An Analysis of TCP over Random Access Satellite Links

Size: px
Start display at page:

Download "An Analysis of TCP over Random Access Satellite Links"

Transcription

1 An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA mayliu, Abstract This aer analyzes the erformance of over satellite links with random access. The system considered consists of large number of identical source-destination airs, each emloying at its transort layer and a random access scheme at its layer. Simle formulas that well cature the system erformance are given, and some imortant roerties of the system erformance are resented as well. Secifically, in order to analyze the system, we roose a simlified version of the system. We then develo formulas for obtaining the throughut of this simlified system as a function of various system and rotocol arameters. Based on these formulas, it is shown that the maximum ossible system throughut is /e, which can be achieved only when the system arameters satisfy a given condition. The otimal layer transmission robability at which the throughut is maximized is derived as well. Furthermore, the imact of varying system and rotocol arameters on the system erformance is analyzed. The results show that for systems with very small roagation delay or very large number of source-destination airs, a throughut of /e can be achieved by setting the layer transmission robability to its otimal value. However, when the number of users is (relatively) small or the roagation delay is (relatively) large, the maximum achievable throughut can be substantially smaller than /e. Although the analysis is based on the simlified system, simulations on the original system show that the formulas and the above results can be used to describe the erformance of the original system as well. I. INTRODUCTION In this aer we consider the erformance of over a shared satellite link with random access (i.e., Aloha). Satellite links are inherently different from terrestrial links, and the erformance of over satellite has received a great deal of attention over the ast decade. Most revious work has focused on the imact of the large roagation delays and high bit error rates associated with satellite links, [], [4], [5], [6]. Overviews are given in [3], [8]. This aer addresses the multi-access nature of satellite networks, and analyzes the erformance over satellite links when a ure random access scheme is emloyed at the layer. In articular, the system considered consists of large number of identical ersistent source-destination airs, each air emloying at its transort layer and each source emloying a random access scheme at its layer. In order to analyze the system, we roose an simlified system that differs from the above system in that the transort layers emloy a simlified version of window flow control. For this simlified system, an analytical model is develoed, and equations are derived for solving for the system throughut, idle robability and collision robability. Based on the equations, we show that the maximum achievable throughut is /e and give a necessary and sufficient condition for achieving it. The imact of system and rotocol arameters on the system erformance is obtained both analytically and numerically. Finally, the erformance of the original system is examined by simulations and the results are comared with those numerical results obtained from the formulas for the simlified system. The results show that although the analysis and formulas are based on the simlified system, they are a good aroximation of the original system and all the results obtained are valid for the original system as well. The aer is organized as follows: the next section gives a detail descrition on the systems and rotocols examined. In Section III we develo an analytical model for the simlified system. Using this analytical model, Section IV gives formulas for the system s throughut, the conditions for achieving the maximum throughut, as well as the otimal layer transmission robability. The imact of various system arameters on erformance is also examined in Section IV, both analytically and numerically, and simulation results for the original system are resented and comared with the numerical results as well. Section V discusses the imlications of the various assumtions and concludes the aer. II. SYSTEM DESCRIPTION The system we consider consists of N identical sourcedestination airs (SD airs), where N is large, as shown in Figure. Each of the N sources has unlimited number of ackets to be sent to its corresonding destination. All N sources share a common channel to the satellite. Each SD air emloys at its transort layer for congestion control urose, and all sources emloy a simlified version of ALOHA multi-access scheme at their layer for multiaccess urose. For simlicity, we ignore the timeout udate of based on its round tri time measurements, and assume that the timeout value is a random variable with mean TO slots. The ALOHA schemes will be described in detail later. For all SD airs, all ackets have the same length and each acket requires one time unit (called a slot) for transmission. The two-way roagation delay, defined to be the duration between the time when a acket is successfully transmitted by

