91 research outputs found

    Performance analysis of contention based bandwidth request mechanisms in WiMAX networks

    Get PDF
    This article is posted here with the permission of IEEE. The official version can be obtained from the DOI below - Copyright @ 2010 IEEEWiMAX networks have received wide attention as they support high data rate access and amazing ubiquitous connectivity with great quality-of-service (QoS) capabilities. In order to support QoS, bandwidth request (BW-REQ) mechanisms are suggested in the WiMAX standard for resource reservation, in which subscriber stations send BW-REQs to a base station which can grant or reject the requests according to the available radio resources. In this paper we propose a new analytical model for the performance analysis of various contention based bandwidth request mechanisms, including grouping and no-grouping schemes, as suggested in the WiMAX standard. Our analytical model covers both unsaturated and saturated traffic load conditions in both error-free and error-prone wireless channels. The accuracy of this model is verified by various simulation results. Our results show that the grouping mechanism outperforms the no-grouping mechanism when the system load is high, but it is not preferable when the system load is light. The channel noise degrades the performance of both throughput and delay.This work was supported by the U.K. Engineering and Physical Sciences Research Council (EPSRC) under Grant EP/G070350/1 and by the Brunel University’s BRIEF Award

    WLC22-4: Efficient request mechanism usage in IEEE 802.16

    Get PDF
    IEEE 802.16 protocols for metropolitan broadband wireless access systems have been standardized recently. According to the standard, a subscriber station can deliver bandwidth request messages to a base station by numerous methods. This paper provides both the simulation and analytical models for the investigation of specified random access method, which is compared with centralized polling and station- grouping mechanisms. Based on the assumptions of Bernoulli request arrival process and ideal channel conditions, the mean delay of a request transmission is evaluated for varying number of transmission opportunities and different arrival rates

    Adjusting WiMAX for a Dedicated Surveillance Network

    Get PDF
    WiMAX (Worldwide Interoperability for Microwave Access) devices have been used widely in the market. WiMAX-based video surveillance products have also been available. The acceptance of WiMAX in the market, as well as the availability of WiMAX products, contributes to the possibility of implementing it for dedicated video surveillance application. However, since WiMAX is designed to accommodate various applications with different quality of service (QoS) requirements, WiMAX–based dedicated surveillance network may not achieve optimum performance, as all SSs generate the same QoS requirements. The scheduler cannot implement traffic type priority; therefore, service classification does not work as expected. This paper proposes WiMAX adjustment to transform a multi-purpose WiMAX network into a network dedicated to video surveillance. NS-2 simulations show that the proposed adjustment is able to deliver low delay and high quality video surveillance.DOI:http://dx.doi.org/10.11591/ijece.v3i4.318

    A Unified Performance Model for Best-Effort Services in WiMAX Networks

    Get PDF
    Based on the work from the IEEE Working Group 802.16 and ETSI HiperMAN Working Group, the WiMAX (Worldwide Interoperability for Microwave Access) technology is defined by the WiMAX Forum to support fixed and mobile broadband wireless access. In the standard (IEEE 802.16 standard, 2009), it defines several air interface variants, including WirelessMAN-SC, WirelessMAN-OFDM, WirelessMAN-OFDMA and WirelessMAN-HUMAN. WiMAX networks can be operated in two different modes: point to multi-point (PMP) mode and mesh mode. Under the PMP mode, all traffics from subscriber stations (SSs) are controlled by the base station. Mesh mode is a distributed architecture where traffics are allowed to route not only between SSs and the base station but also between SSs. In this chapter, we focus on the WirelessMAN-SC air interface operating in the PMP mode. In WiMAX networks, quality of service (QoS) is provided through five different services classes in the MAC layer (Andrews et al., 2007): 1. Unsolicited grant service (UGS) is designed for real-time applications with constant data rate. These applications always have stringent delay requirement, such as T1/E1. 2. Real-time polling service (rtPS) is designed for real-time applications with variable data rate. These applications have less stringent delay requirement, such as MPEG and VoIP without silence suppression. 3. Extended real-time polling service (ertPS) builds on the efficiency of both UGS and rtPS. It is designed for the applications with variable data rate such as VoIP with silence suppression. 4. Non-real-time polling service (nrtPS) is designed to support variable bit rate non-real-time applications with certain bandwidth guarantee, such as high bandwidth FTP. 5. Best effort service (BE) is designed for best effort applications such as HTTP. To meet the requirements of different service classes, several bandwidth request mechanisms have been defined, namely, unsolicited granting, unicast polling, broadcast polling and piggybacking. In this chapter, we present a performance model for services, such as BE service, based on the broadcast polling mechanism which is contention based and requires he SSs to use the truncated binary exponential backoff (TBEB) algorithm (Kwak et al., 2005) to resolve contention

