SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org ||Volume 4 Issue 10|| October 2015 || PP.43-52
www.ijesi.org 43 | Page
Daly Analysis for WiMax under balanced and unbalanced
traffic conditions in fixed priorities between stations
Ramdan A. Kalifa 1
, Nasar Aldian Ambark Shashoa2
1
(Electrical Engineering Department, The High Professional Institute for Comprehensive
Professions Mezda, Libya)
2
(Electrical and Electronics Engineering Department, Azzaytuna University, Libya)
ABSTRACT : Broadband Wireless Access (BWA) systems offer a solution for broadband access and high
data rate transmission of multimedia services with distinct Quality-of-Service (QoS) requirement through a
wireless medium. The IEEE802.16 standard does not specify how to efficiently schedule the traffic related to
different applications in order to meet their specific requirements. In this paper, we present a modified scheme
which is based on a Reservation Priority Access Control (RPAC) using TDD allocation approach, and the
behavior of this reservation scheme is analyzed and evaluated under balanced and unbalanced traffic
conditions in fixed priorities between stations.
KEYWORDS - Broadband Wireless Access, Quality-of-Service, Reservation Priority Access Control,
Downlink Channel
I. INTRODUCTION
The Broadband Wireless Access (BWA) is a technology proposed to offer wireless access to network stations
in a broadband metropolitan area environment. These networks are designed to operate at high data rates and to
deal with several applications, resulting in different types of traffic profiles and demands. Therefore, the system
is required to work with various types of real-time and non-real-time service classes, with different traffic
characteristics and quality of service (QoS) guarantees. In [1] , a new MAC scheme for BWA, incorporating a
scheduling mechanism based on message and/or station priorities, was proposed as an alternative protocol to the
IEEE 802.16 Standard [3]. However, only a fixed priority approach to service differentiation among terminals
was used.In this paper, we propose an extention to the MAC protocol described in [1], with a unbalanced traffic
conditions in fixed priorities between stations in the network. Moreover, we developed a simulation model to
compare the analytical results under balanced and unbalanced traffic conditions and the simulation results
exposed here.The remainder of this paper is organized as follows. Section II gives a short description of IEEE
802.16 standard.The proposed protocol is described in Section III. An analytical model, which allow to obtain
the average message waiting time for different priority classes, is provided in section IV. Section V presents
some numerical results and the paper is concluded with a few discussions concerning the proposal in Section VI.
II. IEEE 802.16 STANDARD
A- PHY and MAC Layers
In the basic architecture there are one Base Station (BS), and one or more Subscriber Stations (SSs).
Transmissions are assumed to take place through two independent channels: a Downlink Channel (DL) from the
BS to the SSs, and an Uplink Channel (UL) from the SSs to the BS. Hence, there is no contention associated
with the the DL channel, while the UL channel must be shared by the SSs through the use of some multiple
access control protocol. During the DL, only the BS transmits in broadcast to all the SSs. The BS determines the
number of slots to be allocated for each SS in the UL, and broadcast this information in an UL-MAP message at
the beginning of each frame. The stations transmit their data in predefined time slots as indicated in the UL-
MAP. A scheduling module for the UL is necessary to be kept in the BS in order to determine the transmission
opportunities using the bandwidth requests (BW-Request) sent by the SSs. Figure 1 illustrates the structure of
the MAC frame.
Daly Analysis for WiMax under balanced…
www.ijesi.org 44 | Page
Fig.1. MAC frame structure
B- QoS Architecture
The IEEE 802.16 supports many traffic types (data, voice, video) with different QoS requirements. The standard
defines four types of data flows, each one associated with distinct applications and QoS requirements [2]:
1. Unsolicited Grant Service (UGS): for applications with constant bandwidth allocation requirements.
2. Real-Time Polling Service (rtPS): for applications with specific bandwith requirements and maximum
acceptable delay.
3. Non-Real-Time Polling Service (nrtPS): for applications with a minimum bandwidth allocation requirements,
that are intolerant to delay.
4. Best Effort Service (BE): for applications without bandwidth allocation requirements, that receive the
remaining bandwidth after the allocation to the three previous types of services. Fig. 2 shows the QoS
architecture present in 802.16. The UL packet scheduling (UPS) module controls all the packet transmissions in
the UL. As the protocol is connection-oriented, the application should establish a connection between the BS
and the associated service flow (UGS, rtPS, nrtPS or BE). The BS identifies the connections by assigning a
unique Connection ID (CID) to each one. The 802.16 defines the signaling process for the establishment of a
connection (Connection-Request and Connection-Response) between SS and BS, but does not specify the rules
for admission control.
Fig.2 QoS Architecture of IEEE802.16
Daly Analysis for WiMax under balanced…
www.ijesi.org 45 | Page
In summary, the IEEE 802.16 specifies: the signaling mechanism for information exchange between the BS and
the SSs, as the connection configuration, BW-Request and UL-MAP; and the scheduling of UL for UGS traffic.
The standard does not define: the scheduling of UL for rtPS, nrtPS and BE services; admission control and
traffic policing.
III. PROPOSED PROTOCOL
In the paper, we use the TDD allocation scheme, and we will compare result for unbalanced traffic conditions
with the results of the balanced traffic condition which were achieved in [1]. the authors proposed a new MAC
protocol for IEEE802.16 that uses an access scheme called RPAC (Reservation-Priority Access Control),
described in [3]. This access scheme incorporate a traffic scheduling mechanism based on messages and/or
stations priorities, and a reservation period governed by a TDMA discipline with one time slot allocated per
station in the network. The difference between the protocols described in [1] and [3] is that, in the former, the
access scheme was reformulated and adapted to 802.16 MAC structure. The MAC frame structure for the
