Multiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng

Size: px
Start display at page:

Download "Multiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng"

Transcription

1 Multiple MAC Protocols Selection Strategies Presented by Chen-Hsiang Feng

2 Outline Motivation and Goal Simulation Environment MAC Selection Strategies Conclusions

3 Motivation Today's devices have multiple PHY and MAC Ex. Cell phone: 3G, 4G, WiMax, Wi-Fi, Bluetooth, Infrared, USB... Each of them using independent PHY/MAC Personal computer Multiple Ethernet cards, Multiple Wi-Fi cards, 3G, USB... Each of them using independent PHY/MAC

4 Motivation -- 2 Communication conditions change dynamically, there is no definite good or bad for these PHY/MAC pairs.

5 Goal If we can freely select any of the PHY/MAC pairs to use at run time, what is the best selection strategy? Optimize Packet Success Rate

6 Outline Motivation and Goal Simulation Environment, Assumptions Methods Conclusions

7 System Model Can reach any neighbor using any MAC/PHY Currently only one node can select MAC Optimize packet success rate of that node

8 Traffic Model Poisson traffic is not realistic (no memory) Wide-Area Traffic: The Failure of Poisson Modeling (1995), by Vern Paxson, Sally Floyd If there is no memory, you can learn nothing more than λ

9 Traffic Model - 2 In general, there is relation of consecutive traffics in time. Short-range dependence (SRD) ACF of the form Long-range dependent (LRD) ACF of the form ρ k ~ e βk,β> 0 ρ k ~ k β =e β log k,β> 0 Definition: = E[ X t X t ] 2

10 Poisson vs. LRD Ex. for similar mean traffic

11 Generating LRD Traffic Modeling Video Traffic Using M G Input Processes: A Compromise Between Markovian and LRD Models (1998), by Marwan M. Krunz, Armand M. Makowski Use M/G/ input processes M for exponential inter-arrival time distribution (Poisson) G for general service time distribution distribution (arbitrary) for infinity number of servers The pdf of G can be derived from ACF k

12 Sigma = 214 A(1) =1 A(2) =2 A(3) =1 A(4) = R = t

13 Instantaneous Traffic

14 Average Traffic Load G Average traffic is the average of instantaneous traffic over a window period. (EX, 10 time instances)

15 Packet Success Rate Traffic Load G Throughput S Aloha :S= Ge G Slotted non persistent CSMA :S= age ag 1 e ag a p persistent CSMA :S= 1 e ag [ P s ' 0 P s 1 0 ] 1 e ag [a t 0 a t a] a 0 Packet Success Rate = S/G Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics (1983), by Leonard Kleinrock, Fouad, A. Tobagi

16 Measurement of PSR We assume MAC protocol can measure the previous slots' packet success rate The measurement is exact value + noise P s [s]= P s [ s] [s] ω[s] is Gaussian noise term with fixed variance σ ω2 = 0.09 in the emulation

17 Ref:

18 Measurement of PSR - 2 In practice we can count the number of packets (collision & success) during a window period, thus packet success rate.

19 Outline Motivation and Goal Emulation Environment MAC Selection Strategies Conclusions

20 Two MACs Setting Both Non-persistent CSMA Traffic Both long-range dependent (LRD)

21 Saturating Counter

22

23 Optimal Stopping Choosing a optimal stopping time of using a MAC to minimize the expected total cost The problem is to find a threshold V* that If x < V*, switch to next MAC If x >= V*, stay using the current MAC

24 Optimal Stopping - 2 The reward sequence is defined as Y 0 =,Y 1 = X 1 c,...,y n = X n c,...,y = Assumption X 1, X 2,... are observations of PSR iid with known distribution F(x) The real distribution of F(x) is intractable Assume F(x) ~ N(μ,σ 2 )

25 Optimal Stopping - 3 V* can be calculated from the optimality Equ. Where F is the CDF of Gaussian distribution N(μ,σ 2 ) Thus, Where Φ(x) is the standardized Gaussian CDF

