Performance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model

Size: px
Start display at page:

Download "Performance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model"

Transcription

1 Perormance Study o Block ACK and Reverse Direction in IEEE n using a Markov Chain Model Md. Akbar Hossain, Nurul I Sarkar, Jairo Gutierrez, William Liu School o Computer and Mathematical Sciences Auckland University o Technology Auckland 1010, New Zealand Abstract IEEE n networks are widely used in home and corporate network environments because they oer high-speed wireless Internet access at relatively low-cost. The n standard introduced several key eatures including Block acknowledgement (ACK) and reverse direction (RD) data transmission or enhanced system perormance. An in-depth study o n system capacity or Block ACK mechanisms (both protected and unprotected) and RD data lows is required to assist optimum planning and design o such systems in view o the limited wireless channel capacity. In this paper we study the interdependencies o Block ACK and RD mechanisms using a discrete bi-directional Markov chain model under non-saturated traic loads. We present a mathematical model to derive throughput, delay, and packet loss probability or both protected and unprotected Block ACKs under varying loads. We validate the model using MATLAB based numerical studies. Results obtained show that the combined eect o protected Block ACK and RD lows has a positive impact on system perormance. However, unprotected Block ACK wastes transmission opportunity (TXOP) especially in collisions and thereore degrades the system perormance. Our indings reported in this paper provide some insights into the perormance o n with respect to Block ACK and RD methods. This study may help network researchers and engineers in their contribution to the development o next generation wireless LANs such as IEEE ac.

2 Keywords: Medium Access Control; Block ACK; Markov Chain; Reverse Direction; Distributed Coordination Function 1. Introduction IEEE based wireless local area networks (WLANs) are widely adopted in home and corporate networking environments due to their simplicity in operation, robustness, low cost, well-deined standards (e.g a/b/g/n) and the user mobility oered by the technology. In the standard, the distributed coordination unction (DCF) is deined as a mandatory medium access control (MAC) protocol and the point coordination unction(pcf) is optional [1]. The perormance o DCF has been analyzed extensively using mathematical modeling and simulation [2][3][4]. In [2], Bianchi proposed a Markov chain model or a backo mechanism to evaluate the throughput under saturated traic and error ree channel condition. Bianchi s work assume that packets will eventually transmitted regardless o the no. o retransmissions. However, a station (STA) will increase its contention window size ater each ailed transmission until it reaches the maximum backo stage. Since the maximum backo stage and retry limit are not equal, the contention window size remains the same and STA will continue retransmitting until it reaches a retry limit. I the subsequent transmission is not successul, the packet is discarded. The authors in [5], developed a Markov model which considers a inite retry limit or the transmission control protocol (TCP) over WLANs. They considered saturated traic loads under ideal channel conditions. The extension o Bianchi s model was reported in [6] or inite load analysis. However, the maximum capacity o a wireless node is bounded by queue delays [7]. A inite load Markov model is presented in [7] by integrating a queue model as a new state with a Bianchi model assuming the STA queue is empty ater successul transmission. All o these models are well studied or (a/b/g) networks. The undamental goal o these models is to study the DCF protocol behavior under dierent channel and load conditions. The common thread o these studies is that the system perormance can be 2

3 enhanced by reducing MAC overheads. The e standard [1] published in 2005, proposed a new MAC method called hybrid access method(hcf). A new ACK scheme is being introduced in the e standard known as BA. Unlike the traditional ACK scheme, an ACK is transmitted to reply to multiple data rames rather than per rame as in BA. Hence, the Markov model that has been developed or the traditional DCF protocol does not it well with the BA scheme used to investigate the system throughput perormance. Authors in [8] developed a Markov model or the BA and showed that a block with multiple rames can oers higher throughput than the traditional ACK based two-way or our-way transmission under saturated load and ininite retransmission conditions. But, when the rame consists o only one data rame it suers rom severe throughput degradation due to a couple o additional rames (e.g.ba request and BA). Moreover, it is assumed that data rames received with errors are considered a successul transmission, thus the contention window is reset. Unortunately, according to the standard, receivers will not acknowledge the error data rame. Consequently, the sender has to retransmit the rame and increase the contention window i it does not reach a maximum contention value. Further enhancement o [8] is reported in [4] by introducing a protected BA mechanism. The work reported in [4] inspired by urther extensions o inite load conditions and integrating the RD eatures o n. Beside the BA scheme, rame aggregation mechanism is widely studied in recent literature to enhance the perormance o n networks. In [9] discrete time Markov chain model is used to analyse the post backo behavior due to rame aggregation under an error ree environment. The perormance study shows that, MAC service data unit (MSDU) outperorms the MAC protocol data unit (MPDU) as rame aggregation size becomes larger. An empirical study perorms in [10] also conirms that a signiicant perormance enhancement can be achieved when the rame aggregation and BA schemes are utilized. However, under an error prone channel rame aggregation mechanism experience severe throughput degradation and higher access delay due subrames size [11]. So ar, we only consider the unidirectional data transmission. A bi-dimensional 3

4 Markovian model presented in [12] shows that, bidirectional data transmission signiicantly enhance the overall network perormance. Most o the previous studies on perormance enhancement o n have ocused on rame aggregation mechanisms. Very limited studies have actually analyzed the throughput perormance o n under non-ideal channel conditions using Markov chains. The main contribution o this paper is three old. First, we present a simple Markov model to study the perormance o n standard under nonsaturated traic load. A detailed Markov chain model is developed by considering all possible constrains including load conditions, retry limits and channel state inormation. Second, we derived both Throughput and Packet delay or both the protected BA and non-protected BA schemes. Third, the eect o load conditions is analyzed in terms o packet loss probability. Moreover, an extensive MATLAB based numerical studies is presented to validate analytical model. The rest o the paper is organized as ollows: We describe the BA and RD mechanisms in Section 2. Section 3 presents a detailed discrete Markov model or n with a protected BA mechanism ollowed by three dierent subsections throughput, packet delay probability and mean delay (including MAC delay and Queue delay in consecutive subsections) analysis. A detailed numerical study including a comparative study o various mechanisms is presented in Section 4. A brie discussion in Section 5 ends the paper. 2. Preliminaries 2.1. Block ACK Mechanism The Block ACK mechanism was irst introduced in [1] to reduce the MAC overhead o e and later in n. The basic idea o the BA mechanism is to aggregate several ACK rames into a single rame. There are two dierent types o Block ACK mechanisms: Immediate (Im) and Delayed (D) Block ACK. A urther extension o n or High Throughput(HT) operations classiies each o these Block ACK schemes in two subclasses: Protected 4

