Analysis of a random-access protocol under long-range-dependent traffic

نویسندگان

  • Jianbo Gao
  • Izhak Rubin
چکیده

Aloha-type random-access protocols have been employed as access-control protocols in wireline and wireless, and stationary and mobile, multiple-access communications networks. They are frequently employed by the control and signaling subsystem of demand-assigned multiple-access protocols for regulating the sharing of a multiaccess communications channel. The correct design and sizing of the random-access operated control/signaling channel is a critical element in determining the performance of these networks. Excessive delays in the transport of signaling messages (induced by too many collisions and retransmissions) lead to unacceptable session-connection setup times. This is of particular concern when the message traffic is highly bursty, as it tends to be under a multitude of often-observed traffic-loading scenarios. Consequently, in this paper, we investigate the performance behavior of a random-access protocol when loaded by bursty traffic processes. The latter often exhibit long-range dependence (LRD). The LRD traffic flows are modeled here as multiplicative multifractal processes. The random-access protocol is modeled as an Aloha channel with blocking. We demonstrate that the burstiness feature of the traffic processes, rather than their LRD character, is the essential element determining the performance behavior of the protocol. When the loading-traffic process is not very bursty, we show that the performance of the random-access channel can be even better than that exhibited under Poisson traffic loading; otherwise, performance degradation is noted. We demonstrate the impact of the selection of the protocol-operational parameters in determining the effective performance behavior of the random-access protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Random Access Protocol under Bursty Traffic

Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are frequently employed by the control and signaling subsystem of demand-assigned multiple access protocols for regulating the sharing of a control channel. The latter is used for the transport of reservation packets req...

متن کامل

Closed Loop Analysis of the Bottleneck Buffer under Adaptive Window Controlled Transfer of HTTP-Like Traffic

We consider an Internet link carrying http-like traffic, i.e., transfer of finite volume files starting at random time instants. These file transfers are controlled by an adaptive window protocol (AWP); an example of such a protocol is TCP. We provide an analysis for the auto-covariance function of the AWP controlled traffic into the link’s buffer; this traffic, in general, is not an on-off pro...

متن کامل

Performance Analysis of a Novel Hybrid S-ALOHA/TDMA Protocol for Beta Distributed Massive MTC Access

Simultaneous random access of massive machine type communications (MTC) devices are expected to cause congestion in the radio access network. Not only the performance of MTC, but the coexisting human to human (H2H) communications would also degrade dramatically without an appropriate medium access control (MAC) protocol. However, most existing solutions focus on the random access procedure with...

متن کامل

Long range dependence in network traffic and the closed loop behaviour of buffers under adaptive window control

We consider an Internet link carrying http-like traffic, i.e., transfers of finite volume files arriving at random time instants. These file transfers are controlled by an adaptive window protocol (AWP); an example of such a protocol is TCP. We provide analysis for the auto-covariance function of the AWP controlled traffic into the link’s buffer; this traffic, in general, cannot be represented ...

متن کامل

A new virtual leader-following consensus protocol to internal and string stability analysis of longitudinal platoon of vehicles with generic network topology under communication and parasitic delays

In this paper, a new virtual leader following consensus protocol is introduced to perform the internal and string stability analysis of longitudinal platoon of vehicles under generic network topology. In all previous studies on multi-agent systems with generic network topology, the control parameters are strictly dependent on eigenvalues of network matrices (adjacency or Laplacian). Since some ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Trans. Vehicular Technology

دوره 52  شماره 

صفحات  -

تاریخ انتشار 2003