26

27 Multi-armed Bandit Only one machine is operated at each time Machines that are not operated remain frozen Machines are independent Frozen machines contribute no reward

28 Multi-armed Bandit - 2 We model the state of each MAC with a Markov chain State i has reward K+1-i The smaller state represents higher success rate and thus higher reward

29 Multi-armed Bandit - 3 By calculating the expected reward of each machine from the current states, the optimal solution is the machine (MAC) with the highest expected reward. Extensions of the multiarmed bandit problem: The discounted case (1985), by P. Varaiya, J. Walrand, and C. Buyukkoc

30

31 Proactive MAC Selection Until now, we only use the PSR estimation of the chosen MAC What can we do if all MAC can update PSR estimation at every time slot?

32 New Bounds

33 Parallel Saturating Counter Each MAC is model by a separate saturating counter. All counters are updated at every time instance Choose the counter with best previous state as the current selected MAC

34

35 Kalman Filter Model the system using an AR(p) process u[n] ~ N(0,σ u2 ) is the state variance, and w[n] ~ N(0,σ w2 ) is the observation noise variance AR:Autoregressive

36 Kalman Filter - 2 We can rewrite the state equation in the form Ref: Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory (v. 1, p.426) by Steven M. Kay

37 The updating rules Kalman Filter - 3 Ref: Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory (v. 1, p.436), by Steven M. Kay

38

39 Traffic is Matter So far Kalman filter is the best This is only true for certain testing traffic. Kalman Filter state variance σ u 2 Small σ u2 filter out noise, large σ u2 track channel variation Can not do both things good at the same time if σ u2 is fixed

40 Example of traffic defeat Kalman filter Success Rate Last Best Perfect Knowledge 82 % Last Best 75 % Kalman Filter 73%

41 New State Space Equation The system is still modeled by u[n] ~ N(0,σ u2 [n]) is the state variance, and w[n] ~ N(0,σ w2 ) is the observation noise variance

42 Tracking σ u 2 We model the state variance as h[n]= h[n 1] u[n] y[n]= h[n] w [n] Where h[n] is the estimation of state variance σ u2, and Σ u [n] ~ N(0,η u2 ), where η u2 is the variance of σ u 2, given as 2 u= 2 u [ 1] 2 N Ref: Estimation with Applications to Tracking and Navigation by Yaakov Bar-Shalom, X. Rong Li, Thiagalingam Kirubarajan, chapter The variance of the sample mean and sample varinace, page 106.

43 Estimation The idea is, we use Kalman filter to track the variance σ u2 [n], and then use Particle (Kalman) filter to track the system state. Improved bayesian MIMO channel tracking for wireless communications : Incorporating a dynamical model, by HUBER Kris and HAYKIN Simon

44

45 Outline Motivation and Goal Emulation Environment MAC selection Methods Conclusions

46 Conclusion We investigated many MAC selection strategies under the cases that PSR estimations are (1)updated only at the chosen MAC, or (2)always updated for all MAC For (1), Multi-armed Bandit method gave good performance if right model is chosen For (2), Kalman Filter with varying σ u2 [n] gave good performance

47 Conclusion - 2 If computation power is limited, just choose the best MAC in previous slot. It also gives very good result.

48 Future Work Do simulation that multiple nodes can select MAC Currently we only select the best MAC Choose the best N MACs to increase throughput Sending redundant (overlapped ) date via N MACs to increase reliability.

