Multimedia Communication Services Traffic Modeling and Streaming
|
|
- Hester Nash
- 5 years ago
- Views:
Transcription
1 Multimedia Communication Services Medium Access Control algorithms Aloha Slotted: performance analysis with finite nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master of Science in Communication Technologies and Multimedia
2 Slotted Aloha: analysis Node number m finite, fresh arrivals are Poisson, time-unit rate λ Use DTMC to describe number n of Backlogged, slot duration is T Not Backlogged nodes m-n: transmit fresh packets arrived in previous slot No fresh packets at idle node: Fresh packets at idle node: ( ) = e λt / m P k = 0 q a =1 e λt / m Backlogged nodes transmit independently with probability P(trx) = q r Probability i not Backlogged nodes transmit when n are Backlogged : Q a (i, n) Probability j Backlogged nodes (re)transmit when n are Backlogged : Q r (j, n) 2
3 Slotted Aloha: analysis/2 Q a (i, n) and Q r (i, n) are binomial r.v. Let p probability event happens: on n attempts it happens k times with prob. P( k) = n p k ( 1 p) n k n, P( k) =1 k By replacing: [ ] = kp( k) E x Q a n k =0 = np ( i,n) = m n 1 q i a ( ) = n i Q r i,n 1 q r k =0 ( ) m n i q a i ( ) n i q r i 3
4 Slotted Aloha: analysis/3 State n changes when n n - 1 : no fresh arrivals, only one retransmission n n : two cases Single fresh arrival, no retransmission (fresh packet transmitted) No fresh arrival, no retransmission or at least two n n + 1 : one single fresh arrival and retransmission(s) n n + i : fresh arrivals are i 2 (don t care retransmissions) Probabilities are: P n,n 1 = Q a ( 0,n)Q r 1,n P n,n = Q a ( 1,n )Q r 0,n P n,n +1 = Q a 1,n P n,n +i = Q a ( i,n),i 2 ( ) ( ) + Q a ( 0,n) 1 Q r ( 1,n ) ( ) 1 Q r ( 0,n) [ ] [ ] Note: event fresh arrival and one retransmission does not imply transition n n 4
5 Slotted Aloha: analysis/4 One step transition matrix: from state n to State n-1, one Backlogged node turns idle State n, Backlogged nodes do not change State m > n, new nodes turned Backlogged P 00 0 P 02 P 03 NOTE: P 01 = 0, why? P 10 P 11 P 12 P 13 P =,P 0 P 21 P 22 P 23 ij = P[ n new state = j n = i] 0 0 P 32 P 33 From matrix P to asymptotic distribution n +1 p n = p i P in, p n =1 i= 0 m n= 0 5
6 Slotted Aloha: results and notes Average number of Backlogged nodes: N = Average delay (from Little s Theorem) To limit delay after collisions m n= 0 np n T = N /λ Retransmission probability q r should be high If λ low and few collisions: OK! Retransmissions are successful Average number of retransmissions depends on state n: q r n If q r n >> 1 too many collisions in future slots!! Network collapse! 6
7 Slotted Aloha: results and notes/2 New arrivals on not Backlogged nodes on average N n = ( m - n ) q a Retransmissions on Backlogged nodes on average R n = nq r Probability that one (re)transmission is successful Only one fresh arrival and no retransmissions No fresh arrivals and only one retransmission P sn = Q a ( 1,n )Q r ( 0,n) + Q a ( 0,n)Q r ( 1,n ) Why? On average, transmission rate is exactly P s n Variation/ drift D n of Backlogged nodes D n = N n P sn Increases with fresh traffic, decreases with delivered traffic = ( m n)q a P sn Attempted number of (re)transmissions Includes fresh and retransmissions G n = N n + R n = ( m n)q a + nq r 7
8 Slotted Aloha: results and notes/3 Note: P s n, D n and G n depend on n (number of Backlogged nodes) By replacing Q a and Q r into P s n : ( )( 1 q a ) m n 1 q a ( 1 q r ) n + ( 1 q a ) m n n( 1 q r ) n 1 q r = P sn = m n 1 1 = ( m n)q a + nq r 1 q a 1 q a 1 q r (( m n)q a + nq r )e q a ( m n) q r n = G( n)e G n where approximation is good if q a and q r are small ( ) m n ( 1 q r ) n ( ) Number of transmissions (attempts) well approximated by Poisson G(n) Note: number of transmission attempts increases with n ( Backlogged ) 8
