Average Packet Delay in Random Multiple Access for Satellite Systems
|
|
- Molly McBride
- 7 years ago
- Views:
Transcription
1 Average Packet Delay in Random Multiple Access for Satellite Systems MARIO REYES-AYALA 1, EDGAR ALEJANDRO ANDRADE-GONZALEZ 1, JOSÉ ALFREDO TIRADO-MÉNDEZ 1, HILDEBERTO JARDÓN AGUILAR 2 1 Electronics Department Metropolitan Autonomous University San Pablo 180, Col. Reynosa Tamaulipas, Azcapotzalco, ZIP Code 02200, Mexico City MEXICO 2 Section of Communications CINVESTAV-IPN Av. IPN 2508, Col. San Pedro Zacatenco, Zip Code Mexico City MEXICO Abstract: - In this paper, the Random Multiple Access is evaluated for digital satellite system where packet transmission is used. The main parameters to analyze the system are the throughput, the average number of retransmission and the average packet delay. Key-words: - Satellite, Multiple Access, ALOHA, Mobile Satellite Services, Average Packet Delay. 1 Introduction The main parameters in a multiple access techniques are the number of simultaneous users and the throughput of the network. Time Division Multiple Access (TDMA) and Code Division Multiple Access (CDMA) schemes offer high performances, but when the users do not generate information uniformly in the time, there is an important choice to obtain multiple access: Random Multiple Access (RMA) [1] [2] [3]. In this kind of multiple access the transmission media is employed simultaneously by the users, because they divide the information in packages. The users produce a non-uniform traffic, then the packages are transmitted in random times. This features are satisfied in rural applications, with VSAT terminals. The analyses of TDMA satellite systems is the deterioration of performance as the number of terminals increases irrespective of the total traffic in the system. The preamble bursts and guard times occupy a linear increase in the TDMA frame. The reason is the capacity is allocated to the sources, even when the source has nothing to send. Then, the RMA systems allocate bandwidth purely in response to traffic. The best performance in RMA when there are a large number of lightly loaded sources, see Figure 1. The paper has been organized in the following sections: section two is dedicated to ALOHA system, section three shows the analysis of pure ALOHA system, section four is dedicated to analyze the slotted ALOHA variation, section five is completely related to evaluate the performance of the average packet delay in this kind of system. Fig. 1 Satellite Multiple Access System. 2 ALOHA System The origin of the random multiple access technique was in the ALOHA system at the University of Hawaii. This system was a packet switched network, in which a radio channel was shared among a number of users. When a user generates a package, it is transmitted immediately regardless of the status at the other users in the system [4] [5] [6]. It is clear, that in this system is possible to collide packages, when two or more users generate simultaneously a package. The result of a collision ISBN: ISSN:
2 is two or more unintelligible packages and their retransmissions. In Figure 2 the line flow of pure ALOHA channel is illustrated. It is important to emphasize the collision presented in this Figure, when users one and two, transmit a package simultaneously. Afterward, the users involved in the collision should retransmit their packages after different random time-out intervals. The random variable of the timeout should have a large enough variance, then the probability of repeated collisions is small. Nevertheless, if the variance is too large, the delay of a package can increase drastically [6] [7]. P Collision = e 2Λm 1 (2) P Collision Probability of a collision. Λ Total average rate, packages/s. In order to carry the analysis forward it is assumed that the total traffic on the line has a Poisson distribution. In Figure 3, the pure ALOHA collision mechanism is illustrated. Fig. 2.Line flow on the pure ALOHA channel. There are many mechanisms to apprised of a collision, the easiest way is to detect the use of the channel and other way is to wait a positive acknowledgement when the packet is received correctly [9] [10] [11]. 