Exact Distribution of Access Delay in IEEE DCF MAC

Size: px
Start display at page:

Download "Exact Distribution of Access Delay in IEEE DCF MAC"

Transcription

1 Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. teerawat, tao, ekram, Abstract This paper presents an analytical framework to calculate the probability mass function (pmf) of channel access delay in IEEE 8.11 Distributed Coordination Function (DCF) Medium Access Control (MAC) mechanism. The access delay is defined as the time between a station chooses a new backoff value and the time it is able to access the channel for data packet transmission. Using a Markov process, the access delay is modeled as having phase-type distribution. Since the back-off is frozen when the channel is sensed busy, the access delay distribution is observed to be composed of noncontinuous clusters. The envelope of the pmf as well as the envelope of each cluster resemble hyper-exponential distribution. While the proposed model is flexible enough to accommodate any distribution of MAC data frame length, the numerical results presented in this paper are for the fixed-length data frames. The model would be useful in many aspects such as queueing analysis and/or designing energy-efficient MAC protocols compatible with the IEEE 8.11 DCF standard. Index Terms IEEE 8.11 DCF, channel access delay, discrete time Markov chain, phase-type distribution. I. INTRODUCTION During the past few years, wireless local area networks (WLANs) have become very popular in a broad range of applications. Today, WLANs are deployed in many places like universities, corporate offices, airports, or even residential houses. Most of these WLANs are based on the IEEE 8.11 standard [1], first launched in Since then, the standard has been thoroughly investigated in two major aspects. The first aspect aims at improving the performance of IEEE 8.11, while the second is to analyze the performance of IEEE In this paper, we limit our study to analyzing the medium access control (MAC) performance of the IEEE IEEE 8.11 specifies Point Coordination Function (PCF) and Distributed Coordination Function (DCF) as its MAC protocols. Due to its distributed nature, DCF is more challenging to analyze and optimize. One of the earliest analytical works on modeling and analysis of DCF was presented in [] assuming continuously backlogged data flows (i.e., under saturation condition) and errorfree wireless channel. Performance of DCF MAC under saturation condition in presence of random errors due to wireless channel was analyzed in [3] and [4] considering limited persistence automatic repeat request (ARQ)-based error recovery protocol. However, all these works derived only long-term average throughput and delay assuming that the back-off value is not frozen This work was supported in part by the Telecommunications Research Labs (TRLabs), Winnipeg, Canada, in part by the Natural Sciences and Engineering Research Council (NSERC) of Canada, and in part by University of Manitoba Graduate Fellowship (UMGF). when the channel is busy, which may not be the case for 8.11 DCF. By overcoming this limitation, the performance of DCF MAC under non-saturation condition was analyzed in [5] and [6] based on a M/G/1/K and a G/G/1 queueing model, respectively. Utilizing Z-transform, [5] and [6] developed a methodology to calculate the probability generating function (PGF) of average MAC-layer access delay 1 for uniformly distributed data frame length. However, to obtain the probability mass function (pmf) from the PGF, it requires to perform inversion of Z-transforms which might be computationally very expensive. This paper resorts to a matrix-based approach, which avoids the use of complicated transformations and directly calculates the exact pmf of MAC-layer channel access delay. Unlike [5] and [6], we propose an efficient approach to iteratively determine the pmf of the access delay time. While [5] and [6] obtained the expected access delay by differentiating the calculated PGF, we derive a closed-form solution (which is computationally much more efficient) for this metric. Also, rather than assuming a uniform distribution for packet lengths, we generalize our model to support any packet length distribution. Moreover, the pmf for access delay can be obtained for any given back-off window size, which is significant in that this information can be used for buffer management/packet dropping at a mobile station. Classified as phase-type (P H) distribution, the derived results can later be extended for queueing analysis of IEEE 8.11 DCF, for example, by using G/PH/1 or BMAP/PH/1 models. The organization of the rest of the paper is as follows. Section II provides the preliminaries on the IEEE 8.11 DCF and the P H-distribution. In Section III, we present a Markov model for analyzing channel access delay for the 8.11 DCF MAC in which the access delay is modeled to have a PH distribution. Section IV discusses the numerical and the simulation results, and some useful implications of the obtained results. Finally, conclusions are stated in Section V. A. IEEE 8.11 DCF MAC II. BACKGROUND IEEE 8.11 DCF consists of two main mechanisms: contention window adjustment and back-off mechanisms [1]. Once a station (STA) is turned on, it sets the contention window to the minimum value (CW min ). The contention window is doubled for every transmission failure until it reaches the maximum 1 Average MAC-layer access delay is the access delay averaged over all possible back-off values and contention windows.

