Multimedia Communication Services Traffic Modeling and Streaming

Size: px
Start display at page:

Download "Multimedia Communication Services Traffic Modeling and Streaming"

Transcription

1 Multimedia Communication Services Medium Access Control algorithms Aloha Slotted: performance analysis with finite nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master of Science in Communication Technologies and Multimedia

2 Slotted Aloha: analysis Node number m finite, fresh arrivals are Poisson, time-unit rate λ Use DTMC to describe number n of Backlogged, slot duration is T Not Backlogged nodes m-n: transmit fresh packets arrived in previous slot No fresh packets at idle node: Fresh packets at idle node: ( ) = e λt / m P k = 0 q a =1 e λt / m Backlogged nodes transmit independently with probability P(trx) = q r Probability i not Backlogged nodes transmit when n are Backlogged : Q a (i, n) Probability j Backlogged nodes (re)transmit when n are Backlogged : Q r (j, n) 2

3 Slotted Aloha: analysis/2 Q a (i, n) and Q r (i, n) are binomial r.v. Let p probability event happens: on n attempts it happens k times with prob. P( k) = n p k ( 1 p) n k n, P( k) =1 k By replacing: [ ] = kp( k) E x Q a n k =0 = np ( i,n) = m n 1 q i a ( ) = n i Q r i,n 1 q r k =0 ( ) m n i q a i ( ) n i q r i 3

4 Slotted Aloha: analysis/3 State n changes when n n - 1 : no fresh arrivals, only one retransmission n n : two cases Single fresh arrival, no retransmission (fresh packet transmitted) No fresh arrival, no retransmission or at least two n n + 1 : one single fresh arrival and retransmission(s) n n + i : fresh arrivals are i 2 (don t care retransmissions) Probabilities are: P n,n 1 = Q a ( 0,n)Q r 1,n P n,n = Q a ( 1,n )Q r 0,n P n,n +1 = Q a 1,n P n,n +i = Q a ( i,n),i 2 ( ) ( ) + Q a ( 0,n) 1 Q r ( 1,n ) ( ) 1 Q r ( 0,n) [ ] [ ] Note: event fresh arrival and one retransmission does not imply transition n n 4

5 Slotted Aloha: analysis/4 One step transition matrix: from state n to State n-1, one Backlogged node turns idle State n, Backlogged nodes do not change State m > n, new nodes turned Backlogged P 00 0 P 02 P 03 NOTE: P 01 = 0, why? P 10 P 11 P 12 P 13 P =,P 0 P 21 P 22 P 23 ij = P[ n new state = j n = i] 0 0 P 32 P 33 From matrix P to asymptotic distribution n +1 p n = p i P in, p n =1 i= 0 m n= 0 5

6 Slotted Aloha: results and notes Average number of Backlogged nodes: N = Average delay (from Little s Theorem) To limit delay after collisions m n= 0 np n T = N /λ Retransmission probability q r should be high If λ low and few collisions: OK! Retransmissions are successful Average number of retransmissions depends on state n: q r n If q r n >> 1 too many collisions in future slots!! Network collapse! 6

7 Slotted Aloha: results and notes/2 New arrivals on not Backlogged nodes on average N n = ( m - n ) q a Retransmissions on Backlogged nodes on average R n = nq r Probability that one (re)transmission is successful Only one fresh arrival and no retransmissions No fresh arrivals and only one retransmission P sn = Q a ( 1,n )Q r ( 0,n) + Q a ( 0,n)Q r ( 1,n ) Why? On average, transmission rate is exactly P s n Variation/ drift D n of Backlogged nodes D n = N n P sn Increases with fresh traffic, decreases with delivered traffic = ( m n)q a P sn Attempted number of (re)transmissions Includes fresh and retransmissions G n = N n + R n = ( m n)q a + nq r 7