3 Pure ALOHA Throughput The main assumptions in ALOHA systems are: the users generate fixed-length packages at a Poisson rate and, there are a lot of lightly loaded users, so that each holds no more than a single package at a time. The dimensionless offered load to communication channel can be obtained by equation 1 [11] [12] [13]. ρ = mλ (1) ρ Offered load. λ Average rate, packages/s. m Package o message duration, s. In order to be stable, in the absence of overhead traffic, the offered load must be less than one. The flow in the line consists of new packages and retransmitted packages. Then, the total rate should consider both. In this way, the probability of a collision can be calculated by equation 2. Fig. 3 Pure ALOHA collision mechanism. A package will be involved in a collision if another terminal transmits in a window with a duration equal to double package duration. The total average rate is the result of mixed traffic, see equation 3. 2Λm ( 1 ) Λ = λ + ΛP Collision = λ + Λ e (3) Then, the performance of pure ALOHA system can be calculated by equation 4. ( ) ρ = R exp 2R (4) R Total carried load on the channel, package/s. 4 Slotted ALOHA System The performance of the pure ALOHA system can be increased by changing the collision window, see Figure 4. The throughput in ALOHA system is determined by equation 5,[8] [9] [10]. ( ) ρ = R exp R (5) ISBN: ISSN:
3 Q r Probability of a successful retransmission after r retries. Then, the average retransmission delay of a packet is evaluated by equation 9. E{ T} = E{ r} 2 (9) Fig. 4 Slotted ALOHA Mechanism. 5 Average Packet Delay in ALOHA The ALOHA system gives a much better average packet delay in comparison with TDMA or CDMA systems [4] [5] [6]. It is important to point out that equation 4 is double-valued function, because for a given value for ρ, there are two values for R. This indicates that as the channel increases past 0.5, the throughput drops, because the number of collisions increases and there are more packet retransmissions. The condition explained before is named instability and it is an inherent feature in ALOHA, subsequently it is necessary to prevent it, by operating below the maximum throughput. The average packet delay in an ALOHA channel T ALOHA consists of the service time m (packet length or duration), the average retransmission delay D and the satellite propagation delay T R, see equation 6. T = T + m D (6) ALOHA R + Consider the randomized retransmission strategy in case of collision, where the random time delay introduced is uniformly distributed over 1 to K intervals of m seconds each. The retransmission delay after r retransmissions is computed by equation 7. T = r 2 (7) In these conditions, the average number of retransmissions of a packet is obtained by equation 8. { } r = r= E rq r (8) 1 The probability of a successful retransmission after r retries is a function determined by equation 10. q Q r r ( 1 q)( 1 q' ) 1 q' = (10) Probability of a successful transmission of a new packet. q Probability of a successful retransmission of a packet. For a large K, the average number of retransmissions can be approximated by equation 11. { r} = exp( 2R) 1 E (11) Thus the average retransmission delay of a packet is obtained by equation 12. D = E{ T} = [ exp( 2R) 1] 2 (12) Finally, putting all these results together we obtain the average packet delay approximation, see equation 13. ( K 1) m + TALOHA = TR + m + [ exp( 2R) 1] TR + 2 (13) It is very important to highlight that the equation 13 is double-valued function. 6 Results The performance of pure ALOHA is shown in Figure 5. ISBN: ISSN:
4 10, 50 and 100 (dark blue, blue and yellow, respectively). Fig. 5 Pure ALOHA throughput. In Figure 6, the performance of slotted ALOHA is illustrated. Fig. 6 Slotted ALOHA throughput. Fig. 7 Average Packet Delay in Slotted ALOHA system. The main result of this paper is shown in Figure 7, where the average packet delay is plotted for K = 7 Conclusions The main parameter of performance in RMA is the average packet delay, because it is the most important advantage of this multiple access technique in comparison with TDMA or CDMA. In this paper this parameter has been evaluated. The work presented here demonstrates that RMA is the best solution in packet networks, where the number of the sources is very high and the traffic is bursty and when the satellite channel capacity is limited. Now, the results of this article are being improved to obtain the performance of the slotted ALOHA system using a Markov