proposed protocol is illustrated in Figure 3. Differently from the 802.16 standard, the frame lengths are not fixed
in the proposed scheme. Basically, the length of each frame will depend upon the number of packets arriving to
the stations in the previous frame. Reservation periods are located at the end of the UL sub-frame (not at the
beginning as in 802.16). Those periods are used by each of the stations to inform the BS about the services for
which a bandwidth reservation is being requested, as well as the number of packets to be transmitted for each of
those services. After processing all the requests, the BS sends, in the DL sub-frame of the next frame, a UL-
MAP with transmission opportunities to all reserved stations.
Fig 3. MAC Frame Structure for the Presented Scheme [1]
For analysis of the protocol, the activity in the channel can be seenas a sequence of reservation, downlink, and
transmission intervals, where each pair of DL and UL constitutes a transmission cycle, as illustrated in Figure 4.
It is important to note that there is a difference between the MAC frame and the transmission cycle, despite both
having an equal size, because the reservation period is fixed. In fact, the n-th cycle is formed by the reservation
period of (j−1)-st frame, plus the downlink and transmission intervals of the j-th frame. With this definition of
the transmission cycles, the analytical approach described in [3] can be used for the analysis of the average
waiting-time of the messages, as will be seen in Section IV. Referring to the picture in Figure 4, we
define 𝐿 𝑛
𝑅
, 𝐿 𝑛
𝐷𝐿
𝑎𝑛𝑑 𝐿 𝑛
𝑇
respectively, as the lengths (or duration, given by the number of slots) of the
reservation, the downlink, and the transmission intervals in the n-th cycle. Thus, 𝐿 𝑛 = 𝐿 𝑛
𝑅
+ 𝐿 𝑛
𝐷𝐿
+ 𝐿 𝑛
𝑇
represents the total length of the n-th cycle. Following the TDMA protocol, each reservation period is composed
by M slots ( 𝐿 𝑛
𝑅
= M; n = 1, 2 ...), where M is the number of stations in the network. During this period, of
duration of Mτ seconds, each station is associated to a single slot in a fixed manner.
Fig 4. Consecutive Transmission Cycles.
Daly Analysis for WiMax under balanced…
www.ijesi.org 46 | Page
We note that the length of a current (say, the n-th) cycle will depend on the number of messages that arrived
during the previous (say, the (n − 1)-st) cycle. This happens because request for the messages that arrived
during the (n−1)-st cycle will be transmitted in the reservation period of the n-th cycle. After this period, the BS
performs the centralized processing of the transmission opportunities and sends a UL-MAP in the DL sub-
channel, still in the n-th cycle. Afterwards, the stations transmit their messages in the transmission interval of
the same cycle, following the priorities established in the UL-MAP. Therefore, messages arriving during an
ongoing cycle get transmitted only in the subsequent cycle. We propose a medium access protocol with
priorities based on messages and/or stations, in accordance to the 802.16 protocol, that uses GPC or GPSS
admissions. We assume that, following the reservation phase and the DL sub-frame, the channel is allocated to
the stations following the sequence 1, 2, 3, ...,M. Thus, according to the priority rules used to determine the
order in which the messages should be transmitted during the transmission period, the following versions of the
protocol are considered:
• Version I, in which, for any p, q 2 {1, ..., P} such that p < q, all the class-p messages are transmitted before
any messages of class q, independent of which station it belongs to. For messages belonging to the same class
but in distinct stations, the order of the transmissions is according to the order in which the stations access the
channel (first station 1 and last station M). For messages in the same station with the same class of priorities, the
transmissions occur by order of arrival.
• Version II, in which, for any i, j 2 {1, ...,M} such that i < j, all the messages in station i are transmitted before
any message in station j, independently of it„s priority class. In any terminal, the messages are transmitted in
accordance with their priority classes and in order of arrival, in the case of belonging to the same class; that is, at
each station, the priority discipline HOL (Head-Of-the-Line) is applied with the highest priority assigned to
class 1 and the lowest assigned to class P. The behavior of the channel, according to Versions I and II of the
proposed protocol, is illustrated in Figures 5 and 6, respectively. Note that, in Version II, a higher priority
station transmits all it„s messages before one of lower priority. So, unlike Version I, it is possible that messages
of lower priority are transmitted before messages with higher priorities. We observe that a rigid admission
control carried by the BS and also by the SSs is necessary so that the heavy traffic of a specific class (or station)
does not overload (and hog) the channel, affecting the response time of the others.
Fig. 5. Version I of proposed protocol.
Fig. 6. Version II of proposed protocol.
Daly Analysis for WiMax under balanced…
www.ijesi.org 47 | Page
IV. ANALYTIC MODEL
The technique used to obtain the average waiting-time for the messages is similar to the method used in [4]. The
analysis for Version I of the proposed scheme is introduced first, and then obtained results are adopted and used
to extend our analysis to cover Version II. As defined in [1], the system considered has one BS and M (M ¸1)
client stations (SSs), each of which has an infinite buffer-size and is already associated with the base station.
The transmission channel is assumed to be error-free, with a transmission rate equal to C bit/s. In general, the
messages generated at each station are composed of a random number of fixed units of data, called packets, each
of which containsµ−1
bits. The transmission time of each packet is made equal to a time slot (τ). Therefore τ =
1/( µC). Messages arriving at each station belong to one of the different P classes and we assume that class-1
messages have the highest priority and class-P messages the lowest. Moreover, the arrival of messages is
characterized by a Poisson point process, such that 𝜆𝑖
𝑝
(messages per slot) is the average arrival rate of class-p
messages to station i.
Fixed Priorities
1. Version I: As the protocol defined in [1] uses the reservation scheme of [3], the results from the later paper
were used to obtain the expression for the steady-state average waiting-time of class-p messages at station i, in
the former one:
 