8 Slotted Aloha: results and notes/3 Note: P s n, D n and G n depend on n (number of Backlogged nodes) By replacing Q a and Q r into P s n : ( )( 1 q a ) m n 1 q a ( 1 q r ) n + ( 1 q a ) m n n( 1 q r ) n 1 q r = P sn = m n 1 1 = ( m n)q a + nq r 1 q a 1 q a 1 q r (( m n)q a + nq r )e q a ( m n) q r n = G( n)e G n where approximation is good if q a and q r are small ( ) m n ( 1 q r ) n ( ) Number of transmissions (attempts) well approximated by Poisson G(n) Note: number of transmission attempts increases with n ( Backlogged ) 8

9 Slotted Aloha: results and notes/4 How to plot/represent P s n, D n and G n With q a, q r and m known, compute them as a function of n ( Backlogged ) P sn ( ) ( ) ( ) = P sn [q a,q r,m] n D n = D s[qa,q r,m] n G n = G s[qa,q r,m] n G n = N n + R n = ( m n)q a + nq r By varying n in [0, m] plot m + 1 points [G n, P s n ] as a curve It s Transmission Rate P s n as a function of Attempted Rate G n Plot m + 1 points [G n, N n ] = [(m - n)q a + nq r, (m-n)q a ] on the same graph It s New arrivals rate as a function of Attempted Rate G n (this is a line) Network can deliver packets if New arrivals rate N n < Transmission Rate P s n 9

10 Slotted Aloha: results and notes/5 Blue curve from simple analysis (infinite nodes, m = ): rate = Ge -G Note: q a must be chosen so that m q a < P s max Here we have m = 20, q a = 0.01, q r = 0.4 Transmission rate P s New arrival rate Attempted rate G n 10

11 Slotted Aloha: instability Drift D n can be easily evaluated : D n = N n - P s = (m - n) q a - P s Transmission rate P s Where Drift is zero, steady state: how many? Depends on q r Steady states: D n = 0 s 1 s 2 q r = 0.4 Transmission rate P s s 1 q r = 0.2 s 3 Attempted rate G n Attempted rate G n If they are three, the one in the middle is unstable! (why?) 11

12 Slotted Aloha: instability/2 Threshold T for q r : one or three steady states If q r < T only one steady state s 1 on the left If q r > T two more states on the right s 2 and s 3 (that at center unstable) 1. Start with low q r : only state s 1 on the left If network works (regime) at its left Drift is positive (in fact, D n = N n P s > 0 ), fresh traffic not delivered More nodes get Backlogged, G n increases, regime moves to the right If regime at its right Drift is negative (in fact, D n = N n P s > 0 ), retransmissions successful Less nodes Backlogged (turn idle), G n decreases, regime moves to the left Steady state s 1 is stable: If regime perturbed, soon it returns to s 1 12

13 Slotted Aloha: instability/3 Threshold T for q r : one or three steady states If q r < T only one steady state s 1 on the left If q r > T two more states on the right s 2 and s 3 (that at center unstable) 2. Increase q r : three steady states s 1, s 2 and s 3 State s 1 as before State s 2, if regime perturbed to the left, drift negative, G n tend to decrease, regime moves to s 1 to the right, drift positive, G n tend to increase, regime moves to s 3 State s 2 is unstable State s 3, if regime perturbed to the left, drift > 0, regime returns to s 3 State s 3 is stable 13

14 Slotted Aloha: instability/4 Below threshold, too few retransmissions When collision occurs, some nodes get Backlogged (A few) nodes remain Backlogged for a long time (low q r ) Nodes tend to be idle (unless they have some fresh arrival) Network works with low P s Above threshold, too many retransmissions When collision occurs, Backlogged nodes retransmit immediately Soon, all nodes are Backlogged Network prone to work on the rightmost state with low P s Close to threshold, network oscillates between n = 0 and n = m 14

15 Slotted Aloha: instability/5 When above threshold Increasing q r moves s 2 to the left Behavior gets worse, even less Backlogged nodes to escape from s 3 In general, average transmission delay decreases with q r 15

16 Slotted Aloha: instability/6 Example: m = 25 λ max = 1 e 0.36 Choosing q a greater than that is useless, maximum throughput can not deliver traffic q a < λ max m q a = 0.01 Choose q r = 0.2 Only one steady state (stable, s 1 ). P s is high Transmission rate P s Probability # Backlogged # Backlogged 16

