2,238 research outputs found
Stability Region of a Slotted Aloha Network with K-Exponential Backoff
Stability region of random access wireless networks is known for only simple
network scenarios. The main problem in this respect is due to interaction among
queues. When transmission probabilities during successive transmissions change,
e.g., when exponential backoff mechanism is exploited, the interactions in the
network are stimulated. In this paper, we derive the stability region of a
buffered slotted Aloha network with K-exponential backoff mechanism,
approximately, when a finite number of nodes exist. To this end, we propose a
new approach in modeling the interaction among wireless nodes. In this
approach, we model the network with inter-related quasi-birth-death (QBD)
processes such that at each QBD corresponding to each node, a finite number of
phases consider the status of the other nodes. Then, by exploiting the
available theorems on stability of QBDs, we find the stability region. We show
that exponential backoff mechanism is able to increase the area of the
stability region of a simple slotted Aloha network with two nodes, more than
40\%. We also show that a slotted Aloha network with exponential backoff may
perform very near to ideal scheduling. The accuracy of our modeling approach is
verified by simulation in different conditions.Comment: 30 pages, 6 figure
Exponential growth in two-dimensional topological fluid dynamics
This paper describes topological kinematics associated with the stirring by
rods of a two-dimensional fluid. The main tool is the Thurston-Nielsen (TN)
theory which implies that depending on the stirring protocol the essential
topological length of material lines grows either exponentially or linearly. We
give an application to the growth of the gradient of a passively advected
scalar, the Helmholtz-Kelvin Theorem then yields applications to Euler flows.
The main theorem shows that there are periodic stirring protocols for which
generic initial vorticity yields a solution to Euler's equations which is not
periodic and further, the and -norms of the gradient of its
vorticity grow exponentially in time.Comment: For the proceedings of the IUTAM Symposium on Topological Fluid
Mechanics II, Cambridge, UK, July 201
Characterizing Heavy-Tailed Distributions Induced by Retransmissions
Consider a generic data unit of random size L that needs to be transmitted
over a channel of unit capacity. The channel availability dynamics is modeled
as an i.i.d. sequence {A, A_i},i>0 that is independent of L. During each period
of time that the channel becomes available, say A_i, we attempt to transmit the
data unit. If L<A_i, the transmission was considered successful; otherwise, we
wait for the next available period and attempt to retransmit the data from the
beginning. We investigate the asymptotic properties of the number of
retransmissions N and the total transmission time T until the data is
successfully transmitted. In the context of studying the completion times in
systems with failures where jobs restart from the beginning, it was shown that
this model results in power law and, in general, heavy-tailed delays. The main
objective of this paper is to uncover the detailed structure of this class of
heavy-tailed distributions induced by retransmissions. More precisely, we study
how the functional dependence between P[L>x] and P[A>x] impacts the
distributions of N and T. In particular, we discover several functional
criticality points that separate classes of different functional behavior of
the distribution of N. We also discuss the engineering implications of our
results on communication networks since retransmission strategy is a
fundamental component of the existing network protocols on all communication
layers, from the physical to the application one.Comment: 39 pages, 2 figure
Robust and Listening-Efficient Contention Resolution
This paper shows how to achieve contention resolution on a shared
communication channel using only a small number of channel accesses -- both for
listening and sending -- and the resulting algorithm is resistant to
adversarial noise.
The shared channel operates over a sequence of synchronized time slots, and
in any slot agents may attempt to broadcast a packet. An agent's broadcast
succeeds if no other agent broadcasts during that slot. If two or more agents
broadcast in the same slot, then the broadcasts collide and both broadcasts
fail. An agent listening on the channel during a slot receives ternary
feedback, learning whether that slot had silence, a successful broadcast, or a
collision. Agents are (adversarially) injected into the system over time. The
goal is to coordinate the agents so that each is able to successfully broadcast
its packet.
A contention-resolution protocol is measured both in terms of its throughput
and the number of slots during which an agent broadcasts or listens. Most prior
work assumes that listening is free and only tries to minimize the number of
broadcasts.
This paper answers two foundational questions. First, is constant throughput
achievable when using polylogarithmic channel accesses per agent, both for
listening and broadcasting? Second, is constant throughput still achievable
when an adversary jams some slots by broadcasting noise in them? Specifically,
for packets arriving over time and jammed slots, we give an algorithm
that with high probability in guarantees throughput and
achieves on average channel accesses against an
adaptive adversary. We also have per-agent high-probability guarantees on the
number of channel accesses -- either or , depending on how quickly the adversary can react to what
is being broadcast
Performance analysis of general backoff protocols
In this paper, we analyze backoff protocols, such as the one used in Ethernet. We examine a general backoff function (GBF) rather than just the binary exponential backoff (BEB) used by Ethernet. Under some mild assumptions we find stability and optimality conditions for a wide class of backoff protocols with GBF. In particular, it is proved that the maximal throughput rate over the class of backoff protocols is a fixed function of the number of stations (N) and the optimal average service time is about Ne for large N. The reasons of the instability of the BEB protocol (for a big enough input rate) are explained. Additionally, the paper introduces novel procedure for analyzing bounded backoff protocols, which is useful for creating new protocols or improving existing, as no protocol can use unbounded counters
- …