1 Nikolajs Bogdanovs Riga Technical University, Lomonosova iela 1, LV-1019, Riga, Latvia, phone: +37129727288, Two Layer Model.

Slides:



Advertisements
Similar presentations
The Capacity of Wireless Networks Danss Course, Sunday, 23/11/03.
Advertisements

VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Why to learn OSI reference Model? The answer is too simple that It tells us that how communication takes place between computers on internet but how??
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
MAC Performance Analysis for Vehicle to Infrastructure Communication Tom H. Luan*, Xinhua Ling, Xuemin (Sherman) Shen* *BroadBand Communication Research.
Path Optimization in Computer Networks Roman Ciloci.
Network Layer and Transport Layer.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Ncue-csie1 A QoS Guaranteed Multipolling Scheme for Voice Traffic in IEEE Wireless LANs Der-Jiunn Deng 、 Chong-Shuo Fan 、 Chao-Yang Lin Speaker:
InVANET(Intelligent Vehicular Ad Hoc Network
Wireless “ESP”: Using Sensors to Develop Better Network Protocols Hari Balakrishnan Lenin Ravindranath, Calvin Newport, Sam Madden M.I.T. CSAIL.
IEEE Wireless LAN Standard
By: Matthew Follett. Introduction  A Wireless local area network (WLAN) links two or more devices using some wireless distribution method and usually.
EstiNet Network Simulator & Emulator 2014/06/ 尉遲仲涵.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
By Omkar KiraniSridhara Chaitanya Sannapureddy Vivek Gupta 1.
Researchers: Farzad Farnoud, Le Zhang, Behnam Hassanabadi, Christine Shea VANET Collision-Avoidance and Platooning using reliable MAC on DSRC Project Code:
A Distributed Scheduling Algorithm for Real-time (D-SAR) Industrial Wireless Sensor and Actuator Networks By Kiana Karimpour.
Introducing Network Standards
IEEE R lmap 23 Feb 2015.
Object and Event Recognition in Wireless Multimedia Sensor Networks Clint Mueller CS441.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Placement of WiFi Access Points for Efficient WiFi Offloading in an Overlay Network Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
NETWORKING FUNDAMENTALS. Bandwidth Bandwidth is defined as the amount of information that can flow through a network connection in a given period of time.Bandwidth.
Application of Finite Geometry LDPC code on the Internet Data Transport Wu Yuchun Oct 2006 Huawei Hisi Company Ltd.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
Department of Electrical Engineering, Southern Taiwan University Robotic Interaction Learning Lab 1 The optimization of the application of fuzzy ant colony.
Lecture 6 Introduction To Switching Circuit Switching.
Chapter 8 Switching Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cognitive Radio Networks
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Developing a measurement and calculation method for the characterization of the flow regimes in two - phase flow Lajos Szakonyi – Péter Iványi – Zoltán.
1 TBD: Trajectory-Based Data Forwarding for Light-Traffic Vehicular Networks IEEE ICDCS’09, Montreal, Quebec, Canada Jaehoon Jeong, Shuo Gu, Yu Gu, Tian.
A seamless handover between cdma2000 and WLAN for 3G-WLAN interworking service continuity 指導教授:黃培壝 學生:陳鵬宇.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
Performance Evaluation of Mobile Hotspots in Densely Deployed WLAN Environments Presented by Li Wen Fang Personal Indoor and Mobile Radio Communications.
Wireless Sensor Networks M Homework #2. IEEE MAC Protocol - Star topology – Part I Consider a square area equipped with 30 nodes distributed.
Kun-chan Lan and Chien-Ming Chou National Cheng Kung University
Sy Le CS 147.  Process of transferring information between computers virtually anywhere in the world.
2010 IEEE Fifth International Conference on networking, Architecture and Storage (NAS), pp , 2010 作者: Filip Cuckov and Min Song 指導教授:許子衡 教授 報告學生:馬敏修.
Doc.: IEEE /117 Submission 11/99 Nada Golmie, NISTSlide 1 IEEE P Working Group for Wireless Personal Area Networks MAC Performance Evaluation.
Copyright © 2003 OPNET Technologies, Inc. Confidential, not for distribution to third parties. Wireless LANs Session
Data Communication Networks Lec 13 and 14. Network Core- Packet Switching.
Ch 1: Simulation of Computer Networks. 1.1 Computer Networks and the Layering Concept Layering Concept Service Interface Protocol.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Improved IEEE PCF performance using silence detection and cyclic shift on stations polling E. Ziouva and T. Antonakopoulos IEE Proceedings-Communications,
1 The Latency/Bandwidth Tradeoff in Gigabit Networks UBI 527 Data Communications Ozan TEKDUR , Fall.
TECHNICAL SEMINAR S V Suresh 08731A1254 By. 1 st GENERATION:  Introduced in 1980  Analog cellular mobile,Data speed 2.4kbps  1G mobiles- AMPS,NMT,TACS.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
System Architecture for C2C Communications Based on Mobile WiMAX Michiyo ASHIDA VTT Technical Research Centre of Finland
1 A Throughput Enhancement Handover Algorithm for WiMAX Network Architecture Hao-Ming Chang and Gwo-Jong Yu Graduate School of Mathematical Sciences, Aletheia.
Featrues of Compputer Networks
“An Eye View On the Future Generation Of Phones”
Authors: Jiang Xie, Ian F. Akyildiz
Planning & System Installation
Network Types & Speed Learning Objectives:
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Data Communication Networks
3.3 Mobile Digital Communication
Presentation transcript:

