Virtual MISO Triggers in Wi-Fi-like Networks

Size: px
Start display at page:

Download "Virtual MISO Triggers in Wi-Fi-like Networks"

Transcription

1 Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April,

2 Signal Outage in Fading Channels Thursday, April,

3 Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time Thursday, April,

4 Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time x Power x Thresh S N time Thursday, April,

5 Signal Outage in Fading Channels x Power Zero Throughput egion x Thresh S time x Power x Thresh S N time How do we exploit this independence among different paths? Thursday, April,

6 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X Symbol Period Symbol Period Thursday, April,

7 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S Symbol Period Symbol Period Thursday, April,

8 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S TX S X S S Symbol Period Symbol Period Thursday, April,

9 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX S S X S S Symbol Period Symbol Period Thursday, April,

10 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S Symbol Period Symbol Period Thursday, April,

11 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) TX X S S S* -S* Symbol Period Symbol Period Thursday, April,

12 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S* TX -S* X S S Symbol Period Symbol Period S* -S* Thursday, April,

13 Transmit Spatial Diversity Multiple transmit antennas (antenna array) separated in distance, transmit redundant signals Consider: No Channel State Infomation (CSI) at Transmitter Orthogonal Space-Time Block Codes (i.e., Alamouti Scheme) S* TX -S* X S S Symbol Period Symbol Period S* -S* Thursday, April,

14 For maximal transmit diversity gains, we require antenna separation difficult to achieve in mobile devices Thursday, April,

15 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X Thursday, April,

16 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX TX X Thursday, April,

17 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX TX X Thursday, April,

18 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,

19 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,

20 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X TX Thursday, April,

21 Virtual MISO (vmiso). System Model.. Distributed System.. Single-Antenna Nodes General Tx Diversity vmiso/cooperation TX X Use Alamouti Scheme TX Thursday, April,

22 vmiso Protocol Design Challenges Triggering vmiso - Establish a criteria and mechanism used to trigger vmiso transmissions, i.e., how and when? Cooperator/elay Selection - Select a neighboring user as cooperator Thursday, April, 7

23 vmiso Protocol Design Challenges Triggering vmiso - Establish a criteria and mechanism used to trigger vmiso transmissions, i.e., how and when? Cooperator/elay Selection - Select a neighboring user as cooperator Thursday, April, 8

24 Objective To develop a comprehensive understanding of vmiso in the context of WLANs: Gains for vmiso flow Implications on network graph due to increased spatial footprint Thursday, April, 9

25 Objective To develop a comprehensive understanding of vmiso in the context of WLANs: Gains for vmiso flow Implications on network graph due to increased spatial footprint In particular, to provide the understanding needed to design trigger policies that maximize throughput performance gains trigger policies when should the cooperator be used? 9 Thursday, April,

26 vmiso Triggers Thursday, April,

27 vmiso Triggers. Method employed to invoke a vmiso transmission: Thursday, April,

28 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission Thursday, April,

29 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel Thursday, April,

30 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

31 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

32 eactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

33 eactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

34 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

35 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

36 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

37 eactive S S Data CN C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

38 eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

39 eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

40 eactive S S Data x CN C x x x NACK time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

41 eactive S S Data x e-tx CN C x x x NACK Tx x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) If transmission fails, receiver replies with a NACK ) NACK triggers simultaneous coded retransmission (from Sender and Cooperator) eacts to Failure Thursday, April,

42 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

43 Proactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

44 Proactive S NC S C time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

45 Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

46 Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

47 Proactive S S Tx NC C x x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

48 Proactive S S Tx e-tx NC C x x Tx x time ) Initial transmission - Sender to eceiver ) Neighboring node overhears transmission ) Simultaneous coded retransmission (from Sender and Cooperator) Prevents Failure Thursday, April,

49 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel We will show results only for eactive. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

50 vmiso Triggers. Method employed to invoke a vmiso transmission:.. eactive (On-Demand) - eacts to a failed packet transmission.. Proactive - Prevent packet failures in an already known bad channel We will show results only for eactive. Trigger policies to identify scenarios in which vmiso transmissions yield a net throughput gain (or loss) Thursday, April,

51 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Fully Connected Identify when the cooperator should or should not be used Thursday, April, 7

52 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Fully Connected Identify when the cooperator should or should not be used Thursday, April, 8

53 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

54 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

55 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

56 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S C High throughput gains for F F S Little to no cooperator interference with F Identify when the cooperator should or should not be used Thursday, April, 8

57 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

58 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

59 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

60 Trigger Policies in WLANs Interference ange Cooperator Footprint Intended Data Tx F S Low High throughput gains for F C Little to no cooperator interference with F F S Identify when the cooperator should or should not be used Thursday, April, 9

61 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,

62 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S Collisions F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,

63 Interference ange Cooperator Footprint Intended Data Tx Trigger Policies in WLANs F S Collisions C F S Information Asymmetry Identify when the cooperator should or should not be used Thursday, April,