17 Slotted Aloha: instability/7 By increasing q r, system tends to oscillate: # Backlogged Probability Hundreds of steps Oscillates between high P s and Congestion Never stops at unstable state Transmission rate P s # Backlogged Both sides highly probable # Backlogged 17

18 Slotted Aloha: instability/8 Above threshold, if unstable state s 2 exceeded, works in s 3 with P s = 0 # Backlogged Probability Hundreds of steps Transmission rate P s # Backlogged # Backlogged 18

19 Slotted Aloha: how to make it stable When n is small, choose high q r P s is high (good!), average delay low (very good!) Problem: what if system moves to s 3? When n is big, choose low q r Drift turns negative, n decreases system escapes from congestion! It s a sort of BackOff Exponential There is no agreement between nodes, fix q r small for as long as the (single) node is Backlogged. # Backlogged Hundreds of steps 19

20 Slotted Aloha: with Infinite Nodes By increasing the number of nodes Fresh traffic q a must be decreased (remember about maximum throughput!) It is already a limiting hypothesis Threshold for q r decreases To have stability, delay must be increased Network tends to become unusable! Change hypothesis: from no-buffering to infinite nodes Attempted rate is G(n) = λ + nq r and Drift is D n = λ - P s Fresh traffic (red line, straight) becomes horizontal (check slide 13) There is no asymptotic distribution, number of Backlogged nodes is huge 20

21 Slotted Aloha: Comparison DTMC vs m = m = 10 nodes m = 50 nodes 21

22 Multimedia Communication Services Medium Access Control algorithms Simulation of AlohaNet (slotted) with finite number of nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master of Science in Communication Technologies and Multimedia

23 Aloha-slotted, simulation of finite network {method 1} Easy to do: all events are synchronous Do not need discrete event simulator: at every t = jδt compute evolution Method based on DTMC: simulate ONLY state n evolution Keep as less state as possible: n number of Backlogged nodes Once statistics of n available, compute network efficiency and throughput Fix number of nodes m, q a and q r and start with n = 0 Compute matrix P of the DTMC that rules the evolution (it s m + 1 * m + 1) Repeat N times the following experiment to extract the new state: Choose X, r.v. uniform in [0,1] Partition [0,1] with probabilities from row n + 1 of P {P n,0, P n,1 } 0 P n,0 P n,1 P n,2 P n,3 1 X next n=2 23

24 Aloha-slotted, simulation of finite network {method 1}/2 Some implementation notes for MATLAB To compute DTMC matrix use a function like this one function M = slalohamatrix(m,qa,qr)! % create empty matrix! M = zeros([m+1 m+1]);! % compute all elements in the matrix! for id = 1:m+1,! for jd = id-1:m+1,! if ( jd == 0 )! continue;! end;! n = id-1; % this is state n = i-1! % four cases! if ( id == jd ) % from n stay in n! M(id,jd) = q(m-n,1,qa)*q(n,0,qr) + q(m-n,0,qa)*(1-q(n,1,qr));! 24

25 Aloha-slotted, simulation of finite network {method 1}/3 Some implementation notes for MATLAB Use separated function to compute binomial probabilities Q a e Q r function prob = q(n,i,p);! if( n < i )! prob = 0;! else! prob = nchoosek(n,i) * p^i * (1-p)^(n-i);! end;! 25

26 Aloha-slotted, simulation of finite network {method 1}/4 Some implementation notes for MATLAB Main loop:! % DTMC matrix in M! steps = ;! n = 0;! ntrace = zeros([1 steps]);! for step = 1:steps,! levels = cumsum(m(n+1, :));! n = sum(rand > levels);! ntrace(step) = n;! end;! 26

27 Aloha-slotted, simulation of finite network {method 1}/5 Some implementation notes for MATLAB For stable network, two matrixes M 1 (high q r1 ) and M 2 (low q r2 ) If n m/2 use matrix M 1 to extract next state If n > m/2 use matrix M 2 Precompute M 1 and M 2! Otherwise very slow code About fresh traffic q a : choose it to have a working network Base on maximum throughput for an infinite network Choose q r1 freely Choose q r2 according to stationary state analysis Only state s 1 should appear 27