   
  2
1
2
1
2
21
1 1
1
1











   

 


LE
LEb
DLEMW
p
j
M
g
i
j
p
j
j
g
p
i
p
ip
i 

(1)
Where 𝜌𝑖
𝑝
= 𝜆𝑖
𝑝
𝑏𝑖
𝑝
is the traffic in the terminal i due to the messages of class p, and
   DL
n
n
LEDLE

 lim . This expression is still given as a function of E [L] and E [𝐿2
], respectively,
the first and second steady-state moments of the cycle length:
 
 



1
DLEM
LE (2)
Where
1
1 1
  
 
P
p
M
i
p
i

and
(3)
2) Version II: The analysis for Version II follows in a direct manner noting that, the messages are transmitted in
the same order as in Version I, with the classes of the messages exchanged for the numbers of the stations and
vice-versa (see Section III). Therefore, the expression in the Version II is analogous to that in Version I,
changing only the M by the P and the i for the p:
(4)
with E[L] and E[L2] given by equations (2) and (3), respectively.
Daly Analysis for WiMax under balanced…
www.ijesi.org 48 | Page
V. RESULTS
An evaluate the level of differentiation obtained with the described schemes, we considered two distinct
scenarios, where in each scenario there is a differentiated probability between four classes of traffic (P = 4), as
shown in Table I.
Table I, Traffic Scenarios Used
To simulate the presented models under balanced and unbalanced traffic conditions, we assume that:
1. Balanced case: there are 10 stations (M=10), each station shares with a traffic percentage (ρi = ρ/10), and
each station contributes with its traffic class according to Table I.
2. Unbalanced case: similarly M=10, but 72% of the traffic from station “5” and the remaining 28% of the
traffic from other stations (3% from each station), each station has traffic type as illustrated in Table I.
We assume that the number of packets in each message of class p in the station i is constant with average
bip = 5 and b2,ip = 25, for each p = 1, 2, 3, 4; and i = 1, ..., 10. So, the average waiting-time for the
class p is given by:
p
i
i
p
p
ip
WW 


10
1


(5)
Where
p
i
p
i
p
i
b 
and
p
i
p
M  
A. Average Waiting-time vs. Traffic Intensity
The performance of the model is measured for the average waiting-time per class. Fig. (7) and Fig. (8)
illustrate the average waiting-time in the queue for each class of priorities related to the offered traffic in the
channel using the TDD allocation schemes.
(a) Version I
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
50
100
150
200
250
300
Traffic Intensity
AverageWaiting-Time
class1 balan
class2 balan
class3 balan
class4balan
class1 unbalan
class2 unbalan
class3 unbalan
class4 unbalan
Traffic
classes
Scenario I Scenario II
Class 1 25% 15%
Class 2 25% 20%
Class 3 25% 30%
Class 4 25% 35%
Daly Analysis for WiMax under balanced…
www.ijesi.org 49 | Page
(b) Version II
Fig7. Average Waiting-Time vs. Traffic intensity in Scenario1 under Balance and Unbalance
Case (a) Version I (b) Version II with M=10
(a) Version I
(b) Version II
Fig8 .Average Waiting-Time vs. Traffic Intensity in Scenario-2 under
Balance and Unbalance Case for (a) Version I (b) Vversion II with M=10
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
100
200
300
400
500
600
700
Traffic Intensity
AverageWaiting-Time
class1balance
class2balance
class3balance
class4balance
class1unbalance
class2unbalance
class3unbalance
class4unbalance
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
50
100
150
200
250
300
Traffic Intensity
AverageWaiting-Time
class 1unbala
class2 unbala
class3 unbala
class4 unbala
class1 bala
class bala
class3 bala
class3 bala
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
0
100
200
300
400
500
600
700
800
Traffic Intensity
AverageWaiting-Time
class1 unbala
class2 unbala
class3 unbala
class4 unbala
class1bala
class2 bala
class3 bala
class3 bala
Daly Analysis for WiMax under balanced…
www.ijesi.org 50 | Page
Both Figures that the average waiting-time of class-p message versus traffic intensity is completely equals for
both balanced and unbalanced traffic conditions. This occurs because in these models, we deal with over all
traffic intensity which equals to the sum of traffic intensities from all SSs. From fig (7) and fig (8) we note that
the average waiting-time increases with the increase in traffic intensity, especially at heavy traffic condition. It
can also notices that the differentiation between classes is clearly in Version I than Version II because in
Version I, the priorities between classes prevail over the priorities between stations, while in Version II Where
the priorities between the stations superpose. It observes that the waiting-time for the traffic of higher priority
(class 1). For Version I in both scenarios, we observe that the waiting-time for each class depends on traffic
intensity of this class and traffic intensities of all classes which have higher priority than this class
B. Average waiting- time versus station index
Fig. (9) and Fig. (10) Present the average waiting-time in the stations queue for traffic intensity (ρ= 0.9) for
balanced and unbalanced traffic conditions. In this way, the average waiting-time in the queue for the station i is
given by (6), where λi represents the message rate in the station-i.
p
i
p i
p
i
i WW 