5 and non-protected Block ACKs. The scope o this paper is limited to the Im- Block ACK scheme or both protected and non-protected modes. In the Im- Block ACK scheme, transmitters and receivers are known as originators and recipients, respectively. To initialize the new acknowledgement policy, the originator and the recipient will exchange Add Block Acknowledgement(ADDBA) Request/Response rames. Aterwards, a data block with multiple data rames is transmitted rom the originator to the recipient with Block ACK Request(BAR) at the end. The number o data rames in one data block is bounded by the receiver buer size. The recipient sends a Block Acknowledgement (BA) rame or the the entire data block. Figure1(a) shows the protected Block ACK channel access mechanism. In protected Block ACK, beore transmitting an entire data burst, the originator will transmit a single data rame and wait or an ACK rom the recipient. Ater the successul reception o an ACK rame, the originator initiates the transmission opportunity (TXOP) period to transmit the data burst. Thereore, i there is an error or channel collision,this problem would only be experienced by the irst data rame or ACK rame. This concept is most likely an RTS/CTS based our-way handshake (shown in Fig. 1(c)) mechanism except when using a special RTS/CTS rame where as the non-protected Block ACK mechanism is based on a two-way handshake mechanism. The time diagram o the non-protected Block ACK mechanism is depicted in Fig.1. In terms o throughput as a perormance metric, protected Block ACK should outperorm the non-protected Block ACK scheme by reducing the wasted time due to collision or channel errors Reverse Direction We propose an eicient reverse direction (RD) data exchange protocol to improve QoS support and overall eiciency o the IEEE n standard or high rate physical layer. The RD protocol provides mechanisms that signiicantly reduce the MAC-overhead while retaining ull compatibility with legacy systems. Figure 1(c) illustrates the RD scheme with a block ACK mechanism. In this speciied transmission, the receiver may request a reverse data transmission in 5

6 Figure 1: Various Block ACK mechanisms with Reverse Direction the CTS control rame. This allows the transportation o data rames and also aggregates rames, in both directions, in one Transmission Opportunity (TXOP) period. Until now, when the sender STA is allocated with a TXOP, it inorms surrounding STAs about how long the wireless medium will be engaged. Hence, RD achieves better results by supporting on-demand bi-directional data lows using the existing handshake protocol without any additional control rames. Furthermore, it reduces block transmission overhead by eliminating the short interrame space(sifs) or transmission in both directions and relies on a single block acknowledgement rame. Previously, or each uni-directional data transer, the initiating station needed to contend or the channel in a contention-based wireless medium. With RD, the other stations are essentially allowed to send inormation back once the transmitting station has attained a TXOP. Thereore, two roles need to be identiied: RD initiator and RD responder. The RD initiator sends its permission to the RD responder due to a Reverse Direction 6

7 Grant (RDG) in the RDG/More physical layer convergence protocol (PLCP) protocol data unit (PPDU) ield o the high throughput (HT) control ield. The RD mechanism acilitates the data transmission rom both sides (sender and receiver) without urther contending or the medium and reducing the number o contentions by a actor o 1.5 to 2 [13]. Moreover, the proposed RD mechanism reduces the overall MAC overhead associated with collision detection and medium protection. A similar concept or a RD mechanism was presented in [14],where receiver data is piggybacked with a Block ACK to the sender. Obviously this modiication increases the throughput or the system but, as ar as we can ascertain, an overall perormance analysis including error and MAC delay analysis are still not ound in the recent literature. 3. Markov Model or IEEE n with Protected BLOCK ACK In this section, an analytical model is proposed to evaluate the perormance o n under non-saturated load conditions. A two dimensional Markov model is developed to derive the channel throughput and end-to-end delay o successul data transmissions. To simpliy the mathematical model we made the ollowing assumptions. (i) Finite number o stations (ii) Unsaturated load i.e. there is a certain probability that the transmission queue is empty (iii) Channel is prone to errors (iv) No hidden terminals (v) Packets are destroyed only through collisions exceeding the retry limit (vi) Packets are o equal length The proposed model also takes into consideration both basic handshake (twoway) and RTS/CTS handshake (our-way)-based channel access schemes. Developing a Markov model to evaluate the DCF perormance o WLANs was irst shown by using the Bianchi Model [2] under saturated loads with ideal channel 7

8 conditions. Unortunately Markov Models developed or a/b/g are not substantial enough to explain the n behavior which has distinct eatures such as Protected Block ACK and Reverse Direction Data lows. In our model, we derive both the throughput and end-to-end delays by taking into account protected Block ACKs and Reverse Direction data lows in non-saturated load conditions. The undamental access method o is called distributed coordination unction (DCF) which is based on carrier sense multiple access with collision avoidance (CSMA/CA). For a STA to transmit, it senses the medium to determine i another STA is in transmission. According to DCF distributed protocol there must be a minimum time gap to identiy contiguous rame sequences. Thereore, a transmitting STA must ensure that the medium is idle or this period beore attempting to transmit. I the medium continues to be busy, the STA deers until the end o the current transmission. Ater deerral, or prior to attempting to transmit again immediately ater a successul transmission, the STA selects a random backo interval and decrements the backo interval counter while the medium is idle. A transmission is successul i an acknowledgement (ACK) rame is received rom the targeted STA (unicast) or when a multicast rame is sent completely. A reinement method may be used to urther reduce collisions: the transmitting and receiving STAs exchange short control rames, request to send (RTS) and clear to send (CTS). Let n be the number o stations (STAs)in a WLAN contending or channel access. Let b(t) and s(t) be the stochastic processes representing the backo counter and backo stages at time t respectively. Hence according to DCF, the b(t) value is decremented at the start o every idle slot and a contending station wins the channel when it reaches to zero. Ater successul transmissions i the STA has more data to send a new value would be set or b(t). As the counter value o k = b(t) is chosen to be uniormly distributed over k [0, CW i ], where CW i stands or the contention window size, there is a chance that two STAs end up with the same b(t) values and transmit data simultaneously. This is called a collision. In order to avoid urther collisions, the collided STAs will generate new b(t) values 8

9 determined by: 2 i CW min ; i m, CW i = (1) 2 m CW min = CW m ; i > m 200 Where CW i is an initial size or the contention window and m is a maximum number by which the contention window can be doubled. In this model, m is used to resemble the maximum backo stage. According to the IEEE standard, the value m could be larger than m, while the CW will hold ater that. Thereore, every STA is modeled by a pair o integers (i, k). At the very irst time, the backo stage i = s(t) starts at 0 and is increased by 1 everytime transmissions collide. Once the CW reaches CW m,it will remain at this value until it is reset. That means STA will keep transmitting the packet till it reaches the retry limit. I the transmission is still unsuccessul the packet will be dropped. The two-dimensional process (s(t), b(t)) will be analyzed with an embedded Markov chain (in steady state) at time instants at which the channel state changes. Let (i,k) denote the state o this process. At each stage the STA is described by i, k where i stands or the backo stage and k stands or the backo delay which takes any value in the range o [0, CW i 1]. Let, p denote the rame ailure transition probability rom one stage to another (e.g. rom row i 1 to row i in Fig.2). It is also the probability o an unsuccessul (re)transmission attempt seen by a STA as its rame is being transmitted on the channel. The unsuccessul (re)transmission attempt can happen due to the collision o this station with at least one o the n 1 remaining stations, occurring with probability p coll, where p coll is p coll = 1 (1 τ) n 1 (2) and/or by having a rame with errors, occurring with probability p err (due to channel ading and/or noise). Since both events are independent, the probability p can be expressed as: p = 1 (1 p coll )(1 p err ) = p coll + p err p coll p err (3) 9

