Virtual MISO Triggers in Wi-Fi-like Networks
|
|
- Cory Armstrong
- 5 years ago
- Views:
Transcription
1 Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April,
2 Signal Outage in Fading Channels Thursday, April,
3 Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time Thursday, April,
4 Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time x Power x Thresh S N time Thursday, April,
5 Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time x Power x Thresh S N time How do we exploit this independence among different paths? Thursday, April,
6 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X Symbol Period Symbol Period Thursday, April,
7 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S Symbol Period Symbol Period Thursday, April,
8 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S TX S X S S Symbol Period Symbol Period Thursday, April,
9 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX S S X S S Symbol Period Symbol Period Thursday, April,
10 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S Symbol Period Symbol Period Thursday, April,
11 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S S* -S* Symbol Period Symbol Period Thursday, April,
12 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S* TX -S* X S S Symbol Period Symbol Period S* -S* Thursday, April,
13 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S* TX -S* X S S Symbol Period Symbol Period S* -S* Thursday, April,
14 For maximal transmit diversity gains, we require antenna separation difficult to achieve in mobile devices Thursday, April,
15 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X Thursday, April,
16 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX TX X Thursday, April,
17 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX TX X Thursday, April,
18 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,
19 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,
20 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,
21 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X Use Alamouti Scheme TX Thursday, April,
22 vmiso Protocol Design Challenges Triggering vmiso - Establish a criteria and mechanism used to trigger vmiso transmissions, i.e., how and when? Cooperator/elay Selection - Select a neighboring user as cooperator Thursday, April, 7
23 vmiso Protocol Design Challenges Triggering vmiso - Establish a criteria and mechanism used to trigger vmiso transmissions, i.e., how and when? Cooperator/elay Selection - Select a neighboring user as cooperator Thursday, April, 8
24 Objective To develop a comprehensive understanding of vmiso in the context of WLANs: Gains for vmiso flow Implications on network graph due to increased spatial footprint Thursday, April, 9
25 Objective To develop a comprehensive understanding of vmiso in the context of WLANs: Gains for vmiso flow Implications on network graph due to increased spatial footprint In particular, to provide the understanding needed to design trigger policies that maximize throughput performance gains trigger policies when should the cooperator be used? 9 Thursday, April,
26 vmiso Triggers Thursday, April,
27 vmiso Triggers. Method employed to invoke a vmiso transmission: Thursday, April,
28 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission Thursday, April,
29 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel Thursday, April,
30 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,
31 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,
32 eactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
33 eactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
34 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
35 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
36 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
37 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
38 eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
39 eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
40 eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
41 eactive S S Data x e-tx CN C x x x NACK Tx x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,
42 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,
43 Proactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,
44 Proactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,
45 Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,
46 Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,
47 Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,
48 Proactive S S Tx e-tx NC C x x Tx x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,
49 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel We will show results only for eactive. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,
50 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel We will show results only for eactive. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,
51 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Fully Connected Identify when the cooperator should or should not be used Thursday, April, 7
52 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Fully Connected Identify when the cooperator should or should not be used Thursday, April, 8
53 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8
54 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8