4
1


(6)
(a) Version I
(b) Version II
Fig. 9. Average Waiting-Time vs. Station Index in Scenario-1 under
Balanced and Unbalanced Cases (a) Version I. (b) Version II
1 2 3 4 5 6 7 8 9 10
0
200
400
600
800
1000
1200
1400
1600
1800
Station Index
AverageWaiting-TimeperClass(Slots)
class1 bala
class2bala
class3bala
class4bala
class1 unbala
class2unbala
class3 unbala
class4 unbala
1 2 3 4 5 6 7 8 9 10
0
500
1000
1500
2000
2500
3000
3500
StationIndex
AverageWaiting-TimeperClass(Slots)
class1bala
class2bala
class3bala
class4bala
class1unbala
class2unbala
class3unbala
class4unbala
Daly Analysis for WiMax under balanced…
www.ijesi.org 51 | Page
(a) Version I
(b) Version II
Fig. 10. Average Waiting-Time vs. Station Index in Scenario-2 under
Balanced and Unbalanced Cases (a) Version I. (b) Version II
Form Figures (9) and (10) it can be observe that for balanced and unbalance traffic conditions, the average
waiting-time increases uniformly with the increase in station index. But the increases in waiting-time with the
increases in station index are clearly in unbalance case than balance case.
VI. CONCLOSTION
In this paper, a modified MAC reservation scheme is proposed for BWA systems which incorporate traffic
scheduling functions with message-or station-based priorities Moreover, an analytical model is devised for the
mean message waiting-time for the different traffic scenarios, using TDD allocation scheme, and assuming
Poisson arrivals of messages and general distributions for message lengths. According to the results exposed in
this work , we can conclude that the maximum difference in waiting-time between stations for Version I is
smaller than that for Version II , for the balance and unbalance traffic conditions, the average waiting-time of
class-p versus traffic intensity is completely equals. Systematic increase in waiting-time is observed as the
station index increase. This obvious clearly in unbalance traffic case than balance traffic case.
1 2 3 4 5 6 7 8 9 10
0
500
1000
1500
2000
2500
Station Index
AverageWaiting-TimeperClass(Slots)
class1 unbala
class2 unbala
class3 unbala
class4 unbala
class1 bala
class2 bala
class3 bala
class4 bala
1 2 3 4 5 6 7 8 9 10
0
500
1000
1500
2000
2500
3000
3500
4000
4500
5000
Station Index
AverageWaiting-TimeperClass(Slots)
class1 unbala
class2 unbala
class3 unbala
class4 unbala
class1 bala
class2 bala
class3 bala
class4 bala
Daly Analysis for WiMax under balanced…
www.ijesi.org 52 | Page
REFERENCES
[1] L. F. M. de Moraes and P. D. Maciel Jr., “Analysis and Evaluation of a New MAC Protocol for Broadband Wireless Access,” in
IEEE WirelessCom 2005 - International Conference on Wireless Networks,Communications, and Mobile Computing, Maui,
Hawaii, June 2005.
[2] L. F. M. de Moraes and A. N. L. Valverde, “Waiting-Time Analysis of a Reservation Access-Control Scheme with message-
based priorities,” Third IFIP TC 6/wg 7.3 Inter. Conf. on Data Communication Systems and Their Performance, June 1987.
[3] IEEE 802.16, IEEE Standard for Local and Metropolitan Area Networks- Part 16: Air Interface for Fixed Broadband Wireless
Access Systems,IEEE Std. 802.16, Oct. 2004.
[4] L. F. M. de Moraes and P. D. Maciel Jr., “Proposta e Avaliac¸ ˜ao de um Novo Protocolo de Acesso ao Meio para Broadband
Wireless Acess,” in XXII Brazilian Symposium of Telecommunications - SBrT‟05, Campinas, SP - Brasil, Sept. 2005.
[5] I. Rubin and L. F. M. de Moraes, “Message Delay Analysis for Polling and Token Multiple-Access Schemes for Local
Communication Networks,” IEEE JSAC, vol. SAC-1, no. 5, Nov. 1983.
[6] L. F. M. de Moraes and A. N. L. Valverde, “Waiting-Time Analysis of a Reservation Access-Control Scheme with message-
based priorities,” Third IFIP TC 6/wg 7.3 Inter. Conf. on Data Communication Systems and Their Performance, June 1987.

More Related Content

What's hot

The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocolspijans
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...pijans
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...IJCNCJournal
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlUniversity of Piraeus
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksChandan Thakur
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...IJSRED
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 

What's hot (17)

The analysis of multichannel mac protocols
The analysis of multichannel mac protocolsThe analysis of multichannel mac protocols
The analysis of multichannel mac protocols
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and FairnessChannel Aware Mac Protocol for Maximizing Throughput and Fairness
Channel Aware Mac Protocol for Maximizing Throughput and Fairness
 
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...A DDRESSING  T HE  M ULTICHANNEL S ELECTION , S CHEDULING  A ND C OORDINATION...
A DDRESSING T HE M ULTICHANNEL S ELECTION , S CHEDULING A ND C OORDINATION...
 
Hb3512341239
Hb3512341239Hb3512341239
Hb3512341239
 
Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...Enhanced aodv route discovery and route establishment for qos provision for r...
Enhanced aodv route discovery and route establishment for qos provision for r...
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
QoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN controlQoS-aware scheduling in LTE-A networks with SDN control
QoS-aware scheduling in LTE-A networks with SDN control
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networks
 
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...	Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
Hybrid Novel Approach for Channel Allocation in Heterogeneous Cognitive Radi...
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
10.1.1.258.7234
10.1.1.258.723410.1.1.258.7234
10.1.1.258.7234
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networks
 
Bh4103368374
Bh4103368374Bh4103368374
Bh4103368374
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
J1803056876
J1803056876J1803056876
J1803056876
 

Viewers also liked

PIC_Experience2
PIC_Experience2PIC_Experience2
PIC_Experience2ray chen
 
A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...Jenny Mitcham
 
Austin Benn - Attrition White Paper
Austin Benn - Attrition White PaperAustin Benn - Attrition White Paper
Austin Benn - Attrition White PaperJade Webster
 
Collateral mgt
Collateral mgtCollateral mgt
Collateral mgtSagar Rao
 
تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016
تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016
تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016مجلس نواب الشعب
 
An approach to training trainers of construction workers using flipped learni...
An approach to training trainers of construction workers using flipped learni...An approach to training trainers of construction workers using flipped learni...
An approach to training trainers of construction workers using flipped learni...Shaun .
 
Veiktais darbs nedēļas laikā
Veiktais darbs nedēļas laikāVeiktais darbs nedēļas laikā
Veiktais darbs nedēļas laikārlycky
 
Presentazione - Web
Presentazione - WebPresentazione - Web
Presentazione - WebPaolo Rossi
 
Office development tips and tricks
Office development tips and tricksOffice development tips and tricks
Office development tips and tricksEugene Agafonov
 
04.10.06 Newsclip_PublicityUpdate
04.10.06 Newsclip_PublicityUpdate04.10.06 Newsclip_PublicityUpdate
04.10.06 Newsclip_PublicityUpdateJanet Gericke
 
suresh resume 2015
suresh resume 2015suresh resume 2015
suresh resume 2015SASI SURESH
 

Viewers also liked (13)

PIC_Experience2
PIC_Experience2PIC_Experience2
PIC_Experience2
 
My_CV
My_CVMy_CV
My_CV
 
Album of my pencil’s life
Album of my pencil’s lifeAlbum of my pencil’s life
Album of my pencil’s life
 
A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...A collaborative approach to "filling the digital preservation gap" for Resear...
A collaborative approach to "filling the digital preservation gap" for Resear...
 