2 value (CW max ). If the transmission is successful, the contention window will be reset to CW min. The back-off mechanism in IEEE 8.11 DCF MAC is illustrated in Fig. 1. After window adjustment, an STA waits for Distributed InterFrame Space (DIFS) period of time and calculates a back-off value which is a random variable uniformly distributed between and CW (CW is the value of the current contention window). After this point, the back-off value is decreased by one for every idle time slot. When the channel becomes busy, the back-off is frozen until the channel is idle for DIFS period of time. At the end of DIFS, the back-off value is still the same as what it was before the channel had been busy [5],[7]. After that, the STA starts decreasing the back-off value by one for each subsequent time slot. When the back-off value reaches zero, the STA can transmit data in the next time slot. Fig. 1. Back-off = DIFS = L = MAC-Layer Delay Channel Busy (L) DIFS Back-off mechanism in IEEE 8.11 DCF. Data Transmission As an option, the IEEE 8.11 DCF MAC can use a handshake mechanism to reduce the impact of hidden nodes. As in Fig., an STA intending to transmit data must first transmit a Ready To Send (RTS) packet. Upon receiving an RTS packet, the receiving node transmits a Clear To Send (CTS) packet back to the sender. Then, the sender can start sending a DATA packet. Finally, the receiver informs the sender of successful reception by sending back an ACKnowledgment (ACK) packet. Except for the RTS, each STA has to sense the channel idle for Short InterFrame Space () period of time before sending any packet. Since is shorter than DIFS, only the RTS packet will be vulnerable to collision if all STAs are in the same area. Fig.. DIFS Transmitter Receiver RTS Other nodes CTS DATA NAV(DATA) NAV(CTS) NAV(RTS) Handshake mechanism in IEEE 8.11 DCF. ACK B. Absorbing Markov Chain and P H Distribution An absorbing Markov chain is a Markov process which finally stops at an absorbing state [8]. Consider a discrete time Markov chain (DTMC) with the first state and all the subsequent states being absorbing and transient states, respectively. A general form The channel is considered to be idle when there is no on-going transmission. of the corresponding transition probability matrix (TPM) P 3 can be written as in (1) below ( ) 1 P = (1) ω Ω where the matrices ω and Ω are called absorbing and transient TPMs, respectively. Throughout this paper, we denote all-zero, all-one, and identity matrices by, e, and I, respectively. The pmf that the DTMC is absorbed at step d (f D (d)) and the expected time to absorption (E[D]) can be calculated from ()-(3) [9] α, d = f D (d) = αω d 1 () ω, d 1 E[D] = α(i Ω) 1 e (3) where α and α represent the probability that the DTMC starts at the absorbing and the transient states, respectively. III. MODELING AND ANALYSIS OF CHANNEL ACCESS DELAY UNDER IEEE 8.11 DCF MAC A. System Model and Assumptions Consider an 8.11 WLAN with N mobile stations (STAs). The STAs are assumed to be in the range of each other and each STA implements the IEEE 8.11 DCF with the same parameter settings. We assume that unsuccessful data transmission is caused only by data collision (i.e., when more than one STA transmits simultaneously). In presence of the handshake mechanism, collisions are associated only with the RTS packets when the back-off values of more than one backlogged STAs expire in the same time slot. If an RTS is successfully transmitted, other STAs will refrain from transmission and no collision will occur. We model the system with variable-size data frames, and also simplify the results for a special case with fixed size data frames. B. Mathematical Model We define MAC-layer access delay as the time interval from the point where the contention window is adjusted to the point where the back-off value becomes zero (Fig. 1). The access delay is therefore conditioned on the current contention window. We also define unconditional MAC-layer access delay as an interval from the point where the contention window is set to CW min to the point where the transmission is successful. In the following, we model the access delay in terms of transmission probability (p tx ) which is defined as the probability that an STA will have zero back-off value and have data to transmit. Under saturation condition, p tx can be calculated by using the method in []. Under non-saturation condition, p tx can be approximated by the model in [5]. We divide the analysis into two parts. The first part derives the pmf of channel access delay conditioned on a particular value of back-off timer. The second part utilizes the results from the first part and calculates the unconditional pmf of the channel access delay. 3 Throughout this paper, we use regular and boldface letters to represent scalar values and matrices, respectively.