9 Slotted Aloha: results and notes/4 How to plot/represent P s n, D n and G n With q a, q r and m known, compute them as a function of n ( Backlogged ) P sn ( ) ( ) ( ) = P sn [q a,q r,m] n D n = D s[qa,q r,m] n G n = G s[qa,q r,m] n G n = N n + R n = ( m n)q a + nq r By varying n in [0, m] plot m + 1 points [G n, P s n ] as a curve It s Transmission Rate P s n as a function of Attempted Rate G n Plot m + 1 points [G n, N n ] = [(m - n)q a + nq r, (m-n)q a ] on the same graph It s New arrivals rate as a function of Attempted Rate G n (this is a line) Network can deliver packets if New arrivals rate N n < Transmission Rate P s n 9
10 Slotted Aloha: results and notes/5 Blue curve from simple analysis (infinite nodes, m = ): rate = Ge -G Note: q a must be chosen so that m q a < P s max Here we have m = 20, q a = 0.01, q r = 0.4 Transmission rate P s New arrival rate Attempted rate G n 10
11 Slotted Aloha: instability Drift D n can be easily evaluated : D n = N n - P s = (m - n) q a - P s Transmission rate P s Where Drift is zero, steady state: how many? Depends on q r Steady states: D n = 0 s 1 s 2 q r = 0.4 Transmission rate P s s 1 q r = 0.2 s 3 Attempted rate G n Attempted rate G n If they are three, the one in the middle is unstable! (why?) 11
12 Slotted Aloha: instability/2 Threshold T for q r : one or three steady states If q r < T only one steady state s 1 on the left If q r > T two more states on the right s 2 and s 3 (that at center unstable) 1. Start with low q r : only state s 1 on the left If network works (regime) at its left Drift is positive (in fact, D n = N n P s > 0 ), fresh traffic not delivered More nodes get Backlogged, G n increases, regime moves to the right If regime at its right Drift is negative (in fact, D n = N n P s > 0 ), retransmissions successful Less nodes Backlogged (turn idle), G n decreases, regime moves to the left Steady state s 1 is stable: If regime perturbed, soon it returns to s 1 12
13 Slotted Aloha: instability/3 Threshold T for q r : one or three steady states If q r < T only one steady state s 1 on the left If q r > T two more states on the right s 2 and s 3 (that at center unstable) 2. Increase q r : three steady states s 1, s 2 and s 3 State s 1 as before State s 2, if regime perturbed to the left, drift negative, G n tend to decrease, regime moves to s 1 to the right, drift positive, G n tend to increase, regime moves to s 3 State s 2 is unstable State s 3, if regime perturbed to the left, drift > 0, regime returns to s 3 State s 3 is stable 13
14 Slotted Aloha: instability/4 Below threshold, too few retransmissions When collision occurs, some nodes get Backlogged (A few) nodes remain Backlogged for a long time (low q r ) Nodes tend to be idle (unless they have some fresh arrival) Network works with low P s Above threshold, too many retransmissions When collision occurs, Backlogged nodes retransmit immediately Soon, all nodes are Backlogged Network prone to work on the rightmost state with low P s Close to threshold, network oscillates between n = 0 and n = m 14
15 Slotted Aloha: instability/5 When above threshold Increasing q r moves s 2 to the left Behavior gets worse, even less Backlogged nodes to escape from s 3 In general, average transmission delay decreases with q r 15
16 Slotted Aloha: instability/6 Example: m = 25 λ max = 1 e 0.36 Choosing q a greater than that is useless, maximum throughput can not deliver traffic q a < λ max m q a = 0.01 Choose q r = 0.2 Only one steady state (stable, s 1 ). P s is high Transmission rate P s Probability # Backlogged # Backlogged 16
17 Slotted Aloha: instability/7 By increasing q r, system tends to oscillate: # Backlogged Probability Hundreds of steps Oscillates between high P s and Congestion Never stops at unstable state Transmission rate P s # Backlogged Both sides highly probable # Backlogged 17
18 Slotted Aloha: instability/8 Above threshold, if unstable state s 2 exceeded, works in s 3 with P s = 0 # Backlogged Probability Hundreds of steps Transmission rate P s # Backlogged # Backlogged 18