55 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8
56 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8
57 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9
58 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9
59 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9
60 Trigger Policies in WLANs Interference ange Cooperator Footprint Intended Data Tx F S Low High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9
61 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,
62 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S Collisions F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,
63 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S Collisions C F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,
64 Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,
65 Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,
66 Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,
67 Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,
68 Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power More Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,
69 Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power More Fewer Losses Lower vmiso Gains vmiso S C Higher Identify when the cooperator should or should not be used Thursday, April,
70 Evaluation oadmap 8 System Implementation Comprehensive vmiso Evaluation 8 Atomic Scenarios (Fundamental Small- Scale Topologies) Large-Scale Topologies (up to flows) Monday, December, Mbps vmiso Mbps Direct Tx. Mbps vmiso Mbps Direct Tx. Mbps vmiso 8Mbps Direct Tx. 8Mbps vmiso Number of Cooperative Number Packets of (x) Cooperative Pkts. (x) BPSK QPSK QAM QAM BPSK Mbps QPSK Mbps QAM Mbps QAM 8Mbps BPSK No Coop BPSK BPSK Coop Mbps Direct Tx. QPSK BPSK Mbps QPSK No Coop 8 QAM Mbps vmiso 8 QPSK Coop QAM QPSK Mbps 7 QAM No Coop Mbps Direct Tx. QAM Coop QAM 7 87 Mbps QAM Mbps No Coop vmiso QAM Coop QAM 8Mbps Mbps Direct Tx. No Direct Cooperation Tx. No Direct Cooperation Tx. Mbps Cooperation Cooperation vmiso NvMISO NvMISO 8Mbps Direct Tx Mbps vmiso 8 Perfect NACK NvMISO 8 NvMISO 8 7 Direct Tx Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Attenuation (db) F F (b) Attenuation (db) Attenuation (db) Flow Experiment Flow Experiment Flow Simulation Flow Simulation Flow -8 Experiment Flow -8 Experiment -8 Flow Simulation -8 Flow Simulation Flow Flow Flow Flow Flow F Flow Flow Flow F Experiment Simulation Experiment Simulation Attenuation (db) Attenuation (db) (a) Hidden Terminal (b) Information Asymmetry (a) (b) Throughput (Mbps) Throughput (Mbps) Throughput (Mbps) Monday, December, Throughput (kbps) Throughput (kbps) Tuesday, February 8, Throughput (Mbps) X Position (meters) X Position (meters) X Position (meters) X Position (meters) c) 7 Independent Flows 7 - Flow d) Independent 7 Flows - 8 Flow 8 Throughput Gain/Loss (%) Throughput Gain/Loss (%) Attenuation Attenuation (db) Wednesday, March 7, (db) Throughput (kbps) Throughput (kbps) Y Position (meters) Y Position (meters) 8 Number of Cooperative Pkts. (x) Number of of Cooperative Packets (x) Number of Cooperative Packets (x) X Position (meters) X Position (meters) a) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at d=7m (%) (%) 8 8 F F Node Index Y Position (meters) Y Position (meters) X Position (meters) X Position (meters) b) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at (%) d=7m (%) 8 8 F F Thursday, April,
71 8 Evaluation oadmap System Implementation Comprehensive vmiso Evaluation 8 Atomic Scenarios (Fundamental Small- Scale Topologies) Large-Scale Topologies (up to flows) Monday, December, Mbps vmiso Mbps Direct Tx. Mbps vmiso Mbps Direct Tx. Mbps vmiso 8Mbps Direct Tx. 8Mbps vmiso Number of Cooperative Number Packets of (x) Cooperative Pkts. (x) BPSK QPSK QAM QAM BPSK Mbps QPSK Mbps QAM Mbps QAM 8Mbps BPSK No Coop BPSK BPSK Coop Mbps Direct Tx. QPSK BPSK Mbps QPSK No Coop 8 QAM Mbps vmiso 8 QPSK Coop QAM QPSK Mbps 7 QAM No Coop Mbps Direct Tx. QAM Coop QAM 7 87 Mbps QAM Mbps No Coop vmiso QAM Coop QAM 8Mbps Mbps Direct Tx. No Direct Cooperation Tx. No Direct Cooperation Tx. Mbps Cooperation Cooperation vmiso NvMISO NvMISO 8Mbps Direct Tx Mbps vmiso 8 Perfect NACK NvMISO 8 NvMISO 8 7 Direct Tx Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Attenuation (db) F F (b) Attenuation (db) Attenuation (db) Flow Experiment Flow Experiment Flow Simulation Flow Simulation Flow -8 Experiment Flow -8 Experiment -8 Flow Simulation -8 Flow Simulation Flow Flow Flow Flow Flow F Flow Flow Flow F Experiment Simulation Experiment Simulation Attenuation (db) Attenuation (db) (a) Hidden Terminal (b) Information Asymmetry (a) (b) Throughput (Mbps) Throughput (Mbps) Throughput (Mbps) Monday, December, Throughput (kbps) Throughput (kbps) Tuesday, February 8, Throughput (Mbps) X Position (meters) X Position (meters) X Position (meters) X Position (meters) c) 7 Independent Flows 7 - Flow d) Independent 7 Flows - 8 Flow 8 Throughput Gain/Loss (%) Throughput Gain/Loss (%) Attenuation Attenuation (db) Wednesday, March 7, (db) Throughput (kbps) Throughput (kbps) Y Position (meters) Y Position (meters) 8 Number of Cooperative Pkts. (x) Number of of Cooperative Packets (x) Number of Cooperative Packets (x) X Position (meters) X Position (meters) a) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at d=7m (%) (%) However, our evaluation explored networks of up to flows 8 8 F F Node Index Y Position (meters) Y Position (meters) X Position (meters) X Position (meters) b) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at (%) d=7m (%) 8 8 F F Thursday, April,
