Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels
|
|
- Lisa Tucker
- 6 years ago
- Views:
Transcription
1 Analysis o Burst Acknowledgement Mechanisms or IEEE e WLANs over Fading Wireless Channels Department o Computer Science and Inormation Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung Hsien, 433 Taiwan chhliu@pu.edu.tw Abstract: Transmission opportunity, or TXOP, is a channel control method introduced in the IEEE e wireless local area network (WLAN standard. The control method includes some new operations developed or improving channel eiciency. In this paper, we propose an analytical model to evaluate these TXOP operations under ading channels. With this model, we calculate the maximum achievable throughput or the IEEE DCF with RTS/CTS access mode. In addition, we quantiy in the experiments how these operations can aect the system eiciency or dierent environments. The experiment results well conirm the theoretical model that provides new insights on design criterion or a WLAN in the real world. Key Words: WLAN, TXOP, Burst Transmission, Acknowledgment Aggregation, Perormance Analysis. 1 Introduction With the increasing deployment o WLANs in customer premises, came the challenge o supporting diverse networked multimedia applications over a shared wireless medium. Facing the challenge, the IEEE Task Group E proposes an enhanced MAC layer standard, namely IEEE e [1], to provide service dierentiation among WLAN users and applications. The e MAC deines two medium access schemes: contention-based Enhanced Distributed Channel Access (EDCA and centrally controlled Hybrid Coordination Channel Access (HC- CA. However, many research works only ocus on EDCA because it is currently promoted by the majority o vendors. In particular, these works concentrate mainly on how to conigure the WLAN parameters so as to achieve better service dierentiation. The various proposals or realizing EDCA are conined to the assignment o Arbitrary Inter-rame Spacing (AIFS value and Backo periods to dierent traic classes. Additionally, IEEE also provides means or increasing throughput and reducing contention through a prioritized access scheme called Transmission Opportunity (TXOP. This scheme increases aggregate system throughput by allowing multiple consecutive rame exchanges to take place between a station and access-point (AP. More precisely, two new operations, namely data transmission bursting and aggregated acknowledgments that can eiciently eliminate communication overheads in the legacy DCF, are 383 standardized as part o the IEEE e MAC, which receives quite a lot o attentions. In this paper we consider these new operations perormed under an errorprone channel. A modiied Markov chain model o the back-o window is derived to account or both rame error probability and the maximal retransmission limit or each o the ollowing methods that involve the new operations. These methods are 1 the Normal Acknowledgement (NA method that involves only the transmission bursting, and 2 the Block Acknowledgement (BA method that involves both transmission bursting and aggregated acknowledgments. For these methods, we derive their maximum throughputs with dierent rame error probabilities, TXOP limits, and the other parameters involved. Finally, in the experiments, we quantiy the two methods by showing their eects on the system perormance in dierent environments. Their results are shown to be very consistent with those o the theoretical analysis. The paper is organized as ollows. In Section 2, we briely summarize the new operations o EDCA. In Sections 3 and 4, we calculate the maximum throughput or the NA method and the BA method, respectively. The theoretical results are examined in Section 5. The related works are summarized in Section 6, and inally, conclusions are drawn in Section 7. 2 IEEE e EDCA As known widely, the IEEE e deines Enhanced Distributed Channel Access (EDCA to provide d-
2 MH RTS MH RTS BREQ AP CTS ACK ACK ACK ACK AP CTS BACK TXOP Limt (a TXOP Limt (b Figure 1: Transmission with Normal ACK (NA and Block ACK (BA: (a the NA method, and (b the BA method. ierential services among contending stations [1]. Speciically, there are two major operations o EDCA designed to improve the system eiciency. The irst allows the probability o accessing the channel to be dierentiable among stations. The second deines the transmission unit based on the channel access time. Given these operations, we ocus on the innovative aspects o the burst transmission and the corresponding acknowledgment operations. That is, we ocus on the act that once a station succeeds in competing the channel, EDCA will give the station a TXOP or its data transmission and speciy an ACK mechanism to response it. For reerence, their characteristics are summarized as ollows. 