64 Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

65 Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

66 Trigger Policies in WLANs Multi-Hop S N Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

67 Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

68 Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power More Fewer Losses Lower vmiso Gains vmiso S C Identify when the cooperator should or should not be used Thursday, April,

69 Trigger Policies in WLANs Multi-Hop S N High Low Tx ate Transmissions Over Shorter/Higher Quality Links VS Transmit Diversity or/and x Tx Power More Fewer Losses Lower vmiso Gains vmiso S C Higher Identify when the cooperator should or should not be used Thursday, April,

70 Evaluation oadmap 8 System Implementation Comprehensive vmiso Evaluation 8 Atomic Scenarios (Fundamental Small- Scale Topologies) Large-Scale Topologies (up to flows) Monday, December, Mbps vmiso Mbps Direct Tx. Mbps vmiso Mbps Direct Tx. Mbps vmiso 8Mbps Direct Tx. 8Mbps vmiso Number of Cooperative Number Packets of (x) Cooperative Pkts. (x) BPSK QPSK QAM QAM BPSK Mbps QPSK Mbps QAM Mbps QAM 8Mbps BPSK No Coop BPSK BPSK Coop Mbps Direct Tx. QPSK BPSK Mbps QPSK No Coop 8 QAM Mbps vmiso 8 QPSK Coop QAM QPSK Mbps 7 QAM No Coop Mbps Direct Tx. QAM Coop QAM 7 87 Mbps QAM Mbps No Coop vmiso QAM Coop QAM 8Mbps Mbps Direct Tx. No Direct Cooperation Tx. No Direct Cooperation Tx. Mbps Cooperation Cooperation vmiso NvMISO NvMISO 8Mbps Direct Tx Mbps vmiso 8 Perfect NACK NvMISO 8 NvMISO 8 7 Direct Tx Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Attenuation (db) F F (b) Attenuation (db) Attenuation (db) Flow Experiment Flow Experiment Flow Simulation Flow Simulation Flow -8 Experiment Flow -8 Experiment -8 Flow Simulation -8 Flow Simulation Flow Flow Flow Flow Flow F Flow Flow Flow F Experiment Simulation Experiment Simulation Attenuation (db) Attenuation (db) (a) Hidden Terminal (b) Information Asymmetry (a) (b) Throughput (Mbps) Throughput (Mbps) Throughput (Mbps) Monday, December, Throughput (kbps) Throughput (kbps) Tuesday, February 8, Throughput (Mbps) X Position (meters) X Position (meters) X Position (meters) X Position (meters) c) 7 Independent Flows 7 - Flow d) Independent 7 Flows - 8 Flow 8 Throughput Gain/Loss (%) Throughput Gain/Loss (%) Attenuation Attenuation (db) Wednesday, March 7, (db) Throughput (kbps) Throughput (kbps) Y Position (meters) Y Position (meters) 8 Number of Cooperative Pkts. (x) Number of of Cooperative Packets (x) Number of Cooperative Packets (x) X Position (meters) X Position (meters) a) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at d=7m (%) (%) 8 8 F F Node Index Y Position (meters) Y Position (meters) X Position (meters) X Position (meters) b) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at (%) d=7m (%) 8 8 F F Thursday, April,

71 8 Evaluation oadmap System Implementation Comprehensive vmiso Evaluation 8 Atomic Scenarios (Fundamental Small- Scale Topologies) Large-Scale Topologies (up to flows) Monday, December, Mbps vmiso Mbps Direct Tx. Mbps vmiso Mbps Direct Tx. Mbps vmiso 8Mbps Direct Tx. 8Mbps vmiso Number of Cooperative Number Packets of (x) Cooperative Pkts. (x) BPSK QPSK QAM QAM BPSK Mbps QPSK Mbps QAM Mbps QAM 8Mbps BPSK No Coop BPSK BPSK Coop Mbps Direct Tx. QPSK BPSK Mbps QPSK No Coop 8 QAM Mbps vmiso 8 QPSK Coop QAM QPSK Mbps 7 QAM No Coop Mbps Direct Tx. QAM Coop QAM 7 87 Mbps QAM Mbps No Coop vmiso QAM Coop QAM 8Mbps Mbps Direct Tx. No Direct Cooperation Tx. No Direct Cooperation Tx. Mbps Cooperation Cooperation vmiso NvMISO NvMISO 8Mbps Direct Tx Mbps vmiso 8 Perfect NACK NvMISO 8 NvMISO 8 7 Direct Tx Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Flow Throughput Gain/Loss at d=m (%) Attenuation (db) F F (b) Attenuation (db) Attenuation (db) Flow Experiment Flow Experiment Flow Simulation Flow Simulation Flow -8 Experiment Flow -8 Experiment -8 Flow Simulation -8 Flow Simulation Flow Flow Flow Flow Flow F Flow Flow Flow F Experiment Simulation Experiment Simulation Attenuation (db) Attenuation (db) (a) Hidden Terminal (b) Information Asymmetry (a) (b) Throughput (Mbps) Throughput (Mbps) Throughput (Mbps) Monday, December, Throughput (kbps) Throughput (kbps) Tuesday, February 8, Throughput (Mbps) X Position (meters) X Position (meters) X Position (meters) X Position (meters) c) 7 Independent Flows 7 - Flow d) Independent 7 Flows - 8 Flow 8 Throughput Gain/Loss (%) Throughput Gain/Loss (%) Attenuation Attenuation (db) Wednesday, March 7, (db) Throughput (kbps) Throughput (kbps) Y Position (meters) Y Position (meters) 8 Number of Cooperative Pkts. (x) Number of of Cooperative Packets (x) Number of Cooperative Packets (x) X Position (meters) X Position (meters) a) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at d=7m (%) (%) However, our evaluation explored networks of up to flows 8 8 F F Node Index Y Position (meters) Y Position (meters) X Position (meters) X Position (meters) b) Coupled Flows - Flow Flow Throughput Gain/Loss at d=7m (%) Flow Throughput Gain/Loss at (%) d=7m (%) 8 8 F F Thursday, April,

