SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
QoS-bbaasseedd MMAACC pprroottooccooll ffoorr MMeeddiiccaall 
WWiirreelleessss BBooddyy AArreeaa SSeennssoorr NNeettwwoorrkkss 
Author: 
KKhhaalleedd AA.. AAllii,, 
JJaahhaannggiirr HH.. SSaarrkkeerr,, aanndd 
HHuusssseeiinn TT.. MMoouuffttaahh 
School of Information Technology and Engineering 
University of Ottawa 
Ottawa, Ontario, K7L 3N6 
Presented by: 
IIffffaatt AAnnjjuumm((RRoollll:: 1166)) 
NNaazziiaa AAllaamm((RRoollll:: 2288)) 
15th Batch. 
Date: 3rd May 2012.
CCoonntteennttss 
 Contribution. 
 Problem Definition. 
• Background 
 Proposed Protocol 
• Network Model 
• Mathematical analysis 
 Performance Evaluation. 
2 
Slide 2 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
CCoonnttrriibbuuttiioonnss 
 The paper proposed QoS-based MAC protocol that can be 
employed in WBASNs. 
 This protocol is based on the IEEE 802.15.4 a Ultra Wide Band 
(UWB) MAC protocol and the sensor nodes utilize the slotted 
Aloha random access mechanism. 
 Also prioritizes the critical packets access to the transmission 
medium by cutting of the number of retransmissions of the 
collided non critical packets. 
 The critical traffic throughput is increased and its rejection rate is 
decreased ,maintaining the non critical traffic QoS parameters 
above a minimum provisioned level. 
3 
Slide 3 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
Slide 4 PPrroobblleemm DDeeffiinniittiioonn 
 Medical information have different urgency levels and timing 
constraints that require a sensor to: 
 Sense a physiological phenomenon , 
 Process the sensed value, 
 Communicate the processed value to a central node, in a 
bounded and guaranteed time. 
 For these requirements, A MAC protocol has to , 
 Maximize network throughput, 
 Minimize packet rejection rate and, 
 Differentiate network traffic. 
Green Networking Research Group 4 
Dept. of Computer Science and Engineering, University of Dhaka
PPrroobblleemm DDeeffiinniittiioonn 
 The medium access mechanism in WBASNs is based on the MAC 
protocol of Wireless Personal Area Networks (WPANs) standard. 
 WPAN (extended to UWB) s’ MAC protocol uses, 
 Carrier Sense Multiple Access/Collison Avoidance 
(CSMA/CA) and, 
 Aloha access mechanism. 
 In this standards, star and peer-to-peer both network topologies 
are supported. 
 Two communication modes for the star topology, 
 Beacon mode and 
 Non-beacon mode. 
5 
Slide 5 
BACKGROUND 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrroobblleemm DDeeffiinniittiioonn 
 In beacon mode, network communications are controlled by the 
network coordinator. 
 This coordinator periodically transmits beacon frames for , 
 Device synchronization and network association control. 
6 
Slide 6 
BACKGROUND 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrroobblleemm DDeeffiinniittiioonn 
 In Non-beacon mode, a network node can send data to the 
coordinator using CSMA/CA or Aloha access mechanisms. 
 To receive data from the network coordinator, the node must 
power up ,and poll the coordinator. 
 Non-beacon operation mode provides the best performance since, 
 Sensor nodes’ receivers are not required to power up for 
receiving the beacon frame. 
 But the network coordinator cannot communicate with a node 
unless it has been invited by the node to communicate. 
 The beacon mode operation is mainly suitable under very tight 
data rate restrictions. 
7 
Slide 7 
BACKGROUND 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrroobblleemm DDeeffiinniittiioonn 
 A Distributed Queuing Body Area Network (DQBAN) MAC 
protocol for healthcare applications, that propose a QoS MAC 
protocol. 
 The CRQ control access requests to the medium, 
 DTQ schedules sensor nodes collision-free packet transmissions. 
 But DQBAN requires the management of different queues and the 
logic system implementation in every sensor node. 
8 
Slide 8 
BACKGROUND 
 Collision Resolution Queue (CRQ) and, 
 Data Transmission Queue (DTQ). 
Green Networking Research Group 
 It utilizes two queues: 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
In the proposed QoS-based MAC protocol, 
 slotted Aloha access mechanism is used, 
 which sensor nodes contend for the medium only at the 
