Multiple MAC Protocols Selection Strategies. Presented by Chen-Hsiang Feng
|
|
- Gillian Porter
- 5 years ago
- Views:
Transcription
1 Multiple MAC Protocols Selection Strategies Presented by Chen-Hsiang Feng
2 Outline Motivation and Goal Simulation Environment MAC Selection Strategies Conclusions
3 Motivation Today's devices have multiple PHY and MAC Ex. Cell phone: 3G, 4G, WiMax, Wi-Fi, Bluetooth, Infrared, USB... Each of them using independent PHY/MAC Personal computer Multiple Ethernet cards, Multiple Wi-Fi cards, 3G, USB... Each of them using independent PHY/MAC
4 Motivation -- 2 Communication conditions change dynamically, there is no definite good or bad for these PHY/MAC pairs.
5 Goal If we can freely select any of the PHY/MAC pairs to use at run time, what is the best selection strategy? Optimize Packet Success Rate
6 Outline Motivation and Goal Simulation Environment, Assumptions Methods Conclusions
7 System Model Can reach any neighbor using any MAC/PHY Currently only one node can select MAC Optimize packet success rate of that node
8 Traffic Model Poisson traffic is not realistic (no memory) Wide-Area Traffic: The Failure of Poisson Modeling (1995), by Vern Paxson, Sally Floyd If there is no memory, you can learn nothing more than λ
9 Traffic Model - 2 In general, there is relation of consecutive traffics in time. Short-range dependence (SRD) ACF of the form Long-range dependent (LRD) ACF of the form ρ k ~ e βk,β> 0 ρ k ~ k β =e β log k,β> 0 Definition: = E[ X t X t ] 2
10 Poisson vs. LRD Ex. for similar mean traffic
11 Generating LRD Traffic Modeling Video Traffic Using M G Input Processes: A Compromise Between Markovian and LRD Models (1998), by Marwan M. Krunz, Armand M. Makowski Use M/G/ input processes M for exponential inter-arrival time distribution (Poisson) G for general service time distribution distribution (arbitrary) for infinity number of servers The pdf of G can be derived from ACF k
12 Sigma = 214 A(1) =1 A(2) =2 A(3) =1 A(4) = R = t
13 Instantaneous Traffic
14 Average Traffic Load G Average traffic is the average of instantaneous traffic over a window period. (EX, 10 time instances)
15 Packet Success Rate Traffic Load G Throughput S Aloha :S= Ge G Slotted non persistent CSMA :S= age ag 1 e ag a p persistent CSMA :S= 1 e ag [ P s ' 0 P s 1 0 ] 1 e ag [a t 0 a t a] a 0 Packet Success Rate = S/G Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics (1983), by Leonard Kleinrock, Fouad, A. Tobagi
16 Measurement of PSR We assume MAC protocol can measure the previous slots' packet success rate The measurement is exact value + noise P s [s]= P s [ s] [s] ω[s] is Gaussian noise term with fixed variance σ ω2 = 0.09 in the emulation
17 Ref:
18 Measurement of PSR - 2 In practice we can count the number of packets (collision & success) during a window period, thus packet success rate.
19 Outline Motivation and Goal Emulation Environment MAC Selection Strategies Conclusions
20 Two MACs Setting Both Non-persistent CSMA Traffic Both long-range dependent (LRD)
21 Saturating Counter
22
23 Optimal Stopping Choosing a optimal stopping time of using a MAC to minimize the expected total cost The problem is to find a threshold V* that If x < V*, switch to next MAC If x >= V*, stay using the current MAC
24 Optimal Stopping - 2 The reward sequence is defined as Y 0 =,Y 1 = X 1 c,...,y n = X n c,...,y = Assumption X 1, X 2,... are observations of PSR iid with known distribution F(x) The real distribution of F(x) is intractable Assume F(x) ~ N(μ,σ 2 )
25 Optimal Stopping - 3 V* can be calculated from the optimality Equ. Where F is the CDF of Gaussian distribution N(μ,σ 2 ) Thus, Where Φ(x) is the standardized Gaussian CDF
26
27 Multi-armed Bandit Only one machine is operated at each time Machines that are not operated remain frozen Machines are independent Frozen machines contribute no reward
28 Multi-armed Bandit - 2 We model the state of each MAC with a Markov chain State i has reward K+1-i The smaller state represents higher success rate and thus higher reward
29 Multi-armed Bandit - 3 By calculating the expected reward of each machine from the current states, the optimal solution is the machine (MAC) with the highest expected reward. Extensions of the multiarmed bandit problem: The discounted case (1985), by P. Varaiya, J. Walrand, and C. Buyukkoc
30
31 Proactive MAC Selection Until now, we only use the PSR estimation of the chosen MAC What can we do if all MAC can update PSR estimation at every time slot?