2 the layer of the source and the time when its corresonding acknowledgement is received by the source, is a random variable with mean D slots. Here the randomness reresents the queuing delays and other random delays exerienced by the ackets. To focus on the imact of random access, assume that there are no other acket losses in the network excet losses due to layer collisions. Sat. TABLE I WINDOW EVOLUTION AND ROUNDS ACK window acket round first acket number of ackets size released in round in round 2 2, , , two-way roagation delay D S S2 SN D D2 DN Fig.. System with over Random Access The simlified version of ALOHA multi-access scheme works as follows: When one or more ackets are available in the layer buffer, the layer transmits the first acket with robability. If two or more ackets are transmitted in a given slot, a collision occurs and all ackets are assumed lost. If only one acket is transmitted in a given slot, the acket is successfully received. The difference between this scheme and ordinary ALOHA lies in that here we do not allow retransmissions of ackets involved in collisions at the layer. This assumtion is reasonable over a satellite link as retransmissions at the layer will almost certainly result in a time-out event, which can be easily verified. As with ALOHA, each layer of the system can be viewed as a queuing system, with all arrivals coming from its corresonding transort layer and geometrically distributed service time with mean /. In order to obtain an analytical model, we consider a simlified system that differs from the above system only in that it has a different window flow control (WFC) scheme. Its WFC scheme is similar to that in the congestion avoidance hase of but without the fast retransmit/recovery otion. In articular, it works as follows: Initially the window size W =. Uon an acknowledgement, the window size is udated to be W W + W. Uon a timeout, the window size is reset to be W. We also assume that the transort layer emloys a selective reeat retransmission rotocol and retransmits only those ackets that were lost. Furthermore, we assume that the timeout value is large enough that the robability of timeout due to queuing delay at the layer can be ignored. Recall that there are no losses other than collision losses. Hence, timeouts can only be triggered by layer collisions. The analysis henceforth will be based on the simlified system with these assumtions, and we therefore call the simlified system the system when there is no ambiguity. Nevertheless, the analytical results match well with the simulations for the original system with without timeout udate, as will be resented in Section IV. Including timeout udate into analysis is art of our future work. For convenience, we borrow the concet of round from [7] at the transort layer, with extension that includes the timeout signal: a round starts with transmission of W ackets, where W is the current window size of the congestion window. Once all ackets falling within the congestion window have been sent, no other ackets are sent until the first ACK for one of these W ackets or a timeout signal is received. This ACK recetion or timeout marks the end of the current round and the beginning of the next round. We further index the ackets sent and the rounds between two successive timeouts in order, i.e., acket k isthe kth acket and round k is the kth round. The ACK for acket k is called ACK k. Table I illustrates the window evolution and rounds between two successive timeouts for the simlified system. For examle in Table I, each time when the window size is increased by, there are two ackets released. Otherwise, there is one acket released. After the window size reaches 3, there are three ACKs received, namely ACK 3,4 and 5, before the window size reaches 4. Corresondingly, four ackets are released, namely acket 5, 6, 7 and 8. These are shown in column to column 3. Round 4 begins with ACK 4, which is the first ACK of ackets in round 3, and the first acket in round 4 is acket 7. ACK 7 thus becomes the first ACK of ackets in round 4 and marks the end of round 4 and beginning of round 5. This is shown in the 4th and 5th columns. By counting the number of ackets in round 4, we obtain 4, which is shown in the last column. III. PERFORMANCE ANALYSIS In the following we first consider the entire system including all SD airs, and then examine one SD air in isolation. The combined analysis yields formulas that together can be used to solve for the system erformance. A. Analysis at the System Level For every sender/receiver air, define the throughut as the number of ackets correctly received by the receiver er unit

3 time, and the send rate as the number of ackets sent by the sender er unit time. That is, the send rate includes both ackets that are included in throughut and the ackets that are lost due to collisions. By assuming equivalence between time average and ensemble average, the throughut is also the robability that in a slot, a acket is correctly received by the receiver. Similarly, the send rate is also the robability that in a slot, a acket is sent by the sender. In our system, on one hand, we have two layers, the transort layer and the layer. We therefore have definitions of throughut and send rate at both layers. On the other hand, the layers receive ackets only from their corresonding transort layers. Therefore, the send rate at both layers are the same. In addition, collision losses at the layers are the only losses in the system. So the throughut at both layers are the same as well. Henceforth, we use the name throughut and send rate to refer to the throughut and send rate at both layers. Besides, the throughut and send rate can refer to those of a single SD airs and those of all N SD airs. We call those for a single SD air individual throughut and send rate, and denote them by λ d and B d, resectively. We call those for all N SD airs system throughut and send rate, and denote them by λ s and B s, resectively. From the above definitions and discussions of throughut and send rate, we conclude that in our system, the system throughut λ s is the robability that there is exactly one layer sending a acket in a slot. For one articular SD air, the individual send rate B d is the robability that the layer of this SD air sends a acket in a slot. Since we have a large number of SD airs (N is large), we further assume that for a articular SD air, its state is indeendent of the state of other SD airs. We hence have the following relationshi between the system throughut, idle robability, collision robability and the individual send rate: λ s = NB d ( B d ) N NB d e NB d, P I =( B d ) N e NB d, P C = λ s P I. (a) (b) (c) where P I and P C are the idle robability and collision robability, resectively, and the aroximations hold when B d is small and N is large. On one hand, due to the indeendent assumtion, the above analysis is similar to that of a standard ALOHA system. The equations in () show that, as in an ALOHA system, the number of ackets correctly received in a slot can be aroximated by a Poison random variable, with the attemt rate NB d as its mean. The maximum ossible throughut can be achieved at NB d =, with the corresonding throughut, idle robability and collision robability being /e, /e and 2/e, resectively. On the other hand, different from an ALOHA system, NB d =is not always achievable in our system due to the transort layer window limitation, which will be analyzed in detail later, while in an ALOHA system, attemt rate can always be achieved with roer arameter settings. We henceforth call the system erformance at NB d = ALOHA erformance. Furthermore, under the indeendent assumtion, the effects of other SD airs on one articular SD air are aggregated into one arameter Q, defined to be the robability that all other N layers transmit no ackets in a slot. Since all SD airs are identical, we have: Q =( B d ) N e (N )B d e NB d. (2) Note that although the values of P I and Q are aroximately the same (Equation (b) and (2)), they have different hysical meaning. P I is for all N SD airs, while Q excludes the SD air considered and is for the other N SD airs only. Moreover, the indeendent assumtion also gives λ s = Nλ d and B s = NB d. B. Analysis at the session level As mentioned before, the effects of the other N SD airs on one articular SD air are aggregated into one arameter Q, the idle robability of all other N SD airs. This articular SD air can thus be modelled as a normal transort layer session with collision robability of each acket being Q. This section models one articular SD air as a renewal rocess and obtain an uer bound and a lower bound for its send rate, B d, in terms of Q. For one articular SD air, let s consider after a timeout, what haens before the first collision occurs. All ackets sent before the collided acket won t encounter a timeout, since they encounter no losses and the large timeout value assumtion ensures that their ACKs will be received before the retransmission timer exires. Whereas the collided acket will eventually encounter a timeout, since there is no mechanism other than the transort layer retransmission to recover this collision loss. Therefore, the first collision after a timeout causes a successive timeout. We introduce the concet of cycle to denote the interval between two successive timeouts. Moreover, since the transmissions of the ackets between the first timeout and the collided acket were successful, the transort layer sender will receive some ACKs after the collision and release some new ackets. The large timeout value assumtion ensures that the layer will finish the transmissions of these later released ackets before the second timeout signal. Thus uon each timeout signal, there is no acket in the buffer. In addition, according to the WFC scheme, the window evolves exactly the same after each timeout signal. The timeout signal sequence therefore forms a renewal rocess, and a cycle between two successive timeouts is an inter-arrival eriod of the renewal rocess. Let M be the number of ackets sent during a cycle and T be cycle length. Then by the renewal theory, B d = E[M] E[T ]. (3) To solve for B d, let s first consider E[T ]. Instead of deriving its exact exression, which requires comlicate queuing