Austin Benn - Attrition White Paper
Austin Benn - Attrition White PaperAustin Benn - Attrition White Paper
Austin Benn - Attrition White Paper
 
Collateral mgt
Collateral mgtCollateral mgt
Collateral mgt
 
تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016
تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016
تقرير حول مشروع ميزانية وزارة السياحة والصناعات التقليدية لسنة 2016
 
An approach to training trainers of construction workers using flipped learni...
An approach to training trainers of construction workers using flipped learni...An approach to training trainers of construction workers using flipped learni...
An approach to training trainers of construction workers using flipped learni...
 
Veiktais darbs nedēļas laikā
Veiktais darbs nedēļas laikāVeiktais darbs nedēļas laikā
Veiktais darbs nedēļas laikā
 
Presentazione - Web
Presentazione - WebPresentazione - Web
Presentazione - Web
 
Office development tips and tricks
Office development tips and tricksOffice development tips and tricks
Office development tips and tricks
 
04.10.06 Newsclip_PublicityUpdate
04.10.06 Newsclip_PublicityUpdate04.10.06 Newsclip_PublicityUpdate
04.10.06 Newsclip_PublicityUpdate
 
suresh resume 2015
suresh resume 2015suresh resume 2015
suresh resume 2015
 

Similar to Daly Analysis for WiMax under balanced and unbalanced traffic conditions in fixed priorities between stations

A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networkspijans
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksIJCNCJournal
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127IJMER
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...iosrjce
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...ijwmn
 
General Model for Single and Multiple Channels WLANs with Quality of Service...
 General Model for Single and Multiple Channels WLANs with Quality of Service... General Model for Single and Multiple Channels WLANs with Quality of Service...
General Model for Single and Multiple Channels WLANs with Quality of Service...ijwmn
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfYAAKOVSOLOMON1
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXIJCSEA Journal
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETijsrd.com
 

Similar to Daly Analysis for WiMax under balanced and unbalanced traffic conditions in fixed priorities between stations (20)

Mv3621812185
Mv3621812185Mv3621812185
Mv3621812185
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor NetworksComparison of Csma Based MAC Protocols of Wireless Sensor Networks
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
 
D044021420
D044021420D044021420
D044021420
 
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...Newton-raphson method to solve systems of non-linear equations in VANET perfo...
Newton-raphson method to solve systems of non-linear equations in VANET perfo...
 
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networksModified q aware scheduling algorithm for improved fairness in 802.16 j networks
Modified q aware scheduling algorithm for improved fairness in 802.16 j networks
 
ShortPaper
ShortPaperShortPaper
ShortPaper
 
Ba2641224127
Ba2641224127Ba2641224127
Ba2641224127
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
An Implementation and Analysis of RTS/CTS Mechanism for Data Transfer in Wire...
 
B010611015
B010611015B010611015
B010611015
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...General Model for Single and Multiple Channels WLANs with Quality of Service ...
General Model for Single and Multiple Channels WLANs with Quality of Service ...
 
General Model for Single and Multiple Channels WLANs with Quality of Service...
 General Model for Single and Multiple Channels WLANs with Quality of Service... General Model for Single and Multiple Channels WLANs with Quality of Service...
General Model for Single and Multiple Channels WLANs with Quality of Service...
 
Performance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdfPerformance evaluation of Frame Slotted.pdf
Performance evaluation of Frame Slotted.pdf
 
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAXPERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
PERFORMANCE EVALUATION OF DIFFERENT SCHEDULING ALGORITHMS IN WIMAX
 
Quality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANETQuality of Service for Video Streaming using EDCA in MANET
Quality of Service for Video Streaming using EDCA in MANET
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Daly Analysis for WiMax under balanced and unbalanced traffic conditions in fixed priorities between stations