72 System Implementation Host PC SCIPT VISUALIZE CONTOLLE WAPnet Client WAPnet Client WAPnet Client WAPnet Server Combination of over-the-air experiments (small topologies) and simulation (large topologies) WAP Platform [] and WAPnet - Clean slate MAC and PHY B A EBE D C (a) m G J F (b) H I Simulations in NS- Performance Metric: Throughput (bps) Protocol Implementation: Idealized NACK-based (benchmarking) vs practical NACK-based scheme. [] Thursday, April,

73 vmiso in Atomic Scenarios Thursday, April,

74 vmiso in Atomic Scenarios S F D S F D S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,

75 vmiso in Atomic Scenarios S F D S F Fully Connected D S F D S F Information Asymmetry D 7 Thursday, April,

76 S vmiso in Atomic Scenarios F D S F D S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,

77 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D 7 Thursday, April,

78 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Throughput (Mbps)... Flow Flow Fully Connected 7 Thursday, April,

79 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Almost doubled throughput of flow Throughput (Mbps)... Flow Flow Fully Connected 7 Thursday, April,

80 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D Throughput (Mbps)... Almost doubled throughput of flow No negative effect of the cooperator on competing flow:. Flow Flow Fully Connected 7 Thursday, April,

81 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D Throughput (Mbps).... Flow Flow Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Fully Connected 7 Thursday, April,

82 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D S F Information Asymmetry D. Almost doubled throughput of flow 9 8 Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Fully Connected 7 Information Asymmetry Thursday, April,

83 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso S F Fully Connected D As expected f>>f S F Information Asymmetry D. Almost doubled throughput of flow 9 8 Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Fully Connected 7 Information Asymmetry Thursday, April,

84 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso. S F Fully Connected D Almost doubled throughput of flow As expected f>>f Big increase (~%), but still unsatisfactory performance S F Information Asymmetry 9 8 D Throughput (Mbps)... No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow Throughput (kbps) 7 Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry

85 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology S F Information Asymmetry Throughput (kbps) D Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry

86 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology Why didn t it help that much? Low number of cooperative tx triggered S F Information Asymmetry Throughput (kbps) D Flow Flow Flow Flow Thursday, April, Fully Connected 7 Information Asymmetry

87 S F vmiso in Atomic Scenarios D S F D N C Direct Tx vmiso Throughput (Mbps).... S F Fully Connected Flow Flow Fully Connected D Almost doubled throughput of flow No negative effect of the cooperator on competing flow: Why? Noncooperative flow already deferring competing flow 7 As expected f>>f Big increase (~%), but still unsatisfactory performance Why did it help? elay helps one link by providing further information about topology Why didn t it help that much? Low number of cooperative tx triggered MAC behavior completely dominates the PHY behavior S F Information Asymmetry Throughput (kbps) D Flow Flow Information Asymmetry Thursday, April,

88 vmiso in Large-Scale Scenarios 8 Thursday, April,

89 vmiso in Large-Scale Scenarios. Aggregate effects observed in atomic scenarios. Complex interactions between nodes (specially between cooperator and neighboring nodes/flows) Thursday, April, 9