3 1) Channel Access Delay Conditioned on a Back-off Value: Consider a two-dimensional absorbing DTMC (B n, T n ) defined at time slot n. The first variable, B, 1,, B} is the backoff value. The second variable, T n 1,, L} is the length of a busy period due either to data transmission or collision. The DTMC starts (initial state) from the point where B = B and finishes when B = (in an absorbing state). Based on this formulation, the corresponding TPM, P can be formulated as in (1), where (ω Ω) = [Q] i,j = [R] i,j = Re Q R Q R Q R Q p c, i = 1, j = L c p dj, i = 1, j = L dmin,, L dmax } 1, i =,, L}, j = i 1 1 pc p d, i = 1, j = 1 p dj = p d f Ldata (j L HDR ), p d = j (4) (5) (6) p dj. (7) In the above equations, [A] c,d represents the entry in row c column d of matrix A, L d = L DAT A + L HDR, L HDR = L RT S + L CT S + L ACK + 3L SIF S + L DIF S, and L c = L RT S + L EIF S. Here, L RT S, L CT S, L DAT A, L ACK, L DIF S, L SIF S, and L EIF S (Extended InterFrame Space) are the lengths of the corresponding packets and f Ldata (l), l L dmin L HDR,, L dmax L HDR } is the probability that the length of DAT A is l. Matrices R and Q with size L = maxl c, L dmax } represent the probability that the back-off counter will and will not decrease in the next step (or time slot). Embedded in R (the back-off decreases by one) is the probability (1 p c p d ) that the channel will be idle. With probabilities p c and p dl, the process moves to column L c and l of Q (the back-off remains the same), where p d = (N 1) p tx (1 p tx ) N (8) p c = 1 (1 p tx ) N 1 p d. (9) After Q and R matrices are formulated, we use () and (3) to calculate pmf (f D B (d b)) and the expectated channel access delay (E[D B]). Mathematically, f D B (d b) = αω d 1 ω (1) E[D B] = α(i Ω) 1 e (11) where α is an initial probability row vector, whose entry L(B 1) + 1 is one and all other entries are zero. From (1) and (11), the complexity of calculating f D B (d b) and E[D B] can be determined based on the complexity of computing Ω d 1 and the matrix inversion (I Q) 1. Since the size of Ω is fairly large, calculation of (1) and (11) could require substantial amount of memory and computational effort. Hereafter, we simplify the solution for a special case with fixedsize data length, where L max = L d and f L (l) is 1 for l = L d L HDR and is zero otherwise. The solutions for f D B (d b) and E[D B] in this case can be calculated with reduced complexity (of O(L ) and O(1), respectively, compared to O(L 3 )). Using the sparse structure of α and ω, we can expand (1) and (11) as follows: f D B (d b) = (1 p d p c ) [Ω d 1 ] L(B 1)+1,1 (1) E[D B] = B L [(I Ω) 1 ] L(B 1)+1,j. (13) Since Ω is a bi-diagonal matrix, [Ω k ] i,j in (1) can be calculated by using the following heuristics: Q [Ω k ] i,j, i = j [Ω k+1 ] i,j = R [Ω k ] i 1,j + Q [Ω k ] i,j, i < j (14), i > j [ Ω 1 ] Q, i = j = R, i = j + 1 (15) i,j. The model complexity can be further reduced by considering the special structures of Q and R. Denoting row i of an arbitrary matrix A by A i, we simplify (14) to pc A (QA) i = Lc + p d A Ld, i = 1 (16) A i+1, i =,, L} (1 pc p (RA) i = d ) A 1, i = 1 (17), i =,, L}. This special structure also leads to the closed-form solution for E[D B] as in (18) E[D B] = B(1 + p c(l c 1) + p d (L d 1)) 1 p c p d = B t B (18) where t B is the time required for the back off value to decrease by one unit. The proof of (18) is given in the Appendix. Note that, t B can be obatined by multiplying the average busy period (1 + p c (L c 1) + p d (L d 1)) with 1/(1 p c p d ), the average number of busy periods. The access delay for back-off B is just the time required for the back-off value to decrease by B units. ) Unconditional Channel Access Delay: Using the total probability theorem, we derive the pmf for the unconditional channel access delay (f D (d)) as follows: f D (d) = M f D W (d w i ) π wi (19) i=1 where f D W (d w) is the pmf of access delay conditioned on contention window w, π wi = [π w ] 1,i is the probability that the contention window is w i, and M is the number of back-off windows. We calculate π w by using a DTMC W n representing the contention window of an STA at the moment that it is adjusted. Based on the window adjustment mechanism discussed in section II-A, we formulate the TPM (W) with size M for this DTMC as in (). By using the limiting property of the DTMC, namely, π w = π w W, we obtain π w in (1). Then, we calculate f D W (d w) from (), by using Bayes s theorem.