chain embedded at the slot boundaries. References: [1] Timothy Pratt, Charles Bostian & Jeremy Allnutt, Satellite Communications, John Wiley & Sons, Second Edition, [2] International Telecommunication Union, Handbook on Satellite Communications, John Wiley & Sons, Third Edition, Suiza [3] Carleial A. B., Helman M. E., Bistable Behavior of ALOHA-type systems, IEEE Transactions on Communications, Vol. COM- 23, No. 4, April 1975, pp [4] Chu W. W., Konheim A. G., On the Analysis and Modeling of a class of Computer Communication Systems, IEEE Transactions on Communications, Vol. 20, No. 11, June 1972, pp [5] Kleinrock L., Lam S. S., Packet Switching in a Multiaccess Broadcast Channel: Performance Evaluation, IEEE Transactions on Communications, Vol. COM-23, No. 4, April 1975, pp [6] Lam S. S., Kleinrock L., Packet Switching in a Multiaccess Broadcast Channel: Dynamic Control Procedures, IEEE Transactions on Communications, Vol. COM-23, No. 9, September 1975, pp [7] Meditch J. S., Lee C. T., Stability and Optimization of the CSMA and CSMA/CD Channels, IEEE Transactions on Communications, Vol. COM-31, No. 6, June 1983, [8] Saadawi, T. N. Ephremedes A. Analysis, Stability and Optimization of slotted ALOHA with a finite number of buffered users, IEEE ISBN: ISSN:
5 Transactions on Automatic Control, Vol. AC- 26, No.3, June 1981, [9] Tobagi F. A., Carrier Sense Multiple Access with Message Based Priority Functions, IEEE Transactions on Communications, Vol. COM- 30, No. 1, January [10] Tsybakov B. S., Survey of USSR contributions to random multi-access communications, IEEE Transactions on Information Theory, Vol. 31, No. 2, March 1985, pp [11] Jacobs I. M., Binder R., Hoversten E. V. General Purpose Packet Satellite Networks, Proceedings of the IEEE, Vol. 66, No. 11, pp [12] Raychaudhuri D. Stability, Throughput and Delay of Asynchronous Selective Reject ALOHA, IEEE Transactions on Communications, Vol. COM-35, No. 7, 1987, pp [13] Retnadas G. Satellite Multiple Access Protocols, IEEE Communications Magazine, Vol. 18, No. 5, pp ISBN: ISSN:
ECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationTABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationMultiple Access Protocols
Raphael Rom Moshe Sidi Multiple Access Protocols Performance and analysis This book is made available with the consent of Springer-Verlag. The book or any part of it cannot be reproduced for commercial
More informationPerformance Analysis of the IEEE 802.11 Wireless LAN Standard 1
Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research
More informationCURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More information2.0 System Description
2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationPacket Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
More informationa. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationCooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis
Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Ahmed K. Sadek, K. J. Ray Liu, and Anthony Ephremides Department of Electrical and Computer Engineering, and Institute
More informationThe Need for Media Access Control in Optical CDMA Networks
The Need for Media Access Control in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister pkamath, joseph, touch @isi.edu Information Sciences Institute, University of Southern
More informationRESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
More informationIN MULTIACCESS wireless networks where a common
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 3, NO 6, NOVEMBER 2004 2221 A Dynamic Queue Protocol for Multiaccess Wireless Networks With Multipacket Reception Qing Zhao, Member, IEEE, and Lang Tong,
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 11, November 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Automated
More informationMaximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.
Title Maximizing the number of users in an interactive video-ondemand system Author(s) Bakiras, S; Li, VOK Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. 281-292 Issued Date 2002 URL
More informationOptimizing the Use of Random Access Channels in GSM-GPRS
Wireless Personal Communications 22: 387 408, 2002. 2002 Kluwer Academic Publishers. Printed in the Netherlands. Optimizing the Use of Random Access Channels in GSM-GPRS JAHANGIR H. SARKER and SEPPO J.