28 Aloha-slotted, simulation of finite network {method 2} Simulate independent stations State: for each station just maintain Backlog status (yes/no) Fix m, q a and q r + initialize all stations to not Backlogged Repeat N times this experiment For a station not backlogged: Partition [0,1] in S={1 arrival, 0 arrivals} S={[0,q a ),[q a,1]} NOTE P[n = 1] = q a!! Choose X U[0,1], verify if there is a new arrival For a backlogged station: Partition [0,1] in S={retransmit, skip} S={[0,q r ),[q r,1]} NOTE P[retransmit] = q r!! } Choose X U[0,1], verify if there is a retransmission attempt or not q a 1-q a 1 q r 1-q r 1 0 X new arrival 0 X no retransmission 28

29 Aloha-slotted, simulation of finite network {method 2}/2 Repeat N times this experiment ( continue from previous slide) If n arr > 1: Fresh arrivals > 1, Put corresponding stations to backlog If n arr == 1 & n retr > 0: where n retr is the total number of retransmissions Collision for the only fresh arrival Put corresponding station to backlog If n arr == 0 & n retr > 1: Backlogged stations collided If n arr == 1 & n retr == 0: Fresh arrival delivered! If n arr == 0 & n retr == 1: Retransmission delivered Put corresponding station to not backlog For every loop keep trace (statistics) of Backlogged nodes n bklgd Status of transmission = f(n bklgd ) How many fresh arrival and retransmissions= g,h(n bklgd ) As functions of n bklgd 29

30 Aloha-slotted, simulation of finite network {method 2}/3 E.g. simulation, m = 3 (nodes) Backlogging statistics 30

31 Aloha-slotted, simulation of finite network {method 2}/4 At the end compute statistics of B Outcome is a m + 1 cells vector: Cell 2+1 = 3 tells how many times there were 2 backlogged nodes Divide elements from last row of P s by elements in statistics of B Outcome: statistics of delivered traffic as function of backlogged nodes Divide elements from last row of G by elements in statistics of B Outcome: statistics of offered traffic as function of backlogged nodes Plot statistics of θ(n) as a function of G(n) 31

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Markov Chain Model for ALOHA protocol

Markov Chain Model for ALOHA protocol Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability

More information

Random Access Protocols ALOHA

Random Access Protocols ALOHA Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population

More information

Analysis of random-access MAC schemes

Analysis of random-access MAC schemes Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals

More information

Chapter 5. Elementary Performance Analysis

Chapter 5. Elementary Performance Analysis Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Answers to the problems from problem solving classes

Answers to the problems from problem solving classes Answers to the problems from problem solving classes Class, multiaccess communication 3. Solution : Let λ Q 5 customers per minute be the rate at which customers arrive to the queue for ordering, T Q 5

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

16:330:543 Communication Networks I Midterm Exam November 7, 2005

16:330:543 Communication Networks I Midterm Exam November 7, 2005 l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know

More information

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking

Lecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov

More information

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability

On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

Lecture 3: Big-O and Big-Θ

Lecture 3: Big-O and Big-Θ Lecture 3: Big-O and Big-Θ COSC4: Algorithms and Data Structures Brendan McCane Department of Computer Science, University of Otago Landmark functions We saw that the amount of work done by Insertion Sort,

More information

Availability. M(t) = 1 - e -mt

Availability. M(t) = 1 - e -mt Availability Availability - A(t) the probability that the system is operating correctly and is available to perform its functions at the instant of time t More general concept than reliability: failure

More information

Lecture Notes 7 Random Processes. Markov Processes Markov Chains. Random Processes

Lecture Notes 7 Random Processes. Markov Processes Markov Chains. Random Processes Lecture Notes 7 Random Processes Definition IID Processes Bernoulli Process Binomial Counting Process Interarrival Time Process Markov Processes Markov Chains Classification of States Steady State Probabilities

More information

6 Solving Queueing Models

6 Solving Queueing Models 6 Solving Queueing Models 6.1 Introduction In this note we look at the solution of systems of queues, starting with simple isolated queues. The benefits of using predefined, easily classified queues will