2.1 Transmission Opportunity To enhance the system eiciency, EDCA allows a s- tation wining the medium contention to gain a TXOP, deined by the starting time and the maximum duration o a transmission, with that the station can send one or more MPDUs in a burst, separated by and limited by a threshold, namely TXOP limit, to complete its channel access. Given this mechanism, ragmentation is mandatory whenever the MSDU transmission duration exceeds the TXOP limit. 2.2 Block Acknowledgment To reduce the channel wastes caused by the ACK transmissions, EDCA also deines a new acknowledgment scheme that allows a block o MPDUs to be acknowledged by a inal aggregated ACK rame, called block ACK (BACK, and thus reducing the number o ACKs required by each data rame in a burst transmission. The block ACK contains inormation about the reception o the whole block o data rames through a bitmap. However, it will not be transmitted automatically ater a burst o data transmission. Instead, it only begins ater receiving an explicit transmission request, namely block ACK request, sent by the requester. 384 In addition, or quickly identiying collisions and reducing the possibility o other transmissions occurred during a TXOP, the head-o-burst (HOB rame o each new burst transmission requires to be protected with an immediate acknowledgement. The mechanism can be done with the RTS/CTS exchange. That is, ater successully receiving a CTS rame, other stations are orbidden on the channel access during the period o time speciied in the RTS/CTS duration ields. 2.3 NA and BA Methods When these operations combined, two corresponding methods or the WLAN could be resulted. As shown in Fig. 1 (a, the method without BACK, namely the Normal Acknowledgment (NA method, transmits its data rame once a time and waits an immediate ACK until reaching the TXOP limit. On the other hand, the method with BACK, namely Block Acknowledgement (BA method, sends multiple back-to-back data rames, each separated by a period o time, and then issues a block ACK request (BREQ to expect the receipt o the corresponding BACK, as shown in Fig. 1 (b. 3 Throughput Analysis or The NA Method In this section, we irst introduce a Markov chain model or the NA method, and then, based on this model, we calculate the method s maximum achievable throughput. 3.1 Markov Chain Model In this work, we adopt a Markov chain model with a representation similar to that o [2], and also, make a similar assumption that the network consists o N contending stations and each o them always has backlog packets to be transmitted. However, unlike that
3 (c ack i,-2n b 3 data i, -5 ack i, -4 data i, -3 cts i, -2 rts i, -1 (1- Pc (a i, 0 P ack P data P ack P data P cts P rts P c (b (b (b (b (b (b (b (c (a 1 W , 0 0, 1 0, 2 0, W 0 2 0, W0 1 (b W 1 (a i, 0 i, 1 i, 2 i, W i 2 i, W i 1 (a (b W 1 1 i 1 1 i+1, 0 i+1, 1 i+1, 2 i+ 1, W i+ 1 2 i+ 1, W i (b W m 1 1 m, 0 m, 1 m, 2 mw, m 2 mw, m 1 Figure 2: Markov chain model or the NA method work, our model takes into account not only the backo procedure, but also the new operations o EDCA (i.e., TXOP and block ACK, the rame error probability or each type o rame involved, and the maximal allowable number o retransmission attempts. In addition, due to our analysis involving the rame error probability, we consider that 1 only RT- S will suer both collisions and rame errors while the other rames suer only rame errors, and 2 i no response or a RTS/DATA/BREQ returns, the sender will timeout and invoke the binary exponential backo (BEB procedure. The irst is made because a control rame should be transmitted with the maximum BSS basic rate equal to or lower than the data rate. In our work, a control rame is transmitted with the lowest rate to reach the most distant station in the WLAN and thus to robustly prevent collisions in the network 1. The second is made because the BEB procedure will be invoked or the transmission ails, indicated by a ailure to receive a CTS in response to an RTS, a ailure to receive an ACK rame that was expected in response to a unicast MPDU, or ailure to receive a BACK or ACK rame in response to a BREQ rame 1 The same assumption is also adopted in [3]. 385 (reerring to [1]. In such cases, a timeout period is required beore invoking the BEB procedure. The Markov chain model or the NA method is given in Fig. 2, which involves two halves. The bottom hal represents the back-o procedure with the maximal allowable number o retransmission attempts o EDCA, m. When reaching this limit, a station will give up its current transmission and go to the irst stage or the next transmission with probability o 1. On the other hand, the upper hal represents the states ater reaching the zero back-o count that accounts or the NA method. It denotes the act that ater reaching the state o 0 ( i.e., reaching the zero back-o count, the model can not decide its next back-o stage only according to the collision probability P c. Instead, it should go through the states in the upper hal that represents the collision s status, the RTS/CTS transmissions status, and the multiple DATA/ACK transmissions status. Thus, i collisionree, the chain will go to (i; 1 (as shown by the arrow with a mark o (a, and then i RTS error-ree, it will go to (i; 2, and so on. Finally, i collisionree and error-ree or all the rames involved (RT- S/CTS/DATA/ACK, the burst is successully trans-