10 Figure 2: Two Dimensional Markov Chain Model or n backo In case o an unsuccessul transmission attempt, ater the backo timer expires in state (i, 0), the station moves to any state on row i(i, k) with probability p /CW i. Following a successul transmission (occurring with conditional probability p ) while the observed station is in stage i (0, m), a new packet is admitted in the queue, the station returns to backo stage 0, and its backo timer uniormly selects any integer value in the range (0, CW 0 1) with probability (1 p )/W 0. I the station reaches backo stage m, and once its backo timer reaches 0, its rame can be successully or unsuccessully transmitted. In both cases, a new rame is admitted in the queue and the station returns to backo stage 0,and its backo timer is uniormly chosen in the range (0, CW 0 1) with probability 1/CW 0. Ater a successul transmission or ater m th ailed retransmissions, it is assumed that the buer o the transmitting station is not empty with probability q and empty with probability 1 q. 10

11 Based on the above discussion the transition probabilities o the Markov process are determined as ollows: 1. P (i, k i, k + 1) = 1; k [0, CW i 2], i [0, m] The station s backo timer is decremented rom k+1 to k at ixed i backo stages, i.e. the station has detected an idle slot, so the channel is idle. 2. P (0, k i, 0) = q(1 p )/CW 0 ; k [0, CW 0 1], i [0, m] Ater a successul transmission with probability 1 p, it is assumed that there is a new packet in the transmitting STA buer with probability q to start a new transmission at backo stage P (i, k i 1) = p /CW i ; k [0, CW i 1], i [1, m] The station s backo timer is changed rom 0 to k and the backo stage is changed rom i 1 to i. The probability o this event equals: Pr(transmission is unsuccessul and number k was randomly chosen to initiate the backo timer at stage i)= Pr(transmission is unsuccessul) Pr(number k was randomly chosen to initiate the backo timer at stage i). The probability o unsuccessul transmission equals p and the probability that number k was randomly chosen to initiate the backo timer at stage i equals 1/CW i. 4. P (m, k m, 0) = p /CW m ; k [0, CW m 1] The probability o unsuccessul transmission equals p. The probability that number k was randomly chosen to initiate the backo timer at stage m (maximum backo stage) equals 1/CW m till reaching the retry limit. 5. P (I i, 0) = (1 q)(1 p ); i [0, m] This equation represents the practical scenario i.e. unsaturated traic condition where the transmitting STA s buer is empty with probability 1 q ater a successul transmission. Hence the station will not contend or a channel till the new packet has arrived. 6. P (I I) = 1 q This stage is known as the Idle stage, when STA doesn t have any packet in its buer to transmit. 7. P (0, k I) = q/cw 0 ; k [0, CW 0 1] This means a new packet arrives at the buer with probability q and 11

12 starts a new transmission by using a randomly chosen delay k to initiate the backo counter at stage 0 with probability 1/CW 0 8. P (0, k m, 0) = q/cw 0 ; k [0, CW 0 1] The transition probability mentioned in the previous equation could happen when a packet is discarded due to a ailure to transmit within the retry limit. Here it is assumed that there is at least a packet in the buer. 9. P (I m, 0) = 1 q I the buer is empty with probability 1 q ater the retry limit. Let the stationary distribution o the chain be b i,k = lim t P {s(t) = i, b(t) = k}, i (0, m), k (0, CW i 1), denoting the probability o the station to be in state(i, k). The probability o the station to be in state (i, 0) can be expressed as a n stage transition probability as ollows: b i 1,0 p = b i,0 0 < i m (4) b i,0 = p i b 0,0 0 i m (5) Since the chain is regular, or each k [0, CW i 1] b i,k = CW i k CW i q(1 p ) m 1 b i,0 + b m,0 + q b I i = 0 p b i 1,0 0 < i m (6) Now m m b I = (1 q)(1 p ) b i,0 + (1 q) b I b I (1 q)b I = (1 q)(1 p ) b I = (1 q)(1 p ) q b i,0 m b i,0 (7) 12

13 Now rom equations 6 and 7 m 1 q(1 p ) b i,0 + q b I + b m,0 m 1 = q(1 p ) b i,0 + q b I + b m,0 m 1 = (1 p )[q b i,0 + (1 q) m b i,0 ] + b m,0 Utilizing the relation established in Eq.(4) and make use o Eq.(6) can be written as Now by using the normalization condition or stationary distribution equation: m (8) b i,0 = b0,0 1 p, b i,k = CW i k CW i b i,0 i (0, m), k (0, CW i 1) (9) 1 = = m m m 1 m 1 b i,0 b i,0 b i,k + b I b i,0 b i,k CW i k CW i + b I m = p i CW i k b 0,0 + b I 2 = b m 0,0 p i (2 i CW + 1) + b I 2 ( = b m ) m 0,0 (2p ) i + p i + b I 2 Now or m m (i.e the retry limit is within the range o the maximum backo stage) = b 0,0 2 = b 0,0 2 1 = b 0,0 2 = b 0,0 2 ( (CW (1 (2p ) m+1 )) + 1 ) pm+1 + (1 q)(1 p ) m 1 2p 1 p q + 1 ) pm+1 (1 q)(1 pm+1 ) + 1 2p 1 p q + 1 ) pm+1 2(1 q)(1 pm+1 ) + 1 2p 1 p q ) ( (CW (1 (2p ) m+1 )) ( (CW (1 (2p ) m+1 )) ( A q(1 2p )(1 p ) 13 b i,0 b 0,0

14 where A = q(1 p )CW (1 (2p ) m+1 ) + q(1 2p )(1 p m+1 ) + 2(1 2p )(1 p )(1 q)(1 p m+1 ) b 0,0 = 2q(1 2p )(1 p ) A (10) Now the probability o transmission at any random slot can be written as τ = m b i,0 = 1 pm+1 b 0,0 1 p τ = 2q(1 2p )(1 p m+1 ) ; m m A For m m (i.e retry limit is greater than maximum backo stage) (11) = b m 0,0 2 ( CW i + = b 0,0 2 m i=m +1 p i CW i + m p i ) + b I (1 +1 2pm )(1 p ) + (1 2p )(1 p m+1 (CW (1 q)(1 pm+1 ) + q b 0,0 = 2q(1 p )(1 2p ) B b 0,0 B = q[cw (1 (2p ) mprime +1 )(1 p ) + (1 2p )(1 p m+1 )+ ) + 2 m CW p m +1 (1 2p )(1 p m m ) )+ (1 2p )(1 p ) (12) + 2 m CW p m +1 (1 2p )(1 p m m )] + 2(1 q)(1 p m+1 )(1 2p )(1 p ) Thus τ = m b i,0 = 1 pm+1 b 0,0 1 p (13) τ = 2q(1 2p )(1 p m+1 ) ; m m B So ar, p is still unknown but can be solved by using Eq.(3), where p coll = 1 (1 τ) n 1. p err in Eq.(3), stands or the rame error probability(fer)o a 14