32 New Bounds
33 Parallel Saturating Counter Each MAC is model by a separate saturating counter. All counters are updated at every time instance Choose the counter with best previous state as the current selected MAC
34
35 Kalman Filter Model the system using an AR(p) process u[n] ~ N(0,σ u2 ) is the state variance, and w[n] ~ N(0,σ w2 ) is the observation noise variance AR:Autoregressive
36 Kalman Filter - 2 We can rewrite the state equation in the form Ref: Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory (v. 1, p.426) by Steven M. Kay
37 The updating rules Kalman Filter - 3 Ref: Fundamentals of Statistical Signal Processing, Volume I: Estimation Theory (v. 1, p.436), by Steven M. Kay
38
39 Traffic is Matter So far Kalman filter is the best This is only true for certain testing traffic. Kalman Filter state variance σ u 2 Small σ u2 filter out noise, large σ u2 track channel variation Can not do both things good at the same time if σ u2 is fixed
40 Example of traffic defeat Kalman filter Success Rate Last Best Perfect Knowledge 82 % Last Best 75 % Kalman Filter 73%
41 New State Space Equation The system is still modeled by u[n] ~ N(0,σ u2 [n]) is the state variance, and w[n] ~ N(0,σ w2 ) is the observation noise variance
42 Tracking σ u 2 We model the state variance as h[n]= h[n 1] u[n] y[n]= h[n] w [n] Where h[n] is the estimation of state variance σ u2, and Σ u [n] ~ N(0,η u2 ), where η u2 is the variance of σ u 2, given as 2 u= 2 u [ 1] 2 N Ref: Estimation with Applications to Tracking and Navigation by Yaakov Bar-Shalom, X. Rong Li, Thiagalingam Kirubarajan, chapter The variance of the sample mean and sample varinace, page 106.
43 Estimation The idea is, we use Kalman filter to track the variance σ u2 [n], and then use Particle (Kalman) filter to track the system state. Improved bayesian MIMO channel tracking for wireless communications : Incorporating a dynamical model, by HUBER Kris and HAYKIN Simon
44
45 Outline Motivation and Goal Emulation Environment MAC selection Methods Conclusions
46 Conclusion We investigated many MAC selection strategies under the cases that PSR estimations are (1)updated only at the chosen MAC, or (2)always updated for all MAC For (1), Multi-armed Bandit method gave good performance if right model is chosen For (2), Kalman Filter with varying σ u2 [n] gave good performance
47 Conclusion - 2 If computation power is limited, just choose the best MAC in previous slot. It also gives very good result.
48 Future Work Do simulation that multiple nodes can select MAC Currently we only select the best MAC Choose the best N MACs to increase throughput Sending redundant (overlapped ) date via N MACs to increase reliability.
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III
ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationEstimating the Transmission Probability in Wireless Networks with Configuration Models
Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)
More informationOn Flow-Aware CSMA. in Multi-Channel Wireless Networks. Mathieu Feuillet. Joint work with Thomas Bonald CISS 2011
On Flow-Aware CSMA in Multi-Channel Wireless Networks Mathieu Feuillet Joint work with Thomas Bonald CISS 2011 Outline Model Background Standard CSMA Flow-aware CSMA Conclusion Outline Model Background
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationLearning via Delayed Knowledge A Case of Jamming. SaiDhiraj Amuru and R. Michael Buehrer
Learning via Delayed Knowledge A Case of Jamming SaiDhiraj Amuru and R. Michael Buehrer 1 Why do we need an Intelligent Jammer? Dynamic environment conditions in electronic warfare scenarios failure of
More information1 Interference Cancellation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.
More informationThe Long Range Wide Area Network - LoraWAN
Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT
More informationThroughput-optimal number of relays in delaybounded multi-hop ALOHA networks
Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationCalculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme
Calculation of the Spatial Reservation Area for the RTS/CTS Multiple Access Scheme Chin Keong Ho Eindhoven University of Technology Elect. Eng. Depart., SPS Group PO Box 513, 56 MB Eindhoven The Netherlands
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationFPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL
U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,
More informationCross-Layer Designs of Multichannel Reservation MAC Under Rayleigh Fading
2054 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 8, AUGUST 2003 Cross-Layer Designs of Multichannel Reservation MAC Under Rayleigh Fading Atul Maharshi, Lang Tong, Senior Member, IEEE, and Ananthram
More informationAnalyzing Split Channel Medium Access Control Schemes
IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationModeling load balancing in carrier aggregation mobile networks
Modeling load balancing in carrier aggregation mobile networks R-M. Indre Joint work with F. Bénézit, S. E. El Ayoubi, A. Simonian IDEFIX Plenary Meeting, May 23 rd 2014, Avignon What is carrier aggregation?
