Analysis of a random-access protocol under long-range-dependent traffic
نویسندگان
چکیده
Aloha-type random-access protocols have been employed as access-control protocols in wireline and wireless, and stationary and mobile, multiple-access communications networks. They are frequently employed by the control and signaling subsystem of demand-assigned multiple-access protocols for regulating the sharing of a multiaccess communications channel. The correct design and sizing of the random-access operated control/signaling channel is a critical element in determining the performance of these networks. Excessive delays in the transport of signaling messages (induced by too many collisions and retransmissions) lead to unacceptable session-connection setup times. This is of particular concern when the message traffic is highly bursty, as it tends to be under a multitude of often-observed traffic-loading scenarios. Consequently, in this paper, we investigate the performance behavior of a random-access protocol when loaded by bursty traffic processes. The latter often exhibit long-range dependence (LRD). The LRD traffic flows are modeled here as multiplicative multifractal processes. The random-access protocol is modeled as an Aloha channel with blocking. We demonstrate that the burstiness feature of the traffic processes, rather than their LRD character, is the essential element determining the performance behavior of the protocol. When the loading-traffic process is not very bursty, we show that the performance of the random-access channel can be even better than that exhibited under Poisson traffic loading; otherwise, performance degradation is noted. We demonstrate the impact of the selection of the protocol-operational parameters in determining the effective performance behavior of the random-access protocol.
منابع مشابه
Analysis of Random Access Protocol under Bursty Traffic
Aloha-type random-access protocols have been employed as access control protocols in wireline and wireless, stationary and mobile, multiple-access communications networks. They are frequently employed by the control and signaling subsystem of demand-assigned multiple access protocols for regulating the sharing of a control channel. The latter is used for the transport of reservation packets req...
متن کاملClosed Loop Analysis of the Bottleneck Buffer under Adaptive Window Controlled Transfer of HTTP-Like Traffic
We consider an Internet link carrying http-like traffic, i.e., transfer of finite volume files starting at random time instants. These file transfers are controlled by an adaptive window protocol (AWP); an example of such a protocol is TCP. We provide an analysis for the auto-covariance function of the AWP controlled traffic into the link’s buffer; this traffic, in general, is not an on-off pro...
متن کاملPerformance Analysis of a Novel Hybrid S-ALOHA/TDMA Protocol for Beta Distributed Massive MTC Access
Simultaneous random access of massive machine type communications (MTC) devices are expected to cause congestion in the radio access network. Not only the performance of MTC, but the coexisting human to human (H2H) communications would also degrade dramatically without an appropriate medium access control (MAC) protocol. However, most existing solutions focus on the random access procedure with...
متن کاملLong range dependence in network traffic and the closed loop behaviour of buffers under adaptive window control
We consider an Internet link carrying http-like traffic, i.e., transfers of finite volume files arriving at random time instants. These file transfers are controlled by an adaptive window protocol (AWP); an example of such a protocol is TCP. We provide analysis for the auto-covariance function of the AWP controlled traffic into the link’s buffer; this traffic, in general, cannot be represented ...
متن کاملA new virtual leader-following consensus protocol to internal and string stability analysis of longitudinal platoon of vehicles with generic network topology under communication and parasitic delays
In this paper, a new virtual leader following consensus protocol is introduced to perform the internal and string stability analysis of longitudinal platoon of vehicles under generic network topology. In all previous studies on multi-agent systems with generic network topology, the control parameters are strictly dependent on eigenvalues of network matrices (adjacency or Laplacian). Since some ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Trans. Vehicular Technology
دوره 52 شماره
صفحات -
تاریخ انتشار 2003