4 1 p c p d, i = 1,, M}, j = 1 p W = c + p d, i = j 1, j =,, M} or i = M, j = M. (1 p c p d ) (p c + p d ) i 1, π wi = i = 1,, M 1} (p c + p d ) i 1, i = M. f D W (d w) = b= = 1 w P rb = b W = w} f D B (d b) b= () (1) f D B (d b). () In (), P rb = b W = w} = 1/w is the probability that an STA selects its back-off value b when the current contention window is w, and f D B (d b) is calculated by using (1). Finally, we calculate the pmf for the unconditional access delay by using (1) and () in (19). Similarly, we calculate the expected MAC-layer access delay conditioned on contention window w (E[D w]) and unconditional expected MAC-layer access delay (E[D]) as follows: E[D w] = E[D] = b= M i=1 1 w b t B = w 1 t B (3) w i 1 t B π wi = W 1 t B. (4) Similar to E[D B], E[D w] is the product of average backoff decreasing time and the average back-off value. In the unconditional case, E[D] is obtained by replacing w with the average contention window W (= M i=1 w i π wi ). IV. NUMERICAL AND SIMULATION RESULTS A. Parameter Settings and Model Validation Unless otherwise specified, we assume the parameter setting as in Table I [1]. Each STA operates under saturation condition and we calculate the value of p tx using the method in []. The results for the non-saturation case can be obtained by calculating p tx following [5]. We derive the pmf (f D (d)) of the MAC-layer access delay for a tagged STA in presence of other N 1 STAs. Based on fixed DATA frame length specified in Table I, L c = 7 time slots and L d = 4 time slots. To validate our model, we run simulations with the same settings as those used for obtaining the numerical results from the model. All the simulation results are observed to be fairly close to those obtained from (19). However, we only show simulation results in Fig. 3 for the sake of better legibility of the figures. B. Numerical Results Fig. 3 reveals that the channel access time distribution is noncontinuous and consists of several clusters. Due to fixed length L d, data transmission by one of the other STAs increases the access delay by L d. The n th (n > ) cluster in the pmf is contributed mostly by n data transmissions (by other STAs) TABLE I DEFAULT PARAMETER SETTING FOR IEEE 8.11 DCF Parameter Value Channel Rate Mbps Slot Time µs L SIF S 1 µs L DIF S 5 µs Physical Header 19 bits MAC Header 7 bits L RT S 16 bits L CT S 11 bits L DAT A 8 bits L ACK 11 bits Range of Contention Window [3, 14] Number of STAs 5 before the tagged STA acquires a channel access. Therefore, these clusters are located at approximately L d time slots apart and each cluster peak decreases at the rate of p d. Probability mass function Model Simulation Fig. 3. Probability mass function of channel access delay (for the parameters as shown in Table I). Within cluster n, the first non-zero probability is due to the tagged STA selecting back-off value of 1 and the channel becomes idle in the slot after n consecutive data transmissions. Higher probability of channel access delay in cluster n results from increasing idle back-off slots. Each idle slot occurs with probability 1 p c p d. Therefore, the probability of increasing access delay decreases geometrically with rate 1 p c p d. However, there are ( ) n+i n combinations which correspond to n data transmissions and i idle slots, resulting in the same access delay nl d +i. With respect to the number of idle slots, the probability of higher access delay increases due to the combination coefficient and decreases due to the geometric decreasing rate. Not until reaching the L th c entry in cluster n, will the pmf be contributed by another possibility: n data transmissions and one collision. Again, the pmf after this point increases due to the combination coefficient, and decreases because of 1 p c p d. This phenomenon repeats every L c time slots but the intensity is scaled down due to more number of collisions. Since L c is comparatively small, the tail of a sub-cluster contributed by data collision spreads out to neighboring sub-clusters, and the tails within each cluster do not fluctuate considerably. Fig. 4 plots the pmf with similar settings but the number of STAs is now changed to 15. In this case, p d increases from 16.5% to 8.7%, and p c increases from 1.9% to 6.75%. Since 1 p c p d is smaller, each peak decays more quickly. Now, each spike does not spread to adjacent spike as much as