19 Slotted Aloha: how to make it stable When n is small, choose high q r P s is high (good!), average delay low (very good!) Problem: what if system moves to s 3? When n is big, choose low q r Drift turns negative, n decreases system escapes from congestion! It s a sort of BackOff Exponential There is no agreement between nodes, fix q r small for as long as the (single) node is Backlogged. # Backlogged Hundreds of steps 19
20 Slotted Aloha: with Infinite Nodes By increasing the number of nodes Fresh traffic q a must be decreased (remember about maximum throughput!) It is already a limiting hypothesis Threshold for q r decreases To have stability, delay must be increased Network tends to become unusable! Change hypothesis: from no-buffering to infinite nodes Attempted rate is G(n) = λ + nq r and Drift is D n = λ - P s Fresh traffic (red line, straight) becomes horizontal (check slide 13) There is no asymptotic distribution, number of Backlogged nodes is huge 20
21 Slotted Aloha: Comparison DTMC vs m = m = 10 nodes m = 50 nodes 21
22 Multimedia Communication Services Medium Access Control algorithms Simulation of AlohaNet (slotted) with finite number of nodes Università degli Studi di Brescia A.A. 2014/2015 Francesco Gringoli Master of Science in Communication Technologies and Multimedia
23 Aloha-slotted, simulation of finite network {method 1} Easy to do: all events are synchronous Do not need discrete event simulator: at every t = jδt compute evolution Method based on DTMC: simulate ONLY state n evolution Keep as less state as possible: n number of Backlogged nodes Once statistics of n available, compute network efficiency and throughput Fix number of nodes m, q a and q r and start with n = 0 Compute matrix P of the DTMC that rules the evolution (it s m + 1 * m + 1) Repeat N times the following experiment to extract the new state: Choose X, r.v. uniform in [0,1] Partition [0,1] with probabilities from row n + 1 of P {P n,0, P n,1 } 0 P n,0 P n,1 P n,2 P n,3 1 X next n=2 23
24 Aloha-slotted, simulation of finite network {method 1}/2 Some implementation notes for MATLAB To compute DTMC matrix use a function like this one function M = slalohamatrix(m,qa,qr)! % create empty matrix! M = zeros([m+1 m+1]);! % compute all elements in the matrix! for id = 1:m+1,! for jd = id-1:m+1,! if ( jd == 0 )! continue;! end;! n = id-1; % this is state n = i-1! % four cases! if ( id == jd ) % from n stay in n! M(id,jd) = q(m-n,1,qa)*q(n,0,qr) + q(m-n,0,qa)*(1-q(n,1,qr));! 24
25 Aloha-slotted, simulation of finite network {method 1}/3 Some implementation notes for MATLAB Use separated function to compute binomial probabilities Q a e Q r function prob = q(n,i,p);! if( n < i )! prob = 0;! else! prob = nchoosek(n,i) * p^i * (1-p)^(n-i);! end;! 25
26 Aloha-slotted, simulation of finite network {method 1}/4 Some implementation notes for MATLAB Main loop:! % DTMC matrix in M! steps = ;! n = 0;! ntrace = zeros([1 steps]);! for step = 1:steps,! levels = cumsum(m(n+1, :));! n = sum(rand > levels);! ntrace(step) = n;! end;! 26
27 Aloha-slotted, simulation of finite network {method 1}/5 Some implementation notes for MATLAB For stable network, two matrixes M 1 (high q r1 ) and M 2 (low q r2 ) If n m/2 use matrix M 1 to extract next state If n > m/2 use matrix M 2 Precompute M 1 and M 2! Otherwise very slow code About fresh traffic q a : choose it to have a working network Base on maximum throughput for an infinite network Choose q r1 freely Choose q r2 according to stationary state analysis Only state s 1 should appear 27
28 Aloha-slotted, simulation of finite network {method 2} Simulate independent stations State: for each station just maintain Backlog status (yes/no) Fix m, q a and q r + initialize all stations to not Backlogged Repeat N times this experiment For a station not backlogged: Partition [0,1] in S={1 arrival, 0 arrivals} S={[0,q a ),[q a,1]} NOTE P[n = 1] = q a!! Choose X U[0,1], verify if there is a new arrival For a backlogged station: Partition [0,1] in S={retransmit, skip} S={[0,q r ),[q r,1]} NOTE P[retransmit] = q r!! } Choose X U[0,1], verify if there is a retransmission attempt or not q a 1-q a 1 q r 1-q r 1 0 X new arrival 0 X no retransmission 28