90 vmiso in Large-Scale Scenarios Inter-Packet Transmission Time (ms) Perfect NACK NvMISO 9 9 to Perfect Perfect flow NACK NACK networks, NvMISO random 8 position, static 8 topology Inter Packet Transmission Time (ms) Inter Packet Transmission Time (ms) 7 7 Aggregate effects due to the cooperator (increased transmission footprint) hinder gains attained by vmiso Direct Tx. Direct Tx. NvMISO Direct Tx. Tx. NvMISO Perfect NACK NvMISO NvMISO NvMISO Throughput Throughput Gain Gain (Mbps) (Mbps) Time seconds Time seconds Gains decrease from 7% ( flows) to approximately % ( flows) Throughput Gain Gain (Mbps) (Mbps) Perfect NACK NvMISO Perfect NACK NvMISO NvMISO NvMISO NvMISO NvMISO Managed Network Managed Network Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows (a) Time Time seconds seconds Time seconds Perfect Perfect Perfect NACK NACK NACK NvMISO NvMISO NvMISO NvMISO Trigger Managed Managed Threshold Network Trigger Threshold Network Policy Policy Flows Flows Flows Flows Flows (b) Thursday, April,

91 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Thursday, April,

92 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Thursday, April,

93 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy Thursday, April,

94 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy Thursday, April,

95 vmiso in Large-Scale Scenarios How do we diminish negative effects of vmiso? Establish a Network Wide Trigger Policy e.g., Local Approach: only flows achieving γ% gains allowed to trigger vmiso Thursday, April,

96 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso Direct Tx. Tx. NvMISO erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO ect Tx. MISO rfect NACK NvMISO Inter Packet Transmission Time (ms) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

97 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

98 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

99 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

100 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

101 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

102 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness educe Footprint Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. (a) (b) Flows Flows Flows Flows Flows..... Thursday, April,

103 vmiso in Large-Scale Scenarios Time seconds irect Tx. vmiso erfect NACK Perfect NvMISO NACK NvMISO 9 9 Perfect NACK NvMISO Local Decisions 8 8 ect Tx. MISO Network-wide Direct Tx. trigger threshold Tx. NvMISO policy: rfect NACK NvMISO Inter Packet Transmission Time (ms) 7 7 Only flows achieving +% gains allowed to trigger vmiso (arbitrarily chosen) Time seconds Why it works? educe aggressiveness educe Footprint Throughput Flows Flows Flows Flows Flows Flows Flows Flows Flows Flows (a) Time seconds Time seconds Time seconds Perfect NACK Perfect Perfect NACK NACK NvMISO NvMISO NvMISO NvM Trigger Threshold Managed Policy Ne NvMISOPerfect NACK Perfect NACK NvMISO NvMISO Trigger Trigger Threshold NvMISO Managed Threshold Policy Network NetworP Trigger Managed Threshold Network Policy.. Flows.. Flows... Flows. Flows.. Flows.. Even a simple policy can be highly efficient in large networks (b) Flows Flows Flows Flows Flows..... Thursday, April,

104 Conclusion Objective: To develop a comprehensive understanding of vmiso in the context of WLANs that, leads to the design of trigger policies that maximize throughput performance gains Demonstrated that cooperation is able to achieve very high gains at atomic level scenarios However, the magnitude of these gains decrease at networkscale scenarios Nonetheless, simple trigger policies can have a significant positive impact on the performance of vmiso Thursday, April,

105 Thank You! Thursday, April,

106 Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly Thursday, April,

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Resilient Multi-User Beamforming WLANs: Mobility, Interference,

Resilient Multi-User Beamforming WLANs: Mobility, Interference, Resilient Multi-ser Beamforming WLANs: Mobility, Interference, and Imperfect CSI Presenter: Roger Hoefel Oscar Bejarano Cisco Systems SA Edward W. Knightly Rice niversity SA Roger Hoefel Federal niversity

More information

HOW DO MIMO RADIOS WORK? Adaptability of Modern and LTE Technology. By Fanny Mlinarsky 1/12/2014

HOW DO MIMO RADIOS WORK? Adaptability of Modern and LTE Technology. By Fanny Mlinarsky 1/12/2014 By Fanny Mlinarsky 1/12/2014 Rev. A 1/2014 Wireless technology has come a long way since mobile phones first emerged in the 1970s. Early radios were all analog. Modern radios include digital signal processing

More information

MIMO I: Spatial Diversity

MIMO I: Spatial Diversity MIMO I: Spatial Diversity COS 463: Wireless Networks Lecture 16 Kyle Jamieson [Parts adapted from D. Halperin et al., T. Rappaport] What is MIMO, and why? Multiple-Input, Multiple-Output (MIMO) communications

More information

Cooperative MIMO schemes optimal selection for wireless sensor networks

Cooperative MIMO schemes optimal selection for wireless sensor networks Cooperative MIMO schemes optimal selection for wireless sensor networks Tuan-Duc Nguyen, Olivier Berder and Olivier Sentieys IRISA Ecole Nationale Supérieure de Sciences Appliquées et de Technologie 5,

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

A Performance Study of Deployment Factors in Wireless Mesh

A Performance Study of Deployment Factors in Wireless Mesh A Performance Study of Deployment Factors in Wireless Mesh Networks Joshua Robinson and Edward Knightly Rice University Rice Networks Group networks.rice.edu City-wide Wireless Deployments Many new city-wide