4 analysis, we derive an uer bound and an lower bound. Let R be the number of successful round during a cycle and RT O be the timeout value that ends the cycle. Then T is the sum of the duration of these R rounds lus RT O. Each round takes at least the service time of its first acket, denoted by F k for round k, lus the two way roagation delay this acket exeriences, denoted by D k, for the sender to receive its ACK. We therefore have a lower bound for T, denoted by T L,tobe T T L = R k= (F k + D k )+RT O. Similarly, an uer bound for T, denoted by T U, can be obtained when ignoring the overlaing between the service time of each acket and D k of each round k. Mathematically, define Z to be the index of the acket that incurs the first collision and X k to be the service time of acket k. Then T T U = Z k= X k + R k= D k + RT O. Along with the lower bound T L,wehave R Z R (F k + D k )+RT O = T L T T U = X k + D k + RT O. k= k= k= By our multi-access scheme, the service time for each acket is geometrically distributed with mean / and indeendent of each other and R and Z as well. Thus by taking exectations of the above inequality, ( +D)E[R]+TO = E[T L ] E[T ] E[T U ]= E[Z] +DE[R]+TO. (4) Now let s consider E[M]. Recall that acket Z is the acket that incurs the first collision. This means that the revious Z ackets were successfully transmitted and have been or will be ACKed, while acket Z and thereafter won t be ACKed. According to the WFC scheme, new ackets can be released only uon recetion of ACKs. Therefore, M equals to, counting for the first acket, lus the number of ackets triggered by the Z ACKs. In addition in the WFC scheme, each ACK triggers the release of one acket, excet those ACKs that increase the window size by (i.e., the last ACK in a round) where two ackets are released (See Table I for illustration). Let I be the number of such ACKs in the Z ACKs, then M =+(Z ) + I = Z + I. Moreover, the window size is increased by er round. Therefore I = R, and E[M] =E[Z]+E[R]. (5) We now have bounds for E[T ] as in Inequality (4) and E[M] as in Equation (5) in terms of E[Z] and E[R]. Recall that Q is the robability that no other senders send their ackets in one slot and this event is indeendent of the state of the articular SD air. Therefore, each acket of the articular SD air incurs a collision with robability of Q and indeendent of each other. Z is thus geometrically distributed with Pr(Z = z) =Q z ( Q) and E[Z] =/( Q). By exloring the relationshi between R and Z, it can be shown that E[R] = k= Qk(k+)/2. For brevity, we omit the details. By combining them with Equation (3), Inequality (4) and Equation (5), we obtain the following bounds for the send rate B d : Q + k= Qk(k+)/2 ( Q) + D k= Qk(k+)/2 + TO = f L B d f U Q = + k= Qk(k+)/2 ( + D) k= Qk(k+)/2 + TO. (6) Notice that for large enough timeout value TO, both bounds are increasing functions of Q. Mathematically, this can be shown by taking the derivative of the bounds with resect to Q. Physically, from our derivation, the lower bound corresonds to the send rate of the following system: after sending the first acket of each round, the layer holds the transmission of other ackets until it receives the ACK of the first acket. This is how we obtain the uer bound for the duration T between two successive timeouts. Clearly, the send rate of this system increases with the idle robability of the other N SD airs Q. Similarly, the uer bound corresonds to the send rate of the following system: after sending the first acket of each round, the layer finishes the transmission of all other outstanding ackets before it receives the ACK of the first acket, that is, within time D k for round k. Thisis how we obtain the lower bound for the duration T between two successive timeouts. Again, the send rate of this system increases with the idle robability of the other N SD airs Q. To fully under the system behavior, the exectation of the collision window W z, defined to the window size when the collided acket Z is released (i.e., when the collision occurs), can also be shown to be: E[W Z ]=+ k=2 Again for brevity, we omit the details. Q k(k+) 2 2. (7) IV. SYSTEM PERFORMANCE Section III-A analyzes N SD airs together and gives one relationshi between the individual send rate B d and the idle robability of N SD airs Q, in Equation (2). Section III- B gives an uer bound and a lower bound of B d in terms of Q in Inequality (6). Based on these results, this section first gives bounds for B d and Q in terms of system and rotocol arameters, and then discusses the system erformance. A sufficient and necessary condition for the system to achieve the ALOHA erformance is also given, as well as the otimal layer transmission robability at which the throughut is maximized. The analysis is confirmed by the numerical results under different system and rotocol arameters. This section also gives the simulation results on the original system and comares them with the numerical results for the simlified system. Before roceeding, let s first introduce how we set the system and rotocol arameters in the numerical comutations

