Random multiple access of broadcast channels with Pareto distributed packet interarrival times

We consider the random multiple access of a slotted broadcast communication channel. Packet arrivals for such channels are often modeled as Poisson processes because the latter have attractive theoretical properties and are well understood, even though a number of traffic studies have shown that packet interarrival times are not always exponentially distributed. For example, some studies argue convincingly that traffic from a variety of working packet networks (LANs, WANs, etc.) is much better modeled using statistically self-similar processes to characterize the packet interarrival times of the aggregate traffic, which have much different properties than Poisson processes. Because of the great influence multiple access algorithms (used in the channel access subsystem) will have on the performance of third-generation digital wireless mobile communication systems, we study the problem of random multiple access under packet traffic generated by interactive data applications (e.g., reading/composing short e-mail messages, responding to paging type messages, transferring files between the mobile and a fixed computer, and querying of a database). We examine and demonstrate the performance robustness of the random access algorithms (RAAs) when they are driven by a strongly bursty packet arrival process, commonly found in interactive data applications.

[1]  Averill M. Law,et al.  Simulation Modeling and Analysis , 1982 .

[2]  Philippe Flajolet,et al.  Q -ary collision resolution algorithms in random-access systems with free or blocked channel access , 1985, IEEE Trans. Inf. Theory.

[3]  Lazaros F. Merakos,et al.  Delay analysis of the n -ary stack random-access algorithm , 1988, IEEE Trans. Inf. Theory.

[4]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[5]  Giuseppe Anastasi,et al.  A bandwidth reservation protocol for speech/data integration in TDMA-based advanced mobile systems , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.

[6]  George C. Polyzos,et al.  A queueing theoretic approach to the delay analysis for the FCFS 0.487 conflict resolution algorithm , 1993, IEEE Trans. Inf. Theory.

[7]  Raphael Rom,et al.  Multiple Access Protocols: Performance and Analysis , 1990, SIGMETRICS Perform. Evaluation Rev..

[8]  Dimitri P. Bertsekas,et al.  Data networks (2nd ed.) , 1992 .

[9]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[10]  Walter Willinger,et al.  Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.

[11]  Raphael Rom,et al.  Multiple Access Protocols: Performance and Analysis , 1990, SIGMETRICS Perform. Evaluation Rev..

[12]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[13]  Leonidas Georgiadis,et al.  Bounds on the delay distribution of window random-access algorithms , 1993, IEEE Trans. Commun..

[14]  Walter Willinger,et al.  Proof of a fundamental result in self-similar traffic modeling , 1997, CCRV.