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

ADVANCED WIRELESS TECHNOLOGIES. Aditya K. Jagannatham Indian Institute of Technology Kanpur

ADVANCED WIRELESS TECHNOLOGIES. Aditya K. Jagannatham Indian Institute of Technology Kanpur ADVANCED WIRELESS TECHNOLOGIES Aditya K. Jagannatham Indian Institute of Technology Kanpur Wireless Signal Fast Fading The wireless signal can reach the receiver via direct and scattered paths. As a result,

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks 1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac

More information

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum

CIS 632 / EEC 687 Mobile Computing. Mobile Communications (for Dummies) Chansu Yu. Contents. Modulation Propagation Spread spectrum CIS 632 / EEC 687 Mobile Computing Mobile Communications (for Dummies) Chansu Yu Contents Modulation Propagation Spread spectrum 2 1 Digital Communication 1 0 digital signal t Want to transform to since

More information

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005 Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Plenary Talk at: Jack H. Winters September 13, 2005 jwinters@motia.com 12/05/03 Slide 1 1 Outline Service Limitations Smart Antennas

More information

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved.

AEROHIVE NETWORKS ax DAVID SIMON, SENIOR SYSTEMS ENGINEER Aerohive Networks. All Rights Reserved. AEROHIVE NETWORKS 802.11ax DAVID SIMON, SENIOR SYSTEMS ENGINEER 1 2018 Aerohive Networks. All Rights Reserved. 2 2018 Aerohive Networks. All Rights Reserved. 8802.11ax 802.11n and 802.11ac 802.11n and

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016

Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016 Investigation and Improvements to the OFDM Wi-Fi Physical Layer Abstraction in ns-3 Workshop on ns-3 June 15, 2016 Hossein-Ali Safavi-Naeini, Farah Nadeem, Sumit Roy University of Washington Goals of this

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas Muhammad Irfan Rafique, Marco Porsch, Thomas Bauschert Chair for Communication Networks, TU Chemnitz irfan.rafique@etit.tu-chemnitz.de

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

CHAPTER 5 DIVERSITY. Xijun Wang

CHAPTER 5 DIVERSITY. Xijun Wang CHAPTER 5 DIVERSITY Xijun Wang WEEKLY READING 1. Goldsmith, Wireless Communications, Chapters 7 2. Tse, Fundamentals of Wireless Communication, Chapter 3 2 FADING HURTS THE RELIABILITY n The detection

More information

BASIC CONCEPTS OF HSPA

BASIC CONCEPTS OF HSPA 284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.

More information

SpotFi: Decimeter Level Localization using WiFi. Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University

SpotFi: Decimeter Level Localization using WiFi. Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University SpotFi: Decimeter Level Localization using WiFi Manikanta Kotaru, Kiran Joshi, Dinesh Bharadia, Sachin Katti Stanford University Applications of Indoor Localization 2 Targeted Location Based Advertising

More information

MIMO Systems and Applications

MIMO Systems and Applications MIMO Systems and Applications Mário Marques da Silva marques.silva@ieee.org 1 Outline Introduction System Characterization for MIMO types Space-Time Block Coding (open loop) Selective Transmit Diversity

More information

MIMO RFIC Test Architectures

MIMO RFIC Test Architectures MIMO RFIC Test Architectures Christopher D. Ziomek and Matthew T. Hunter ZTEC Instruments, Inc. Abstract This paper discusses the practical constraints of testing Radio Frequency Integrated Circuit (RFIC)

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Jack H. Winters May 31, 2004 jwinters@motia.com 12/05/03 Slide 1 Outline Service Limitations Smart Antennas Ad Hoc Networks Smart

More information

Relay Based Deployments for Wireless & Mobile Systems

Relay Based Deployments for Wireless & Mobile Systems Relay Based Deployments for Wireless & Mobile Systems Packet Relays: : a Disruptive Technology for Future Systems (Panel) Bernhard Walke ComNets, RWTH Aachen University EW 25, Nicosia, Cyprus Communication

More information

Considerations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment

Considerations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment Considerations about Wideband Data Transmission at 4.9 GHz for an hypothetical city wide deployment Leonhard Korowajczuk CEO, CelPlan Technologies, Inc. WCA Public Safety Task Force 11/18/2004 Copyright

More information

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Raghuwanshi*, 4.(8): August, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY PERFORMANCE ANALYSIS OF INTEGRATED WIFI/WIMAX MESH NETWORK WITH DIFFERENT MODULATION SCHEMES Mr. Jogendra Raghuwanshi*, Mr. Girish

More information

Randomized spatial multiplexing for distributed cooperative communications

Randomized spatial multiplexing for distributed cooperative communications Randomized spatial multiplexing for distributed cooperative communications Pei Liu and Shivendra Panwar Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, Brooklyn, NY 1121