15 MAC data rame or an ACK rame or the given STA which can be expressed as an independent events as ollows: p err = 1 (1 F ER data )(1 F ER ack ) = F ER data + F ER ack F ER data F ER ack (14) We can rewrite FER with respect to STA s mobility, receiver ading margin, transmission carrier requency, and rame duration [15]. F ER = 1 exp( ρ d 2πρTp ) Where ρ is the ading margin decided by the receiver structure, d is the maximum doppler requency calculated rom the STA speed and the carrier requency,and T p represents rame duration. Hence, Eq.(3) becomes: p = 1 (1 τ) n 1 (1 F ER data )(1 F ER ack ) (15) In this analysis, the unsaturated traic behavior is characterized by deining a MAC queue(q) in equations 11 and 13. q can be deined as the probability that there is at least one packet to be transmitted in the STA queue. Assume, the packet arrival rate at each STA buer rom upper layer is λ pkt/sec and µ represent the packet processing rate assuming that the queue has a length o K. By using a M/M/1/K queueing model[15], the probability q, that there is at least one packet in the queue is: q = 1 1 λ µ 1 ( λ µ )K+1 (16) Here µ = τs(1 τs)n 1 σ s. τ s and σ s are packet transmission probabilities at any random slot and average slot times at saturated load conditions. Equations 15,11, and 13 represent a non-linear system with two unknown parameters τ and p having single solution which can be solved numerically Throughput Analysis Let P tr be the probability that at least one station transmits a packet in a randomly selected slot time with probability τ and P s is the conditional probability that an occurring packet transmission is successul. For a WLAN with n 15

16 contending stations, the probabilities P tr and P s can be written as P tr = 1 (1 τ) n ; P s = nτ(1 τ)n 1 1 (1 τ) n (17) Considering that a random slot is empty with probability (1 P tr ) and that it contains a successul transmission with probability P tr P s, a collision with probability P tr (1 P s ) and P err in 14 is the probability o a channel access ailure due to channel error. According to [3], the throughput S is deined as a ratio o successully transmitted payload size over a randomly chosen slot duration: S = P tr P s (1 P err )E[P T ] (1 p tr )σ + P tr P s (1 P err )T s + P tr (1 P s )T c + P tr P s P err T e (18) where σ is the backo slot duration, T s is the average time that the channel is captured with successul transmission, T c is the average time that the channel is captured by stations which collide and T e is the average wasted time due to a channel access ailure caused by channel error due to mobility and ading eects. Hence the duration o a channel slot is the period o time the channel stays in one state:idle, ail including collision and error and inally success. Let T data,t ack,t rts,t cts,t bar, T ba, T hob and T hack be the transmission times (measured in microseconds) o an MPDU, an ACK rame, a RTS rame, a CTS rame, a BlockAckReq (BAR) rame, a BlockAck (BA), a Head o Brust(HOB) and a Head o ACK(HACK) rame, respectively. As in [4] it is also assumed that the rame could be corrupted due to either collision or channel error that leads to retransmission and increment o the backo stage. When using the protected block ack mechanism, a data burst transmission cannot be initiated at TXOP i there is an error or collision in the HOB or HACK rames [1]. Hence, a data 16

17 burst duration T s,t e,t c is given by T ack + T sis + (T data + T sis ) B + T bar + T sis + T ba + T RD ; Protected Block ACK Scheme T data + T Tsis ) B + T bar + T sis + T ba + T RD + T dis ; T s = Unprotected Block ACK Scheme T rts + T cts + 2T sis + (T data + T sis ) B + T bar + T sis + T ba + T RD + T dis ; RTS/CTS scheme (19) T hob + T eis + (T sis + T hack ) Protected Block ACK Scheme 1 F ER hob F ER hob +F ER hack F ER hob F ER hack (T data + T Tsis ) B + T bar + T sis + T ba + T RD + +T dis T e = Unprotected Block ACK Scheme T rts + T eis + (T sis + T cts ) RTS/CTS scheme 1 F ER rts F ER rts+f ER cts F ER rtsf ER cts (20) T hob + T eis Protected Block ACK Scheme (T data + T Tsis ) B + T bar + T sis + T ba + T RD + +T dis T c = Unprotected Block ACK Scheme (21) T rts + T eis RTS/CTS scheme T RD = T sis +(T data +T sis ) B RD +T bar +T sis +T ba (ReverseDirection) (22) All o the above mentioned time equations consider RD transmissions which can easily be unplugged to calculate the throughput without RD. According to [4], 17

18 it is also assumed that the HOB rame is always successul to gain the TXOP. Thus E[P T ] is given by L (E[B] 1)(1 F ER data ) + L (E[B RD ])(1 F ER data ) + L; Protected Block ACK with RD, L (E[B] 1)(1 F ER data ) + L; E[P T ] = Protected Block ACK without RD, L (E[B])(1 F ER data ); RTS/CTS Method and Unprotected Block ACK. (23) 3.2. Packet Drop Probability The packet drop probability is the probability that a packet is dropped when the retry limit is reached. Moreover, a packet may be dropped when the sending queue is ull. Hence the total packet drop probability is the sum o both o these events Packet Drop Due to Retry Limit A packet is ound in the last backo stage m i it encounters m collisions in the previous stages and it is eventually discarded or dropped. Thus, the packet drop probability due to reaching the retry limit can be written as a unction o the last backo stage: P drop = b m,0 b 0,0 p = p m.p = p m+1 = [1 (1 p )(1 τ) n 1 ] m+1 (24) Packet Drop Due to Queue Let us consider the M/M/1/K queue system, where there are K rames in the system shown in Fig. 3. Now, by using one o the balanced equations, the steady state probability can be written as 18

19 Figure 3: M/M/1/K Queue Model λ(1 p drop )p 0 = µp 1 Similarly it can be shown that p 1 = λ(1 p drop) p 0 µ p 1 = ρp 0 ; where, ρ = λ(1 p drop) µ p n = ρ n p 0 ; n = 0, 1, 2,...K K 1 λ(1 p drop) µ p n = 1 p 0 = ( λ(1 pdrop ) 1 n=0 µ ) K+1 Note that not all the rames arriving at the queue enter the queue because rames are not allowed into the queue when there are already K rames in the queue. Thereore, the rames are dropped with probability P k = ρ k p 0 ( ) K λ(1 pdrop ) 1 λ(1 p drop) µ (25) = ( ) µ K+1 λ(1 pdrop ) 1 Thus, the total probability o packet loss is µ P loss = P drop + P K ( ) K λ(1 = [1 (1 p )(1 τ) n 1 ] m+1 Pdrop ) 1 λ(1 P drop) µ + ( µ λ(1 Pdrop ) 1 µ ) K+1 (26) 19