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks

Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

TSIN01 Information Networks Lecture 9

TSIN01 Information Networks Lecture 9 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information

More information

Estimating the Transmission Probability in Wireless Networks with Configuration Models

Estimating the Transmission Probability in Wireless Networks with Configuration Models Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)

More information

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011

On Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011 On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

LTE in Unlicensed Spectrum

LTE in Unlicensed Spectrum LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer

Learning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

The Long Range Wide Area Network - LoraWAN

The Long Range Wide Area Network - LoraWAN Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks

Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme

Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands

More information

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks

Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

Cross-Layer Designs of Multichannel Reservation MAC Under Rayleigh Fading

Cross-Layer Designs of Multichannel Reservation MAC Under Rayleigh Fading 2054 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 8, AUGUST 2003 Cross-Layer Designs of Multichannel Reservation MAC Under Rayleigh Fading Atul Maharshi, Lang Tong, Senior Member, IEEE, and Ananthram

More information

Analyzing Split Channel Medium Access Control Schemes

Analyzing Split Channel Medium Access Control Schemes IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

Modeling load balancing in carrier aggregation mobile networks

Modeling load balancing in carrier aggregation mobile networks Modeling load balancing in carrier aggregation mobile networks R-M. Indre Joint work with F. Bénézit, S. E. El Ayoubi, A. Simonian IDEFIX Plenary Meeting, May 23 rd 2014, Avignon What is carrier aggregation?

More information

Lecture 3. Contents. Conflict free access

Lecture 3. Contents. Conflict free access Lecture 3 Conflict free access Contents Fixed resource allocation FDMA DMA Generalized DMA CDMA Dynamic resource allocation Reservation Packet scheduling 7..8 M/G/ Poisson arrival process Single server

More information

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks

A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu

More information

Some results on optimal estimation and control for lossy NCS. Luca Schenato

Some results on optimal estimation and control for lossy NCS. Luca Schenato Some results on optimal estimation and control for lossy NCS Luca Schenato Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures: adaptive space telescope Wireless Sensor Networks

More information

Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc Network

Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc Network Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc etwork Young An Kim 1, Choong Seon Hong 1 1 Department of Electronics and Information, Kyung Hee University, 1

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel

Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the

More information

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

Lectures 8 & 9. M/G/1 Queues

Lectures 8 & 9. M/G/1 Queues Lectures 8 & 9 M/G/1 Queues MIT Slide 1 M/G/1 QUEUE Poisson M/G/1 General independent Service times Poisson arrivals at rate λ Service time has arbitrary distribution with given E[X] and E[X 2 ] Service

More information

Coverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry

Coverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry Coverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry Neelakantan Nurani Krishnan, Gokul Sridharan, Ivan Seskar, Narayan Mandayam WINLAB, Rutgers University North Brunswick, NJ,

More information

Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks

Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Hussein Al-Zubaidy SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: hussein@sce.carleton.ca 21 August

More information

The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks

The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:

More information

Simulating Mobile Networks Tools and Models. Joachim Sachs

Simulating Mobile Networks Tools and Models. Joachim Sachs Simulating Mobile Networks Tools and Models Joachim Sachs Outline Types of Mobile Networks Performance Studies and Required Simulation Models Radio Link Performance Radio Network Performance Radio Protocol

More information

Transmission Scheduling in Capture-Based Wireless Networks

Transmission Scheduling in Capture-Based Wireless Networks ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor

Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor 2615 PAPER Special Section on Wide Band Systems Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor Wataru HORIE a) and Yukitoshi SANADA b), Members SUMMARY In this paper, a novel

More information

IN wireless communication networks, Medium Access Control

IN wireless communication networks, Medium Access Control IEEE TRANSACTIONS ON WIRELESS COMMNICATIONS, VOL. 5, NO. 5, MAY 6 967 Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas,

More information

Improved Voice/Data Traffic Performance of Cellular CDMA System

Improved Voice/Data Traffic Performance of Cellular CDMA System International Journal of Engineering and Technology Volume 4 No. 7, July, 014 Improved Voice/Data Traffic Performance of Cellular CDMA System Elechi Promise Department of Electrical Engineering, Rivers

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009

Dynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009 Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy

More information

Internet of Things Cognitive Radio Technologies

Internet of Things Cognitive Radio Technologies Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento

More information

Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization

Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization 1 Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization Yuxia Lin, Student Member, IEEE, and Vincent W.S. Wong, Senior Member, IEEE Abstract Wireless local area networks (WLANs have

More information

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

Link Models for Circuit Switching

Link Models for Circuit Switching Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can