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

Computer Networks More general queuing systems

Computer Networks More general queuing systems Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a

More information

Part I Stochastic variables and Markov chains

Part I Stochastic variables and Markov chains Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)

More information

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic

ECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic ECE 3511: Communications Networks Theory and Analysis Fall Quarter 2002 Instructor: Prof. A. Bruce McDonald Lecture Topic Introductory Analysis of M/G/1 Queueing Systems Module Number One Steady-State

More information

Stochastic Models in Computer Science A Tutorial

Stochastic Models in Computer Science A Tutorial Stochastic Models in Computer Science A Tutorial Dr. Snehanshu Saha Department of Computer Science PESIT BSC, Bengaluru WCI 2015 - August 10 to August 13 1 Introduction 2 Random Variable 3 Introduction

More information

Exercises Solutions. Automation IEA, LTH. Chapter 2 Manufacturing and process systems. Chapter 5 Discrete manufacturing problems

Exercises Solutions. Automation IEA, LTH. Chapter 2 Manufacturing and process systems. Chapter 5 Discrete manufacturing problems Exercises Solutions Note, that we have not formulated the answers for all the review questions. You will find the answers for many questions by reading and reflecting about the text in the book. Chapter

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742

More information

Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times

Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times Nikolaos Pappas Department of Science and Technology, Linköping University, Sweden E-mail: nikolaospappas@liuse arxiv:1809085v1

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

Week 5: Markov chains Random access in communication networks Solutions

Week 5: Markov chains Random access in communication networks Solutions Week 5: Markov chains Random access in communication networks Solutions A Markov chain model. The model described in the homework defines the following probabilities: P [a terminal receives a packet in

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

Introduction to Markov Chains, Queuing Theory, and Network Performance

Introduction to Markov Chains, Queuing Theory, and Network Performance Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods

Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that

More information

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences

Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia

More information

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1

NICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1 NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering

More information

Communications and Signal Processing Spring 2017 MSE Exam

Communications and Signal Processing Spring 2017 MSE Exam Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing

More information

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "

Queueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems  M/M/1  M/M/m  M/M/1/K Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals

More information

Exam Spring Embedded Systems. Prof. L. Thiele

Exam Spring Embedded Systems. Prof. L. Thiele Exam Spring 20 Embedded Systems Prof. L. Thiele NOTE: The given solution is only a proposal. For correctness, completeness, or understandability no responsibility is taken. Sommer 20 Eingebettete Systeme

More information

Delay and throughput analysis of tree algorithms for random access over noisy collision channels

Delay and throughput analysis of tree algorithms for random access over noisy collision channels Delay and throughput analysis of tree algorithms for random access over noisy collision channels Benny Van Houdt, Robbe Block To cite this version: Benny Van Houdt, Robbe Block. Delay and throughput analysis

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

LECTURE 3. Last time:

LECTURE 3. Last time: LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate

More information

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks

Capacity and Delay Tradeoffs for Ad-Hoc Mobile Networks IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano

More information

Service differentiation without prioritization in IEEE WLANs

Service differentiation without prioritization in IEEE WLANs Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs

More information

CS115 Computer Simulation Project list

CS115 Computer Simulation Project list CS115 Computer Simulation Project list The final project for this class is worth 40% of your grade. Below are your choices. You only need to do one of them. Project MC: Monte Carlo vs. Deterministic Volume

More information

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1

Queueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1 Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to

More information

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks

Recap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution

More information

Introduction to queuing theory

Introduction to queuing theory Introduction to queuing theory Claude Rigault ENST claude.rigault@enst.fr Introduction to Queuing theory 1 Outline The problem The number of clients in a system The client process Delay processes Loss

More information

COMP 355 Advanced Algorithms

COMP 355 Advanced Algorithms COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Running Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that

More information

Maximum Sum Rate of Slotted Aloha with Capture

Maximum Sum Rate of Slotted Aloha with Capture Maximum Sum Rate of Slotted Aloha with Capture Yitong Li and Lin Dai, Senior Member, IEEE arxiv:50.03380v3 [cs.it] 7 Dec 205 Abstract The sum rate performance of random-access networks crucially depends