beginning of each time slot of the MAC frame. 
 Network nodes are grouped into, 
 Sensor nodes with critical information (C1)and , 
 Sensor nodes of non critical information (C2). 
 Sensor nodes have the capability to sense multiple health 
parameters to indentify the traffic, if it is critical or non critical, 
 Based on a predefined threshold. 
 Traffic is non critical if its sensed value is below the threshold. 
 It becomes critical when such threshold is exceeded. 
9 
Slide 9 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
10 
Slide 10 
Figure: QoS-based MAC Protocol Illustration. 
The total number of packets G, ready for transmission at the 
beginning of a time slot can be defined as, 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
11 
Slide 11 
Network Model 
A star network model composed of, 
 The coordinator node a Full-Function Device (FFD) and, 
 The sensor nodes are composed of Reduced-Function Devices 
(RFDs). 
Figure: WBAN Network for QoS-based MAC protocol Evaluation. 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
N: total number of sensor nodes 
Nc: sensor nodes of critical information 
Nnc: sensor nodes of non critical information 
G: aggregate packet arrival rate per time slot 
Gc: aggregate critical packet arrival rate per time slot 
Gnc: aggregate non critical packet arrival rate per time slot 
Sc: total critical throughput 
Snc: total non critical throughput 
12 
Slide 12 
Mathematical Analysis 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka 
Definitions
PPrrooppoosseedd PPrroottooccooll 
Rc: total critical rejection rate 
Rnc: total non critical rejection rate 
λc : critical nodes packet arrival rate 
λnc: non critical nodes packet arrival rate 
rc: number of allowed packet retransmissions for critical nodes 
rnc: number of allowed packet retransmissions for non critical 
nodes 
rc 
max : maximum number of allowed packet retransmissions 
for critical nodes 
13 
Slide 13 
Mathematical Analysis 
min: minimum number of allowed packet retransmissions 
for critical nodes 
rc 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka 
Definitions
PPrrooppoosseedd PPrroottooccooll 
14 
Slide 14 
Mathematical Analysis 
Here, 
Aggregate critical packet arrival rate Gc per time slot is, 
The term psucc in Equation (2) defines the probability of a 
successful packet transmission in a time slot. 
Equation (2) can be simplified , 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
15 
Slide 15 
Mathematical Analysis 
Equation (4) can be more simplified, 
Similarly, Gnc can be written, 
The aggregate packet arrival G per time slot can be rewritten, 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
16 
Slide 16 
Mathematical Analysis 
Equation (7) can be simplified as in Equation (8) 
Substituting the psucc term of Equation (8) , 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
17 
Slide 17 
Mathematical Analysis 
Equation (8) defines the aggregate network traffic generation 
per time slot ,which is solved numerically to obtained G value. 
This G value is used to compute the critical and non critical 
throughput Sc and Snc respectively, 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPrrooppoosseedd PPrroottooccooll 
Traffic Rejection Rate, the another performance parameter 
studied in this paper is the total packet rejection rate. 
This parameter is defined here for critical and non critical traffic 
respectively, 
18 
Slide 18 
Mathematical Analysis 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPeerrffoorrmmaannccee EEvvaalluuaattiioonn 
Figure :Aggregate Throughput, λ c = λ nc = 0.02. Figure:Aggregate Throughput, λ c = λnc = 0.025 
19 
Slide 19 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPeerrffoorrmmaannccee EEvvaalluuaattiioonn 
Figure :Aggregate Throughput, λ c = λ nc = 0.03. Figure: Packet Rejection Rate, λ c = λnc = 0.02 
20 
Slide 20 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
PPeerrffoorrmmaannccee EEvvaalluuaattiioonn 
Figure: Packet Rejection Rate, λ c = λnc = 0.025 Figure: Packet Rejection Rate, λ c = λnc = 0.03 
21 
Slide 21 
Green Networking Research Group 
Dept. of Computer Science and Engineering, University of Dhaka
THANK YOU 
Green Networking Research Dept. of 
Computer Science and Engineering, 
University of Dhaka 
22