More information

Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks

Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks Dapeng Wu Rohit Negi Abstract Providing Quality of Service(QoS) guarantees is important in the third generation (3G)

More information

ChSim A wireless channel simulator for OMNeT++

ChSim A wireless channel simulator for OMNeT++ ChSim A wireless channel simulator for OMNeT++ Simulation workshop TKN, TU Berlin September 08, 2006 Computer Networks Group Universität Paderborn Outline Introduction Example scenario, results & modeling

More information

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks

Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum

More information

Fairness and Delay in Heterogeneous Half- and Full-Duplex Wireless Networks

Fairness and Delay in Heterogeneous Half- and Full-Duplex Wireless Networks Fairness and Delay in Heterogeneous Half- and Full-Duplex Wireless Networks Tingjun Chen *, Jelena Diakonikolas, Javad Ghaderi *, and Gil Zussman * * Electrical Engineering, Columbia University Simons

More information

How user throughput depends on the traffic demand in large cellular networks

How user throughput depends on the traffic demand in large cellular networks How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang Wireless Communication: Concepts, Techniques, and Models Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Digital communication over radio channels Channel capacity MIMO: diversity and parallel channels

More information

NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS. Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct.

NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS. Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct. NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct. 2011 Outline 2 Introduction Energy Saving at the Network Level The

More information

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents

Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,

More information

Analysis of DCF with Heterogeneous Non-Saturated Nodes

Analysis of DCF with Heterogeneous Non-Saturated Nodes Analysis of 80.11 DCF with Heterogeneous Non-Saturated Nodes Hamed M. K. Alazemi Dept. of Computer Engineering Kuwait University Kuwait hamed@eng.kuniv.kw A. Margolis, J. Choi, R. Viayakumar, S. Roy Dept.

More information

Efficiency and detectability of random reactive jamming in wireless networks

Efficiency and detectability of random reactive jamming in wireless networks Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering

More information

Wireless communications: from simple stochastic geometry models to practice III Capacity

Wireless communications: from simple stochastic geometry models to practice III Capacity Wireless communications: from simple stochastic geometry models to practice III Capacity B. Błaszczyszyn Inria/ENS Workshop on Probabilistic Methods in Telecommunication WIAS Berlin, November 14 16, 2016

More information

Multiple Access Methods: Delay and Throughput

Multiple Access Methods: Delay and Throughput doc: IEEE P802.11 91111 Multiple Access Methods: Delay and Throughput By JONATHON Y.C. CHEAH The push to adopt a suitable overlaying access protocol for the Indoor Wireless LAN has seen an increase in

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,

Joint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich, Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

Downlink Erlang Capacity of Cellular OFDMA

Downlink Erlang Capacity of Cellular OFDMA Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,

More information

Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission

Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission 1 Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission Muhammad Ismail, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, an energy management sub-system

More information

Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence

Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Vanlin Sathya, Morteza Mehrnoush, Monisha Ghosh, and Sumit Roy University of Chicago, Illinois, USA. University of Washington, Seattle, USA.

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Queuing analysis of simple FEC schemes for Voice over IP

Queuing analysis of simple FEC schemes for Voice over IP Queuing analysis of simple FEC schemes for Voice over IP Eitan Altman Chadi Barakat Victor Ramos INRIA - Sophia Antipolis, France IEEE INFOCOM 200 Wednesday, April 25, 200 Anchorage, Alaska Outline Audio

More information

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University

Modeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Modeling Infrared LANs in GloMoSim Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Talk Outline Motivation and Applications for Infrared Wireless

More information

Performance of wireless Communication Systems with imperfect CSI

Performance of wireless Communication Systems with imperfect CSI Pedagogy lecture Performance of wireless Communication Systems with imperfect CSI Yogesh Trivedi Associate Prof. Department of Electronics and Communication Engineering Institute of Technology Nirma University

More information

4G Mobile Broadband LTE

4G Mobile Broadband LTE 4G Mobile Broadband LTE Part I Dr Stefan Parkvall Principal Researcher Ericson Research Data overtaking Voice Data is overtaking voice......but previous cellular systems designed primarily for voice Rapid

More information

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance 1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung

Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung December 12, 2013 Presented at IEEE GLOBECOM 2013, Atlanta, GA Outline Introduction Competing Cognitive

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design

Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design Xu Du, Yin Sun, Ness Shroff, Ashutosh Sabharwal arxiv:902.07676v [cs.it] 20 Feb 209 Abstract One fundamental challenge in 5G URLLC

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.

