Loading...
Search for: throughput-modeling
0.006 seconds

    Throughput enhancement of a random access WLAN by combination of digital and analog network coding

    , Article IEEE International Conference on Communications, 5 June 2011 through 9 June 2011 ; June , 2011 ; 05361486 (ISSN) ; 9781612842332 (ISBN) Farhadi, F ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we propose a new packet routing scheme, i.e., a combined digital and analog network coding scheme (DNC-ANC) suitable for multiple unicast scenario. In this respect, we consider a random access WLAN comprised of single and multi-hop unicast sessions. Then we modify the MAC scheme in order to enable ANC. In order to evaluate the effect of the proposed DNC-ANC scheme analytically, we employ an open queueing network and map the details of MAC as well as routing schemes onto its suitable parameters. By writing the corresponding traffic equations and applying the stability condition, we are able to find the maximum stable throughput for the considered scenario. Finally, we will show... 

    Throughput modeling of distributed reservation protocol

    , Article IEEE Transactions on Mobile Computing ; Volume 15, Issue 2 , 2016 , Pages 503-515 ; 15361233 (ISSN) Ajorloo, H ; Manzuri Shalmani, M. T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    To evaluate the performance of distributed mediumaccess control (MAC) layer of emerging ultra wideband (UWB) and 60-GHz millimeter wave (mmWave) wireless personal area networks (WPANs) based on distributed reservation protocol (DRP) of ECMA-368 and ECMA-387 standards, we provide an analytical model for the probability distribution of steady state throughput as a function of the network dimensions size, number of devices, antenna beamwidth, transmission range, bit error rate (BER), antenna disturbance rate (ADR), aggregation length, payload size, and incoming frame rate. Using this model, the optimal payload size is computed as an example of optimization problem.We also propose a formula for... 

    An analytical model for evaluation of wireless mesh networks

    , Article 2008 International Symposium on Telecommunications, IST 2008, Tehran, 27 August 2008 through 28 August 2008 ; October , 2008 , Pages 295-300 ; 9781424427512 (ISBN) Hamidi Sepehr, F ; Ashtiani, F ; Sharif University of Technology
    2008
    Abstract
    Wireless mesh networks (WMNs) are well-promising future networks especially for ubiquitous connection to Internet. In this paper, we propose an analytical model in order to evaluate the maximum stable throughput of a WMN based on a simplified version of IEEE 802.11s MAC protocol. Our modeling approach is based on a multi-class open queueing network. In this respect, we map some of the important features of IEEE 802.11s MAC protocol, esp., its contention-based and contention-free periods onto different parameters of the proposed queueing network. By solving the related traffic equations and applying the stability condition, we determine the maximum stable throughput, i.e., the maximum packet... 

    High-level modeling approach for analyzing the effects of traffic models on power and throughput in mesh-based NoCs

    , Article Proceedings of the IEEE International Frequency Control Symposium and Exposition, 4 January 2008 through 8 January 2008, Hyderabad ; 2008 , Pages 415-420 ; 0769530834 (ISBN); 9780769530833 (ISBN) Koohi, S ; Mirza Aghatabar, M ; Hessabi, S ; Pedram, M ; VLSI Society of India ; Sharif University of Technology
    2008
    Abstract
    Traffic models exert different message flows in a network and have a considerable effect on power consumption through different applications. So a good power analysis should consider traffic models. In this paper we present power and throughput models in terms of traffic rate parameters for the most popular traffic models, i.e. Uniform, Local, HotSpot and First Matrix Transpose (FMT) as a permutational traffic model. We also select Mesh topology as the most prominent NoC topology and validate the presented models by comparing our results against simulation results from Synopsys Power Compiler and Modelsim From the comparison, we show that our modeling approach leads to average error of 2%...