5 and simulations. For the systems, we consider the following data that is tyical for a satellite link: the two-way roagation delay of one transmission is around sec; acket size L is about 0000 bits; and transmission rate is around 00k - M bs. Converting these into the arameters in our system, we obtain that the two-way roagation delay is about 0-00 time slots. We therefore set the two-way roagation delay of ackets to be a uniformly distributed random variable with mean D being 0-00 slots and range of 4 slots. As mentioned before, the randomness reresents the queuing delay and other random delayed exerienced by ackets. The transort layer timeout value is also set to be a uniformly distributed random variable with mean TO. Similar to the timeout udate in, TO is set to be the average round tri time seen by the transort layer ackets, denoted by RT T, lus four times its standard deviation. Because of the large roagation delay of satellite links, when is not close to zero, we can ignore the queuing delays the ackets exeriences at the layer and aroximate RT T by the sum of acket service time at the layer and the twoway roagation delay. Recall that the acket service time at the layer is geometrically distributed with mean / and variance ( )/ 2. Therefore, we obtain TO + D +4. Notice that this setting of TO is used only in the numerical comutations and simulations. The following analysis of imact of arameters on the system erformance does not deend on this articular timeout value setting. It only requires that TO decreases with and increases with D, which should be true for other TO settings as well. Simulations are erformed on ns simulator for the original system. The timeout value is set in the same way described above. A. System Performance and Condition for ALOHA Performance Based on the Equation (2) and Inequality (6), this subsection shows how to obtain the system erformance given the system and rotocol arameters. and Q should be on curve g, as well as be inside the area between curve f L and f U. Therefore, B d and Q are on the section of curve g between curve f L and f U. The intersections of curve g with curve curve f L and f U thus give a lower bound and an uer bound for B d as well as a lower bound and an uer bound for Q. Denote them by Bd L and BU d, QL and Q U, resectively. Clearly, Bd L and BU d are solutions of the following two equations, resectively: B d = e NB d + k= e NB dk(k+)/2 + D ( e NB d ) k= e NB dk(k+)/2 + TO, (8a) e B d = + NB d k= e NB dk(k+)/2 ( + D) k= e NB dk(k+)/2 + TO. (8b) Figure 3 lots the system erformance, the system throughut, idle robability and collision robability, as a function of B d, given in Equation (). From the figure we can see that the bounds for B d actually give us the range of the system erformance. Secifically, if both bounds for B d, Bd L and BU d, lie within the same monotonic region of the throughut, i.e., within [0, /N ] or [/N, ] as in Figure 3, then their corresonding throughut, λ L s and λ U s in Figure 3, are also lower and uer bounds for the actual throughut λ s. Otherwise, Bd L [0, /N ] and BU d [/N, ], the actual throughut is close to the maximum ossible throughut /e. Furthermore, since P C and P I are monotonic with B d,the collision robability and idle robability corresonding to Bd L and Bd U are also bounds for P C and P I. As in Figure 3, PC L P C PC U and P I L P I PI U. We thus conclude that the two bounds given in Equations (8), together with Equation (), fully characterize the system erformance. Fig. 3. System Performance with B d Fig. 2. Bounds for B d and Q Figure 2 lots the relationshi between B d and Q as given in Equation (2), called curve g. Figure 2 also lots the bounds of B d, f L and f U, as given in Inequality (6). For clarity, the distances between the curves are exaggerated. The actual B d Our numerical results further show that in almost all cases, these two bounds are very close to each other. Table II gives some numerical results for different system and rotocol arameters N, D and. The difference between Bd L and Bd U is shown in the last column. Henceforth we aroximate the actual B d by Bd U and use B d and Bd U exchangeably. In conclusion, the system erformance is well aroximated by Equations (8b) and (). Now let us find a sufficient and necessary condition on which the ALOHA erformance, with the system throughut