5 Probability mass function Probability mass function it does in Fig. 3. We can observe more clearly that each subcluster contributed by data collision decreases exponentially and occurs at L c time slots apart. Also, since the height of the first spike in each cluster decreases geometrically, the cluster peak shifts to the right as the cluster number (n) increases. Now, we can observe that the envelope of each cluster resembles hyperexponential distribution, whose mean shifts to the right as n increases. Similarly, each spike in a particular cluster can also be modeled by the same distribution with right-shifted mean for increasing access delay. 6 x Fig. 4. Probability mass function of channel access delay for 15 STAs. Although each spike dies out more quickly, since p c is larger in this case, there are more number of discernible spikes in each cluster (as compared to those in Fig. 3). This is especially true for large n, where there are lesser number of idle slots. Compared to Fig. 3, there are more number of non-negligible clusters, each of which occupies more space in time Fig. 5. Probability mass function of access delay when data length is 4 bits. Next, we set DATA length to 4 bits (correspondingly L d = 5 slots) and plot the pmf in Fig. 5. In this case, the clusters are more closely located. The sub-clusters within a cluster spill over other sub-clusters, both in the same and different clusters. Due to this overlapping, each cluster looks smoother than each of those in Fig. 3. However, since p c and p d are the same as those in Fig. 3, there are approximately 1 significant clusters in Fig. 5 (as in Fig. 3). V. CONCLUSIONS We have modeled the channel access delay for IEEE 8.11 DCF MAC as having phase-type distribution. We have used the special structures of the transition probability matrices to reduce the computational complexity and the memory requirements to an acceptable level. We have observed that the access delay distribution in the system with fixed data length is non-continuous. The envelope of the distribution resembles a hyper-exponential distribution. Therefore, it could be reconstructed by using only few parameters such as the probability of a slot being idle, data length and collision length. The pmf could be very useful in the design of more efficient MAC protocols as well as for queueing analysis in an IEEE 8.11 network. APPENDIX LEMMA 1: For Ω defined in (4), T, i = j [(I Ω) 1 ] i,j = TRT, i > j where T = (I Q) 1 and R is defined in (6). (5) Proof: We prove (5) by induction. Suppose that T = (I Ω) 1 and that (5) is true when the size of Ω is M. From the relation (I Ω)T = I, (I Q)[T] M+1,j RTRT =, j = 1,, M 1} (I Q)[T] M+1,M RT = (I Q)[T] M+1,M+1 = I. (6) Now let t i be the i th row of T. From (I Q)T = I, t 1 p c t Lc p d t Ld = e T 1 and t i t i 1 = e T i, i =,, L}, where et i is a row vector whose entry i is one and all other entries are zero. Accordingly, t 1 = 1, i = 1 p c+p d, i =,, L c } p d, i = L c + 1,, L d } (7) and the i th row of RT is (1 p c p d )t 1 for i = 1 and is otherwise. Since [RT] 1,1 = 1 and [RT] i,j =, j > 1, (RT) i = RT, i I + and the first row of TRT is t 1. By applying this relation to (6), Lemma 1 is proven. By applying Lemma 1 to (13), L E[D B] = [(B 1) TRT + T] 1,j = B L = B(1 + p c(l c 1) + p d (L d 1)) 1 p c p d (8) which proves (18). REFERENCES [1] IEEE Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE inc. Std., [] G. Bianchi, Performance analysis of the IEEE 8.11 distributed coordination function, IEEE Journal on Selected Areas in Commun., vol. 18, no. 3, pp , Mar.. [3] Z. Hadzi-Velkov and B. Spasenovski, Saturation throughput - delay analysis of IEEE 8.11 DCF in fading channel, in Proc. of IEEE ICC 4, June 4. [4] P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, Performance analysis of IEEE 8.11 DCF in presence of transmission errors, in Proc. of IEEE ICC 4, June 4. [5] H. Zhai, Y. Kwon, and Y. Fang, Performance analysis of IEEE 8.11 MAC protocols in wireless LANs, Wireless Commun. and Mobile Computing, vol. 4, no. 8, pp , Dec. 4. [6] O. Tickoo and B. Sikdar, Queueing analysis and delay mitigation in IEEE 8.11 random access mac based wireless networks, in Proc. of IEEE INFOCOM 4, Mar. 4. [7] C. H. Foh and J. W. Tantra, Comments on IEEE 8.11 saturation throughput analysis with freezing backoff counters, IEEE Communications Letters, vol. 9, no., pp , Jan. 5. [8] K. S. Trivedi, Probability and Statistics with Reliability, Queuing and Computer Science Applications. New York: Wiley & Sons, Inc.,. [9] M. F. Neuts, Matrix-Geometric Solutions in Stochastic Models. The John Hopkins University Press, t 1

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou. Report No. UIUCDCS-R-26-27 UILU-ENG-26-743 A Comprehensive Study of the IEEE 82.e Enhanced Distributed Control Access EDCA) Function by Chunyu Hu and Jennifer C. Hou April 26 A Comprehensive Study of the

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

Service differentiation without prioritization in IEEE WLANs

Service differentiation without prioritization in IEEE WLANs Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs

More information

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing

EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources 1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs

Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure 8 Wireless LANs ABSTRACT Subhashini Krishnasamy Dept of Electrical Communication Engg Indian Institute of Science,

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K

Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K Overload Analysis of the PH/PH/1/K Queue and the Queue of M/G/1/K Type with Very Large K Attahiru Sule Alfa Department of Mechanical and Industrial Engineering University of Manitoba Winnipeg, Manitoba

More information

Timestepped Stochastic Simulation. of WLANs

Timestepped Stochastic Simulation. of WLANs Timestepped Stochastic Simulation 1 of 82.11 WLANs Arunchandar Vasan and A. Udaya Shankar Department of Computer Science and UMIACS University of Maryland College Park, MD 2742 CS-TR-4866 and UMIACS-TR-27-19

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs

Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs 01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,

More information

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Cross-layer Theoretical Analysis of NC-aided Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Angelos Antonopoulos, Member, IEEE, Aris S. Lalos, Member, IEEE, arxiv:408.609v

More information

On the Validity of IEEE MAC Modeling Hypotheses

On the Validity of IEEE MAC Modeling Hypotheses On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie

More information

Generalized Two-Hop Relay for Flexible Delay Control in MANETs

Generalized Two-Hop Relay for Flexible Delay Control in MANETs Generalized Two-Hop Relay for Flexible Delay Control in MANETs 12 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

AN ENHANCED ENERGY SAVING STRATEGY FOR AN ACTIVE DRX IN LTE WIRELESS NETWORKS. Received December 2012; revised April 2013

AN ENHANCED ENERGY SAVING STRATEGY FOR AN ACTIVE DRX IN LTE WIRELESS NETWORKS. Received December 2012; revised April 2013 International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 11, November 2013 pp. 4373 4387 AN ENHANCED ENERGY SAVING STRATEGY FOR AN

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs

On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs Technical Report Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran EPFL, Switzerland, Institute IMDEA

More information

On Selfish Behavior in CSMA/CA Networks

On Selfish Behavior in CSMA/CA Networks On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most

More information

Random Access Protocols ALOHA

Random Access Protocols ALOHA Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population

More information

CSE 123: Computer Networks

CSE 123: Computer Networks CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Waiting-Time Distribution of a Discrete-time Multiserver Queue with Correlated. Arrivals and Deterministic Service Times: D-MAP/D/k System

Waiting-Time Distribution of a Discrete-time Multiserver Queue with Correlated. Arrivals and Deterministic Service Times: D-MAP/D/k System Waiting-Time Distribution of a Discrete-time Multiserver Queue with Correlated Arrivals and Deterministic Service Times: D-MAP/D/k System Mohan L. Chaudhry a, *, Bong K. Yoon b, Kyung C. Chae b a Department

More information

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers

Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S

More information

1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W

1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W [] LAN 263 8522 1-33 514-857 1577 NEC 211-8666 1753 464-861 E-mail: {aoki@, kmr@faculty., shioda@faculty., sekiya@faculty.}chiba-u.jp, k.sanada@elec.mie-u.ac.jp 一般社団法人 電子情報通信学会 信学技報 THE INSTITUTE OF ELECTRONICS,

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH

PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH Remco Litjens 1,FrankRoijers, Hans van den Berg,, Richard J. Boucherie, and Maria Fleuren Knowledge Innovation Center, TNO

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Kyung-Joon Park, Jihyuk Choi, and Jennifer C. Hou Department of Computer Science University of Illinois at

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Modeling the Residual Energy and Lifetime of Energy Harvesting Sensor Nodes

Modeling the Residual Energy and Lifetime of Energy Harvesting Sensor Nodes Globecom 212 - Symposium on Selected Areas in Communications Modeling the Residual Energy and Lifetime of Energy Harvesting Sensor Nodes M. Yousof Naderi, Stefano Basagni and Kaushik R. Chowdhury Department

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)

More information

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Approximate Queueing Model for Multi-rate Multi-user MIMO systems. An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems

Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems Performance Analysis and Evaluation of Digital Connection Oriented Internet Service Systems Shunfu Jin 1 and Wuyi Yue 2 1 College of Information Science and Engineering Yanshan University, Qinhuangdao

More information

Optimal Link Adaptation in Wideband CDMA Systems

Optimal Link Adaptation in Wideband CDMA Systems Optimal Link Adaptation in Wideband CDMA Systems Tim Holliday, Andrea Goldsmith, and Peter Glynn Stanford University Abstract We develop a general framework for optimizing link adaptation for multiuser

