Examples of DTMCs.

Slides:



Advertisements
Similar presentations
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Advertisements

Fundamentals of Computer Networks ECE 478/578
Lecture 6  Calculating P n – how do we raise a matrix to the n th power?  Ergodicity in Markov Chains.  When does a chain have equilibrium probabilities?
Lecture 9: Multiple Access Protocols
Link Analysis: PageRank
Discrete Time Markov Chains
1 Part III Markov Chains & Queueing Systems 10.Discrete-Time Markov Chains 11.Stationary Distributions & Limiting Probabilities 12.State Classification.
Module C- Part 1 WLAN Performance Aspects
More on Rankings. Query-independent LAR Have an a-priori ordering of the web pages Q: Set of pages that contain the keywords in the query q Present the.
15 October 2012 Eurecom, Sophia-Antipolis Thrasyvoulos Spyropoulos / Discrete Time Markov Chains.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
Page Rank.  Intuition: solve the recursive equation: “a page is important if important pages link to it.”  Maximailly: importance = the principal eigenvector.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Efficiency Reservation Protocols Voice and Data Techniques - PRMA - Variable rate CDMA.
Teknik Akses Jaringan - Non Carrier Sense Pertemuan 11 Matakuliah: H0484/Jaringan Komputer Tahun: 2007.
7C Cimini-9/97 RANDOM ACCESS TECHNIQUES ALOHA Carrier-Sense Techniques Reservation Protocols PRMA.
CSE 221: Probabilistic Analysis of Computer Systems Topics covered: Discrete time Markov chains (Sec )
CSE 3504: Probabilistic Analysis of Computer Systems Topics covered: Discrete time Markov chains (Sec )
INDR 343 Problem Session
ECE358: Computer Networks Spring 2012
Link-layer EE122 Discussion 10/14/2011. MAC Addresses Link-layer deals with MAC addresses – 48-bit addresses, flat name space – E.g., 88-9F-FA-F
Cs/ee 143 Communication Networks Chapter 3 Ethernet Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech.
1 Chapter 5 The Medium Access Sublayer. 2 Chapter 5 The Medium Access Layer 5.1 The Channel Allocation problem - Static and dynamic channel allocation.
Lecture 16 Random Access protocols r A node transmits at random at full channel data rate R. r If two or more nodes “collide”, they retransmit at random.
Chap 4 Multiaccess Communication (Part 1)
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
Analysis of Ethernet-like protocols Andrey Lukyanenko University of Kuopio.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
Propagation Delay and Receiver Collision Analysis in WDMA Protocols I.E. Pountourakis, P.A. Baziana and G. Panagiotopoulos School of Electrical and Computer.
1 Introduction to Stochastic Models GSLM Outline  limiting distribution  connectivity  types of states and of irreducible DTMCs  transient,
Network Design and Analysis-----Wang Wenjie Queueing System IV: 1 © Graduate University, Chinese academy of Sciences. Network Design and Analysis Wang.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
4: DataLink Layer1 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single wire, e.g. PPP, SLIP) r broadcast (shared wire.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
An Overview of the Aloha protocols J.-F. Pâris University of Houston.
Discrete Time Markov Chains
15 October 2012 Eurecom, Sophia-Antipolis Thrasyvoulos Spyropoulos / Discrete Time Markov Chains.
15 October 2012 Eurecom, Sophia-Antipolis Thrasyvoulos Spyropoulos / Absorbing Markov Chains 1.
Tel Hai Academic College Department of Computer Science Prof. Reuven Aviv Markov Models for Access Control in Computer Networks Resource: Fayez Gebali,
Exercises on Data Link Layer.
5: DataLink Layer5-1 Slotted ALOHA Assumptions r all frames same size r time is divided into equal size slots, time to transmit 1 frame r nodes start to.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Data Link Layer Lower Layers Local Area Network Standards
Discrete Time Markov Chains (A Brief Overview)
Discrete-time Markov chain (DTMC) State space distribution
Markov Chain Hasan AlShahrani CS6800
Ergodicity, Balance Equations, and Time Reversibility
Sidevõrgud IRT 4060/ IRT 0020 vooruloeng 6 / 20. okt 2004
Much More About Markov Chains
Discrete Time Markov Chains (cont’d)
High Speed LANs – Ethernet and Token Ring
Computer Communication Networks
Discrete Time Markov Chains
DTMC Applications Ranking Web Pages & Slotted ALOHA
Carrier sense multiple access with collision resolution
Ioannis Ioannidis, Ananth Grama and Ioannis Ioannidis
Markov Chains Part 5.
2014 session 1 TELE4642: Network Performance Week 12 Review
Solutions Markov Chains 1
Link Layer and LANs Not everyone is meant to make a difference. But for me, the choice to lead an ordinary life is no longer an option 5: DataLink Layer.
Data Communication Networks
Solutions Markov Chains 1
September 1, 2010 Dr. Itamar Arel College of Engineering
CSMA with Reservation by Interruptions (CSMA/RI)
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Solutions Markov Chains 6
CS723 - Probability and Stochastic Processes
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Examples of DTMCs