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org ||Volume 4 Issue 10|| October 2015 || PP.43-52 www.ijesi.org 43 | Page Daly Analysis for WiMax under balanced and unbalanced traffic conditions in fixed priorities between stations Ramdan A. Kalifa 1 , Nasar Aldian Ambark Shashoa2 1 (Electrical Engineering Department, The High Professional Institute for Comprehensive Professions Mezda, Libya) 2 (Electrical and Electronics Engineering Department, Azzaytuna University, Libya) ABSTRACT : Broadband Wireless Access (BWA) systems offer a solution for broadband access and high data rate transmission of multimedia services with distinct Quality-of-Service (QoS) requirement through a wireless medium. The IEEE802.16 standard does not specify how to efficiently schedule the traffic related to different applications in order to meet their specific requirements. In this paper, we present a modified scheme which is based on a Reservation Priority Access Control (RPAC) using TDD allocation approach, and the behavior of this reservation scheme is analyzed and evaluated under balanced and unbalanced traffic conditions in fixed priorities between stations. KEYWORDS - Broadband Wireless Access, Quality-of-Service, Reservation Priority Access Control, Downlink Channel I. INTRODUCTION The Broadband Wireless Access (BWA) is a technology proposed to offer wireless access to network stations in a broadband metropolitan area environment. These networks are designed to operate at high data rates and to deal with several applications, resulting in different types of traffic profiles and demands. Therefore, the system is required to work with various types of real-time and non-real-time service classes, with different traffic characteristics and quality of service (QoS) guarantees. In [1] , a new MAC scheme for BWA, incorporating a scheduling mechanism based on message and/or station priorities, was proposed as an alternative protocol to the IEEE 802.16 Standard [3]. However, only a fixed priority approach to service differentiation among terminals was used.In this paper, we propose an extention to the MAC protocol described in [1], with a unbalanced traffic conditions in fixed priorities between stations in the network. Moreover, we developed a simulation model to compare the analytical results under balanced and unbalanced traffic conditions and the simulation results exposed here.The remainder of this paper is organized as follows. Section II gives a short description of IEEE 802.16 standard.The proposed protocol is described in Section III. An analytical model, which allow to obtain the average message waiting time for different priority classes, is provided in section IV. Section V presents some numerical results and the paper is concluded with a few discussions concerning the proposal in Section VI. II. IEEE 802.16 STANDARD A- PHY and MAC Layers In the basic architecture there are one Base Station (BS), and one or more Subscriber Stations (SSs). Transmissions are assumed to take place through two independent channels: a Downlink Channel (DL) from the BS to the SSs, and an Uplink Channel (UL) from the SSs to the BS. Hence, there is no contention associated with the the DL channel, while the UL channel must be shared by the SSs through the use of some multiple access control protocol. During the DL, only the BS transmits in broadcast to all the SSs. The BS determines the number of slots to be allocated for each SS in the UL, and broadcast this information in an UL-MAP message at the beginning of each frame. The stations transmit their data in predefined time slots as indicated in the UL- MAP. A scheduling module for the UL is necessary to be kept in the BS in order to determine the transmission opportunities using the bandwidth requests (BW-Request) sent by the SSs. Figure 1 illustrates the structure of the MAC frame.
  • 2. Daly Analysis for WiMax under balanced… www.ijesi.org 44 | Page Fig.1. MAC frame structure B- QoS Architecture The IEEE 802.16 supports many traffic types (data, voice, video) with different QoS requirements. The standard defines four types of data flows, each one associated with distinct applications and QoS requirements [2]: 1. Unsolicited Grant Service (UGS): for applications with constant bandwidth allocation requirements. 2. Real-Time Polling Service (rtPS): for applications with specific bandwith requirements and maximum acceptable delay. 3. Non-Real-Time Polling Service (nrtPS): for applications with a minimum bandwidth allocation requirements, that are intolerant to delay. 4. Best Effort Service (BE): for applications without bandwidth allocation requirements, that receive the remaining bandwidth after the allocation to the three previous types of services. Fig. 2 shows the QoS architecture present in 802.16. The UL packet scheduling (UPS) module controls all the packet transmissions in the UL. As the protocol is connection-oriented, the application should establish a connection between the BS and the associated service flow (UGS, rtPS, nrtPS or BE). The BS identifies the connections by assigning a unique Connection ID (CID) to each one. The 802.16 defines the signaling process for the establishment of a connection (Connection-Request and Connection-Response) between SS and BS, but does not specify the rules for admission control. Fig.2 QoS Architecture of IEEE802.16
  • 3. Daly Analysis for WiMax under balanced… www.ijesi.org 45 | Page In summary, the IEEE 802.16 specifies: the signaling mechanism for information exchange between the BS and the SSs, as the connection configuration, BW-Request and UL-MAP; and the scheduling of UL for UGS traffic. The standard does not define: the scheduling of UL for rtPS, nrtPS and BE services; admission control and traffic policing. III. PROPOSED PROTOCOL In the paper, we use the TDD allocation scheme, and we will compare result for unbalanced traffic conditions with the results of the balanced traffic condition which were achieved in [1]. the authors proposed a new MAC protocol for IEEE802.16 that uses an access scheme called RPAC (Reservation-Priority Access Control), described in [3]. This access scheme incorporate a traffic scheduling mechanism based on messages and/or stations priorities, and a reservation period governed by a TDMA discipline with one time slot allocated per station in the network. The difference between the protocols described in [1] and [3] is that, in the former, the access scheme was reformulated and adapted to 802.16 MAC structure. The MAC frame structure for the proposed protocol is illustrated in Figure 3. Differently from the 802.16 standard, the frame lengths are not fixed in the proposed scheme. Basically, the length of each frame will depend upon the number of packets arriving to the stations in the previous frame. Reservation periods are located at the end of the UL sub-frame (not at the beginning as in 802.16). Those periods are used by each of the stations to inform the BS about the services for which a bandwidth reservation is being requested, as well as the number of packets to be transmitted for each of those services. After processing all the requests, the BS sends, in the DL sub-frame of the next frame, a UL- MAP with transmission opportunities to all reserved stations. Fig 3. MAC Frame Structure for the Presented Scheme [1] For analysis of the protocol, the activity in the