72 System Implementation Host PC SCIPT VISUALIZE CONTOLLE WAPnet Client WAPnet Client WAPnet Client WAPnet Server Combination of over-the-air experiments (small topologies) and simulation (large topologies) WAP Platform [] and WAPnet - Clean slate MAC and PHY B A EBE D C (a) m G J F (b) H I Simulations in NS- Performance Metric: Throughput (bps) Protocol Implementation: Idealized NACK-based (benchmarking) vs practical NACK-based scheme. [] Thursday, April,
73 vmiso in Atomic Scenarios Thursday, April,
74 vmiso in Atomic Scenarios S F D S F D S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,
75 vmiso in Atomic Scenarios S F D S F Fully Connected D S F D S F Information Asymmetry D 7 Thursday, April,
76 S vmiso in Atomic Scenarios F D S F D S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,
77 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,
78 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Throughput (Mbps)... Flow Flow Fully Connected 7 Thursday, April,
79 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Almost doubled throughput of flow Throughput (Mbps)... Flow Flow Fully Connected 7 Thursday, April,
80 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D Throughput (Mbps)... Almost doubled throughput of flow No negative effect of the cooperator on competing flow:. Flow Flow Fully Connected 7 Thursday, April,
81 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D Throughput (Mbps).... Flow Flow Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Fully Connected 7 Thursday, April,
82 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Almost doubled throughput of flow 9 8 Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Fully Connected 7 Information Asymmetry Thursday, April,
83 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D As expected f>>f S F Information Asymmetry D. Almost doubled throughput of flow 9 8 Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Fully Connected 7 Information Asymmetry Thursday, April,
84 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso. S F Fully Connected D Almost doubled throughput of flow As expected f>>f Big increase (~%), but still unsatisfactory performance S F Information Asymmetry 9 8 D Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry
85 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology S F Information Asymmetry Throughput (kbps) D Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry
86 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology Why didn t it help that much? Low number of cooperative tx triggered S F Information Asymmetry Throughput (kbps) D Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry
87 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected Flow Flow Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow 7 As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology Why didn t it help that much? Low number of cooperative tx triggered MAC behavior completely dominates the PHY behavior S F Information Asymmetry Throughput (kbps) D Flow Flow Information Asymmetry Thursday, April,
88 vmiso in Large-Scale Scenarios 8 Thursday, April,
89 vmiso in Large-Scale Scenarios. Aggregate effects observed in atomic scenarios. Complex interactions between nodes (specially between cooperator and neighboring nodes/flows) Thursday, April, 9
90 vmiso in Large-Scale Scenarios Inter-Packet Transmission Time (ms) Perfect NACK NvMISO 9 9 to Perfect Perfect flow NACK NACK networks, NvMISO random 8 position, static 8 topology Inter Packet Transmission Time (ms) Inter Packet Transmission Time (ms) 7 7 Aggregate effects due to the cooperator (increased transmission footprint) hinder gains attained by vmiso Direct Tx. Direct Tx. NvMISO Direct Tx. Tx. NvMISO Perfect NACK NvMISO NvMISO NvMISO Throughput Throughput Gain Gain (Mbps) (Mbps) Time seconds Time seconds Gains decrease from 7% ( flows) to approximately % ( flows) Throughput Gain Gain (Mbps) (Mbps) Perfect NACK NvMISO Perfect NACK NvMISO NvMISO NvMISO NvMISO NvMISO Managed Network Managed Network Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows (a) Time Time seconds seconds Time seconds Perfect Perfect Perfect NACK NACK NACK NvMISO NvMISO NvMISO NvMISO Trigger Managed Managed Threshold Network Trigger Threshold Network Policy Policy Flows Flows Flows Flows Flows (b) Thursday, April,
91 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Thursday, April,
92 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Thursday, April,
93 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy Thursday, April,
94 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy Thursday, April,
95 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy e.g., Local Approach: only flows achieving γ% gains allowed to trigger vmiso Thursday, April,
96 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso Direct Tx. Tx. NvMISO erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO ect Tx. MISO rfect NACK NvMISO Inter Packet Transmission Time (ms) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