Mais conteúdo relacionado

Mais procurados

M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsVijay Karan
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsVijay Karan
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...ijwmn
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manetAlexander Decker
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manetAlexander Decker
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...IDES Editor
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PIDES Editor
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
 
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networksambitlick
 
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksIJMER
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet losseSAT Publishing House
 

Mais procurados (20)

M.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing ProjectsM.E Computer Science Mobile Computing Projects
M.E Computer Science Mobile Computing Projects
 
M phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projectsM phil-computer-science-mobile-computing-projects
M phil-computer-science-mobile-computing-projects
 
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...
 
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
PERFORMANCE EVALUATION OF SELECTED E2E TCP CONGESTION CONTROL MECHANISM OVER ...
 
4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet4..[26 36]signal strength based congestion control in manet
4..[26 36]signal strength based congestion control in manet
 
11.signal strength based congestion control in manet
11.signal strength based congestion control in manet11.signal strength based congestion control in manet
11.signal strength based congestion control in manet
 
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
Implementing True Zero Cycle Branching in Scalar and Superscalar Pipelined Pr...
 
Improving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-PImproving Performance of TCP in Wireless Environment using TCP-P
Improving Performance of TCP in Wireless Environment using TCP-P
 
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1Differentiated Classes of Service and Flow Management using An Hybrid Broker1
Differentiated Classes of Service and Flow Management using An Hybrid Broker1
 
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
Ijcnc050203
Ijcnc050203Ijcnc050203
Ijcnc050203
 
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
A Distributed Rendezvous Point Source (RPS) For Congestion Control in A Relia...
 
Dual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained NetworksDual-resource TCPAQM for Processing-constrained Networks
Dual-resource TCPAQM for Processing-constrained Networks
 
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...
 
40520130101003
4052013010100340520130101003
40520130101003
 
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor NetworksThe Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
The Minimum Cost Forwarding Using MAC Protocol for Wireless Sensor Networks
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
 
A046020112
A046020112A046020112
A046020112
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 

Destaque

WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKmadhushreek
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area NetworkFaheema Monica
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMyo Naung Lwin
 
The Global Skills Convergence
The Global Skills ConvergenceThe Global Skills Convergence
The Global Skills ConvergenceJoel Serra Bevin
 
Desarrollo De Contenidos Para El Sector Profesional
Desarrollo De Contenidos Para El Sector ProfesionalDesarrollo De Contenidos Para El Sector Profesional
Desarrollo De Contenidos Para El Sector ProfesionalICC Destinos Turísticos
 
KHDA Inspection Report - Jumeira Baccalaureate School
 KHDA Inspection Report - Jumeira Baccalaureate School KHDA Inspection Report - Jumeira Baccalaureate School
KHDA Inspection Report - Jumeira Baccalaureate Schoolfarrahesham
 
A Y U D A04
A Y U D A04A Y U D A04
A Y U D A04Daf Art
 
Ramadan forbodyandsoul
Ramadan forbodyandsoulRamadan forbodyandsoul
Ramadan forbodyandsoulLogicware
 
Webinar MEPcontent for manufacturers
Webinar MEPcontent for manufacturersWebinar MEPcontent for manufacturers
Webinar MEPcontent for manufacturersStabiplan
 
Escuela de Oficios - Albañil
Escuela de Oficios - AlbañilEscuela de Oficios - Albañil
Escuela de Oficios - AlbañilCba24n
 
¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...
¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...
¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...SalonMiEmpresa
 
SPECJALIŚCI USER EXPERIENCE 2015
SPECJALIŚCI USER EXPERIENCE 2015SPECJALIŚCI USER EXPERIENCE 2015
SPECJALIŚCI USER EXPERIENCE 2015Joanna Rutkowska
 
Curso blogging sesión 03
Curso blogging sesión 03Curso blogging sesión 03
Curso blogging sesión 03Edwin Amaya
 
Resumen investigación tesina gnu linux
Resumen investigación tesina gnu linuxResumen investigación tesina gnu linux
Resumen investigación tesina gnu linuxcrosbycarbajal
 

Destaque (20)

WIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORKWIRELESS BODY AREA NETWORK
WIRELESS BODY AREA NETWORK
 
Wireless Body Area Network
Wireless Body Area NetworkWireless Body Area Network
Wireless Body Area Network
 
Ecc08 malta
Ecc08 maltaEcc08 malta
Ecc08 malta
 
MICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor NetworkMICS Band Wireless Body Sensor Network
MICS Band Wireless Body Sensor Network
 
The Global Skills Convergence
The Global Skills ConvergenceThe Global Skills Convergence
The Global Skills Convergence
 
URAD- Poster
URAD- PosterURAD- Poster
URAD- Poster
 
Desarrollo De Contenidos Para El Sector Profesional
Desarrollo De Contenidos Para El Sector ProfesionalDesarrollo De Contenidos Para El Sector Profesional
Desarrollo De Contenidos Para El Sector Profesional
 
Joan Navarro CCPC
Joan Navarro CCPCJoan Navarro CCPC
Joan Navarro CCPC
 
KHDA Inspection Report - Jumeira Baccalaureate School
 KHDA Inspection Report - Jumeira Baccalaureate School KHDA Inspection Report - Jumeira Baccalaureate School
KHDA Inspection Report - Jumeira Baccalaureate School
 
Web 2.0 Madridonrails
Web 2.0 MadridonrailsWeb 2.0 Madridonrails
Web 2.0 Madridonrails
 
A Y U D A04
A Y U D A04A Y U D A04
A Y U D A04
 
Ramadan forbodyandsoul
Ramadan forbodyandsoulRamadan forbodyandsoul
Ramadan forbodyandsoul
 
Webinar MEPcontent for manufacturers
Webinar MEPcontent for manufacturersWebinar MEPcontent for manufacturers
Webinar MEPcontent for manufacturers
 
Escuela de Oficios - Albañil
Escuela de Oficios - AlbañilEscuela de Oficios - Albañil
Escuela de Oficios - Albañil
 
¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...
¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...
¿Quién puede ayudarme (a poder ser gratis) con la Propiedad Industrial? - Cor...
 
Villavesas San fermín 2013
Villavesas San fermín 2013Villavesas San fermín 2013
Villavesas San fermín 2013
 
Wireless Body Sensor Networks
Wireless Body Sensor Networks Wireless Body Sensor Networks
Wireless Body Sensor Networks
 
SPECJALIŚCI USER EXPERIENCE 2015
SPECJALIŚCI USER EXPERIENCE 2015SPECJALIŚCI USER EXPERIENCE 2015
SPECJALIŚCI USER EXPERIENCE 2015
 
Curso blogging sesión 03
Curso blogging sesión 03Curso blogging sesión 03
Curso blogging sesión 03
 
Resumen investigación tesina gnu linux
Resumen investigación tesina gnu linuxResumen investigación tesina gnu linux
Resumen investigación tesina gnu linux
 

Semelhante a Qo s based mac protocol for medical wireless body area sensor networks

Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN IJECEIAES
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsIJCNCJournal
 
Performance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chipPerformance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chipIAESIJAI
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareIffat Anjum
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chipzhao fu
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentCommunication Systems & Networks
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
Design and Performance Analysis of 8 x 8 Network on Chip Router
Design and Performance Analysis of 8 x 8 Network on Chip RouterDesign and Performance Analysis of 8 x 8 Network on Chip Router
Design and Performance Analysis of 8 x 8 Network on Chip RouterIRJET Journal
 
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Iffat Anjum
 
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfA_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfsehat maruli
 
Fuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksFuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksnooriasukmaningtyas
 
A reinforcement learning based routing protocol with qo s support for biomedi...
A reinforcement learning based routing protocol with qo s support for biomedi...A reinforcement learning based routing protocol with qo s support for biomedi...
A reinforcement learning based routing protocol with qo s support for biomedi...Iffat Anjum
 
Vtc conf presentation - cdt website
Vtc conf presentation - cdt websiteVtc conf presentation - cdt website
Vtc conf presentation - cdt websiteimad Al-Samman
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss controleSAT Journals
 

Semelhante a Qo s based mac protocol for medical wireless body area sensor networks (20)

Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN Effective Router Assisted Congestion Control for SDN
Effective Router Assisted Congestion Control for SDN
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
 