More informationMedium Access Control with Dynamic Frame Length in Wireless Sensor Networks
Journal of Information Processing Systems, Vol.6, No.4, December 2010 DOI : 10.3745/JIPS.2010.6.4.501 Medium Access Control with Dynamic Frame Length in Wireless Sensor Networks Dae-Suk Yoo* and Seung
More informationSharing Channel In IEEE 802.16 Using The Cooperative Model Of Slotted ALOHA
Sharing Channel In IEEE 80.16 Using The Cooperative Model Of Slotted ALOHA Abdellah Zaaloul 1, Mohamed Ben El Aattar 1, Mohamed Hanini 1, Abdelkrim Haqiq 1, And Mohammed Boulmalaf. 1 Computer, Networks,
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationSpectrum handoff reduction for cognitive radio ad hoc networks
Published Research in Conference: International Symposium on Wireless Communication Systems - ISWCS, pp. 1036-1040, 2010 Spectrum handoff reduction for cognitive radio ad hoc networks Mohamed A. Kalil,
More informationBehavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
More informationCSC 313 Data Communications COURSE PARTICULARS COURSE INSTRUCTORS COURSE DESCRIPTION COURSE OBJECTIVES
CSC 313 Data Communications COURSE PARTICULARS Course Code: CSC 313 Course Title: Data Communications No. of Units: 3 Course Duration: Two hours of theory per week for 15 weeks. Status: Compulsory Course
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationData Link Layer. Flow Control. Flow Control
Data Link Layer Flow Control 1 Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a transmitting station does not overflow a receiving station
More informationEfficient Delivery of Frequent Small Data for U-healthcare Applications Over LTE-Advanced Networks
Efficient Delivery of Frequent Small Data for U-healthcare Applications Over LTE-Advanced Networks Revak R. Tyagi SenSIP Center & Industry Consortium School of ECEE Arizona State University Tempe, AZ 85287
More informationMAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
More informationMedium Access Control Protocol for Radio LANs
DOC.: IEEE P802.11/91-74- Medium Access Control Protocol for Radio LANs K. S. Natarajan Chia Chi Huang David F. Bantz IBM Thomas J. Watson Research Center P.O. Box 704, Yorktown Heights. NY 10598 Abstract
More informationCOMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
More informationNetwork Protocol Design and Evaluation
Network Protocol Design and Evaluation 08 - Analytical Evaluation Stefan Rührup Summer 2009 Overview In the last chapter: Simulation In this part: Analytical Evaluation: case studies 2 Analytical Evaluation
More informationDynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
More informationADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks
ADV-MAC: Advertisement-based MAC Protocol for Wireless Sensor Networks Surjya Ray, Ilker Demirkol and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester, Rochester,
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationTHE ALOHA SYSTEM Another alternative for computer communications*
THE ALOHA SYSTEM Another alternative for computer communications* by NORMAN ABRAMSON University of Hawaii Honolulu, Hawaii INTRODUCTION In September 1968 the University of Hawaii began work on a research
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationEXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
More informationA Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationHow To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
More informationFibonacci Backoff Algorithm for Mobile Ad Hoc Networks
Fibonacci Backoff Algorithm for Mobile Ad Hoc Networks Saher S Manaseer Mohamed Ould-Khaoua Lewis M Mackenzie Department of Computing Science University of Glasgow, Glasgow G 8RZ, UK {saher, mohamed, lewis}@dcs.gla.ac.uk
More informationAdmission Control for Variable Spreading Gain CDMA Wireless Packet Networks
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 49, NO. 2, MARCH 2000 565 Admission Control for Variable Spreading Gain CDMA Wireless Packet Networks Tsern-Huei Lee, Senior Member, IEEE, and Jui Teng Wang,
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationAdaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs).