97 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
98 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
99 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
100 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
101 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
102 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness educe Footprint Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,
103 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness educe Footprint Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows (a) Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. Even a simple policy can be highly efficient in large networks (b) Flows Flows Flows Flows Flows..... Thursday, April,
104 Conclusion Objective: To develop a comprehensive understanding of vmiso in the context of WLANs that, leads to the design of trigger policies that maximize throughput performance gains Demonstrated that cooperation is able to achieve very high gains at atomic level scenarios However, the magnitude of these gains decrease at networkscale scenarios Nonetheless, simple trigger policies can have a significant positive impact on the performance of vmiso Thursday, April,
105 Thank You! Thursday, April,
106 Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April,
Wireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationResilient Multi-User Beamforming WLANs: Mobility, Interference,
Resilient Multi-ser Beamforming WLANs: Mobility, Interference, and Imperfect CSI Presenter: Roger Hoefel Oscar Bejarano Cisco Systems SA Edward W. Knightly Rice niversity SA Roger Hoefel Federal niversity
More informationHOW DO MIMO RADIOS WORK? Adaptability of Modern and LTE Technology. By Fanny Mlinarsky 1/12/2014
By Fanny Mlinarsky 1/12/2014 Rev. A 1/2014 Wireless technology has come a long way since mobile phones first emerged in the 1970s. Early radios were all analog. Modern radios include digital signal processing
More informationMIMO I: Spatial Diversity
MIMO I: Spatial Diversity COS 463: Wireless Networks Lecture 16 Kyle Jamieson [Parts adapted from D. Halperin et al., T. Rappaport] What is MIMO, and why? Multiple-Input, Multiple-Output (MIMO) communications
More informationCooperative MIMO schemes optimal selection for wireless sensor networks
Cooperative MIMO schemes optimal selection for wireless sensor networks Tuan-Duc Nguyen, Olivier Berder and Olivier Sentieys IRISA Ecole Nationale Supérieure de Sciences Appliquées et de Technologie 5,
More informationT. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University
Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer
More informationWireless in the Real World. Principles
Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse
More informationA Performance Study of Deployment Factors in Wireless Mesh
A Performance Study of Deployment Factors in Wireless Mesh Networks Joshua Robinson and Edward Knightly Rice University Rice Networks Group networks.rice.edu City-wide Wireless Deployments Many new city-wide
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationADVANCED WIRELESS TECHNOLOGIES. Aditya K. Jagannatham Indian Institute of Technology Kanpur
ADVANCED WIRELESS TECHNOLOGIES Aditya K. Jagannatham Indian Institute of Technology Kanpur Wireless Signal Fast Fading The wireless signal can reach the receiver via direct and scattered paths. As a result,
More informationPartial overlapping channels are not damaging
Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationA Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks
1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac
More informationCIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum
CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since
More informationSmart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005
Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Plenary Talk at: Jack H. Winters September 13, 2005 jwinters@motia.com 12/05/03 Slide 1 1 Outline Service Limitations Smart Antennas
More informationAEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.
AEROHIVE NETWORKS 802.11ax DAVID SIMON, SENIOR SYSTEMS ENGINEER 1 2018 Aerohive Networks. All Rights Reserved. 2 2018 Aerohive Networks. All Rights Reserved. 8802.11ax 802.11n and 802.11ac 802.11n and
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationInvestigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016
Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016 Hossein-Ali Safavi-Naeini, Farah Nadeem, Sumit Roy University of Washington Goals of this
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationSimple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas
Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Muhammad Irfan Rafique, Marco Porsch, Thomas Bauschert Chair for Communication Networks, TU Chemnitz irfan.rafique@etit.tu-chemnitz.de
More informationIEEE ax / OFDMA
#WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationCHAPTER 5 DIVERSITY. Xijun Wang
CHAPTER 5 DIVERSITY Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 7 2. Tse, Fundamentals of Wireless Communication, Chapter 3 2 FADING HURTS THE RELIABILITY n The detection
More informationBASIC CONCEPTS OF HSPA
284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.