6 TABLE II DIFFERENCES BETWEEN B U d AND BL d D N Bd U Bd L Bd U BL d /e, can be achieved. Recall that this erformance can be achieved if and only if NB d =. By lugging NB d = into Equation (8b) and noting that its solution for B d is unique (see Figure 2), we obtain the following sufficient and necessary condition for the ALOHA erformance: 2.0N 0.42D TO 0.42 =0. (9) Notice that TO is a function of D and. Also notice that due to the limit range of the actual arameters, the above condition cannot be always satisfied by adjusting one arameter with others fixed. For examle for very large D, the solution of the above condition for can be negative, while the actual transmission robability has to be nonnegative. In this case, the ALOHA erformance cannot be achieved by adjusting only. Overall, given the system and rotocol arameters, the system erformance can be solved from Equation () and (8b). Condition (9) is a sufficient and necessary condition for the system erformance to achieve the ALOHA erformance. Due to the limited range of system and rotocol arameters, this condition cannot be always satisfied by adjusting one arameter with others fixed. That is, the ALOHA erformance is not always achievable. The following subsections analyze how the system erformance changes with different system and rotocol arameters. B. Imact of Transmission Probability on System Performance First consider the imact of transmission robability on the system erformance. By the definition of f U (Inequality (6)) and noting that TO is a decreasing function of, f U increases with increasing. Thus as increases, curve f U in Figure 2 moves u. On the other hand, curve g is not a function of and remains the same. Therefore, the intersection of curve g and f U moves leftwards. Consequently, Bd U increases monotonically with. Recall that condition (9) is a sufficient and necessary condition for Bd U to achieve /N. Also note that [0, ] and when = 0, Bd U = 0. Therefore, when increases from 0 to, if the solution of condition (9) for, denoted by max, lies within [0, ], then Bd U increases from 0 to /N then to some number. Consequently, the throughut first increases, then decreases, with maximum /e (see Figure 3). Otherwise, Bd U increases from 0 to some number below /N. Consequently, the throughut increases monotonically with, and the maximum throughut is achieved at =. Similarly, since P I and P C is monotonic with B d, P I decreases monotonically with, and P C increases monotonically with. The above discussion actually gives us the transmission robability at which the throughut achieves its highest value, denoted by ot, as follows: ot = { max when max [0, ] (0) otherwise Moreover, if ot = max [0, ], then the system achieves ALOHA erformance. Otherwise, ot =, and the system erformance, with throughut below /e, can be solved from Equation (8b) and Equation (). Physically, when is very small, the send rate B d is very small (lies in [0,/N]. See Figure 3). Most times the system is idle and few ackets incur collisions. That is, the idle robability P I is high and the collision robability P C is low. Increasing increases B d and P C but decreases P I. Although this leads to more collisions, the number of idle slots also decreases, and the overall system throughut λ s increases. If with increasing, the send rate B d remains below /N after reaches, the throughut increases monotonically with (the case ot =). Otherwise, the send rate B d goes beyond /N after reaches a certain oint ( max < ), the system begins to incur too many collisions, and the throughut begins to dro. That is, in this case, the throughut first increases then decreases, with maximum /e achieved at max. Fig. 4. System Throughut as a Function of Transmission robability By solving Equation (8b) and (), Figure 4 shows the numerical results for the throughut λ s as a function of when D =0and N =20as well as when D =50and N =20. The first case (D =0) corresonds to the case ot <, and as exected, the throughut first increases with then decreases. The second case (D =50) corresonds to the case ot =, and the throughut increases monotonically with. For comarison, the throughut corresonding to Bd L is also shown. We can see that the two throughut curves corresonding to Bd U and BL d are very close to each other, which further confirms that using the throughut corresonding to Bd U to aroximate the actual throughut is good. Figure 4 also lots the simulation results for the original system with the same sets of arameters. It can be seen that the numerical results based on Equation (8b) and () match well with the simulation results for the original system.