Performance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chipPerformance analysis of congestion-aware Q-routing algorithm for network on chip
Performance analysis of congestion-aware Q-routing algorithm for network on chip
 
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsVEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETs
 
On qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcareOn qo s provisioning in context aware wireless sensor networks for healthcare
On qo s provisioning in context aware wireless sensor networks for healthcare
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chip
 
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous EnvironmentPacket Reordering Response for MPTCP under Wireless Heterogeneous Environment
Packet Reordering Response for MPTCP under Wireless Heterogeneous Environment
 
Hb3512341239
Hb3512341239Hb3512341239
Hb3512341239
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Design and Performance Analysis of 8 x 8 Network on Chip Router
Design and Performance Analysis of 8 x 8 Network on Chip RouterDesign and Performance Analysis of 8 x 8 Network on Chip Router
Design and Performance Analysis of 8 x 8 Network on Chip Router
 
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
 
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdfA_C_RAN_Architecture_for_LTE_Control_Sig.pdf
A_C_RAN_Architecture_for_LTE_Control_Sig.pdf
 
Fuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networksFuzzy type 1 PID controllers design for TCP/AQM wireless networks
Fuzzy type 1 PID controllers design for TCP/AQM wireless networks
 
A reinforcement learning based routing protocol with qo s support for biomedi...
A reinforcement learning based routing protocol with qo s support for biomedi...A reinforcement learning based routing protocol with qo s support for biomedi...
A reinforcement learning based routing protocol with qo s support for biomedi...
 
Vtc conf presentation - cdt website
Vtc conf presentation - cdt websiteVtc conf presentation - cdt website
Vtc conf presentation - cdt website
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
50620130101005
5062013010100550620130101005
50620130101005
 

Mais de Iffat Anjum

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationIffat Anjum
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Iffat Anjum
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generationIffat Anjum
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environmentIffat Anjum
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generationIffat Anjum
 
Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxIffat Anjum
 
Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Iffat Anjum
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Iffat Anjum
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Iffat Anjum
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Iffat Anjum
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Iffat Anjum
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Iffat Anjum
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysisIffat Anjum
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysisIffat Anjum
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysisIffat Anjum
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compilerIffat Anjum
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerIffat Anjum
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
Data link control
Data link controlData link control
Data link controlIffat Anjum
 

Mais de Iffat Anjum (20)

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Cognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentationCognitive radio network_MS_defense_presentation
Cognitive radio network_MS_defense_presentation
 
Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2Lecture 15 run timeenvironment_2
Lecture 15 run timeenvironment_2
 
Lecture 16 17 code-generation
Lecture 16 17 code-generationLecture 16 17 code-generation
Lecture 16 17 code-generation
 
Lecture 14 run time environment
Lecture 14 run time environmentLecture 14 run time environment
Lecture 14 run time environment
 
Lecture 12 intermediate code generation
Lecture 12 intermediate code generationLecture 12 intermediate code generation
Lecture 12 intermediate code generation
 
Lecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptxLecture 13 intermediate code generation 2.pptx
Lecture 13 intermediate code generation 2.pptx
 
Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2Lecture 11 semantic analysis 2
Lecture 11 semantic analysis 2
 
Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05Lecture 09 syntax analysis 05
Lecture 09 syntax analysis 05
 
Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01Lecture 10 semantic analysis 01
Lecture 10 semantic analysis 01
 
Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4Lecture 07 08 syntax analysis-4
Lecture 07 08 syntax analysis-4
 
Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3Lecture 06 syntax analysis 3
Lecture 06 syntax analysis 3
 
Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2Lecture 05 syntax analysis 2
Lecture 05 syntax analysis 2
 
Lecture 03 lexical analysis
Lecture 03 lexical analysisLecture 03 lexical analysis
Lecture 03 lexical analysis
 
Lecture 04 syntax analysis
Lecture 04 syntax analysisLecture 04 syntax analysis
Lecture 04 syntax analysis
 
Lecture 02 lexical analysis
Lecture 02 lexical analysisLecture 02 lexical analysis
Lecture 02 lexical analysis
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
 