More informationLecture 3. Contents. Conflict free access
Lecture 3 Conflict free access Contents Fixed resource allocation FDMA DMA Generalized DMA CDMA Dynamic resource allocation Reservation Packet scheduling 7..8 M/G/ Poisson arrival process Single server
More informationA Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks
A Backlog-Based CSMA Mechanism to Achieve Fairness and Throughput-Optimality in Multihop Wireless Networks Peter Marbach, and Atilla Eryilmaz Dept. of Computer Science, University of Toronto Email: marbach@cs.toronto.edu
More informationSome results on optimal estimation and control for lossy NCS. Luca Schenato
Some results on optimal estimation and control for lossy NCS Luca Schenato Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures: adaptive space telescope Wireless Sensor Networks
More informationAutonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc Network
Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc etwork Young An Kim 1, Choong Seon Hong 1 1 Department of Electronics and Information, Kyung Hee University, 1
More informationOutline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review
EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationChapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel
Chapter 2 On the Spectrum Handoff for Cognitive Radio Ad Hoc Networks Without Common Control Channel Yi Song and Jiang Xie Abstract Cognitive radio (CR) technology is a promising solution to enhance the
More informationChapter 2 Overview. Duplexing, Multiple Access - 1 -
Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3
More informationLectures 8 & 9. M/G/1 Queues
Lectures 8 & 9 M/G/1 Queues MIT Slide 1 M/G/1 QUEUE Poisson M/G/1 General independent Service times Poisson arrivals at rate λ Service time has arbitrary distribution with given E[X] and E[X 2 ] Service
More informationCoverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry
Coverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry Neelakantan Nurani Krishnan, Gokul Sridharan, Ivan Seskar, Narayan Mandayam WINLAB, Rutgers University North Brunswick, NJ,
More informationDownlink Scheduler Optimization in High-Speed Downlink Packet Access Networks
Downlink Scheduler Optimization in High-Speed Downlink Packet Access Networks Hussein Al-Zubaidy SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: hussein@sce.carleton.ca 21 August
More informationThe Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks
The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:
More informationSimulating Mobile Networks Tools and Models. Joachim Sachs
Simulating Mobile Networks Tools and Models Joachim Sachs Outline Types of Mobile Networks Performance Studies and Required Simulation Models Radio Link Performance Radio Network Performance Radio Protocol
More informationTransmission Scheduling in Capture-Based Wireless Networks
ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationNovel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor
2615 PAPER Special Section on Wide Band Systems Novel CSMA Scheme for DS-UWB Ad-hoc Network with Variable Spreading Factor Wataru HORIE a) and Yukitoshi SANADA b), Members SUMMARY In this paper, a novel
More informationIN wireless communication networks, Medium Access Control
IEEE TRANSACTIONS ON WIRELESS COMMNICATIONS, VOL. 5, NO. 5, MAY 6 967 Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas,
More informationImproved Voice/Data Traffic Performance of Cellular CDMA System
International Journal of Engineering and Technology Volume 4 No. 7, July, 014 Improved Voice/Data Traffic Performance of Cellular CDMA System Elechi Promise Department of Electrical Engineering, Rivers
More informationStability Analysis for Network Coded Multicast Cell with Opportunistic Relay
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast
More informationDynamic Spectrum Access in Cognitive Radio Networks. Xiaoying Gan 09/17/2009
Dynamic Spectrum Access in Cognitive Radio Networks Xiaoying Gan xgan@ucsd.edu 09/17/2009 Outline Introduction Cognitive Radio Framework MAC sensing Spectrum Occupancy Model Sensing policy Access policy
More informationInternet of Things Cognitive Radio Technologies
Internet of Things Cognitive Radio Technologies Torino, 29 aprile 2010 Roberto GARELLO, Politecnico di Torino, Italy Speaker: Roberto GARELLO, Ph.D. Associate Professor in Communication Engineering Dipartimento
More informationCross-layer Design of MIMO-enabled WLANs with Network Utility Maximization