29 Aloha-slotted, simulation of finite network {method 2}/2 Repeat N times this experiment ( continue from previous slide) If n arr > 1: Fresh arrivals > 1, Put corresponding stations to backlog If n arr == 1 & n retr > 0: where n retr is the total number of retransmissions Collision for the only fresh arrival Put corresponding station to backlog If n arr == 0 & n retr > 1: Backlogged stations collided If n arr == 1 & n retr == 0: Fresh arrival delivered! If n arr == 0 & n retr == 1: Retransmission delivered Put corresponding station to not backlog For every loop keep trace (statistics) of Backlogged nodes n bklgd Status of transmission = f(n bklgd ) How many fresh arrival and retransmissions= g,h(n bklgd ) As functions of n bklgd 29
30 Aloha-slotted, simulation of finite network {method 2}/3 E.g. simulation, m = 3 (nodes) Backlogging statistics 30
31 Aloha-slotted, simulation of finite network {method 2}/4 At the end compute statistics of B Outcome is a m + 1 cells vector: Cell 2+1 = 3 tells how many times there were 2 backlogged nodes Divide elements from last row of P s by elements in statistics of B Outcome: statistics of delivered traffic as function of backlogged nodes Divide elements from last row of G by elements in statistics of B Outcome: statistics of offered traffic as function of backlogged nodes Plot statistics of θ(n) as a function of G(n) 31
Multiaccess Communication
Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,
More informationMarkov Chain Model for ALOHA protocol
Markov Chain Model for ALOHA protocol Laila Daniel and Krishnan Narayanan April 22, 2012 Outline of the talk A Markov chain (MC) model for Slotted ALOHA Basic properties of Discrete-time Markov Chain Stability
More informationRandom Access Protocols ALOHA
Random Access Protocols ALOHA 1 ALOHA Invented by N. Abramson in 1970-Pure ALOHA Uncontrolled users (no coordination among users) Same packet (frame) size Instant feedback Large (~ infinite) population
More informationAnalysis of random-access MAC schemes
Analysis of random-access MA schemes M. Veeraraghavan and Tao i ast updated: Sept. 203. Slotted Aloha [4] First-order analysis: if we assume there are infinite number of nodes, the number of new arrivals
More informationChapter 5. Elementary Performance Analysis
Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 8 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu March 6, 2007 Jelenković (Columbia University)
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationAnswers to the problems from problem solving classes
Answers to the problems from problem solving classes Class, multiaccess communication 3. Solution : Let λ Q 5 customers per minute be the rate at which customers arrive to the queue for ordering, T Q 5
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More information16:330:543 Communication Networks I Midterm Exam November 7, 2005
l l l l l l l l 1 3 np n = ρ 1 ρ = λ µ λ. n= T = E[N] = 1 λ µ λ = 1 µ 1. 16:33:543 Communication Networks I Midterm Exam November 7, 5 You have 16 minutes to complete this four problem exam. If you know
More informationLecture 7: Simulation of Markov Processes. Pasi Lassila Department of Communications and Networking
Lecture 7: Simulation of Markov Processes Pasi Lassila Department of Communications and Networking Contents Markov processes theory recap Elementary queuing models for data networks Simulation of Markov
More informationOn the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability
On the Stability and Optimal Decentralized Throughput of CSMA with Multipacket Reception Capability Douglas S. Chan Toby Berger Lang Tong School of Electrical & Computer Engineering Cornell University,
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationLecture 3: Big-O and Big-Θ
Lecture 3: Big-O and Big-Θ COSC4: Algorithms and Data Structures Brendan McCane Department of Computer Science, University of Otago Landmark functions We saw that the amount of work done by Insertion Sort,