7 Moreover, both the numerical results and simulation results for the above cases indicate that the exected collision window decreases monotonically with, with value below 2 for 0.. For brevity, the curves are not shown here. C. Imact of Two-way Proagation Delay on System Performance Analog to the above analysis for, it can be shown that Bd U decreases monotonically with D. For brevity, we omit the details. Furthermore, when D ranges from to infinity, if the solution of condition (9) for D, denoted by D max, lies within [, ], then the ALOHA erformance is achieved at D max. In this case both larger D and smaller D lead to a throughout below /e. Otherwise, D max / [, ], and the throughut increases monotonically with decreasing D and is always below /e. Physically, a low throughut can be either due to too many idle slots or too many collisions. Consequently, for normal and N with D max [, ] and starting from D max, increasing D leads to too many idle slots and reducing D leads to too many collisions. Therefore both result in monotonic decreasing of the throughut with D. While for very small and N with D max / [, ], there are always too many idle slots no matter how small D is. Reducing D thus reduces the number of idle slots and always increases the throughut. Fig. 5. System Throughut as a Function of Two-way Proagation Delay Figure 5 shows the numerical results for the throughut λ s as a function of D [0, 00] when N =20and =0.7 as well as when N =0and =0.7. In the first case (N =20) the ALOHA erformance in achieved around D max 25, while in the second case (N =0), even when D =0, there are still too many idle slots and the throughut is still below /e. To illustrate the imact of adjusting rotocol arameters on the system erformance, for each D in each case, max and ot are also calculated from condition (9) and Equation (0) and the resulting throughut is lotted in Figure 5 as well. The figure shows that for large D, max / [0, ] and ot =. The resulting otimal throughut is below /e. While when D is relatively small, the highest ossible throughut /e can always be achieved by setting the transmission robability = ot = max. That is, we can always lower the transmission robability to counterbalance the increasing collisions resulting from smaller D. Fig. 6. Comarison between Numerical and Simulation Results - Throughut vs Two-way Proagation Delay Simulation results for the original system with the same sets of arameters are lotted in Figure 6. For comarison urose, the numerical results obtained from Equation (8b) and () and lotted in Figure 5 are relotted here as well. Again, the figure shows good match between them. Moreover, the numerical and simulation results for all cases also show that the exected collision window is a nondecreasing function of D and is always below 3. Actually even when D is further increased to 5000, the exected collision window is still below 8. Again for brevity, the curves are not shown here. D. Imact of Number of Users on System Performance The analysis for the imact of the number of users N on the system erformance is also analog to that for the transmission robability. Differently, when N increases from to infinity, curve f U remains the same while curve g moves downwards. Consequently, the intersection of the two curves moves leftwards, and Q L decreases. Recall that NB d increases as Q decreases (Equation (2)). Therefore, NB d increases monotonically with N. Moreover, it can be easily verified that, for any [0, ], D and TO + D (the actual TO should be at least the average RTT of ackets, which is at least + D), the solution of condition (9) for N, denoted by N max, is always greater than. Therefore, as N ranges from to infinity, NB d increases from some value below to infinity. Consequently, the system throughut first increases then decreases, with maximum close to /e achieved at the integer closest to N max. Physically, larger N makes the ackets in the system more dense, which means less idle slots and more collisions. When N is close to N max, the idle slots and collisions reach a balance and the throughut is close to its highest value /e. Further decreasing N or increasing N results in either too many idle slots, or too many collisions, both of which lower the throughut.