1 Cross-layer Design of MIMO-enabled WLANs with Network Utility Maximization Yuxia Lin, Student Member, IEEE, and Vincent W.S. Wong, Senior Member, IEEE Abstract Wireless local area networks (WLANs have
More informationMulti-user Space Time Scheduling for Wireless Systems with Multiple Antenna
Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationLink Models for Circuit Switching
Link Models for Circuit Switching The basis of traffic engineering for telecommunication networks is the Erlang loss function. It basically allows us to determine the amount of telephone traffic that can
More informationPower Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks
Power Control and Scheduling for Guaranteeing Quality of Service in Cellular Networks Dapeng Wu Rohit Negi Abstract Providing Quality of Service(QoS) guarantees is important in the third generation (3G)
More informationChSim A wireless channel simulator for OMNeT++
ChSim A wireless channel simulator for OMNeT++ Simulation workshop TKN, TU Berlin September 08, 2006 Computer Networks Group Universität Paderborn Outline Introduction Example scenario, results & modeling
More informationCarrier Sensing based Multiple Access Protocols for Cognitive Radio Networks
Carrier Sensing based Multiple Access Protocols for Cognitive Radio Networks Shao-Yu Lien, Chih-Cheng Tseng, and Kwang-Cheng Chen Abstract Cognitive radio (CR) dynamically accessing inactive radio spectrum
More informationFairness and Delay in Heterogeneous Half- and Full-Duplex Wireless Networks
Fairness and Delay in Heterogeneous Half- and Full-Duplex Wireless Networks Tingjun Chen *, Jelena Diakonikolas, Javad Ghaderi *, and Gil Zussman * * Electrical Engineering, Columbia University Simons
More informationHow user throughput depends on the traffic demand in large cellular networks
How user throughput depends on the traffic demand in large cellular networks B. Błaszczyszyn Inria/ENS based on a joint work with M. Jovanovic and M. K. Karray (Orange Labs, Paris) 1st Symposium on Spatial
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationWireless Communication: Concepts, Techniques, and Models. Hongwei Zhang
Wireless Communication: Concepts, Techniques, and Models Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Digital communication over radio channels Channel capacity MIMO: diversity and parallel channels
More informationNETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS. Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct.
NETWORK COOPERATION FOR ENERGY SAVING IN GREEN RADIO COMMUNICATIONS Muhammad Ismail and Weihua Zhuang IEEE Wireless Communications Oct. 2011 Outline 2 Introduction Energy Saving at the Network Level The
More informationHedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents Walid Saad, Zhu Han, Tamer Basar, Me rouane Debbah, and Are Hjørungnes. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10,
More informationAnalysis of DCF with Heterogeneous Non-Saturated Nodes
Analysis of 80.11 DCF with Heterogeneous Non-Saturated Nodes Hamed M. K. Alazemi Dept. of Computer Engineering Kuwait University Kuwait hamed@eng.kuniv.kw A. Margolis, J. Choi, R. Viayakumar, S. Roy Dept.
More informationEfficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationWireless communications: from simple stochastic geometry models to practice III Capacity
Wireless communications: from simple stochastic geometry models to practice III Capacity B. Błaszczyszyn Inria/ENS Workshop on Probabilistic Methods in Telecommunication WIAS Berlin, November 14 16, 2016
More informationMultiple Access Methods: Delay and Throughput
doc: IEEE P802.11 91111 Multiple Access Methods: Delay and Throughput By JONATHON Y.C. CHEAH The push to adopt a suitable overlaying access protocol for the Indoor Wireless LAN has seen an increase in
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationarxiv: v1 [cs.it] 21 Feb 2015
1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationDownlink Erlang Capacity of Cellular OFDMA
Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationMobile Terminal Energy Management for Sustainable Multi-homing Video Transmission
1 Mobile Terminal Energy Management for Sustainable Multi-homing Video Transmission Muhammad Ismail, Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, an energy management sub-system
More informationAnalysis of CSAT performance in Wi-Fi and LTE-U Coexistence
Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Vanlin Sathya, Morteza Mehrnoush, Monisha Ghosh, and Sumit Roy University of Chicago, Illinois, USA. University of Washington, Seattle, USA.