Navigating the Web as a Markov Chain Ranking web pages One option is to use the number of other pages that link to a given page (easy to fool) Could weigh each page by the number of pages pointing to it (easy to fool through “cliques”) A more robust option is proceed recursively Rank of page depends on rank of pages pointing to it, which in turn may depend on your rank (and that of other pages) Solution must satisfy j = i iPij Same formulation as Markov chain Rank of page is its limiting probability

Some Real-World Challenges The web’s “Markov chain” is not irreducible… Pages that point to no other pages (absorbing state) Solution: Add (fake) links from each page to all other pages with a small overall weight (popularity tax) Final solution is sensitive to magnitude of tax Solving for the limiting probabilities The transition matrix is big but very sparse, so that matrix multiplication can be implemented efficiently

The Slotted Aloha Protocol Distributed access of shared communication resource (channel) At most one successful packet transmission per time slot m hosts that transmit with probability p in each time slot Collision if more than one host transmits in a slot Retransmission with probability q after failed transmission (this is in addition to new transmissions) Aloha Markov chain: State is number of messages being retransmitted Probability pk of k new messages if Binomial(m,p) Probability qnk of k retransmissions given n retransmission messages is also Binomial(n,q)

Aloha Transition Probabilities If in state 0 (no packet left in system) P0,0 = (1-p)m+mp(1-p)m-1 (0 or 1 packet transmission) P0,1 = 0 (at least 2 packets left after a collision) P0,j = Choose(m,j)pj(1-p)m-j, j=2,…,m P0,j = 0, j>m (cannot increase state by more than m) If in state k>0 (k packets waiting for retransmission) Pk,j = 0, jk-2 or j>k+m At most one successful transmission and no more than m new packets Pk,k-1 = (1-p)m+kp(1-p)k-1 No new transmission, one retransmission Pk,k = m(1-p)m-1(1-q)k +(1-p)m(1-q)k +(1-p)m(1-(1-q)k –kq(1-q)k-1) one new transmission, no retransmission No new transmission and no retransmission No new transmission and two or more retransmissions Pk,k+1 = m(1-p)m-1(1(1-q)k) One new transmission and one or more retransmissions Pk,k+j = Choose(m,j)pj(1-p)m-j, j=2,…,m j>1 new transmissions and any number of retransmissions

Aloha Protocol Properties Chain is readily seen to be irreducible and aperiodic However it is transient for any fixed value of q Expected number of transmissions when in state k E[N] = mp+kq (we obviously need mp < 1, but it is not enough to ensure “stability”) E[N] > 1 whenever k > 1/q Stabilizing the chain calls for making q state dependent We need mp+kqk < 1 or qk < (1-mp)/k One possible option: q = -k,  > 1 (Ethernet protocol)