More informationSpotFi: Decimeter Level Localization using WiFi. Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University
SpotFi: Decimeter Level Localization using WiFi Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University Applications of Indoor Localization 2 Targeted Location Based Advertising
More informationMIMO Systems and Applications
MIMO Systems and Applications Mário Marques da Silva marques.silva@ieee.org 1 Outline Introduction System Characterization for MIMO types Space-Time Block Coding (open loop) Selective Transmit Diversity
More informationMIMO RFIC Test Architectures
MIMO RFIC Test Architectures Christopher D. Ziomek and Matthew T. Hunter ZTEC Instruments, Inc. Abstract This paper discusses the practical constraints of testing Radio Frequency Integrated Circuit (RFIC)
More information1 Interference Cancellation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationSmart Antenna Techniques and Their Application to Wireless Ad Hoc Networks
Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Jack H. Winters May 31, 2004 jwinters@motia.com 12/05/03 Slide 1 Outline Service Limitations Smart Antennas Ad Hoc Networks Smart
More informationRelay Based Deployments for Wireless & Mobile Systems
Relay Based Deployments for Wireless & Mobile Systems Packet Relays: : a Disruptive Technology for Future Systems (Panel) Bernhard Walke ComNets, RWTH Aachen University EW 25, Nicosia, Cyprus Communication
More informationConsiderations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment
Considerations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment Leonhard Korowajczuk CEO, CelPlan Technologies, Inc. WCA Public Safety Task Force 11/18/2004 Copyright
More information[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE ANALYSIS OF INTEGRATED WIFI/WIMAX MESH NETWORK WITH DIFFERENT MODULATION SCHEMES Mr. Jogendra Raghuwanshi*, Mr. Girish
More informationRandomized spatial multiplexing for distributed cooperative communications
Randomized spatial multiplexing for distributed cooperative communications Pei Liu and Shivendra Panwar Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, Brooklyn, NY 1121
More informationThroughput Enhancement for MIMO OFDM Systems Using Transmission Control and Adaptive Modulation
Throughput Enhancement for MIMOOFDM Systems Using Transmission Control and Adaptive Modulation Yoshitaka Hara Mitsubishi Electric Information Technology Centre Europe B.V. (ITE) 1, allee de Beaulieu, Rennes,
More informationJeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications
802.11a Wireless Networks: Principles and Performance Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications May 8, 2002 IEEE Santa Clara Valley Comm Soc Atheros Communications,
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationPredictable Packet Delivery from Wireless Channel Measurements. Daniel Halperin Wenjun Hu, Anmol Sheth, David Wetherall
Predictable 802.11 Packet Delivery from Wireless Channel Measurements Daniel alperin Wenjun u, Anmol Sheth, David Wetherall 802.11 Wi-Fi technology Fast - 600 Mbps in 802.11n represents a 300x speedup
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationAutomatic power/channel management in Wi-Fi networks
Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance
More informationPerformance Analysis of n Wireless LAN Physical Layer
120 1 Performance Analysis of 802.11n Wireless LAN Physical Layer Amr M. Otefa, Namat M. ElBoghdadly, and Essam A. Sourour Abstract In the last few years, we have seen an explosive growth of wireless LAN
More informationFrequency Reuse How Do I Maximize the Value of My Spectrum?
Frequency Reuse How Do I Maximize the Value of My Spectrum? Eric Wilson VP Systems Management, Vyyo Broadband Wireless Forum, February 20, 2001 Spectrum Reuse Outline Definition / concept Alternatives
More informationRate Adaptation for Multiuser MIMO Networks
Rate Adaptation for 82.11 Multiuser MIMO Networks paper #86 12 pages ABSTRACT In multiuser MIMO (MU-MIMO) networks, the optimal bit rate of a user is highly dynamic and changes from one packet to the next.
More informationLink Adaptation in Mobile Communication Networks
Link Adaptation in Mobile Communication Networks Assoc. prof. Vladimír Wieser, PhD. Department of Telecommunication and Multimedia University of Zilina (vladimir.wieser@fel.uniza.sk) Department of Telecommunications
More informationSimple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.