More informationMultiple Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationQueuing analysis of simple FEC schemes for Voice over IP
Queuing analysis of simple FEC schemes for Voice over IP Eitan Altman Chadi Barakat Victor Ramos INRIA - Sophia Antipolis, France IEEE INFOCOM 200 Wednesday, April 25, 200 Anchorage, Alaska Outline Audio
More informationModeling Infrared LANs in GloMoSim. Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University
Modeling Infrared LANs in GloMoSim Sarah M. Carroll and Jeffrey B. Carruthers Dept. of Electrical and Computer Engineering Boston University Talk Outline Motivation and Applications for Infrared Wireless
More informationPerformance of wireless Communication Systems with imperfect CSI
Pedagogy lecture Performance of wireless Communication Systems with imperfect CSI Yogesh Trivedi Associate Prof. Department of Electronics and Communication Engineering Institute of Technology Nirma University
More information4G Mobile Broadband LTE
4G Mobile Broadband LTE Part I Dr Stefan Parkvall Principal Researcher Ericson Research Data overtaking Voice Data is overtaking voice......but previous cellular systems designed primarily for voice Rapid
More informationMIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationOptimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung
Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung December 12, 2013 Presented at IEEE GLOBECOM 2013, Atlanta, GA Outline Introduction Competing Cognitive
More informationEnergy-Efficient Data Management for Sensor Networks
Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell
More informationBalance Queueing and Retransmission: Latency-Optimal Massive MIMO Design
Balance Queueing and Retransmission: Latency-Optimal Massive MIMO Design Xu Du, Yin Sun, Ness Shroff, Ashutosh Sabharwal arxiv:902.07676v [cs.it] 20 Feb 209 Abstract One fundamental challenge in 5G URLLC
More information2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
More information06/02/2006. Sharing the Medium. Peter Rounce Room Notes Courtesy of Graham Knight P.A.
Sharing the Medium Peter Rounce (P.Rounce@cs.ucl.ac.uk) Room 6.18 Notes Courtesy of Graham Knight 2011-05 P.A.Rounce 2011-05-1 Sharing a link Introduction TDM, FDM - fixed allocations Statistical multiplexing
More informationDelay and Throughput in Random Access Wireless Mesh Networks
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY 280 bisnin@rpi.edu, abouzeid@ecse.rpi.edu Abstract Wireless mesh
More informationInterference Analysis for Highly Directional 60-GHz Mesh Networks: The Case for Rethinking Medium Access Control
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Interference Analysis for Highly Directional 60-GHz Mesh Networks: The Case for Rethinking Medium Access Control Sumit Singh, Member, IEEE, Raghuraman Mudumbai, Member,
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification
Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,
More informationExploiting Peer-to-Peer State Exchange for Distributed Medium Access Control
Exploiting Peer-to-Peer State Exchange for Distributed Medium Access Control Ka Hung Hui, Tianyi Li, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationChannel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service
Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction
More informationDecentralised Learning MACs for Collision-free Access in WLANs
1 Decentralised Learning MACs for Collision-free Access in WLANs Minyu Fang, David Malone, Ken R. Duffy, and Douglas J. Leith arxiv:1009.436v2 [cs.ni] 2 Mar 2011 Abstract By combining the features of CSMA
More informationAutomatic power/channel management in Wi-Fi networks
Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance
More informationSaturation Throughput Analysis for a Wireless Network with Multiple Channels
Saturation Throughput Analysis for a Wireless Network with Multiple Channels Wiktor Pronobis T-Labs Berlin TU-Berlin A thesis submitted for the degree of Bachelor of Science (B.Sc.) 05.03.2011 ii Contents
More informationA random access protocol assisted by retransmission diversity and energy reuse capabilities
A random access protocol assisted by retransmission diversity and energy reuse capabilities Ramiro Sámano Robles Congresso Portugues da URSI 2014. 28-Nov-2014 Instituto de telecomunicações, Aveiro, Portugal
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,
More informationUtility-optimal Cross-layer Design for WLAN with MIMO Channels
Utility-optimal Cross-layer Design for WLAN with MIMO Channels Yuxia Lin and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia, Vancouver, BC, Canada,
More informationReal-time Distributed MIMO Systems. Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi
Real-time Distributed MIMO Systems Hariharan Rahul Ezzeldin Hamed, Mohammed A. Abdelghany, Dina Katabi Dense Wireless Networks Stadiums Concerts Airports Malls Interference Limits Wireless Throughput APs
More informationJamming Wireless Networks: Attack and Defense Strategies
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationOverview. Cognitive Radio: Definitions. Cognitive Radio. Multidimensional Spectrum Awareness: Radio Space
Overview A Survey of Spectrum Sensing Algorithms for Cognitive Radio Applications Tevfik Yucek and Huseyin Arslan Cognitive Radio Multidimensional Spectrum Awareness Challenges Spectrum Sensing Methods
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012.
Zhu, X., Doufexi, A., & Koçak, T. (2012). A performance enhancement for 60 GHz wireless indoor applications. In ICCE 2012, Las Vegas Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/ICCE.2012.6161865
More information