Compiler Design - Introduction to Compiler
Compiler Design - Introduction to CompilerCompiler Design - Introduction to Compiler
Compiler Design - Introduction to Compiler
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Data link control
Data link controlData link control
Data link control
 

Qo s based mac protocol for medical wireless body area sensor networks

  • 1. QoS-bbaasseedd MMAACC pprroottooccooll ffoorr MMeeddiiccaall WWiirreelleessss BBooddyy AArreeaa SSeennssoorr NNeettwwoorrkkss Author: KKhhaalleedd AA.. AAllii,, JJaahhaannggiirr HH.. SSaarrkkeerr,, aanndd HHuusssseeiinn TT.. MMoouuffttaahh School of Information Technology and Engineering University of Ottawa Ottawa, Ontario, K7L 3N6 Presented by: IIffffaatt AAnnjjuumm((RRoollll:: 1166)) NNaazziiaa AAllaamm((RRoollll:: 2288)) 15th Batch. Date: 3rd May 2012.
  • 2. CCoonntteennttss  Contribution.  Problem Definition. • Background  Proposed Protocol • Network Model • Mathematical analysis  Performance Evaluation. 2 Slide 2 Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 3. CCoonnttrriibbuuttiioonnss  The paper proposed QoS-based MAC protocol that can be employed in WBASNs.  This protocol is based on the IEEE 802.15.4 a Ultra Wide Band (UWB) MAC protocol and the sensor nodes utilize the slotted Aloha random access mechanism.  Also prioritizes the critical packets access to the transmission medium by cutting of the number of retransmissions of the collided non critical packets.  The critical traffic throughput is increased and its rejection rate is decreased ,maintaining the non critical traffic QoS parameters above a minimum provisioned level. 3 Slide 3 Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 4. Slide 4 PPrroobblleemm DDeeffiinniittiioonn  Medical information have different urgency levels and timing constraints that require a sensor to:  Sense a physiological phenomenon ,  Process the sensed value,  Communicate the processed value to a central node, in a bounded and guaranteed time.  For these requirements, A MAC protocol has to ,  Maximize network throughput,  Minimize packet rejection rate and,  Differentiate network traffic. Green Networking Research Group 4 Dept. of Computer Science and Engineering, University of Dhaka
  • 5. PPrroobblleemm DDeeffiinniittiioonn  The medium access mechanism in WBASNs is based on the MAC protocol of Wireless Personal Area Networks (WPANs) standard.  WPAN (extended to UWB) s’ MAC protocol uses,  Carrier Sense Multiple Access/Collison Avoidance (CSMA/CA) and,  Aloha access mechanism.  In this standards, star and peer-to-peer both network topologies are supported.  Two communication modes for the star topology,  Beacon mode and  Non-beacon mode. 5 Slide 5 BACKGROUND Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 6. PPrroobblleemm DDeeffiinniittiioonn  In beacon mode, network communications are controlled by the network coordinator.  This coordinator periodically transmits beacon frames for ,  Device synchronization and network association control. 6 Slide 6 BACKGROUND Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 7. PPrroobblleemm DDeeffiinniittiioonn  In Non-beacon mode, a network node can send data to the coordinator using CSMA/CA or Aloha access mechanisms.  To receive data from the network coordinator, the node must power up ,and poll the coordinator.  Non-beacon operation mode provides the best performance since,  Sensor nodes’ receivers are not required to power up for receiving the beacon frame.  But the network coordinator cannot communicate with a node unless it has been invited by the node to communicate.  The beacon mode operation is mainly suitable under very tight data rate restrictions. 7 Slide 7 BACKGROUND Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 8. PPrroobblleemm DDeeffiinniittiioonn  A Distributed Queuing Body Area Network (DQBAN) MAC protocol for healthcare applications, that propose a QoS MAC protocol.  The CRQ control access requests to the medium,  DTQ schedules sensor nodes collision-free packet transmissions.  But DQBAN requires the management of different queues and the logic system implementation in every sensor node. 8 Slide 8 BACKGROUND  Collision Resolution Queue (CRQ) and,  Data Transmission Queue (DTQ). Green Networking Research Group  It utilizes two queues: Dept. of Computer Science and Engineering, University of Dhaka