More informationAvailability. M(t) = 1 - e -mt
Availability Availability - A(t) the probability that the system is operating correctly and is available to perform its functions at the instant of time t More general concept than reliability: failure
More informationLecture Notes 7 Random Processes. Markov Processes Markov Chains. Random Processes
Lecture Notes 7 Random Processes Definition IID Processes Bernoulli Process Binomial Counting Process Interarrival Time Process Markov Processes Markov Chains Classification of States Steady State Probabilities
More information6 Solving Queueing Models
6 Solving Queueing Models 6.1 Introduction In this note we look at the solution of systems of queues, starting with simple isolated queues. The benefits of using predefined, easily classified queues will
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationComputer Networks More general queuing systems
Computer Networks More general queuing systems Saad Mneimneh Computer Science Hunter College of CUNY New York M/G/ Introduction We now consider a queuing system where the customer service times have a
More informationPart I Stochastic variables and Markov chains
Part I Stochastic variables and Markov chains Random variables describe the behaviour of a phenomenon independent of any specific sample space Distribution function (cdf, cumulative distribution function)
More informationECE 3511: Communications Networks Theory and Analysis. Fall Quarter Instructor: Prof. A. Bruce McDonald. Lecture Topic
ECE 3511: Communications Networks Theory and Analysis Fall Quarter 2002 Instructor: Prof. A. Bruce McDonald Lecture Topic Introductory Analysis of M/G/1 Queueing Systems Module Number One Steady-State
More informationStochastic Models in Computer Science A Tutorial
Stochastic Models in Computer Science A Tutorial Dr. Snehanshu Saha Department of Computer Science PESIT BSC, Bengaluru WCI 2015 - August 10 to August 13 1 Introduction 2 Random Variable 3 Introduction
More informationExercises Solutions. Automation IEA, LTH. Chapter 2 Manufacturing and process systems. Chapter 5 Discrete manufacturing problems
Exercises Solutions Note, that we have not formulated the answers for all the review questions. You will find the answers for many questions by reading and reflecting about the text in the book. Chapter
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationOn the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels
On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels Jie Luo, Anthony Ephremides ECE Dept. Univ. of Maryland College Park, MD 20742
More informationPerformance Analysis of a System with Bursty Traffic and Adjustable Transmission Times
Performance Analysis of a System with Bursty Traffic and Adjustable Transmission Times Nikolaos Pappas Department of Science and Technology, Linköping University, Sweden E-mail: nikolaospappas@liuse arxiv:1809085v1
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationLecture on Sensor Networks
Lecture on Sensor Networks Cyclic Historical Redundancy Development Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify
More informationChapter 2 Queueing Theory and Simulation
Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,
More informationWeek 5: Markov chains Random access in communication networks Solutions
Week 5: Markov chains Random access in communication networks Solutions A Markov chain model. The model described in the homework defines the following probabilities: P [a terminal receives a packet in
More informationLan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN
Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r
More informationIntroduction to Markov Chains, Queuing Theory, and Network Performance
Introduction to Markov Chains, Queuing Theory, and Network Performance Marceau Coupechoux Telecom ParisTech, departement Informatique et Réseaux marceau.coupechoux@telecom-paristech.fr IT.2403 Modélisation
More informationMathematical Analysis of IEEE Energy Efficiency
Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.
More informationTuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods
Tuning the TCP Timeout Mechanism in Wireless Networks to Maximize Throughput via Stochastic Stopping Time Methods George Papageorgiou and John S. Baras Abstract We present an optimization problem that
More informationData Gathering and Personalized Broadcasting in Radio Grids with Interferences
Data Gathering and Personalized Broadcasting in Radio Grids with Interferences Jean-Claude Bermond a,, Bi Li a,b, Nicolas Nisse a, Hervé Rivano c, Min-Li Yu d a Coati Project, INRIA I3S(CNRS/UNSA), Sophia
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationCommunications and Signal Processing Spring 2017 MSE Exam
Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationExam Spring Embedded Systems. Prof. L. Thiele
Exam Spring 20 Embedded Systems Prof. L. Thiele NOTE: The given solution is only a proposal. For correctness, completeness, or understandability no responsibility is taken. Sommer 20 Eingebettete Systeme
More informationDelay and throughput analysis of tree algorithms for random access over noisy collision channels
Delay and throughput analysis of tree algorithms for random access over noisy collision channels Benny Van Houdt, Robbe Block To cite this version: Benny Van Houdt, Robbe Block. Delay and throughput analysis
More informationQueueing Theory and Simulation. Introduction
Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationDiscrete Random Variables
CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is
More informationLECTURE 3. Last time:
LECTURE 3 Last time: Mutual Information. Convexity and concavity Jensen s inequality Information Inequality Data processing theorem Fano s Inequality Lecture outline Stochastic processes, Entropy rate
More informationCapacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano
More informationService differentiation without prioritization in IEEE WLANs
Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs
More informationCS115 Computer Simulation Project list
CS115 Computer Simulation Project list The final project for this class is worth 40% of your grade. Below are your choices. You only need to do one of them. Project MC: Monte Carlo vs. Deterministic Volume
More informationQueueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1
Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to
More informationRecap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks
Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution
More informationIntroduction to queuing theory
Introduction to queuing theory Claude Rigault ENST claude.rigault@enst.fr Introduction to Queuing theory 1 Outline The problem The number of clients in a system The client process Delay processes Loss
More informationCOMP 355 Advanced Algorithms
COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Running Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that
More informationMaximum Sum Rate of Slotted Aloha with Capture
Maximum Sum Rate of Slotted Aloha with Capture Yitong Li and Lin Dai, Senior Member, IEEE arxiv:50.03380v3 [cs.it] 7 Dec 205 Abstract The sum rate performance of random-access networks crucially depends
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationDiscrete-event simulations
Discrete-event simulations Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/elt-53606/ OUTLINE: Why do we need simulations? Step-by-step simulations; Classifications;
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationDesign and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication
Design and Analysis of Multichannel Slotted ALOHA for Machine-to-Machine Communication Chih-Hua Chang and Ronald Y. Chang School of Electrical and Computer Engineering, Purdue University, USA Research
More informationCOMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background
COMP 355 Advanced Algorithms Algorithm Design Review: Mathematical Background 1 Polynomial Time Brute force. For many non-trivial problems, there is a natural brute force search algorithm that checks every
More informationPerformance analysis of queueing systems with resequencing
UNIVERSITÀ DEGLI STUDI DI SALERNO Dipartimento di Matematica Dottorato di Ricerca in Matematica XIV ciclo - Nuova serie Performance analysis of queueing systems with resequencing Candidato: Caraccio Ilaria