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources 1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

Discrete-event simulations

Discrete-event simulations Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication

Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Chih-Hua Chang and Ronald Y. Chang School of Electrical and Computer Engineering, Purdue University, USA Research

More information

COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background

COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that checks every

More information

Performance analysis of queueing systems with resequencing

Performance analysis of queueing systems with resequencing UNIVERSITÀ DEGLI STUDI DI SALERNO Dipartimento di Matematica Dottorato di Ricerca in Matematica XIV ciclo - Nuova serie Performance analysis of queueing systems with resequencing Candidato: Caraccio Ilaria

More information

Time Reversibility and Burke s Theorem

Time Reversibility and Burke s Theorem Queuing Analysis: Time Reversibility and Burke s Theorem Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. Yannis A. Korilis. Outline Time-Reversal

More information

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks

More information

Buzen s algorithm. Cyclic network Extension of Jackson networks

Buzen s algorithm. Cyclic network Extension of Jackson networks Outline Buzen s algorithm Mean value analysis for Jackson networks Cyclic network Extension of Jackson networks BCMP network 1 Marginal Distributions based on Buzen s algorithm With Buzen s algorithm,

More information

Stability and Performance of Contention Resolution Protocols. Hesham M. Al-Ammal

Stability and Performance of Contention Resolution Protocols. Hesham M. Al-Ammal Stability and Performance of Contention Resolution Protocols by Hesham M. Al-Ammal Thesis Submitted to the University of Warwick for the degree of Doctor of Philosophy Computer Science August 2000 Contents

More information

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks

Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,

More information

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers

A Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,

More information

Congestion Control. Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion

Congestion Control. Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur

More information

Solutions to COMP9334 Week 8 Sample Problems

Solutions to COMP9334 Week 8 Sample Problems Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items

More information

A Mathematical Model of the Skype VoIP Congestion Control Algorithm

A Mathematical Model of the Skype VoIP Congestion Control Algorithm A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

CS 237 Fall 2018, Homework 06 Solution

CS 237 Fall 2018, Homework 06 Solution 0/9/20 hw06.solution CS 237 Fall 20, Homework 06 Solution Due date: Thursday October th at :59 pm (0% off if up to 24 hours late) via Gradescope General Instructions Please complete this notebook by filling

More information

CSE 421 Greedy Algorithms / Interval Scheduling

CSE 421 Greedy Algorithms / Interval Scheduling CSE 421 Greedy Algorithms / Interval Scheduling Yin Tat Lee 1 Interval Scheduling Job j starts at s(j) and finishes at f(j). Two jobs compatible if they don t overlap. Goal: find maximum subset of mutually

More information

Little s Law assumptions: But I still wanna use it! The Goldilocks solution to sizing the system for non-steady-state dynamics

Little s Law assumptions: But I still wanna use it! The Goldilocks solution to sizing the system for non-steady-state dynamics Little s Law assumptions: But I still wanna use it! The Goldilocks solution to sizing the system for non-steady-state dynamics Alex Gilgur Abstract Little s Law is well known: number of concurrent users

More information

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009.

Capacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009. Capacity management for packet-switched networks with heterogeneous sources Linda de Jonge Master Thesis July 29, 2009 Supervisors Dr. Frank Roijers Prof. dr. ir. Sem Borst Dr. Andreas Löpker Industrial

More information

Queueing Networks G. Rubino INRIA / IRISA, Rennes, France

Queueing Networks G. Rubino INRIA / IRISA, Rennes, France Queueing Networks G. Rubino INRIA / IRISA, Rennes, France February 2006 Index 1. Open nets: Basic Jackson result 2 2. Open nets: Internet performance evaluation 18 3. Closed nets: Basic Gordon-Newell result

More information

CDA6530: Performance Models of Computers and Networks. Chapter 8: Discrete Event Simulation (DES)

CDA6530: Performance Models of Computers and Networks. Chapter 8: Discrete Event Simulation (DES) CDA6530: Performance Models of Computers and Networks Chapter 8: Discrete Event Simulation (DES) Simulation Studies Models with analytical formulas Calculate the numerical solutions Differential equations

More information

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals

CHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.