20 3.3. Mean Delay The delay D can be deined as the time elapsing rom the instant the rame is inserted in the MAC buer to the time in which it is successully transmitted by receiving an acknowledgement or this rame. From this deinition it is obvious that delay is associated with two actors: a medium access delay due to the number o contending stations and a queueing delay or load conditions and rame processing rates at the queue. So, the average delay is D avg = D MAC + D Q MAC Delay The MAC delay or a successully transmitted packet is deined to be the time interval rom the time the rame is at the head o the MAC queue ready or transmission until an acknowledgement or this packet is received. As per [16], the average MAC delay is given by E[D MAC ] = E[X]E[slot] Here E[X] is the average number o slots spent or a successul transmission. Let STA be in the i backo stage and get the channel access with probability c i. The average number o slots utilized by the STA in the i backo stage is (CW i + 1)/2, i (0, m) and the probability that the rame reaches the backo stage i and it is not discarded is pi pm+1, i (0, m). Hence, 1 p m+1 [ ] m (p i p m+1 )((CW i + 1)/2) E[X] = 1 p m+1 n=0 E[slot] = (1 p tr )σ + P tr P s (1 P err )T s + P tr (1 P s )T c + P tr P s P err T e [ ] m (p i p m+1 )((CW i + 1)/2) E[D] = 1 p m+1 (1 p tr )σ + +P tr P s (1 P err )T s + n=0 + P tr (1 P s )T c + P tr P s P err T e (27) 20

21 Queueing Delay By using Little s ormula [15], the expected time spent (i.e.queuing delay) in the queue can be calculated as D Q = E[N] λ(1 P drop ) (28) Here E[N] is the expected number o packets in the queue given by E[N] = K np n = n=0 = ρp 0 d dρ K nρ n P 0 n=0 ( ) 1 ρ K+1 1 ρ ( 1 ρ K+1 (1 ρ)(k + 1)ρ K ) = ρp 0 (1 ρ) 2 ( ρ(1 ρ K+1 ) (1 ρ)(k + 1)ρ K+1 ) = (1 ρ)(1 ρ K+1 ) ( ρ(1 (K + 1)ρ K + Kρ K+1 ) ) E[N] = (1 ρ)(1 ρ K+1 ) Now using equation 28, D Q becomes ( ρ(1 (K + 1)ρ K + Kρ K+1 ) D Q = (1 ρ)(1 ρ K+1 ) ) 1 λ(1 P drop ) (29) Thereore the mean delay is given by [ ] m (p i p m+1 )((CW i + 1)/2) D = 1 p m+1 ((1 p tr )σ + P tr P s (1 P err )T s + P tr (1 P s )T c + n=0 ( ρ(1 (K + 1)ρ K + Kρ K+1 ) ) 1 +P tr P s P err T e ) + (1 ρ)(1 ρ K+1 ) λ(1 P drop ) (30) 4. Numerical Studies We study the characteristics o various IEEE n Block ACK schemes and to validate analytical model using MATLAB based numerical studies. Table 1 lists the parameters used in the numerical study. The protected Block ACK with and without reverse direction and non-protected Block ACK with and without RD are considered or comparison purposes. 21

22 Table 1: Summary o IEEE n parameters Payload 1500 bytes r 2 Mbps T-PHY 192 r* 1 Mbps T-DATA 192+(224+Payload)/r Data Rate 11 Mbps T-ACK /r* Block Size 5 T-RTS /r* Block Size RD 3 T-CTS /r* Fading Margin 0.05 T-BAR /r Velocity 5m/s T-BA /r Queue Length 50 Figure 4 shows the increasing the number o STAs on channel throughput perormance or a packet arrival rate o 8pkts/sec.One can observe that in all cases throughput initially increases with the number o STAs but urther increments o network size signiicantly reduce the throughput. This is very obvious in traditional WLANs due to collisions as the number o STAs increases in the network. Moreover, it is observed that the slope o the throughput degradation is stier in the case o Block ACK with RD as compared to protected Block ACK RD and in average the protection with the Block ACK mechanism provides 32.54% higher throughput. Collisions and FER rates are the dominating actors that make this dierence in perormance. As discussed in earlier, collisions and errors are only experienced by the initial data rames in the protected Block ACK mode. I the initial data rame is correctly transmitted then the STA will initiate the rest o the data burst where as in an unprotected scenario, (which used the Block ACK mode) there is no such protection mechanism (RTS/CTS is not considered in two way handshake scheme) resulting in a ull data burst experiencing the collisions and errors (resulting in higher collision and error times). Hence, to ully utilize the RD eature o n, it should be integrated with the protected block ACK mechanism to achieve higher throughput. Another special observation is that, the protected block ACK scheme outperorms the RTS/CTS scheme as RTS/CTS has extra overheads. Figure 5 shows the packet delay increases when the network size grows in 22

23 8.5 x Protected Block ACK RD Protected Block ACK Without RD Non protected Block ACK RD Non protected Block ACK without RD Arrival Rate = 8pkts/sec Throughput(bps) No. o STAs Figure 4: Channel throughput o protected Block ACK with and without RD and nonprotected block with and without RD. all cases due to a higher number o collisions. As a large number o stations attempt to access the channel, more collisions occur, the number o retransmission increases and stations suer longer delays. The protected Block ACK results in delays lower than that o the non-protected Block ACK scheme or both RD and without RD cases, since collisions only experienced by the irst data rame in case o the protected Block ACK scheme where as the whole data burst experienced collisions in the non-protected Block ACK. However, the overhead is a little bit higher in the protected Block ACK scheme due to an additional ACK rame or the irst data rame. This additional ACK rame eventually is more important to reduce the wasted time in terms o collisions or channel errors or higher data transmissions. Moreover, Fig.6 shows the variation o packet 23

24 delay with respect to packet arrival rates. The dierence o packet delay mostly remains constant between protected and non-protected Block ACK, since the packet delay contributions come rom packet arrival rates and queue length as shown in Eq.(29). However packet delay is highly impacted by the number o stations given that the MAC delay s contribution become dominant Protected Block ACK RD Protected Block ACK without RD NonP-Block ACK RD NonP-Block ACK without D RD Arrival Rate = 8pkts/sec 1 Packet Delay (Sec) No. o STAs Figure 5: Packet delay versus number o stations. The eiciency o the set o parameters used on the packet loss probability is explored in Fig.7 or protected Block ACK scheme. one can observe that shows that the choice o higher values or the contention window improve the packet loss probability by reducing the number o collisions. When W = 32, m = 6, m = 5 are used, the packet loss probability increases rapidly and is mostly exponential in nature. Now, using the same settings except a retry limit ixed to 7, the packet drop probability decreases about 48%. This is also true or 24

25 Protected Block ACK RD,STA = 10 NonP-Block ACK RD, STA = 10 Protected Block ACK RD, STA = 20 NonP-Block ACK RD,STA = Packet Delay (Sec) Arrival Rate (pkts/sec) Figure 6: Packet delay versus Arrival rate. maximum backo stage. The packet loss probability can urther be reduced by increasing contention window size rom 4 to 5. This is because the station will get more transmission opportunity according to Eq.(24). However, we observe that the packet loss or the exponential backo mechanism is smaller than the packet loss as a result o queueing mechanism (Fig.8). The probability o packet loss is almost zero or the arrival rate o 8pkts/sec in case o the protected Block ACK with 10 stations and dramatically increases due to queue overlows. We observe similar trend or various access schemes despite o their early queue saturation.. Figure 9 shows the probability o packet loss versus the number o stations. We observe that, the transmission probability, τ s decreases with the number o STAs, hence increasing the probability o collisions. However, at the initial stage (or N < 5) τ is increased a bit and starts decreasing. Interestingly the quantity o τ increments at the initial stage can be characterized by the packet arrival rate. It is shown that or lower packet rates (e.g. λ = 10pkts/sec) τ 25