18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/
More informationPower-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks
Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF DECODE-AND-FORWARD WITH COOPERATIVE DIVERSITY AND ALAMOUTI COOPERATIVE SPACE-TIME CODING IN CLUSTERED MULTIHOP WIRELESS NETWORKS
More informationUNDERSTANDING AND MITIGATING
UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented
More informationAmplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes
Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationCommunication Efficiency of Error Correction Mechanism Based on Retransmissions
Communication Efficiency of Error Correction Mechanism Based on Retransmissions Dragan Samardzija Summary The SNR gap between the capacity and throughput stays constant as SNR increases. The relative efficiency
More informationOn the Coexistence of Overlapping BSSs in WLANs
On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationPERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING WITH DIFFERENT MODULATION TECHNIQUES
SHUBHANGI CHAUDHARY AND A J PATIL: PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING WITH DIFFERENT MODULATION TECHNIQUES DOI: 10.21917/ijct.2012.0071 PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING
More informationWireless LANs IEEE
Chapter 29 Wireless LANs IEEE 802.11 686 History Wireless LANs became of interest in late 1990s For laptops For desktops when costs for laying cables should be saved Two competing standards IEEE 802.11
More informationOutline / Wireless Networks and Applications Lecture 5: Physical Layer Signal Propagation and Modulation
Outline 18-452/18-750 Wireless Networks and Applications Lecture 5: Physical Layer Signal Propagation and Modulation Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/
More informationAdvanced Modeling and Simulation of Mobile Ad-Hoc Networks
Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494
More informationMultihop Routing in Ad Hoc Networks
Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline
More informationAdaptive Modulation and Coding (AMC)
TSG-RAN WG1#17 Stockholm, Sweden, th-th Oct Agenda Item: Adhoc#, HSDPA Source: Motorola TSGR1#17()1395 1. Introduction Adaptive Modulation and Coding (AMC) This contribution provides the text for Section.
More informationAugmenting Wireless Security Using Zero-Forcing Beamforming
RICE UNIVERSITY Augmenting Wireless Security Using Zero-Forcing Beamforming by Narendra Anand A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE Master of Science APPROVED, THESIS
More informationImprovement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE OFDMA Networks
Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE 802.16 OFDMA Networks Dariush Mohammad Soleymani, Vahid Tabataba Vakili Abstract IEEE 802.16 OFDMA network (WiMAX)
More informationMIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance
1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna
More information4G Mobile Broadband LTE
4G Mobile Broadband LTE Part I Dr Stefan Parkvall Principal Researcher Ericson Research Data overtaking Voice Data is overtaking voice......but previous cellular systems designed primarily for voice Rapid
More informationDesigning Reliable Wi-Fi for HD Delivery throughout the Home
WHITE PAPER Designing Reliable Wi-Fi for HD Delivery throughout the Home Significant Improvements in Wireless Performance and Reliability Gained with Combination of 4x4 MIMO, Dynamic Digital Beamforming
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY
[CRT02] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY MODULE NO: CPU5009 Date: Thursday 14 th January 2016
More informationOptimum Power Allocation in Cooperative Networks
Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ
More informationOn the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels
On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH
More informationWireless Physical Layer Concepts: Part III
Wireless Physical Layer Concepts: Part III Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/
More information#8 Adaptive Modulation Coding
06 Q Wireless Communication Engineering #8 Adaptive Modulation Coding Kei Sakaguchi sakaguchi@mobile.ee. July 5, 06 Course Schedule () Date Text Contents #7 July 5 4.6 Error correction coding #8 July 5
More informationChapter 10. User Cooperative Communications
Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a
More informationFAQs about OFDMA-Enabled Wi-Fi backscatter
FAQs about OFDMA-Enabled Wi-Fi backscatter We categorize frequently asked questions (FAQs) about OFDMA Wi-Fi backscatter into the following classes for the convenience of readers: 1) What is the motivation
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationEvolution of Cellular Systems. Challenges for Broadband Wireless Systems. Convergence of Wireless, Computing and Internet is on the Way
International Technology Conference, 14~15 Jan. 2003, Hong Kong Technology Drivers for Tomorrow Challenges for Broadband Systems Fumiyuki Adachi Dept. of Electrical and Communications Engineering, Tohoku
More informationAll Beamforming Solutions Are Not Equal