More information

A New Technique for Link Utilization Estimation

A New Technique for Link Utilization Estimation A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables S. Amarnath and Anurag Kumar* Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 6 February 19, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 6 February 19, 2003 Prof. Yannis A. Korilis TCOM 50: Networking Theory & Fundamentals Lecture 6 February 9, 003 Prof. Yannis A. Korilis 6- Topics Time-Reversal of Markov Chains Reversibility Truncating a Reversible Markov Chain Burke s Theorem Queues

More information

CDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory

CDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory CDA5530: Performance Models of Computers and Networks Chapter 4: Elementary Queuing Theory Definition Queuing system: a buffer (waiting room), service facility (one or more servers) a scheduling policy

More information

Methodology for Computer Science Research Lecture 4: Mathematical Modeling

Methodology for Computer Science Research Lecture 4: Mathematical Modeling Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals

More information

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

Markov Chains and Related Matters

Markov Chains and Related Matters Markov Chains and Related Matters 2 :9 3 4 : The four nodes are called states. The numbers on the arrows are called transition probabilities. For example if we are in state, there is a probability of going

More information

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding

Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits

More information

THE Slotted Aloha (S-Aloha) protocol, since its appearance

THE Slotted Aloha (S-Aloha) protocol, since its appearance IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 26, NO. 1, FEBRUARY 2018 451 The Throughput and Access Delay of Slotted-Aloha With Exponential Backoff Luca Barletta, Member, IEEE, Flaminio Borgonovo, Member,

More information

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it?

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it? Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur

More information

b. ( ) ( ) ( ) ( ) ( ) 5. Independence: Two events (A & B) are independent if one of the conditions listed below is satisfied; ( ) ( ) ( )

b. ( ) ( ) ( ) ( ) ( ) 5. Independence: Two events (A & B) are independent if one of the conditions listed below is satisfied; ( ) ( ) ( ) 1. Set a. b. 2. Definitions a. Random Experiment: An experiment that can result in different outcomes, even though it is performed under the same conditions and in the same manner. b. Sample Space: This

More information

MARKOV PROCESSES. Valerio Di Valerio

MARKOV PROCESSES. Valerio Di Valerio MARKOV PROCESSES Valerio Di Valerio Stochastic Process Definition: a stochastic process is a collection of random variables {X(t)} indexed by time t T Each X(t) X is a random variable that satisfy some

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

EECS 126 Probability and Random Processes University of California, Berkeley: Fall 2014 Kannan Ramchandran November 13, 2014.

EECS 126 Probability and Random Processes University of California, Berkeley: Fall 2014 Kannan Ramchandran November 13, 2014. EECS 126 Probability and Random Processes University of California, Berkeley: Fall 2014 Kannan Ramchandran November 13, 2014 Midterm Exam 2 Last name First name SID Rules. DO NOT open the exam until instructed

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

Sandwich shop : a queuing net work with finite disposable resources queue and infinite resources queue

Sandwich shop : a queuing net work with finite disposable resources queue and infinite resources queue Sandwich shop : a queuing net work with finite disposable resources queue and infinite resources queue Final project for ISYE 680: Queuing systems and Applications Hongtan Sun May 5, 05 Introduction As

More information

Week 4 Concept of Probability

Week 4 Concept of Probability Week 4 Concept of Probability Mudrik Alaydrus Faculty of Computer Sciences University of Mercu Buana, Jakarta mudrikalaydrus@yahoo.com 1 Introduction : A Speech hrecognition i System computer communication

More information

More Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018

More Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018 CS 61B More Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018 Here is a review of some formulas that you will find useful when doing asymptotic analysis. ˆ N i=1 i = 1 + 2 + 3 + 4 + + N = N(N+1)

More information

CS361 Homework #3 Solutions

CS361 Homework #3 Solutions CS6 Homework # Solutions. Suppose I have a hash table with 5 locations. I would like to know how many items I can store in it before it becomes fairly likely that I have a collision, i.e., that two items

More information