8 Fig. 7. System Throughut as a Function of the Number of SD Pairs Figure 7 shows the numerical results for the throughut λ s as a function of N [0, 40] when D =30and =0.7 as well as when D =30and = ot. As mentioned before, the mean timeout value is set to be TO = + D +4.The throughut of the curve with =0.7has maximum value of /e, and first increases then decreases, which confirms the above analysis. The curve with = ot further shows that for large enough N, the maximum ossible throughut /e can be achieved by adjusting the transmission robability according to condition (9). That is, in order to achieve higher throughut, we can always lower the transmission robability to counterbalance the increasing collisions resulting from larger N. Simulations for the original system with the same sets of arameters are also erformed and the results are comared with the numerical results from Equation (8b) and () as well. Again, they have a good match. Besides, both of them give the exected collision window size in all cases being below 3. Again for brevity, the curves are not shown here. In summary, since the numerical curves obtained from the equations match well with the simulation results for the original system, we conclude that the equations can be used to describe the erformance of the original system. In articular, given the system and rotocol arameters,, D, N and TO, Equation () and (8b) give us the system erformance. Condition (9) is a sufficient and necessary condition on the arameters for the system to achieve ALOHA erformance, which has maximum ossible throughut /e. The otimal transmission robability at which the throughut can achieve its highest value is given in Equation (0). For systems with very small D and/or very large N, the ALOHA erformance can always be achieved by setting to its otimal value. For fixed, a system with very large D and/or very small N has a smaller throughut than a system with relatively smaller D and/or larger N due to too many idle slots. On the contrary, a system with very large N has a smaller throughut than a system with relatively smaller N due to too many collisions. Furthermore, in all cases in our numerical comutations, the exected collision window is below 4. This is because of too many collisions due to random access. V. DISCUSSIONS Our urose is to analyze the erformance over satellite links with random access. We focus on its window flow control mechanism and deliberately disregards other asects of, such as RTT measurements and estimation and timer granularity. The system analyzed has a window flow control scheme that differs from that in in two asects: first, we only considered the window evolution in the congestion avoidance hase; and second, we ignored the effect of dulicate ACKs for fast retransmission/recovery. Our simulations show that even with these differences, the analysis gives good rediction on the erformance of the original system. Here we discuss the effects of these two differences. Due to the large number of collisions that result from the random access rotocol, the system original with has a very small congestion window size. This is confirmed by the simulations, which shows that it is normally below 4 and below 8 for extremely large D. As a result, the window threshold will also be very small (below four). With such a small window threshold, the window evolution with only congestion avoidance hase is close to that with both slow start and congestion avoidance hase. Furthermore, the authors in [2] show that for a small congestion window such as eight, fast retransmission/recovery can seldom be entered into if there are multile losses within the window, which is the case in our system due to collisions. Therefore the window flow control scheme analyzed is a good aroximation of that in in our system as well. For the random access scheme, we did not consider collision recovery at the layer. Over a large delay satellite link, this assumtion is also reasonable as any attemt at delayed retransmission will result in a time-out event with very high robability. Hence, it is sensible to leave such retransmissions to higher layers. In addition, we did not take into account the timeout udate in. One future direction is therefore to consider collision recovery at the layer as well as to model the timeout udate at the transort layer. REFERENCES [] H. Balakrishnan, V.N. Padmanabhan, S.Seshan and R.H. Katz, A comarison of mechanisms for imroving erformance over wireless links, IEEE/ACM Transactions on Networking, Vol. 5, , December 997. [2] K. Fall and S. Floyd, Simulation-based comarisons of Tahoe, Reno, and SACK, Comuter Communication Review, 996. [3] N. Ghani and S. Dixit, /IP enhancements for satellite networks, IEEE Communications Magazine, Vol. 37, , July 999. [4] T.V. Lakshman and U. Madhow, The erformance of /IP for networks with high bandwidth-delay roducts and random loss, IEEE/ACM Transactions on Networking, Vol. 5, , June 997. [5] C. Liu and E.H. Modiano, On the Interaction of Layered Protocols: The Case of Window Flow Control and ARQ, Conference on Information Science and System, Princeton, NJ, March, [6] M. Meo and C.F. Chiasserini, Imroving over wireless through adative link layer setting, IEEE GLOBECOM 0, Vol. 3, , November 200. [7] J. Padhye, V. Firoiu, D.F. Towsley, J.F. Kurose, Modeling Reno erformance: a simle model and its emirical validation, IEEE/ACM Transactions on Networking, Vol. 8, , Aril [8] C. Partridge and T.J. Sheard, /IP erformance over satellite links, IEEE Network, Vol., , Setember/October 997.

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010 ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING. 3 Department of Chemical Engineering

RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING. 3 Department of Chemical Engineering Coyright 2002 IFAC 15th Triennial World Congress, Barcelona, Sain RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING C.A. Bode 1, B.S. Ko 2, and T.F. Edgar 3 1 Advanced

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Fig. 21: Architecture of PeerSim [44]

Fig. 21: Architecture of PeerSim [44] Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

On Using FASTEM2 for the Special Sensor Microwave Imager (SSM/I) March 15, Godelieve Deblonde Meteorological Service of Canada

On Using FASTEM2 for the Special Sensor Microwave Imager (SSM/I) March 15, Godelieve Deblonde Meteorological Service of Canada On Using FASTEM2 for the Secial Sensor Microwave Imager (SSM/I) March 15, 2001 Godelieve Deblonde Meteorological Service of Canada 1 1. Introduction Fastem2 is a fast model (multile-linear regression model)

More information

Delay Performance of Threshold Policies for Dynamic Spectrum Access

Delay Performance of Threshold Policies for Dynamic Spectrum Access IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

EE 508 Lecture 13. Statistical Characterization of Filter Characteristics

EE 508 Lecture 13. Statistical Characterization of Filter Characteristics EE 508 Lecture 3 Statistical Characterization of Filter Characteristics Comonents used to build filters are not recisely redictable L C Temerature Variations Manufacturing Variations Aging Model variations

More information

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) 1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y

More information

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Plotting the Wilson distribution

Plotting the Wilson distribution , Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Diverse Routing in Networks with Probabilistic Failures

Diverse Routing in Networks with Probabilistic Failures Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Period-two cycles in a feedforward layered neural network model with symmetric sequence processing

Period-two cycles in a feedforward layered neural network model with symmetric sequence processing PHYSICAL REVIEW E 75, 4197 27 Period-two cycles in a feedforward layered neural network model with symmetric sequence rocessing F. L. Metz and W. K. Theumann Instituto de Física, Universidade Federal do

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

Characteristics of Beam-Based Flexure Modules

Characteristics of Beam-Based Flexure Modules Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced

More information

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP Submitted to the Annals of Statistics arxiv: arxiv:1706.07237 CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP By Johannes Tewes, Dimitris N. Politis and Daniel J. Nordman Ruhr-Universität

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,

More information

Extreme Value FEC for Reliable Broadcasting in Wireless Networks

Extreme Value FEC for Reliable Broadcasting in Wireless Networks Extreme Value FEC for Reliable Broadcasting in Wireless Networks Weiyao Xiao and David Starobinski Deartment of Electrical and Comuter Engineering Boston University, Boston, MA 225 Email:{weiyao, staro}@bu.edu

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling 1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Classical gas (molecules) Phonon gas Number fixed Population depends on frequency of mode and temperature: 1. For each particle. For an N-particle gas

Classical gas (molecules) Phonon gas Number fixed Population depends on frequency of mode and temperature: 1. For each particle. For an N-particle gas Lecture 14: Thermal conductivity Review: honons as articles In chater 5, we have been considering quantized waves in solids to be articles and this becomes very imortant when we discuss thermal conductivity.