2008 Adaptive Medium Access Control (MAC) for Heterogeneous Mobile Wireless Sensor Networks (WSNs). Giorgio Corbellini 1 Challenges of the Ph.D. Study of urgency in sensed data Study of mobility in WSNs
More informationFigure 1: cellular system architecture
Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the
More informationA Multiple Access Protocol for Multimedia Transmission over Wireless Networks
A Multiple Access Protocol for Multimedia Transmission over Wireless Networks Hong Yu and Mohammed Arozullah Department of Electrical Engineering and Computer Science Capitol College, Maryland, USA yhong@capitol-college.edu
More informationDynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet
International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 9 September -2015 3221 5687, (P) 3221 568X Dynamic Channel Allocation And Load Balancing With Sleep Scheduling In Manet 1
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationMaking Money With Affiliate Marketing - How to Do It
A New Dynamic Bandwidth Allocation Protocol with Quality of Service in Ethernetbased Passive Optical Networks Fu-Tai An, Yu-Li Hsueh, Kyeong Soo Kim, Ian M White, and Leonid G Kazovsky Optical Communication
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More information802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
More informationRadio Resource Allocation in GSM/GPRS Networks
Radio Resource Allocation in GSM/GPRS Networks Jean-Lien C. Wu 1, Wei-Yeh Chen 2, and Hung-Huan Liu 1 1 Department of Electronic Engineering, National Taiwan University of Science and Technology, 43, Keelung
More informationIntroduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
More informationCDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
More informationA Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More informationEthernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
More informationVoice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
More informationCourse Duration: Course Content Course Description Course Objectives Course Requirements
Course: TCS 201 Telecommunication and Networks I (3 credits compulsory) Course Duration: The course shall comprise of 45hours of theory and practical classes. The theory will be taught for 30hours of 2hours
More informationHandover Management based on the Number of Retries for VoIP on WLANs
Handover Management based on the Number of Retries for VoIP on WLANs Shigeru Kashihara Yuji Oie Department of Computer Science and Electronics, Kyushu Institute of Technology Kawazu 68-4, Iizuka, 82-852
More informationROUTER CONTROL MECHANISM FOR CONGESTION AVOIDANCE IN CDMA BASED IP NETWORK
International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 465-470 ROUTER CONTROL MECHANISM FOR CONGESTION AVOIDANCE IN CDMA BASED IP NETWORK V.Sumalatha1
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationAn Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e
An Overview of Wireless LAN Standards IEEE 802.11 and IEEE 802.11e Jahanzeb Farooq, Bilal Rauf Department of Computing Science Umeå University Sweden Jahanzeb Farooq, 2006 (tipputhegreat@hotmail.com) Chapter
More informationRandom access protocols for channel access. Markov chains and their stability. Laurent Massoulié.
Random access protocols for channel access Markov chains and their stability laurent.massoulie@inria.fr Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 10 Satellite Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain different type of satellite orbits
More informationAN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationTO realize effective Grid computing on a wide-area network, Performance Evaluation of Data Transfer Protocol GridFTP for Grid Computing
Performance Evaluation of Data Transfer Protocol for Grid Computing Hiroyuki Ohsaki and Makoto Imase Abstract In Grid computing, a data transfer protocol called has been widely used for efficiently transferring
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More information1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.
Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one
More informationCDMA Performance under Fading Channel
CDMA Performance under Fading Channel Ashwini Dyahadray 05307901 Under the guidance of: Prof Girish P Saraph Department of Electrical Engineering Overview Wireless channel fading characteristics Large
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationHow To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem
Lund University ETSN01 Advanced Telecommunication Tutorial 7 : Link layer part I Author: Antonio Franco Course Teacher: Emma Fitzgerald February 12, 2015 Contents I Before you start 3 II Exercises 3 1
More informationPerformance of UMTS Code Sharing Algorithms in the Presence of Mixed Web, Email and FTP Traffic
Performance of UMTS Code Sharing Algorithms in the Presence of Mixed Web, Email and FTP Traffic Doru Calin, Santosh P. Abraham, Mooi Choo Chuah Abstract The paper presents a performance study of two algorithms
More informationA Framework for supporting VoIP Services over the Downlink of an OFDMA Network
A Framework for supporting VoIP Services over the Downlink of an OFDMA Network Patrick Hosein Huawei Technologies Co., Ltd. 10180 Telesis Court, Suite 365, San Diego, CA 92121, US Tel: 858.882.0332, Fax:
More informationECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
More informationFrame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet
Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw
More informationA MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas
A MAC Protocol for Mobile Ad Hoc Networks Using Directional Antennas A. Nasipuri, S. Ye, J. You, and R. E. Hiromoto Division of Computer Science The University of Texas at San Antonio San Antonio, TX 78249-0667
More informationUsing median filtering in active queue management for telecommunication networks
Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.
More information