More information

Throughput Enhancement for MIMO OFDM Systems Using Transmission Control and Adaptive Modulation

Throughput Enhancement for MIMO OFDM Systems Using Transmission Control and Adaptive Modulation Throughput Enhancement for MIMOOFDM Systems Using Transmission Control and Adaptive Modulation Yoshitaka Hara Mitsubishi Electric Information Technology Centre Europe B.V. (ITE) 1, allee de Beaulieu, Rennes,

More information

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications

Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications 802.11a Wireless Networks: Principles and Performance Jeffrey M. Gilbert, Ph.D. Manager of Advanced Technology Atheros Communications May 8, 2002 IEEE Santa Clara Valley Comm Soc Atheros Communications,

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Predictable Packet Delivery from Wireless Channel Measurements. Daniel Halperin Wenjun Hu, Anmol Sheth, David Wetherall

Predictable Packet Delivery from Wireless Channel Measurements. Daniel Halperin Wenjun Hu, Anmol Sheth, David Wetherall Predictable 802.11 Packet Delivery from Wireless Channel Measurements Daniel alperin Wenjun u, Anmol Sheth, David Wetherall 802.11 Wi-Fi technology Fast - 600 Mbps in 802.11n represents a 300x speedup

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Automatic power/channel management in Wi-Fi networks

Automatic power/channel management in Wi-Fi networks Automatic power/channel management in Wi-Fi networks Jan Kruys Februari, 2016 This paper was sponsored by Lumiad BV Executive Summary The holy grail of Wi-Fi network management is to assure maximum performance

More information

Performance Analysis of n Wireless LAN Physical Layer

Performance Analysis of n Wireless LAN Physical Layer 120 1 Performance Analysis of 802.11n Wireless LAN Physical Layer Amr M. Otefa, Namat M. ElBoghdadly, and Essam A. Sourour Abstract In the last few years, we have seen an explosive growth of wireless LAN

More information

Frequency Reuse How Do I Maximize the Value of My Spectrum?

Frequency Reuse How Do I Maximize the Value of My Spectrum? Frequency Reuse How Do I Maximize the Value of My Spectrum? Eric Wilson VP Systems Management, Vyyo Broadband Wireless Forum, February 20, 2001 Spectrum Reuse Outline Definition / concept Alternatives

More information

Rate Adaptation for Multiuser MIMO Networks

Rate Adaptation for Multiuser MIMO Networks Rate Adaptation for 82.11 Multiuser MIMO Networks paper #86 12 pages ABSTRACT In multiuser MIMO (MU-MIMO) networks, the optimal bit rate of a user is highly dynamic and changes from one packet to the next.

More information

Link Adaptation in Mobile Communication Networks

Link Adaptation in Mobile Communication Networks Link Adaptation in Mobile Communication Networks Assoc. prof. Vladimír Wieser, PhD. Department of Telecommunication and Multimedia University of Zilina (vladimir.wieser@fel.uniza.sk) Department of Telecommunications

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS PERFORMANCE ANALYSIS OF DECODE-AND-FORWARD WITH COOPERATIVE DIVERSITY AND ALAMOUTI COOPERATIVE SPACE-TIME CODING IN CLUSTERED MULTIHOP WIRELESS NETWORKS

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes

Amplify-and-Forward Space-Time Coded Cooperation via Incremental Relaying Behrouz Maham and Are Hjørungnes Amplify-and-Forward Space-Time Coded Cooperation via Incremental elaying Behrouz Maham and Are Hjørungnes UniK University Graduate Center, University of Oslo Instituttveien-5, N-7, Kjeller, Norway behrouz@unik.no,

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Communication Efficiency of Error Correction Mechanism Based on Retransmissions

Communication Efficiency of Error Correction Mechanism Based on Retransmissions Communication Efficiency of Error Correction Mechanism Based on Retransmissions Dragan Samardzija Summary The SNR gap between the capacity and throughput stays constant as SNR increases. The relative efficiency

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING WITH DIFFERENT MODULATION TECHNIQUES

PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING WITH DIFFERENT MODULATION TECHNIQUES SHUBHANGI CHAUDHARY AND A J PATIL: PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING WITH DIFFERENT MODULATION TECHNIQUES DOI: 10.21917/ijct.2012.0071 PERFORMANCE ANALYSIS OF MIMO-SPACE TIME BLOCK CODING

More information

Wireless LANs IEEE

Wireless LANs IEEE Chapter 29 Wireless LANs IEEE 802.11 686 History Wireless LANs became of interest in late 1990s For laptops For desktops when costs for laying cables should be saved Two competing standards IEEE 802.11

More information

Outline / Wireless Networks and Applications Lecture 5: Physical Layer Signal Propagation and Modulation

Outline / Wireless Networks and Applications Lecture 5: Physical Layer Signal Propagation and Modulation Outline 18-452/18-750 Wireless Networks and Applications Lecture 5: Physical Layer Signal Propagation and Modulation Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