channel can be seenas a sequence of reservation, downlink, and transmission intervals, where each pair of DL and UL constitutes a transmission cycle, as illustrated in Figure 4. It is important to note that there is a difference between the MAC frame and the transmission cycle, despite both having an equal size, because the reservation period is fixed. In fact, the n-th cycle is formed by the reservation period of (j−1)-st frame, plus the downlink and transmission intervals of the j-th frame. With this definition of the transmission cycles, the analytical approach described in [3] can be used for the analysis of the average waiting-time of the messages, as will be seen in Section IV. Referring to the picture in Figure 4, we define 𝐿 𝑛 𝑅 , 𝐿 𝑛 𝐷𝐿 𝑎𝑛𝑑 𝐿 𝑛 𝑇 respectively, as the lengths (or duration, given by the number of slots) of the reservation, the downlink, and the transmission intervals in the n-th cycle. Thus, 𝐿 𝑛 = 𝐿 𝑛 𝑅 + 𝐿 𝑛 𝐷𝐿 + 𝐿 𝑛 𝑇 represents the total length of the n-th cycle. Following the TDMA protocol, each reservation period is composed by M slots ( 𝐿 𝑛 𝑅 = M; n = 1, 2 ...), where M is the number of stations in the network. During this period, of duration of Mτ seconds, each station is associated to a single slot in a fixed manner. Fig 4. Consecutive Transmission Cycles.
  • 4. Daly Analysis for WiMax under balanced… www.ijesi.org 46 | Page We note that the length of a current (say, the n-th) cycle will depend on the number of messages that arrived during the previous (say, the (n − 1)-st) cycle. This happens because request for the messages that arrived during the (n−1)-st cycle will be transmitted in the reservation period of the n-th cycle. After this period, the BS performs the centralized processing of the transmission opportunities and sends a UL-MAP in the DL sub- channel, still in the n-th cycle. Afterwards, the stations transmit their messages in the transmission interval of the same cycle, following the priorities established in the UL-MAP. Therefore, messages arriving during an ongoing cycle get transmitted only in the subsequent cycle. We propose a medium access protocol with priorities based on messages and/or stations, in accordance to the 802.16 protocol, that uses GPC or GPSS admissions. We assume that, following the reservation phase and the DL sub-frame, the channel is allocated to the stations following the sequence 1, 2, 3, ...,M. Thus, according to the priority rules used to determine the order in which the messages should be transmitted during the transmission period, the following versions of the protocol are considered: • Version I, in which, for any p, q 2 {1, ..., P} such that p < q, all the class-p messages are transmitted before any messages of class q, independent of which station it belongs to. For messages belonging to the same class but in distinct stations, the order of the transmissions is according to the order in which the stations access the channel (first station 1 and last station M). For messages in the same station with the same class of priorities, the transmissions occur by order of arrival. • Version II, in which, for any i, j 2 {1, ...,M} such that i < j, all the messages in station i are transmitted before any message in station j, independently of it„s priority class. In any terminal, the messages are transmitted in accordance with their priority classes and in order of arrival, in the case of belonging to the same class; that is, at each station, the priority discipline HOL (Head-Of-the-Line) is applied with the highest priority assigned to class 1 and the lowest assigned to class P. The behavior of the channel, according to Versions I and II of the proposed protocol, is illustrated in Figures 5 and 6, respectively. Note that, in Version II, a higher priority station transmits all it„s messages before one of lower priority. So, unlike Version I, it is possible that messages of lower priority are transmitted before messages with higher priorities. We observe that a rigid admission control carried by the BS and also by the SSs is necessary so that the heavy traffic of a specific class (or station) does not overload (and hog) the channel, affecting the response time of the others. Fig. 5. Version I of proposed protocol. Fig. 6. Version II of proposed protocol.
  • 5. Daly Analysis for WiMax under balanced… www.ijesi.org 47 | Page IV. ANALYTIC MODEL The technique used to obtain the average waiting-time for the messages is similar to the method used in [4]. The analysis for Version I of the proposed scheme is introduced first, and then obtained results are adopted and used to extend our analysis to cover Version II. As defined in [1], the system considered has one BS and M (M ¸1) client stations (SSs), each of which has an infinite buffer-size and is already associated with the base station. The transmission channel is assumed to be error-free, with a transmission rate equal to C bit/s. In general, the messages generated at each station are composed of a random number of fixed units of data, called packets, each of which containsµ−1 bits. The transmission time of each packet is made equal to a time slot (τ). Therefore τ = 1/( µC). Messages arriving at each station belong to one of the different P classes and we assume that class-1 messages have the highest priority and class-P messages the lowest. Moreover, the arrival of messages is characterized by a Poisson point process, such that 𝜆𝑖 𝑝 (messages per slot) is the average arrival rate of class-p messages to station i. Fixed Priorities 1. Version I: As the protocol defined in [1] uses the reservation scheme of [3], the results from the later paper were used to obtain the expression for the steady-state average waiting-time of class-p messages at station i, in the former one:         2 1 2 1 2 21 1 1 1 1                     LE LEb DLEMW p j M g i j p j j g p i p ip i   (1) Where 𝜌𝑖 𝑝 = 𝜆𝑖 𝑝 𝑏𝑖 𝑝 is the traffic in the terminal i due to the messages of class p, and    DL n n LEDLE   lim . This expression is still given as a function of E [L] and E [𝐿2 ], respectively, the first and second steady-state moments of the cycle length:        1 DLEM LE (2) Where 1 1 1      P p M i p i  and (3) 2) Version II: The analysis for Version II follows in a direct manner noting that, the messages are transmitted in the same order as in Version I, with the classes of the messages exchanged for the numbers of the stations and vice-versa (see Section III). Therefore, the expression in the Version II is analogous to that in Version I, changing only the M by the P and the i for the p: (4) with E[L] and E[L2] given by equations (2) and (3), respectively.