1 Nikolajs Bogdanovs Riga Technical University, Lomonosova iela 1, LV-1019, Riga, Latvia, phone: , Two Layer Model for Performance Evolution of Vehicular Networks

2 We research interests in utilizing wireless technologies like WiMax and WiFi to provide Internet connectivity to users in moving vehicles. Such systems, termed Drive-thru Internet, operate by placing inter-connected roadside access points (APs) on city roads and trunk roads so as to enable vehicular users to obtain network connectivity by temporarily connecting to an AP as the vehicle passes through the AP’s coverage range. The aim is to develop an effective communication system for the Intelligent Transportation System (ITS). An important feature of Drive-thru Internet systems, shown in Fig. Vehicular Network

3 The description of the object We was calculated a goodput of standards IEEE802.11n and IEEE802.16e for open network systems. The physical sphere for the transmission is the wireless network. At the first stage the data is transmitted from the mobile object to the nearest Access Point along the protocol n. However, the distance from the AP object should not exceed 200 meters. Further from the AP the data is transmitted to the remote base station on the protocol (WiMax).

4 Experiment of IEEE802.11n for vehicle On the picture are depicted the set up of three APs locations in a distance of 100 meters to each other. Only 600 meters long test-bed was used to make the experiment.

5 Closed Cyclic estimation model for vehicular number Following the obtained practical results we will calculate the base station performance at variable client count. In our case the 200 meters long base station operational zone of is divided to 5 zones, 40 meters each, the third zone being the most adjacent to the base station. 200 meter segment consisting of 5 zones, 40 meters each,

6 Closed Cyclic estimation model for vehicular number In fact, to determine how to grow the speed of vehicle was made an experiment, as show Figure that velocity grows exponentially: The Table shows the technical data of the car which was used in the experiment. The speed grow can be depending on the vehicle data.

7 Closed Cyclic estimation model for vehicular number Closed network consisting of M independent nodes with N incoming queries. Distribution is exponential with the parameter. If the interval length equals, and vehicle movement then the intensity of vehicle servicespeed equals, by road interval equals:

8 Closed Cyclic estimation model for vehicular number Such a system can be described in a form of a closed cyclic mass service system network with M service devices, N queries and exponentially distributed service time. Query service intensity in the i-th interval equals, as show in Figure.: Closed cyclic system

9 Due to the periodic nature of this model and the next step is calculated as follows: Buzen’s algorithm the most effective methods for closed network analysis, as show in Table. Buzen’s matrix, at the row i and column j can be calculated using the formula: Closed Cyclic estimation model for vehicular number

10 Average number of moving vehicles, competing for resources of base station is calculated in this manner: Vehicular number

11 Two Layer Model The terminal count in each vehicular wireless network is usually high. Bandwidth equation for a two layer network:

12 Two Layer Model There for i-th region is obtained from measurement results, illustrated in Figure.

13 Two Layer Model The average time for the transmission will be varying: more time is spending on the transmission of the data packets, which we denote as. The ACK transmission takes less time denotes it as Then the average time of the data processing in the first node will be: If on the top of each transmitted packet we receive the ACK confirmations. In this case the intensity of the processing in the first node will be:

14 Two Layer Model The intensity for the : Where- effective data transfer rate for the IEEE802.16e protocol. The packet length will be, but the actual speed For the data transmission between the Access Point and the base station is used IEEE802.16e protocol, this protocol will have the peak transfer rate = 50Mbps. is determined in the following way:

15 Two Layer Model The output flow is equal to input flow and from this rule of flow balance it is possible to write: Goodput of the two layered network is defined as the count of processed inquiries in a unit of time. The finished task is put out trough the subsystem of input/output, and instantly trough it a new task is loaded. Probability of a lack of inquiries in i-th node: Where N - number of vehicles. Function for the studied two layer vehicular network looks like this:

16 Goodput with the probability P10=0.999 P12=0.001 for N=10 and N=20 will be: Two Layer Model

17 EXPERIMENTAL ESTIMATION OF VEHICULAR NETWORK The estimation was made by the means of IxChariot software. The main feature is the fact of speed measurement of the data transmission depending on the remoteness of the mobile object from the base station and its moving speed. One channel provides data transfer in GPRS mode. The second channel, being characterized by a high data transfer rate, uses LTE mode – the mode of the next generation of mobile communications Scheme “test-bed” is presented below :

18 Conclusions In this research experimental data is presented, about data transfer rate in wireless networks of IEEE n standard connecting moving objects. Based on the experimental data mathematical patterns were developed binding characteristics of vehicular flow with characteristics of data transfer system. Experimental data is presented in this research, concerning data transfer rate in IEEE n standard wireless network of moving objects. Based on experimental data two mathematical models were developed, binding the characteristics of vehicular flow and characteristics of data transfer system. In the presented research, a model for real data transfer rate estimation depending from number N of moving objects located in the wireless network base stations operational zone was developed. Based on this research, the real data transfer rate depends from the number and distances from base station of objects interacting with base station.

19