  • 9. PPrrooppoosseedd PPrroottooccooll In the proposed QoS-based MAC protocol,  slotted Aloha access mechanism is used,  which sensor nodes contend for the medium only at the beginning of each time slot of the MAC frame.  Network nodes are grouped into,  Sensor nodes with critical information (C1)and ,  Sensor nodes of non critical information (C2).  Sensor nodes have the capability to sense multiple health parameters to indentify the traffic, if it is critical or non critical,  Based on a predefined threshold.  Traffic is non critical if its sensed value is below the threshold.  It becomes critical when such threshold is exceeded. 9 Slide 9 Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 10. PPrrooppoosseedd PPrroottooccooll 10 Slide 10 Figure: QoS-based MAC Protocol Illustration. The total number of packets G, ready for transmission at the beginning of a time slot can be defined as, Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 11. PPrrooppoosseedd PPrroottooccooll 11 Slide 11 Network Model A star network model composed of,  The coordinator node a Full-Function Device (FFD) and,  The sensor nodes are composed of Reduced-Function Devices (RFDs). Figure: WBAN Network for QoS-based MAC protocol Evaluation. Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 12. PPrrooppoosseedd PPrroottooccooll N: total number of sensor nodes Nc: sensor nodes of critical information Nnc: sensor nodes of non critical information G: aggregate packet arrival rate per time slot Gc: aggregate critical packet arrival rate per time slot Gnc: aggregate non critical packet arrival rate per time slot Sc: total critical throughput Snc: total non critical throughput 12 Slide 12 Mathematical Analysis Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka Definitions
  • 13. PPrrooppoosseedd PPrroottooccooll Rc: total critical rejection rate Rnc: total non critical rejection rate λc : critical nodes packet arrival rate λnc: non critical nodes packet arrival rate rc: number of allowed packet retransmissions for critical nodes rnc: number of allowed packet retransmissions for non critical nodes rc max : maximum number of allowed packet retransmissions for critical nodes 13 Slide 13 Mathematical Analysis min: minimum number of allowed packet retransmissions for critical nodes rc Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka Definitions
  • 14. PPrrooppoosseedd PPrroottooccooll 14 Slide 14 Mathematical Analysis Here, Aggregate critical packet arrival rate Gc per time slot is, The term psucc in Equation (2) defines the probability of a successful packet transmission in a time slot. Equation (2) can be simplified , Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 15. PPrrooppoosseedd PPrroottooccooll 15 Slide 15 Mathematical Analysis Equation (4) can be more simplified, Similarly, Gnc can be written, The aggregate packet arrival G per time slot can be rewritten, Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 16. PPrrooppoosseedd PPrroottooccooll 16 Slide 16 Mathematical Analysis Equation (7) can be simplified as in Equation (8) Substituting the psucc term of Equation (8) , Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 17. PPrrooppoosseedd PPrroottooccooll 17 Slide 17 Mathematical Analysis Equation (8) defines the aggregate network traffic generation per time slot ,which is solved numerically to obtained G value. This G value is used to compute the critical and non critical throughput Sc and Snc respectively, Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 18. PPrrooppoosseedd PPrroottooccooll Traffic Rejection Rate, the another performance parameter studied in this paper is the total packet rejection rate. This parameter is defined here for critical and non critical traffic respectively, 18 Slide 18 Mathematical Analysis Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 19. PPeerrffoorrmmaannccee EEvvaalluuaattiioonn Figure :Aggregate Throughput, λ c = λ nc = 0.02. Figure:Aggregate Throughput, λ c = λnc = 0.025 19 Slide 19 Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 20. PPeerrffoorrmmaannccee EEvvaalluuaattiioonn Figure :Aggregate Throughput, λ c = λ nc = 0.03. Figure: Packet Rejection Rate, λ c = λnc = 0.02 20 Slide 20 Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 21. PPeerrffoorrmmaannccee EEvvaalluuaattiioonn Figure: Packet Rejection Rate, λ c = λnc = 0.025 Figure: Packet Rejection Rate, λ c = λnc = 0.03 21 Slide 21 Green Networking Research Group Dept. of Computer Science and Engineering, University of Dhaka
  • 22. THANK YOU Green Networking Research Dept. of Computer Science and Engineering, University of Dhaka 22