26 0.07 Probability o s Packet Loss w = 32,m=6,m = 5 w = 64,m=7,m =5 w = 64,m=7,m =4 w = 32,m=7,m =5 Arrival Rate = 8pkts/sec No. o STAs Figure 7: Probability o packet loss against the number o stations Probability o s Packet Loss Protected RD, STA = 10 NonP-Block ACK RD, STA = 10 Protected RD, STA = 20 NonP-Block ACK, STA = Arrival Rate (pkts/sec) Figure 8: Probability o packet loss versus arrival rates or N = 10 and 20 stations. Comparison o various access methods. increases by whereas it is only or λ = 30pkts/sec.. Figure 10 illustrates the variation o throughput with τ or both protected and non-protected Block ACK schemes. We observed that non-protected Block 26

27 Probability o Collision Arrival Rate = 10pkts/sec c Arrival Rate = 30pkts/sec c τ No. o STAs Figure 9: Relationship between probability o collision and τ or varying no. o stations. ACK degrades perormance severely when the no. o STAs is increased as a result o excessive times wasted in the channel contention. Consequently, nonprotected Block ACK scheme also suers rom higher packet delays and packet loss probability as shown in Fig. 11 and Fig. 12, respectively. Throughput(bps ) x 10 6 Protected Block ACK NonP-Block ACK Arrival Rate = 8pkts/sec τ No. o STAs Figure 10: Relationship between Throughput and τ or varying no. o stations. 27

28 Packet Delay (sec) Protected Block ACK NonP-Block ACK Arrival Rate = 8pkts/sec τ No. o STAs Figure 11: Relationship between packet delay and τ or varying no. o stations. Probability o s Packet Loss Protected Block ACK NonP-Block ACK Arrival Rat = 8pkts/sec τ No. o STAs Figure 12: Relationship between probability o packet loss and τ or varying no. o stations. 28

29 5. Conclusion In this paper, we investigated the interdependencies o Block ACK and RD mechanisms or n using a discrete bi-directional Markov chain model under non-saturated traic loads. We developed a mathematical model to derive system throughput, delay, and packet loss probability or both protected and unprotected Block ACK methods under various loading. The model is validated by MATLAB-based numerical studies. Results obtained have shown that the better system perormance (i.e. up to 33% higher throughput and 48% less packet dropping) can be achieved using protected Block ACK in conjunction with RD data transmission. We ound that unprotected Block ACK wastes TXOP especially during collisions and degrades system perormance signiicantly. To ully utilize the system perormance, n stations should employ protected Block ACK mechanism with RD lows. The work reported can help network planners to deploy high-speed based networks and to contribute in the development o next generation wireless local area network ac amendment. Our uture work will report on the design and perormance evaluation o a crosslayer MAC protocol design supporting multimedia applications over ac. Development o an extensive simulation model to validate our numerical results presented here is also our ongoing work. Reerences [1] S. Committee, Wireless lan medium access control (mac) and physical layer (phy) speciications: Amendment 8: Medium access control (mac) quality o service enhancements, IEEE Computer Society, [2] G. Bianchi, Perormance analysis o the ieee distributed coordination unction, IEEE Journal on Selected Areas in Communications,, vol. 18, no. 3, pp , March [3] F. Daneshgaran, M. Laddomada, F. Mesiti, and M. Mondin, Unsaturated throughput analysis o ieee in presence o non ideal transmission 29

30 channel and capture eects, IEEE Transactions on Wireless Communications, vol. 7, no. 4, pp , [4] H. Lee, I. Tinnirello, J. Yu, and S. Choi, Throughput and delay analysis o ieee le block ack with channel errors, in 2nd IEEE International Conerence on Communication Systems Sotware and Middleware. IEEE, 2007, pp [5] H. Wu, Y. Peng, K. Long, S. Cheng, and J. Ma, Perormance o reliable transport protocol over ieee wireless lan: analysis and enhancement, in proc Twenty-First Annual Joint Conerence o the IEEE Computer and Communications Societies,, vol. 2. IEEE, 2002, pp [6] F. Alizadeh-Shabdiz and S. Subramaniam, A Finite Load Analytical Model or the IEEE Distributed Coordination Function MAC, WiOpt 03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, p. 2 pages, Mar [Online]. Available: [7] Y. S. Liaw, A. Dadej, and A. Jayasuriya, Perormance analysis o ieee dc under limited load, in proc. IEEE Asia-Paciic Conerence on Communications. IEEE, 2005, pp [8] T. Li, Q. Ni, T. Turletti, and Y. Xiao, Perormance analysis o the ieee e block ack scheme in a noisy channel, in 2nd IEEE International Conerence on Broadband Networks. IEEE, 2005, pp [9] B. S. Kim, H. Hwang, and D. K. Sung, Eect o rame aggregation on the throughput perormance o ieee n, in IEEE Wireless Communications and Networking Conerence, March 2008, pp [10] V. Visoottiviseth, T. Piroonsith, and S. Siwamogsatham, An empirical study on achievable throughputs o ieee n devices, in 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOPT 2009., June 2009, pp

31 [11] N. Hajlaoui, I. Jabri, and M. Ben Jemaa, Analytical study o rame aggregation in error-prone channels, in 9th International Wireless Communications and Mobile Computing Conerence, July 2013, pp [12] N. Mohammad and S. Muhammad, Modeling and analyzing mac rame aggregation techniques in n using bi-dimensional markovian model, in Networked Digital Technologies. Springer, 2012, pp [13] D. Akhmetov, n: Perormance results o reverse direction data low, in IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communications,, Sept 2006, pp [14] A. Milad, Z. Bin Muhamad Noh, A. Shibghatullah, and M. Algaet, Design a novel reverse direction transmission using piggyback and piggyback with block ack to improving the perormance o mac layer based on very high speed wireless lans, in proc. IEEE Conerence on Inormation Communication Technologies (ICT), April 2013, pp [15] L. Kleinrock, Queueing systems, volume 1: theory, [16] P. Chatzimisios, A. C. Boucouvalas, and V. Vitsas, IEEE wireless lans: perormance analysis and protocol reinement, EURASIP Journal on Wireless Communications and Networking, vol. 2005, no. 1, pp ,

Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels

Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels Analysis o Burst Acknowledgement Mechanisms or IEEE 802.11e WLANs over Fading Wireless Channels Department o Computer Science and Inormation Engineering Providence University 200 Chung-Chi Rd., Shalu,

More information

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model WIFI IEEE 802 Layers The IEEE 802 amily and its relation to the OSI model Need For Speed Wireless LAN Applications Streaming Media (HDTV, DVD) VoIP Interactive Gaming Data Transer Reuire Hundreds o Mps

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation Power Eiciency in IEEE 802.11a WLA with Cross-Layer Adaptation Jun Zhao, Zihua Guo, and Wenwu Zhu Microsot Research Asia 3/F, Beijing Sigma Center, o.49, Zhichun Road, Haidian District Beijing 100080,

More information

COSC 3213: Communication Networks Chapter 5: Handout #6

COSC 3213: Communication Networks Chapter 5: Handout #6 OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*

Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN* 2016 International Conerence on ustainable nergy, nvironment and Inormation ngineering (I 2016) IBN: 978-1-60595-337-3 Perormance Analysis o the I 802.11n Block- Mechanism in an rror-prone Channel Xue-ing

More information

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication DRaMA: Device-speciic Repetition-aided Multiple Access or Ultra-Reliable and Low-Latency Communication itaek Lee, Sundo im, Junseok im, and Sunghyun Choi Department o ECE and INMC, Seoul National University,

More information

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells Traic Assignment Over Licensed and Unlicensed Bands or Dual-Band Femtocells Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute o NYU, Brooklyn, NY 11201 InterDigital Communications,

More information

On Improving Voice Capacity in Infrastructure Networks

On Improving Voice Capacity in Infrastructure Networks On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in

More information

Worst Case Modelling of Wireless Sensor Networks

Worst Case Modelling of Wireless Sensor Networks Worst Case Modelling o Wireless Sensor Networks Jens B. Schmitt disco Distributed Computer Systems Lab, University o Kaiserslautern, Germany jschmitt@inormatik.uni-kl.de 1 Abstract At the current state

More information

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Modeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks

Modeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks Modeling the Eect o Intererences among N Collocated Heterogeneous Wireless Networs Bilal Khan and Jong-Su Ahn Department o Computer Science and Engineering, Donggu University, Seoul, Korea bilalhan83@hotmailcom

More information

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title Cognitive radio concepts or 802.16h Date Submitted 2005-07-11 Source(s) Mariana Goldhamer Alvarion Tel Aviv, 21

More information

Saturation throughput analysis of error-prone wireless networks

Saturation throughput analysis of error-prone wireless networks Saturation throughput analysis of error-prone 802. wireless networks Qiang Ni,,, Tianji Li, Thierry Turletti 2, and Yang Xiao 3 Hamilton Institute, National University of Ireland Maynooth, Co. Kildare,

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs

Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs Wireless Networks 9, 495 507, 003 003 Kluwer Academic Publishers. Manufactured in The Netherlands. Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs V. VITSAS Department

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION

AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION J-P. Kauppi, K.S. Martikainen Patria Aviation Oy, Naulakatu 3, 33100 Tampere, Finland, ax +358204692696 jukka-pekka.kauppi@patria.i,

More information

Enhancement of Wide Bandwidth Operation in IEEE ac Networks

Enhancement of Wide Bandwidth Operation in IEEE ac Networks Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea

More information

RADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags

RADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags A Multiple Hashing Approach to Complete Identiication o Missing RFID ags Xiulong Liu, Keqiu Li*, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu Abstract Owing to its superior properties, such as ast identiication

More information

A Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks

A Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks A Modiied Proile-Based Location Caching with Fixed Local Anchor or Wireless Mobile Networks Md. Kowsar Hossain, Tumpa Rani Roy, Mousume Bhowmick 3 Department o Computer Science and Engineering, Khulna

More information

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,

More information

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE 3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER 2008 Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks Yaser Pourmohammadi Fallah,

More information

Signal Strength Coordination for Cooperative Mapping

Signal Strength Coordination for Cooperative Mapping Signal Strength Coordination or Cooperative Mapping Bryan J. Thibodeau Andrew H. Fagg Brian N. Levine Department o Computer Science University o Massachusetts Amherst {thibodea,agg,brian}@cs.umass.edu

More information

Efficient Monitoring of Dynamic Tag Populations in RFID Systems

Efficient Monitoring of Dynamic Tag Populations in RFID Systems 2 2 Ninth IFIP IEEE/IFIP Ninth International Conerence on on Embedded and and Ubiquitous Computing Eicient Monitoring o Dynamic Tag Populations in RFID Systems Qingjun Xiao, Kai Bu, Bin Xiao Department

More information

Power Optimization in Stratix IV FPGAs

Power Optimization in Stratix IV FPGAs Power Optimization in Stratix IV FPGAs May 2008, ver.1.0 Application Note 514 Introduction The Stratix IV amily o devices rom Altera is based on 0.9 V, 40 nm Process technology. Stratix IV FPGAs deliver

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title IEEE 80.16 Broadband Wireless Access Working Group Channel and intererence model or 80.16b Physical Layer Date Submitted Source(s) Re: 000-31-09 Tal Kaitz BreezeCOM

More information

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation Goodput Enhancement of IEEE 8.11a Wireless AN via ink Adaptation Daji Qiao Real-Time Computing aboratory The University of Michigan Email: dqiao@eecs.umich.edu Abstract IEEE 8.11a is a new high-speed physical

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

Further developments on gear transmission monitoring

Further developments on gear transmission monitoring Further developments on gear transmission monitoring Niola V., Quaremba G., Avagliano V. Department o Mechanical Engineering or Energetics University o Naples Federico II Via Claudio 21, 80125, Napoli,

More information

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the

More information

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract

More information

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing) Introduction to OFDM Characteristics o OFDM (Orthogonal Frequency Division Multiplexing Parallel data transmission with very long symbol duration - Robust under multi-path channels Transormation o a requency-selective

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation 2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation

More information

Sequence-based Rendezvous for Dynamic Spectrum Access

Sequence-based Rendezvous for Dynamic Spectrum Access Sequence-based endezvous or Dynamic Spectrum Access Luiz A. DaSilva Bradley Dept. o Electrical and Computer Engineering Virginia Tech Arlington, VA, USA ldasilva@vt.edu Igor Guerreiro Wireless Telecommunications

More information

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble

More information

DKAN0008A PIC18 Software UART Timing Requirements

DKAN0008A PIC18 Software UART Timing Requirements DKAN0008A PIC18 Sotware UART Timing Requirements 11 June 2009 Introduction Design conditions oten limit the hardware peripherals available or an embedded system. Perhaps the available hardware UARTs are

More information

WIRELESS communications have shifted from bit rates

WIRELESS communications have shifted from bit rates IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios

Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,

More information

A MATLAB Model of Hybrid Active Filter Based on SVPWM Technique

A MATLAB Model of Hybrid Active Filter Based on SVPWM Technique International Journal o Electrical Engineering. ISSN 0974-2158 olume 5, Number 5 (2012), pp. 557-569 International Research Publication House http://www.irphouse.com A MATLAB Model o Hybrid Active Filter

More information

Opportunism vs. Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading

Opportunism vs. Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading 1 Opportunism vs. Cooperation: Analysis o Forwarding Strategies in Multihop Wireless Networks with Random Fading Chi-Kin Chau, Anand Seetharam, Jim Kurose, Don Towsley Masdar Institute o Science and Technology,

More information

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance On the Impact o Fading and Inter-piconet Intererence on Bluetooth Perormance Andrea Zanella Dept. o Inormation Engineering University o Padova, Padova, Italy zanella@dei.unipd.it Andrea Tonello Bell Labs,

More information

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can

More information

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), V1 PP 44-57 www.iosrjen.org Optimizing Reception Perormance o new UWB Pulse shape over Multipath