More informationTime Reversibility and Burke s Theorem
Queuing Analysis: Time Reversibility and Burke s Theorem Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. Yannis A. Korilis. Outline Time-Reversal
More informationOn the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
More informationBuzen s algorithm. Cyclic network Extension of Jackson networks
Outline Buzen s algorithm Mean value analysis for Jackson networks Cyclic network Extension of Jackson networks BCMP network 1 Marginal Distributions based on Buzen s algorithm With Buzen s algorithm,
More informationStability and Performance of Contention Resolution Protocols. Hesham M. Al-Ammal
Stability and Performance of Contention Resolution Protocols by Hesham M. Al-Ammal Thesis Submitted to the University of Warwick for the degree of Doctor of Philosophy Computer Science August 2000 Contents
More informationDesign and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks
Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,
More informationA Simple Model for the Window Size Evolution of TCP Coupled with MAC and PHY Layers
A Simple Model for the Window Size Evolution of TCP Coupled with and PHY Layers George Papageorgiou, John S. Baras Institute for Systems Research, University of Maryland, College Par, MD 20742 Email: gpapag,
More informationCongestion Control. Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion
Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur
More informationSolutions to COMP9334 Week 8 Sample Problems
Solutions to COMP9334 Week 8 Sample Problems Problem 1: Customers arrive at a grocery store s checkout counter according to a Poisson process with rate 1 per minute. Each customer carries a number of items
More informationA Mathematical Model of the Skype VoIP Congestion Control Algorithm
A Mathematical Model of the Skype VoIP Congestion Control Algorithm Luca De Cicco, S. Mascolo, V. Palmisano Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari 47th IEEE Conference on Decision
More informationDetecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis
Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu
More informationCS 237 Fall 2018, Homework 06 Solution
0/9/20 hw06.solution CS 237 Fall 20, Homework 06 Solution Due date: Thursday October th at :59 pm (0% off if up to 24 hours late) via Gradescope General Instructions Please complete this notebook by filling
More informationCSE 421 Greedy Algorithms / Interval Scheduling
CSE 421 Greedy Algorithms / Interval Scheduling Yin Tat Lee 1 Interval Scheduling Job j starts at s(j) and finishes at f(j). Two jobs compatible if they don t overlap. Goal: find maximum subset of mutually
More informationLittle s Law assumptions: But I still wanna use it! The Goldilocks solution to sizing the system for non-steady-state dynamics
Little s Law assumptions: But I still wanna use it! The Goldilocks solution to sizing the system for non-steady-state dynamics Alex Gilgur Abstract Little s Law is well known: number of concurrent users
More informationCapacity management for packet-switched networks with heterogeneous sources. Linda de Jonge. Master Thesis July 29, 2009.
Capacity management for packet-switched networks with heterogeneous sources Linda de Jonge Master Thesis July 29, 2009 Supervisors Dr. Frank Roijers Prof. dr. ir. Sem Borst Dr. Andreas Löpker Industrial
More informationQueueing Networks G. Rubino INRIA / IRISA, Rennes, France
Queueing Networks G. Rubino INRIA / IRISA, Rennes, France February 2006 Index 1. Open nets: Basic Jackson result 2 2. Open nets: Internet performance evaluation 18 3. Closed nets: Basic Gordon-Newell result
More informationCDA6530: Performance Models of Computers and Networks. Chapter 8: Discrete Event Simulation (DES)
CDA6530: Performance Models of Computers and Networks Chapter 8: Discrete Event Simulation (DES) Simulation Studies Models with analytical formulas Calculate the numerical solutions Differential equations
More informationCHAPTER 4. Networks of queues. 1. Open networks Suppose that we have a network of queues as given in Figure 4.1. Arrivals
CHAPTER 4 Networks of queues. Open networks Suppose that we have a network of queues as given in Figure 4.. Arrivals Figure 4.. An open network can occur from outside of the network to any subset of nodes.