    Spectrum Sharing Methods in Coexisting Wireless Networks

    Get PDF
    Radio spectrum, the fundamental basis for wireless communication, is a finite resource. The development of the expanding range of radio based devices and services in recent years makes the spectrum scarce and hence more costly under the paradigm of extensive regulation for licensing. However, with mature technologies and with their continuous improvements it becomes apparent that tight licensing might no longer be required for all wireless services. This is from where the concept of utilizing the unlicensed bands for wireless communication originates. As a promising step to reduce the substantial cost for radio spectrum, different wireless technology based networks are being deployed to operate in the same spectrum bands, particularly in the unlicensed bands, resulting in coexistence. However, uncoordinated coexistence often leads to cases where collocated wireless systems experience heavy mutual interference. Hence, the development of spectrum sharing rules to mitigate the interference among wireless systems is a significant challenge considering the uncoordinated, heterogeneous systems. The requirement of spectrum sharing rules is tremendously increasing on the one hand to fulfill the current and future demand for wireless communication by the users, and on the other hand, to utilize the spectrum efficiently. In this thesis, contributions are provided towards dynamic and cognitive spectrum sharing with focus on the medium access control (MAC) layer, for uncoordinated scenarios of homogeneous and heterogeneous wireless networks, in a micro scale level, highlighting the QoS support for the applications. This thesis proposes a generic and novel spectrum sharing method based on a hypothesis: The regular channel occupation by one system can support other systems to predict the spectrum opportunities reliably. These opportunities then can be utilized efficiently, resulting in a fair spectrum sharing as well as an improving aggregated performance compared to the case without having special treatment. The developed method, denoted as Regular Channel Access (RCA), is modeled for systems specified by the wireless local resp. metropolitan area network standards IEEE 802.11 resp. 802.16. In the modeling, both systems are explored according to their respective centrally controlled channel access mechanisms and the adapted models are evaluated through simulation and results analysis. The conceptual model of spectrum sharing based on the distributed channel access mechanism of the IEEE 802.11 system is provided as well. To make the RCA method adaptive, the following enabling techniques are developed and integrated in the design: a RSS-based (Received Signal Strength based) detection method for measuring the channel occupation, a pattern recognition based algorithm for system identification, statistical knowledge based estimation for traffic demand estimation and an inference engine for reconfiguration of resource allocation as a response to traffic dynamics. The advantage of the RCA method is demonstrated, in which each competing collocated system is configured to have a resource allocation based on the estimated traffic demand of the systems. The simulation and the analysis of the results show a significant improvement in aggregated throughput, mean delay and packet loss ratio, compared to the case where legacy wireless systems coexists. The results from adaptive RCA show its resilience characteristics in case of dynamic traffic. The maximum achievable throughput between collocated IEEE 802.11 systems applying RCA is provided by means of mathematical calculation. The results of this thesis provide the basis for the development of resource allocation methods for future wireless networks particularly emphasized to operate in current unlicensed bands and in future models of the Open Spectrum Alliance

    Is Our Model for Contention Resolution Wrong?

    Full text link
    Randomized binary exponential backoff (BEB) is a popular algorithm for coordinating access to a shared channel. With an operational history exceeding four decades, BEB is currently an important component of several wireless standards. Despite this track record, prior theoretical results indicate that under bursty traffic (1) BEB yields poor makespan and (2) superior algorithms are possible. To date, the degree to which these findings manifest in practice has not been resolved. To address this issue, we examine one of the strongest cases against BEB: nn packets that simultaneously begin contending for the wireless channel. Using Network Simulator 3, we compare against more recent algorithms that are inspired by BEB, but whose makespan guarantees are superior. Surprisingly, we discover that these newer algorithms significantly underperform. Through further investigation, we identify as the culprit a flawed but common abstraction regarding the cost of collisions. Our experimental results are complemented by analytical arguments that the number of collisions -- and not solely makespan -- is an important metric to optimize. We believe that these findings have implications for the design of contention-resolution algorithms.Comment: Accepted to the 29th ACM Symposium on Parallelism in Algorithms and Architectures (SPAA 2017

    Backoff as Performance improvements Algorithms - A Comprehenssive Review

    Get PDF
    As a significant part of the Media Access Control protocol, the backoff algorithm purpose is to minimize number of collisions if not totally avoid any collision in Mobile Ad Hoc Networks, in the case of contention between nodes to access a channel. Researchers have proposed many algorithms for backoff to enhance the network performance and improve it. This paper aims at exploring the main and most studied backoff algorithms and how do these algorithms lead to an enhancement of the MANETs performance. This paper also compares between the algorithms proposed in the literature and evaluates to what extent they have affected the performance and enhance it