More information

Dynamic Channel Bonding in Multicarrier Wireless Networks

Dynamic Channel Bonding in Multicarrier Wireless Networks Dynamic Channel Bonding in Multicarrier Wireless Networks Pei Huang, Xi Yang, and Li Xiao Department o Computer Science and Engineering Michigan State University Email: {huangpe3, yangxi, lxiao}@cse.msu.edu

More information

Jan M. Kelner, Cezary Ziółkowski, Leszek Kachel The empirical verification of the location method based on the Doppler effect Proceedings:

Jan M. Kelner, Cezary Ziółkowski, Leszek Kachel The empirical verification of the location method based on the Doppler effect Proceedings: Authors: Jan M. Kelner, Cezary Ziółkowski, Leszek Kachel Title: The empirical veriication o the location method based on the Doppler eect Proceedings: Proceedings o MIKON-8 Volume: 3 Pages: 755-758 Conerence:

More information

Qualcomm Research Dual-Cell HSDPA

Qualcomm Research Dual-Cell HSDPA Qualcomm Technologies, Inc. Qualcomm Research Dual-Cell HSDPA February 2015 Qualcomm Research is a division of Qualcomm Technologies, Inc. 1 Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. 5775

More information

Analysis of DCF with Heterogeneous Non-Saturated Nodes

Analysis of DCF with Heterogeneous Non-Saturated Nodes Analysis of 80.11 DCF with Heterogeneous Non-Saturated Nodes Hamed M. K. Alazemi Dept. of Computer Engineering Kuwait University Kuwait hamed@eng.kuniv.kw A. Margolis, J. Choi, R. Viayakumar, S. Roy Dept.

More information

LTE in Unlicensed Spectrum

LTE in Unlicensed Spectrum LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Generating Function Analysis of Wireless Networks and ARQ Systems

Generating Function Analysis of Wireless Networks and ARQ Systems Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical

More information

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

Analysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate

Analysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Analysis o Power Consumption o H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Bambang A.B. Sari, Panos Nasiopoulos and Victor C.M. eung Department o Electrical

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands

More information

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 23-22 (28) Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networs YU-LIANG KUO, ERIC HSIAO-KUANG WU + AND GEN-HUEY

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks 1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac

More information

Enhancing IEEE a/n with Dynamic Single-User OFDM Adaptation

Enhancing IEEE a/n with Dynamic Single-User OFDM Adaptation Enhancing IEEE 82.11a/n with Dynamic Single-User OFDM Adaptation James Gross a,, Marc Emmelmann b,, Oscar Puñal a,, Adam Wolisz b, a Mobile Network Performance Group, UMIC Research Centre, RWTH Aachen

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

A Novel Off-chip Capacitor-less CMOS LDO with Fast Transient Response

A Novel Off-chip Capacitor-less CMOS LDO with Fast Transient Response IOSR Journal o Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 11 (November. 2013), V3 PP 01-05 A Novel O-chip Capacitor-less CMOS LDO with Fast Transient Response Bo Yang 1, Shulin

More information

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems 1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,

More information

Spectrum allocation with beamforming antenna in heterogeneous overlaying networks

Spectrum allocation with beamforming antenna in heterogeneous overlaying networks 2st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Spectrum allocation with beamorming antenna in heterogeneous overlaying networks Sunheui Ryoo, Changhee Joo and

More information

Amplifiers. Department of Computer Science and Engineering

Amplifiers. Department of Computer Science and Engineering Department o Computer Science and Engineering 2--8 Power ampliiers and the use o pulse modulation Switching ampliiers, somewhat incorrectly named digital ampliiers, have been growing in popularity when

More information

Spectrum Sharing with Adjacent Channel Constraints

Spectrum Sharing with Adjacent Channel Constraints Spectrum Sharing with Adjacent Channel Constraints icholas Misiunas, Miroslava Raspopovic, Charles Thompson and Kavitha Chandra Center for Advanced Computation and Telecommunications Department of Electrical

More information

Multiple access techniques

Multiple access techniques Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ

More information

Estimating the Transmission Probability in Wireless Networks with Configuration Models

Estimating the Transmission Probability in Wireless Networks with Configuration Models Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)

More information

Max Covering Phasor Measurement Units Placement for Partial Power System Observability

Max Covering Phasor Measurement Units Placement for Partial Power System Observability Engineering Management Research; Vol. 2, No. 1; 2013 ISSN 1927-7318 E-ISSN 1927-7326 Published by Canadian Center o Science and Education Max Covering Phasor Measurement Units Placement or Partial Power

More information

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,

More information

Saturation Throughput Analysis for a Wireless Network with Multiple Channels

Saturation Throughput Analysis for a Wireless Network with Multiple Channels Saturation Throughput Analysis for a Wireless Network with Multiple Channels Wiktor Pronobis T-Labs Berlin TU-Berlin A thesis submitted for the degree of Bachelor of Science (B.Sc.) 05.03.2011 ii Contents

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks Interference Estimation in IEEE 82.11 Networks A KALMAN FILTER APPROACH FOR EVALUATING CONGESTION IN ERROR-PRONE LINKS ILENIA TINNIRELLO and GIUSEPPE BIANCHI The de facto standard for wireless Internet

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

Overexcitation protection function block description

Overexcitation protection function block description unction block description Document ID: PRELIMIARY VERSIO ser s manual version inormation Version Date Modiication Compiled by Preliminary 24.11.2009. Preliminary version, without technical inormation Petri

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Development of Outage Tolerant FSM Model for Fading Channels

Development of Outage Tolerant FSM Model for Fading Channels Development of Outage Tolerant FSM Model for Fading Channels Ms. Anjana Jain 1 P. D. Vyavahare 1 L. D. Arya 2 1 Department of Electronics and Telecomm. Engg., Shri G. S. Institute of Technology and Science,

More information

Time distributed update of the NLMS algorithm coefficients for Acoustic Echo Cancellers

Time distributed update of the NLMS algorithm coefficients for Acoustic Echo Cancellers Time distributed update o the NLMS algorithm coeicients or Acoustic Echo Cancellers Fotis E. Andritsopoulos, Yannis M. Mitsos, Christos N. Charopoulos, Gregory A. Doumenis, Constantin N. Papaodysseus Abstract

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

Chapter 6: Introduction to Digital Communication

Chapter 6: Introduction to Digital Communication 93 Chapter 6: Introduction to Digital Communication 6.1 Introduction In the context o this course, digital communications include systems where relatively high-requency analog carriers are modulated y

More information

Transmission Timing - a Control Approach to Distributed Uplink Scheduling in WCDMA

Transmission Timing - a Control Approach to Distributed Uplink Scheduling in WCDMA Transmission Timing - a Control Approach to Distributed Uplink Scheduling in WCDMA David Törnqvist, Erik Geijer Lundin, Fredrik Gunnarsson, Fredrik Gustasson Div. o Control and Communication, Linköping

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Optimal Placement of Phasor Measurement Units for State Estimation

Optimal Placement of Phasor Measurement Units for State Estimation PSERC Optimal Placement o Phasor Measurement Units or State Estimation Final Project Report Power Systems Engineering Research Center A National Science Foundation Industry/University Cooperative Research

More information