More informationA New Technique for Link Utilization Estimation
A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables S. Amarnath and Anurag Kumar* Dept. of Electrical Communication Engineering Indian Institute of Science, Bangalore
More informationTCOM 501: Networking Theory & Fundamentals. Lecture 6 February 19, 2003 Prof. Yannis A. Korilis
TCOM 50: Networking Theory & Fundamentals Lecture 6 February 9, 003 Prof. Yannis A. Korilis 6- Topics Time-Reversal of Markov Chains Reversibility Truncating a Reversible Markov Chain Burke s Theorem Queues
More informationCDA5530: Performance Models of Computers and Networks. Chapter 4: Elementary Queuing Theory
CDA5530: Performance Models of Computers and Networks Chapter 4: Elementary Queuing Theory Definition Queuing system: a buffer (waiting room), service facility (one or more servers) a scheduling policy
More informationMethodology for Computer Science Research Lecture 4: Mathematical Modeling
Methodology for Computer Science Research Andrey Lukyanenko Department of Computer Science and Engineering Aalto University, School of Science and Technology andrey.lukyanenko@tkk.fi Definitions and Goals
More informationEfficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation
Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,
More informationMin Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min
JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationLink Models for Circuit Switching
Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can
More informationMarkov Chains and Related Matters
Markov Chains and Related Matters 2 :9 3 4 : The four nodes are called states. The numbers on the arrows are called transition probabilities. For example if we are in state, there is a probability of going
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More informationTHE Slotted Aloha (S-Aloha) protocol, since its appearance
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 26, NO. 1, FEBRUARY 2018 451 The Throughput and Access Delay of Slotted-Aloha With Exponential Backoff Luca Barletta, Member, IEEE, Flaminio Borgonovo, Member,
More informationCongestion Control. Need to understand: What is congestion? How do we prevent or manage it?
Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur
More informationb. ( ) ( ) ( ) ( ) ( ) 5. Independence: Two events (A & B) are independent if one of the conditions listed below is satisfied; ( ) ( ) ( )
1. Set a. b. 2. Definitions a. Random Experiment: An experiment that can result in different outcomes, even though it is performed under the same conditions and in the same manner. b. Sample Space: This
More informationMARKOV PROCESSES. Valerio Di Valerio
MARKOV PROCESSES Valerio Di Valerio Stochastic Process Definition: a stochastic process is a collection of random variables {X(t)} indexed by time t T Each X(t) X is a random variable that satisfy some
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationTCP over Cognitive Radio Channels
1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done
More informationEECS 126 Probability and Random Processes University of California, Berkeley: Fall 2014 Kannan Ramchandran November 13, 2014.
EECS 126 Probability and Random Processes University of California, Berkeley: Fall 2014 Kannan Ramchandran November 13, 2014 Midterm Exam 2 Last name First name SID Rules. DO NOT open the exam until instructed
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationSandwich shop : a queuing net work with finite disposable resources queue and infinite resources queue
Sandwich shop : a queuing net work with finite disposable resources queue and infinite resources queue Final project for ISYE 680: Queuing systems and Applications Hongtan Sun May 5, 05 Introduction As
More informationWeek 4 Concept of Probability
Week 4 Concept of Probability Mudrik Alaydrus Faculty of Computer Sciences University of Mercu Buana, Jakarta mudrikalaydrus@yahoo.com 1 Introduction : A Speech hrecognition i System computer communication
More informationMore Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018
CS 61B More Asymptotic Analysis Spring 2018 Discussion 8: March 6, 2018 Here is a review of some formulas that you will find useful when doing asymptotic analysis. ˆ N i=1 i = 1 + 2 + 3 + 4 + + N = N(N+1)
More informationCS361 Homework #3 Solutions
CS6 Homework # Solutions. Suppose I have a hash table with 5 locations. I would like to know how many items I can store in it before it becomes fairly likely that I have a collision, i.e., that two items
More information