More information

LECTURE 3. Last time:

LECTURE 3. Last time: LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate

More information

Collision-aware Design of Rate Adaptation for Multi-rate WLANs

Collision-aware Design of Rate Adaptation for Multi-rate WLANs Collision-aware Design of Rate Adaptation for Multi-rate 82. WLANs Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Park, Member, IEEE, and Chong-kwon Kim, Member, IEEE Abstract One of the key challenges

More information

Delay and throughput analysis of tree algorithms for random access over noisy collision channels

Delay and throughput analysis of tree algorithms for random access over noisy collision channels Delay and throughput analysis of tree algorithms for random access over noisy collision channels Benny Van Houdt, Robbe Block To cite this version: Benny Van Houdt, Robbe Block. Delay and throughput analysis

More information

Chapter 5. Elementary Performance Analysis

Chapter 5. Elementary Performance Analysis Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7

More information

16:330:543 Communication Networks I Midterm Exam November 7, 2005

16:330:543 Communication Networks I Midterm Exam November 7, 2005 l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know

More information

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that

More information

Jitter Analysis of an MMPP 2 Tagged Stream in the presence of an MMPP 2 Background Stream

Jitter Analysis of an MMPP 2 Tagged Stream in the presence of an MMPP 2 Background Stream Jitter Analysis of an MMPP 2 Tagged Stream in the presence of an MMPP 2 Background Stream G Geleji IBM Corp Hursley Park, Hursley, UK H Perros Department of Computer Science North Carolina State University

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting

Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting 1 Channel Selection in Cognitive Radio Networks with Opportunistic RF Energy Harvesting Dusit Niyato 1, Ping Wang 1, and Dong In Kim 2 1 School of Computer Engineering, Nanyang Technological University

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

A FAST MATRIX-ANALYTIC APPROXIMATION FOR THE TWO CLASS GI/G/1 NON-PREEMPTIVE PRIORITY QUEUE

A FAST MATRIX-ANALYTIC APPROXIMATION FOR THE TWO CLASS GI/G/1 NON-PREEMPTIVE PRIORITY QUEUE A FAST MATRIX-ANAYTIC APPROXIMATION FOR TE TWO CASS GI/G/ NON-PREEMPTIVE PRIORITY QUEUE Gábor orváth Department of Telecommunication Budapest University of Technology and Economics. Budapest Pf. 9., ungary

More information

An engineering approximation for the mean waiting time in the M/H 2 b /s queue

An engineering approximation for the mean waiting time in the M/H 2 b /s queue An engineering approximation for the mean waiting time in the M/H b /s queue Francisco Barceló Universidad Politécnica de Catalunya c/ Jordi Girona, -3, Barcelona 08034 Email : barcelo@entel.upc.es Abstract

More information

A DIFFUSION MODEL FOR UWB INDOOR PROPAGATION. Majid A. Nemati and Robert A. Scholtz. University of Southern California Los Angeles, CA

A DIFFUSION MODEL FOR UWB INDOOR PROPAGATION. Majid A. Nemati and Robert A. Scholtz. University of Southern California Los Angeles, CA A DIFFUION MODEL FOR UWB INDOOR PROPAGATION Majid A. Nemati and Robert A. choltz nematian@usc.edu scholtz@usc.edu University of outhern California Los Angeles, CA ABTRACT This paper proposes a diffusion

More information

MARKOV PROCESSES. Valerio Di Valerio

MARKOV PROCESSES. Valerio Di Valerio MARKOV PROCESSES Valerio Di Valerio Stochastic Process Definition: a stochastic process is a collection of random variables {X(t)} indexed by time t T Each X(t) X is a random variable that satisfy some

More information

Performance Analysis of ARQ Protocols using a Theorem Prover

Performance Analysis of ARQ Protocols using a Theorem Prover Performance Analysis of ARQ Protocols using a Theorem Prover Osman Hasan Sofiene Tahar Hardware Verification Group Concordia University Montreal, Canada ISPASS 2008 Objectives n Probabilistic Theorem Proving

More information

Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802.

Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802. Effective Capacity-based Stochastic Delay Guarantees for Systems with Time-Varying Servers, with an Application to IEEE 802.11 WLANs Emmanouil Kafetzakis a,b, Kimon Kontovasilis a,, Ioannis Stavrakakis

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE June 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-30 June 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010

Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems. Technical Report: TR-CSE March 2010 Residual White Space Distribution Based Opportunistic Channel Access Scheme for Cognitive Radio Systems Technical Report: TR-CSE-010-6 March 010 Manuj Sharma, Anirudha Sahoo Department of Computer Science

More information

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch

A Starvation-free Algorithm For Achieving 100% Throughput in an Input- Queued Switch A Starvation-free Algorithm For Achieving 00% Throughput in an Input- Queued Switch Abstract Adisak ekkittikul ick ckeown Department of Electrical Engineering Stanford University Stanford CA 9405-400 Tel

More information

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems

Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems HyeJeong Lee, Woon-Young Yeo and Dong-Ho Cho Korea Advanced Institute of Science and Technology Abstract The cdma2000 1xEV-DO standard

More information

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov

More information

ATM VP-Based Ring Network Exclusive Video or Data Traffics

ATM VP-Based Ring Network Exclusive Video or Data Traffics ATM VP-Based Ring Network Exclusive Video or Data Traffics In this chapter, the performance characteristic of the proposed ATM VP-Based Ring Network exclusive video or data traffic is studied. The maximum

More information

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

A Game-Theoretic Model for Medium Access Control

A Game-Theoretic Model for Medium Access Control A Game-Theoretic Model for Medium Access Control (Invited Paper) Lijun Chen, Tao Cui, Steven H. Low, and John C. Doyle Division of Engineering and Applied Science California Institute of Technology Pasadena,

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

Entropy in Communication and Chemical Systems

Entropy in Communication and Chemical Systems Entropy in Communication and Chemical Systems Jean Walrand Department of Electrical Engineering and Computer Sciences University of California Berkeley, CA 94720 http://www.eecs.berkeley.edu/ wlr Abstract

More information

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels

Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Feedback Capacity of a Class of Symmetric Finite-State Markov Channels Nevroz Şen, Fady Alajaji and Serdar Yüksel Department of Mathematics and Statistics Queen s University Kingston, ON K7L 3N6, Canada

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,

More information

Part I Stochastic variables and Markov chains

Part I Stochastic variables and Markov chains Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)

More information

A Markov chain approach to quality control

A Markov chain approach to quality control A Markov chain approach to quality control F. Bartolucci Istituto di Scienze Economiche Università di Urbino www.stat.unipg.it/ bart Preliminaries We use the finite Markov chain imbedding approach of Alexandrou,

More information

Mean Field Markov Models of Wireless Local Area Networks

Mean Field Markov Models of Wireless Local Area Networks Mean Field Markov Models of Wireless Local Area Networks Ken R. Duffy 26 th September 2010; revised 8 th April 2010. To appear in Markov Processes and Related Fields Abstract In 1998, Giuseppe Bianchi

More information

DIFS DIFS DIFS DIFS DIFS DIFS. defer

DIFS DIFS DIFS DIFS DIFS DIFS. defer A apacity Analysis for the I 802.11 MA Protocol Y.. Tay K.. hua National University of Singapore Abstract The recently proposed I 802.11 MA protocol provides shared access to a wireless channel. This paper

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

A New Technique for Link Utilization Estimation

A New Technique for Link Utilization Estimation A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables S. Amarnath and Anurag Kumar* Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Appendix A Prototypes Models

Appendix A Prototypes Models Appendix A Prototypes Models This appendix describes the model of the prototypes used in Chap. 3. These mathematical models can also be found in the Student Handout by Quanser. A.1 The QUANSER SRV-02 Setup

More information

Analysis and Performance Evaluation of Dynamic Frame Slotted-ALOHA in Wireless Machine-to-Machine Networks with Energy Harvesting

Analysis and Performance Evaluation of Dynamic Frame Slotted-ALOHA in Wireless Machine-to-Machine Networks with Energy Harvesting and Performance Evaluation of Dynamic Frame Slotted-ALOHA in Wireless Machine-to-Machine Networks with Energy Harvesting Shuang Wu, Yue Chen, Kok K Chai Queen Mary University of London London, U.K. Email:

More information

THE Slotted Aloha (S-Aloha) protocol, since its appearance

THE Slotted Aloha (S-Aloha) protocol, since its appearance IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 26, NO. 1, FEBRUARY 2018 451 The Throughput and Access Delay of Slotted-Aloha With Exponential Backoff Luca Barletta, Member, IEEE, Flaminio Borgonovo, Member,

More information

Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis

Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis Traversing Virtual Network Functions from the Edge to the Core: An End-to-End Performance Analysis Emmanouil Fountoulakis, Qi Liao, Manuel Stein, Nikolaos Pappas Department of Science and Technology, Linköping

More information

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels On the Optimality of Myopic Sensing 1 in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels Kehao Wang, Lin Chen arxiv:1103.1784v1 [cs.it] 9 Mar 2011 Abstract Recent works ([1],

More information