  • 6. Daly Analysis for WiMax under balanced… www.ijesi.org 48 | Page V. RESULTS An evaluate the level of differentiation obtained with the described schemes, we considered two distinct scenarios, where in each scenario there is a differentiated probability between four classes of traffic (P = 4), as shown in Table I. Table I, Traffic Scenarios Used To simulate the presented models under balanced and unbalanced traffic conditions, we assume that: 1. Balanced case: there are 10 stations (M=10), each station shares with a traffic percentage (ρi = ρ/10), and each station contributes with its traffic class according to Table I. 2. Unbalanced case: similarly M=10, but 72% of the traffic from station “5” and the remaining 28% of the traffic from other stations (3% from each station), each station has traffic type as illustrated in Table I. We assume that the number of packets in each message of class p in the station i is constant with average bip = 5 and b2,ip = 25, for each p = 1, 2, 3, 4; and i = 1, ..., 10. So, the average waiting-time for the class p is given by: p i i p p ip WW    10 1   (5) Where p i p i p i b  and p i p M   A. Average Waiting-time vs. Traffic Intensity The performance of the model is measured for the average waiting-time per class. Fig. (7) and Fig. (8) illustrate the average waiting-time in the queue for each class of priorities related to the offered traffic in the channel using the TDD allocation schemes. (a) Version I 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 50 100 150 200 250 300 Traffic Intensity AverageWaiting-Time class1 balan class2 balan class3 balan class4balan class1 unbalan class2 unbalan class3 unbalan class4 unbalan Traffic classes Scenario I Scenario II Class 1 25% 15% Class 2 25% 20% Class 3 25% 30% Class 4 25% 35%
  • 7. Daly Analysis for WiMax under balanced… www.ijesi.org 49 | Page (b) Version II Fig7. Average Waiting-Time vs. Traffic intensity in Scenario1 under Balance and Unbalance Case (a) Version I (b) Version II with M=10 (a) Version I (b) Version II Fig8 .Average Waiting-Time vs. Traffic Intensity in Scenario-2 under Balance and Unbalance Case for (a) Version I (b) Vversion II with M=10 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 100 200 300 400 500 600 700 Traffic Intensity AverageWaiting-Time class1balance class2balance class3balance class4balance class1unbalance class2unbalance class3unbalance class4unbalance 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 50 100 150 200 250 300 Traffic Intensity AverageWaiting-Time class 1unbala class2 unbala class3 unbala class4 unbala class1 bala class bala class3 bala class3 bala 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 100 200 300 400 500 600 700 800 Traffic Intensity AverageWaiting-Time class1 unbala class2 unbala class3 unbala class4 unbala class1bala class2 bala class3 bala class3 bala
  • 8. Daly Analysis for WiMax under balanced… www.ijesi.org 50 | Page Both Figures that the average waiting-time of class-p message versus traffic intensity is completely equals for both balanced and unbalanced traffic conditions. This occurs because in these models, we deal with over all traffic intensity which equals to the sum of traffic intensities from all SSs. From fig (7) and fig (8) we note that the average waiting-time increases with the increase in traffic intensity, especially at heavy traffic condition. It can also notices that the differentiation between classes is clearly in Version I than Version II because in Version I, the priorities between classes prevail over the priorities between stations, while in Version II Where the priorities between the stations superpose. It observes that the waiting-time for the traffic of higher priority (class 1). For Version I in both scenarios, we observe that the waiting-time for each class depends on traffic intensity of this class and traffic intensities of all classes which have higher priority than this class B. Average waiting- time versus station index Fig. (9) and Fig. (10) Present the average waiting-time in the stations queue for traffic intensity (ρ= 0.9) for balanced and unbalanced traffic conditions. In this way, the average waiting-time in the queue for the station i is given by (6), where λi represents the message rate in the station-i. p i p i p i i WW    4 1   (6) (a) Version I (b) Version II Fig. 9. Average Waiting-Time vs. Station Index in Scenario-1 under Balanced and Unbalanced Cases (a) Version I. (b) Version II 1 2 3 4 5 6 7 8 9 10 0 200 400 600 800 1000 1200 1400 1600 1800 Station Index AverageWaiting-TimeperClass(Slots) class1 bala class2bala class3bala class4bala class1 unbala class2unbala class3 unbala class4 unbala 1 2 3 4 5 6 7 8 9 10 0 500 1000 1500 2000 2500 3000 3500 StationIndex AverageWaiting-TimeperClass(Slots) class1bala class2bala class3bala class4bala class1unbala class2unbala class3unbala class4unbala
  • 9. Daly Analysis for WiMax under balanced… www.ijesi.org 51 | Page (a) Version I (b) Version II Fig. 10. Average Waiting-Time vs. Station Index in Scenario-2 under Balanced and Unbalanced Cases (a) Version I. (b) Version II Form Figures (9) and (10) it can be observe that for balanced and unbalance traffic conditions, the average waiting-time increases uniformly with the increase in station index. But the increases in waiting-time with the increases in station index are clearly in unbalance case than balance case. VI. CONCLOSTION In this paper, a modified MAC reservation scheme is proposed for BWA systems which incorporate traffic scheduling functions with message-or station-based priorities Moreover, an analytical model is devised for the mean message waiting-time for the different traffic scenarios, using TDD allocation scheme, and assuming Poisson arrivals of messages and general distributions for message lengths. According to the results exposed in this work , we can conclude that the maximum difference in waiting-time between stations for Version I is smaller than that for Version II , for the balance and unbalance traffic conditions, the average waiting-time of class-p versus traffic intensity is completely equals. Systematic increase in waiting-time is observed as the station index increase. This obvious clearly in unbalance traffic case than balance traffic case. 1 2 3 4 5 6 7 8 9 10 0 500 1000 1500 2000 2500 Station Index AverageWaiting-TimeperClass(Slots) class1 unbala class2 unbala class3 unbala class4 unbala class1 bala class2 bala class3 bala class4 bala 1 2 3 4 5 6 7 8 9 10 0 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 Station Index AverageWaiting-TimeperClass(Slots) class1 unbala class2 unbala class3 unbala class4 unbala class1 bala class2 bala class3 bala class4 bala
  • 10. Daly Analysis for WiMax under balanced… www.ijesi.org 52 | Page REFERENCES [1] L. F. M. de Moraes and P. D. Maciel Jr., “Analysis and Evaluation of a New MAC Protocol for Broadband Wireless Access,” in IEEE WirelessCom 2005 - International Conference on Wireless Networks,Communications, and Mobile Computing, Maui, Hawaii, June 2005. [2] L. F. M. de Moraes and A. N. L. Valverde, “Waiting-Time Analysis of a Reservation Access-Control Scheme with message- based priorities,” Third IFIP TC 6/wg 7.3 Inter. Conf. on Data Communication Systems and Their Performance, June 1987. [3] IEEE 802.16, IEEE Standard for Local and Metropolitan Area Networks- Part 16: Air Interface for Fixed Broadband Wireless Access Systems,IEEE Std. 802.16, Oct. 2004. [4] L. F. M. de Moraes and P. D. Maciel Jr., “Proposta e Avaliac¸ ˜ao de um Novo Protocolo de Acesso ao Meio para Broadband Wireless Acess,” in XXII Brazilian Symposium of Telecommunications - SBrT‟05, Campinas, SP - Brasil, Sept. 2005. [5] I. Rubin and L. F. M. de Moraes, “Message Delay Analysis for Polling and Token Multiple-Access Schemes for Local Communication Networks,” IEEE JSAC, vol. SAC-1, no. 5, Nov. 1983. [6] L. F. M. de Moraes and A. N. L. Valverde, “Waiting-Time Analysis of a Reservation Access-Control Scheme with message- based priorities,” Third IFIP TC 6/wg 7.3 Inter. Conf. on Data Communication Systems and Their Performance, June 1987.