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

The Noise Power Ratio - Theory and ADC Testing

The Noise Power Ratio - Theory and ADC Testing The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Fisher Information in Flow Size Distribution Estimation

Fisher Information in Flow Size Distribution Estimation 1 Fisher Information in Flow Size Distribution Estimation Paul Tune, Member, IEEE, and Darryl Veitch, Fellow, IEEE Abstract The flow size distribution is a useful metric for traffic modeling and management

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

The Binomial Approach for Probability of Detection

The Binomial Approach for Probability of Detection Vol. No. (Mar 5) - The e-journal of Nondestructive Testing - ISSN 45-494 www.ndt.net/?id=7498 The Binomial Aroach for of Detection Carlos Correia Gruo Endalloy C.A. - Caracas - Venezuela www.endalloy.net

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Evaluating Process Capability Indices for some Quality Characteristics of a Manufacturing Process

Evaluating Process Capability Indices for some Quality Characteristics of a Manufacturing Process Journal of Statistical and Econometric Methods, vol., no.3, 013, 105-114 ISSN: 051-5057 (rint version), 051-5065(online) Scienress Ltd, 013 Evaluating Process aability Indices for some Quality haracteristics

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming Maximum Entroy and the Stress Distribution in Soft Disk Packings Above Jamming Yegang Wu and S. Teitel Deartment of Physics and Astronomy, University of ochester, ochester, New York 467, USA (Dated: August

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

Chapter 2 Introductory Concepts of Wave Propagation Analysis in Structures

Chapter 2 Introductory Concepts of Wave Propagation Analysis in Structures Chater 2 Introductory Concets of Wave Proagation Analysis in Structures Wave roagation is a transient dynamic henomenon resulting from short duration loading. Such transient loadings have high frequency

More information

Recent Developments in Multilayer Perceptron Neural Networks

Recent Developments in Multilayer Perceptron Neural Networks Recent Develoments in Multilayer Percetron eural etworks Walter H. Delashmit Lockheed Martin Missiles and Fire Control Dallas, Texas 75265 walter.delashmit@lmco.com walter.delashmit@verizon.net Michael

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

Monte Carlo Studies. Monte Carlo Studies. Sampling Distribution

Monte Carlo Studies. Monte Carlo Studies. Sampling Distribution Monte Carlo Studies Do not let yourself be intimidated by the material in this lecture This lecture involves more theory but is meant to imrove your understanding of: Samling distributions and tests of

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

In-Order Delivery Delay of Transport Layer Coding

In-Order Delivery Delay of Transport Layer Coding In-Order Delivery Delay of Transort Layer Coding Jason Cloud, Douglas Leith, and Muriel Médard Massachusetts Institute of Technology, Cambridge, MA 039, USA Hamilton Institute, National University of Ireland

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling Modeling Residual-Geometric Flow Samling Xiaoming Wang Amazon.com Seattle, WA 98101 USA Email: xmwang@gmail.com Xiaoyong Li Texas A&M University College Station, TX 77843 USA Email: xiaoyong@cse.tamu.edu

More information

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. Y, 1 Oortunistic Sectrum Access in Multile Primary User Environments Under the Packet Collision Constraint Eric Jung, Student Member, IEEE, and Xin Liu,

More information

One step ahead prediction using Fuzzy Boolean Neural Networks 1

One step ahead prediction using Fuzzy Boolean Neural Networks 1 One ste ahead rediction using Fuzzy Boolean eural etworks 1 José A. B. Tomé IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa jose.tome@inesc-id.t João Paulo Carvalho IESC-ID, IST Rua Alves Redol, 9 1000 Lisboa

More information

Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences

Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences J.A. Vallejos & S.M. McKinnon Queen s University, Kingston, ON, Canada ABSTRACT: Re-entry rotocols are

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

DIFFERENTIAL evolution (DE) [3] has become a popular

DIFFERENTIAL evolution (DE) [3] has become a popular Self-adative Differential Evolution with Neighborhood Search Zhenyu Yang, Ke Tang and Xin Yao Abstract In this aer we investigate several self-adative mechanisms to imrove our revious work on [], which

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction

AKRON: An Algorithm for Approximating Sparse Kernel Reconstruction : An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS

KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS 4 th International Conference on Earthquake Geotechnical Engineering June 2-28, 27 KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS Misko CUBRINOVSKI 1, Hayden BOWEN 1 ABSTRACT Two methods for analysis

More information

Modelling TCP with a Discrete Time Markov Chain

Modelling TCP with a Discrete Time Markov Chain Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet

More information