06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A. Sharing the Medium Peter Rounce (P.Rounce@cs.ucl.ac.uk) Room 6.18 Notes Courtesy of Graham Knight 2011-05 P.A.Rounce 2011-05-1 Sharing a link Introduction TDM, FDM - fixed allocations Statistical multiplexing

More information

Delay and Throughput in Random Access Wireless Mesh Networks

Delay and Throughput in Random Access Wireless Mesh Networks Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY 280 bisnin@rpi.edu, abouzeid@ecse.rpi.edu Abstract Wireless mesh

More information

Interference Analysis for Highly Directional 60-GHz Mesh Networks: The Case for Rethinking Medium Access Control

Interference Analysis for Highly Directional 60-GHz Mesh Networks: The Case for Rethinking Medium Access Control IEEE/ACM TRANSACTIONS ON NETWORKING 1 Interference Analysis for Highly Directional 60-GHz Mesh Networks: The Case for Rethinking Medium Access Control Sumit Singh, Member, IEEE, Raghuraman Mudumbai, Member,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Exploiting Peer-to-Peer State Exchange for Distributed Medium Access Control

Exploiting Peer-to-Peer State Exchange for Distributed Medium Access Control Exploiting Peer-to-Peer State Exchange for Distributed Medium Access Control Ka Hung Hui, Tianyi Li, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern

More information

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

Decentralised Learning MACs for Collision-free Access in WLANs

Decentralised Learning MACs for Collision-free Access in WLANs 1 Decentralised Learning MACs for Collision-free Access in WLANs Minyu Fang, David Malone, Ken R. Duffy, and Douglas J. Leith arxiv:1009.436v2 [cs.ni] 2 Mar 2011 Abstract By combining the features of CSMA

More information

Automatic power/channel management in Wi-Fi networks

Automatic power/channel management in Wi-Fi networks Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance

More information

Saturation Throughput Analysis for a Wireless Network with Multiple Channels

Saturation Throughput Analysis for a Wireless Network with Multiple Channels Saturation Throughput Analysis for a Wireless Network with Multiple Channels Wiktor Pronobis T-Labs Berlin TU-Berlin A thesis submitted for the degree of Bachelor of Science (B.Sc.) 05.03.2011 ii Contents

More information

A random access protocol assisted by retransmission diversity and energy reuse capabilities

A random access protocol assisted by retransmission diversity and energy reuse capabilities A random access protocol assisted by retransmission diversity and energy reuse capabilities Ramiro Sámano Robles Congresso Portugues da URSI 2014. 28-Nov-2014 Instituto de telecomunicações, Aveiro, Portugal

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,

More information

Utility-optimal Cross-layer Design for WLAN with MIMO Channels

Utility-optimal Cross-layer Design for WLAN with MIMO Channels Utility-optimal Cross-layer Design for WLAN with MIMO Channels Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia, Vancouver, BC, Canada,

More information

Real-time Distributed MIMO Systems. Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi

Real-time Distributed MIMO Systems. Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi Real-time Distributed MIMO Systems Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi Dense Wireless Networks Stadiums Concerts Airports Malls Interference Limits Wireless Throughput APs

More information

Jamming Wireless Networks: Attack and Defense Strategies

Jamming Wireless Networks: Attack and Defense Strategies Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space

Overview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012. Zhu, X., Doufexi, A., & Koçak, T. (2012). A performance enhancement for 60 GHz wireless indoor applications. In ICCE 2012, Las Vegas Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/ICCE.2012.6161865

More information