    Energy Efficient and Cooperative Solutions for Next-Generation Wireless Networks

    Get PDF
    Energy efficiency is increasingly important for next-generation wireless systems due to the limited battery resources of mobile clients. While fourth generation cellular standards emphasize low client battery consumption, existing techniques do not explicitly focus on reducing power that is consumed when a client is actively communicating with the network. Based on high data rate demands of modern multimedia applications, active mode power consumption is expected to become a critical consideration for the development and deployment of future wireless technologies. Another reason for focusing more attention on energy efficient studies is given by the relatively slow progress in battery technology and the growing quality of service requirements of multimedia applications. The disproportion between demanded and available battery capacity is becoming especially significant for small-scale mobile client devices, where wireless power consumption dominates within the total device power budget. To compensate for this growing gap, aggressive improvements in all aspects of wireless system design are necessary. Recent work in this area indicates that joint link adaptation and resource allocation techniques optimizing energy efficient metrics can provide a considerable gain in client power consumption. Consequently, it is crucial to adapt state-of-the-art energy efficient approaches for practical use, as well as to illustrate the pros and cons associated with applying power-bandwidth optimization to improve client energy efficiency and develop insights for future research in this area. This constitutes the first objective of the present research. Together with energy efficiency, next-generation cellular technologies are emphasizing stronger support for heterogeneous multimedia applications. Since the integration of diverse services within a single radio platform is expected to result in higher operator profits and, at the same time, reduce network management expenses, intensive research efforts have been invested into design principles of such networks. However, as wireless resources are limited and shared by clients, service integration may become challenging. A key element in such systems is the packet scheduler, which typically helps ensure that the individual quality of service requirements of wireless clients are satisfied. In contrastingly different distributed wireless environments, random multiple access protocols are beginning to provide mechanisms for statistical quality of service assurance. However, there is currently a lack of comprehensive analytical frameworks which allow reliable control of the quality of service parameters for both cellular and local area networks. Providing such frameworks is therefore the second objective of this thesis. Additionally, the study addresses the simultaneous operation of a cellular and a local area network in spectrally intense metropolitan deployments and solves some related problems. Further improving the performance of battery-driven mobile clients, cooperative communications are sought as a promising and practical concept. In particular, they are capable of mitigating the negative effects of fading in a wireless channel and are thus expected to enhance next-generation cellular networks in terms of client spectral and energy efficiencies. At the cell edges or in areas missing any supportive relaying infrastructure, client-based cooperative techniques are becoming even more important. As such, a mobile client with poor channel quality may take advantage of neighboring clients which would relay data on its behalf. The key idea behind the concept of client relay is to provide flexible and distributed control over cooperative communications by the wireless clients themselves. By contrast to fully centralized control, this is expected to minimize overhead protocol signaling and hence ensure simpler implementation. Compared to infrastructure relay, client relay will also be cheaper to deploy. Developing the novel concept of client relay, proposing simple and feasible cooperation protocols, and analyzing the basic trade-offs behind client relay functionality become the third objective of this research. Envisioning the evolution of cellular technologies beyond their fourth generation, it appears important to study a wireless network capable of supporting machine-to-machine applications. Recent standardization documents cover a plethora of machine-to-machine use cases, as they also outline the respective technical requirements and features according to the application or network environment. As follows from this activity, a smart grid is one of the primary machine-to-machine use cases that involves meters autonomously reporting usage and alarm information to the grid infrastructure to help reduce operational cost, as well as regulate a customer's utility usage. The preliminary analysis of the reference smart grid scenario indicates weak system architecture components. For instance, the large population of machine-to-machine devices may connect nearly simultaneously to the wireless infrastructure and, consequently, suffer from excessive network entry delays. Another concern is the performance of cell-edge machine-to-machine devices with weak wireless links. Therefore, mitigating the above architecture vulnerabilities and improving the performance of future smart grid deployments is the fourth objective of this thesis. Summarizing, this thesis is generally aimed at the improvement of energy efficient properties of mobile devices in next-generation wireless networks. The related research also embraces a novel cooperation technique where clients may assist each other to increase per-client and network-wide performance. Applying the proposed solutions, the operation time of mobile clients without recharging may be increased dramatically. Our approach incorporates both analytical and simulation components to evaluate complex interactions between the studied objectives. It brings important conclusions about energy efficient and cooperative client behaviors, which is crucial for further development of wireless communications technologies
    • 

    corecore