Multihop Routing in Ad Hoc Networks

Multihop Routing in Ad Hoc Networks Multihop Routing in Ad Hoc Networks Dr. D. Torrieri 1, S. Talarico 2 and Dr. M. C. Valenti 2 1 U.S Army Research Laboratory, Adelphi, MD 2 West Virginia University, Morgantown, WV Nov. 18 th, 20131 Outline

More information

Adaptive Modulation and Coding (AMC)

Adaptive Modulation and Coding (AMC) TSG-RAN WG1#17 Stockholm, Sweden, th-th Oct Agenda Item: Adhoc#, HSDPA Source: Motorola TSGR1#17()1395 1. Introduction Adaptive Modulation and Coding (AMC) This contribution provides the text for Section.

More information

Augmenting Wireless Security Using Zero-Forcing Beamforming

Augmenting Wireless Security Using Zero-Forcing Beamforming RICE UNIVERSITY Augmenting Wireless Security Using Zero-Forcing Beamforming by Narendra Anand A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE Master of Science APPROVED, THESIS

More information

Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE OFDMA Networks

Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE OFDMA Networks Improvement of System Capacity using Different Frequency Reuse and HARQ and AMC in IEEE 802.16 OFDMA Networks Dariush Mohammad Soleymani, Vahid Tabataba Vakili Abstract IEEE 802.16 OFDMA network (WiMAX)

More information

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance

MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance 1 MIMO Ad Hoc Networks: Medium Access Control, Saturation Throughput and Optimal Hop Distance Ming Hu and Junshan Zhang Abstract: In this paper, we explore the utility of recently discovered multiple-antenna

More information

4G Mobile Broadband LTE

4G Mobile Broadband LTE 4G Mobile Broadband LTE Part I Dr Stefan Parkvall Principal Researcher Ericson Research Data overtaking Voice Data is overtaking voice......but previous cellular systems designed primarily for voice Rapid

More information

Designing Reliable Wi-Fi for HD Delivery throughout the Home

Designing Reliable Wi-Fi for HD Delivery throughout the Home WHITE PAPER Designing Reliable Wi-Fi for HD Delivery throughout the Home Significant Improvements in Wireless Performance and Reliability Gained with Combination of 4x4 MIMO, Dynamic Digital Beamforming

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY [CRT02] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATIONS 2015/2016 WIRELESS NETWORKS AND SECURITY MODULE NO: CPU5009 Date: Thursday 14 th January 2016

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

Wireless Physical Layer Concepts: Part III

Wireless Physical Layer Concepts: Part III Wireless Physical Layer Concepts: Part III Raj Jain Professor of CSE Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

#8 Adaptive Modulation Coding

#8 Adaptive Modulation Coding 06 Q Wireless Communication Engineering #8 Adaptive Modulation Coding Kei Sakaguchi sakaguchi@mobile.ee. July 5, 06 Course Schedule () Date Text Contents #7 July 5 4.6 Error correction coding #8 July 5

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

FAQs about OFDMA-Enabled Wi-Fi backscatter

FAQs about OFDMA-Enabled Wi-Fi backscatter FAQs about OFDMA-Enabled Wi-Fi backscatter We categorize frequently asked questions (FAQs) about OFDMA Wi-Fi backscatter into the following classes for the convenience of readers: 1) What is the motivation

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Evolution of Cellular Systems. Challenges for Broadband Wireless Systems. Convergence of Wireless, Computing and Internet is on the Way

Evolution of Cellular Systems. Challenges for Broadband Wireless Systems. Convergence of Wireless, Computing and Internet is on the Way International Technology Conference, 14~15 Jan. 2003, Hong Kong Technology Drivers for Tomorrow Challenges for Broadband Systems Fumiyuki Adachi Dept. of Electrical and Communications Engineering, Tohoku

More information

All Beamforming Solutions Are Not Equal

All Beamforming Solutions Are Not Equal White Paper All Beamforming Solutions Are Not Equal Executive Summary This white paper compares and contrasts the two major implementations of beamforming found in the market today: Switched array beamforming

More information

Wireless TDMA Mesh Networks

Wireless TDMA Mesh Networks Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development

More information

ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION

ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION Aihua Hong, Reiner Thomä Institute for Information Technology Technische

More information

Review on Improvement in WIMAX System

Review on Improvement in WIMAX System IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 09 February 2017 ISSN (online): 2349-6010 Review on Improvement in WIMAX System Bhajankaur S. Wassan PG Student

More information

Implementation of Antenna Switching Diversity and Its Improvements over Single-Input Single-Output System

Implementation of Antenna Switching Diversity and Its Improvements over Single-Input Single-Output System Implementation of Antenna Switching Diversity and Its Improvements over Single-Input Single-Output System by Oktavius Felix Setya A thesis presented to the University of Waterloo in fulfillment of the