White Paper All Beamforming Solutions Are Not Equal Executive Summary This white paper compares and contrasts the two major implementations of beamforming found in the market today: Switched array beamforming
More informationWireless TDMA Mesh Networks
Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development
More informationON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION
ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION Aihua Hong, Reiner Thomä Institute for Information Technology Technische
More informationReview on Improvement in WIMAX System
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 09 February 2017 ISSN (online): 2349-6010 Review on Improvement in WIMAX System Bhajankaur S. Wassan PG Student
More informationImplementation of Antenna Switching Diversity and Its Improvements over Single-Input Single-Output System
Implementation of Antenna Switching Diversity and Its Improvements over Single-Input Single-Output System by Oktavius Felix Setya A thesis presented to the University of Waterloo in fulfillment of the
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More informationUnderstanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks
Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2
More informationDESIGN OF STBC ENCODER AND DECODER FOR 2X1 AND 2X2 MIMO SYSTEM
Indian J.Sci.Res. (): 0-05, 05 ISSN: 50-038 (Online) DESIGN OF STBC ENCODER AND DECODER FOR X AND X MIMO SYSTEM VIJAY KUMAR KATGI Assistant Profesor, Department of E&CE, BKIT, Bhalki, India ABSTRACT This
More informationThe Impact of Channel Bonding on n Network Management
The Impact of Channel Bonding on 802.11n Network Management --- Lara Deek --- Eduard Garcia-Villegas Elizabeth Belding Sung-Ju Lee Kevin Almeroth UC Santa Barbara, UPC-Barcelona TECH, Hewlett-Packard Labs
More informationOptimizing the Performance of MANET with an Enhanced Antenna Positioning System
50 Optimizing the Performance of MANET with an Enhanced Antenna Positioning System Jackline Alphonse and Mohamed Naufal M.Saad Electrical and Electronics Department, Universiti Teknologi PETRONAS, Bandar
More informationMobile Communications: Technology and QoS
Mobile Communications: Technology and QoS Course Overview! Marc Kuhn, Yahia Hassan kuhn@nari.ee.ethz.ch / hassan@nari.ee.ethz.ch Institut für Kommunikationstechnik (IKT) Wireless Communications Group ETH
More informationInformation Theory at the Extremes
Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.
More informationPerformance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles
Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles Bin Cheng Joint work with Ali Rostami, Marco Gruteser WINLAB, Rutgers University, USA Gaurav Bansal, John B. Kenney
More informationCross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment
Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper
More informationTTN Vehicular Communications Part II Transmission Techniques for Noise Limited Systems
N Vehicular Communications Part II ransmission echniques for Noise Limited Systems oberto Verdone Slides are provided as supporting tool, they are not a textbook! Outline 1. Fundamentals of Digital Communications
More informationA Distributed System for Cooperative MIMO Transmissions
A Distributed System for Cooperative MIMO Transmissions Hsin-Yi Shen, Haiming Yang, Biplab Sikdar, Shivkumar Kalyanaraman Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 USA Abstract
More informationNomadic Communications n/ac: MIMO and Space Diversity
Nomadic Communications 802.11n/ac: MIMO and Space Diversity Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/teaching-duties/nomadic-communications CopyRight Quest opera è protetta
More informationAn Alamouti-based Hybrid-ARQ Scheme for MIMO Systems
An Alamouti-based Hybrid-ARQ Scheme MIMO Systems Kodzovi Acolatse Center Communication and Signal Processing Research Department, New Jersey Institute of Technology University Heights, Newark, NJ 07102
More information2012 LitePoint Corp LitePoint, A Teradyne Company. All rights reserved.
LTE TDD What to Test and Why 2012 LitePoint Corp. 2012 LitePoint, A Teradyne Company. All rights reserved. Agenda LTE Overview LTE Measurements Testing LTE TDD Where to Begin? Building a LTE TDD Verification
More informationMedium Access Control Protocol for WBANS
Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee
More informationOn the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels
1 On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels Cong Shen, Student Member, IEEE, Tie Liu, Member, IEEE, and Michael P. Fitz, Senior Member, IEEE Abstract The problem of
More informationUniversity of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012.
Zhu, X., Doufexi, A., & Koçak, T. (2012). A performance enhancement for 60 GHz wireless indoor applications. In ICCE 2012, Las Vegas Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/ICCE.2012.6161865
More informationCellular systems 02/10/06
Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from
More informationAdapting to the Wireless Channel: SampleRate
Adapting to the Wireless Channel: SampleRate Brad Karp (with slides contributed by Kyle Jamieson) UCL Computer Science CS M38 / GZ6 27 th January 216 Today 1. Background: digital communications Modulation
More information