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks

Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Understanding Channel and Interface Heterogeneity in Multi-channel Multi-radio Wireless Mesh Networks Anand Prabhu Subramanian, Jing Cao 2, Chul Sung, Samir R. Das Stony Brook University, NY, U.S.A. 2

More information

DESIGN OF STBC ENCODER AND DECODER FOR 2X1 AND 2X2 MIMO SYSTEM

DESIGN OF STBC ENCODER AND DECODER FOR 2X1 AND 2X2 MIMO SYSTEM Indian J.Sci.Res. (): 0-05, 05 ISSN: 50-038 (Online) DESIGN OF STBC ENCODER AND DECODER FOR X AND X MIMO SYSTEM VIJAY KUMAR KATGI Assistant Profesor, Department of E&CE, BKIT, Bhalki, India ABSTRACT This

More information

The Impact of Channel Bonding on n Network Management

The Impact of Channel Bonding on n Network Management The Impact of Channel Bonding on 802.11n Network Management --- Lara Deek --- Eduard Garcia-Villegas Elizabeth Belding Sung-Ju Lee Kevin Almeroth UC Santa Barbara, UPC-Barcelona TECH, Hewlett-Packard Labs

More information

Optimizing the Performance of MANET with an Enhanced Antenna Positioning System

Optimizing the Performance of MANET with an Enhanced Antenna Positioning System 50 Optimizing the Performance of MANET with an Enhanced Antenna Positioning System Jackline Alphonse and Mohamed Naufal M.Saad Electrical and Electronics Department, Universiti Teknologi PETRONAS, Bandar

More information

Mobile Communications: Technology and QoS

Mobile Communications: Technology and QoS Mobile Communications: Technology and QoS Course Overview! Marc Kuhn, Yahia Hassan kuhn@nari.ee.ethz.ch / hassan@nari.ee.ethz.ch Institut für Kommunikationstechnik (IKT) Wireless Communications Group ETH

More information

Information Theory at the Extremes

Information Theory at the Extremes Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.

More information

Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles

Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles Performance Evaluation of a Mixed Vehicular Network with CAM-DCC and LIMERIC Vehicles Bin Cheng Joint work with Ali Rostami, Marco Gruteser WINLAB, Rutgers University, USA Gaurav Bansal, John B. Kenney

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

TTN Vehicular Communications Part II Transmission Techniques for Noise Limited Systems

TTN Vehicular Communications Part II Transmission Techniques for Noise Limited Systems N Vehicular Communications Part II ransmission echniques for Noise Limited Systems oberto Verdone Slides are provided as supporting tool, they are not a textbook! Outline 1. Fundamentals of Digital Communications

More information

A Distributed System for Cooperative MIMO Transmissions

A Distributed System for Cooperative MIMO Transmissions A Distributed System for Cooperative MIMO Transmissions Hsin-Yi Shen, Haiming Yang, Biplab Sikdar, Shivkumar Kalyanaraman Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 USA Abstract

More information

Nomadic Communications n/ac: MIMO and Space Diversity

Nomadic Communications n/ac: MIMO and Space Diversity Nomadic Communications 802.11n/ac: MIMO and Space Diversity Renato Lo Cigno ANS Group locigno@disi.unitn.it http://disi.unitn.it/locigno/teaching-duties/nomadic-communications CopyRight Quest opera è protetta

More information

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems An Alamouti-based Hybrid-ARQ Scheme MIMO Systems Kodzovi Acolatse Center Communication and Signal Processing Research Department, New Jersey Institute of Technology University Heights, Newark, NJ 07102

More information

2012 LitePoint Corp LitePoint, A Teradyne Company. All rights reserved.

2012 LitePoint Corp LitePoint, A Teradyne Company. All rights reserved. LTE TDD What to Test and Why 2012 LitePoint Corp. 2012 LitePoint, A Teradyne Company. All rights reserved. Agenda LTE Overview LTE Measurements Testing LTE TDD Where to Begin? Building a LTE TDD Verification

More information

Medium Access Control Protocol for WBANS

Medium Access Control Protocol for WBANS Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee

More information

On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels

On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels 1 On the Average Rate Performance of Hybrid-ARQ in Quasi-Static Fading Channels Cong Shen, Student Member, IEEE, Tie Liu, Member, IEEE, and Michael P. Fitz, Senior Member, IEEE Abstract The problem of

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012. Zhu, X., Doufexi, A., & Koçak, T. (2012). A performance enhancement for 60 GHz wireless indoor applications. In ICCE 2012, Las Vegas Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/ICCE.2012.6161865

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

Adapting to the Wireless Channel: SampleRate

Adapting to the Wireless Channel: SampleRate Adapting to the Wireless Channel: SampleRate Brad Karp (with slides contributed by Kyle Jamieson) UCL Computer Science CS M38 / GZ6 27 th January 216 Today 1. Background: digital communications Modulation

More information