4 mitted, which leads the chain to the irst back-o stage as indicated by the arrow with a mark o (c. On the contrary, i there is any error occurred, the burst is terminated and the back-o procedure is restarted, which leads the chain to the next back-o stage as indicated by the arrow with a mark o (b Given this model, however, in what ollows we will instead use a simpliied model to obtain the transmission probability i, and with this probability, we can then obtain the maximum achievable throughput by means o the complete Markov chain model shown in Fig. 2. For the irst step, a simpliied Markov chain is made here by merging the states in the upper hal or each stage i and the state (i; 0 in the bottom hal as a virtual state (i 0 ; 0 0, and renaming the other states (i; js by(i 0 ;j 0 s. With the simpliied and equivalent model, we let b(t and s(t denote the stochastic processes representing the back-o timer and the backo stage, respectively, or a given station at slot time t. Then, the non-null probabilities involved can be represented by 8 >< WSEAS TRANSACTIONS on COMMUNICATIONS P i 0 ;k 0 ji 0 ; (k +1 0 g = 1; i k 0 2 (0 0 ; (W i 2 0 ; and i 0 2 (0 0 ;m 0 P 0 0 ;k 0 ji 0 ; 0 0 g = e 1 P W 0 ; i k 2 (0 0 ; (W ; and i 0 2 (0 0 ;m 0 P i 0 ;k 0 j(i 1 0 ; e 0 0 P g = W i ; i k 0 2 (0 0 ; (W i 1 0 ; and i 0 2 (1 0 ;m 0 P 0 >: 0 ;k 0 jm 0 ; 0 0 g = 1 W 0 ; i k 0 2 (0 0 ; (W m 1 0 (1 where P e = 1 PT, and P T denotes the probability leading the current state to the irst back-o stage. Clearly, the latter (P T involves the probability o collision-ree, that o RTS/CTS transmission successul, and that o multiple DATA/ACK transmission successul. That is, P T = (1 P c (1 P rts (1 P cts (1 P data (1 P ack Nb (2 where P c denotes the conditional probability o collision, and can be calculated by 1 (1 i N 1 given N completing stations in the network. N b is the maximum number rames transmitted in a TXOP limit. P rts, P cts, P data, and P ack represent the rame error probabilities o RTS/CTS/DATA/ACK rames, respectively, and can be obtained by 1 (1 P b l, with bit error rate o P b and rame size o l bits. With the above, and ater some algebra manipulations similar to that in [2], we can obtain the stationary 386 probability o state (0 0 ; 0 0 as where b 0 0 ;0 0 = i = 2(1 2 P e (1 P e 8 W 0 (1 (2 P e m+1 (1 P e + i = >< >: (1 2 e P (1 e P m+1 ; i m» m 0 W 0 (1 (2 e P m 0 +1 (1 e P + (1 2 P e (1 P e m+1 + W 0 2 e m0 P m 0 +1 (1 2 P e (1 P em m 0 ; i m>m 0 (3 In above, m 0 represents the largest contention window size. Finally, we can attain the probability i that a station transmits a rame in a randomly chosen slot time by mx i = b i 0 ;0 0 = i0 =0 mx i0 =0 e P m+1 b0 0 ;0 0 e = 1 P m+1 b 1 P e 0 0 ;0 0 (4 Now, it can be seen that the relationship between ep and i in act represents a non-linear system involving the parameters W 0, m, m 0, N, N b, and P b. That is, i = (W 0 ;m;m 0 ;N;N b ;P b, which can be solved with numerical methods. 3.2 Throughput Calculation In this work, we consider the NA method with the IEEE a PHY, which provides dierent modulation schemes with corresponding dierent data rates (namely, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. According to the standard, data rame and control rame are transmitted with dierent rates. Thus, we denote the rate or data rame by r and that or control rame by r Λ. Speciically, a control rame is transmitted with the lowest rate (6 Mbps in order to reach the most distant station in the a WLAN or robustly preventing collisions in the network, as mentioned previously. The channel occupancy time o RTS/CTS exchange, data rame and ACK, are denoted by RT S, CTS, DATA, and ACK, respectively. In above, a data rame with payload size o L should also include a MAC header. As a reerence, all the times involved are summarized in Table 1, which also includes that or the BA method. However, it does not show the details such as that each rame should include a common physical header, and its transmission time has to
5 Table 1: PHY payload and header transmission times RTS CTS ACK BREQ BACK DATA 160=r Λ 112=r Λ 112=r Λ 192=r 1216=r (MAC + P =r Table 2: Channel Occupancy Times T O A T O R T P NA RT S +2 + CTS 0 DATA +2 + ACK BA RT S +2 + CTS BREQ +2 + BACK DATA + be added to the PHY payload time, although our simulations involve all the details. For the throughput calculation, we consider that any block does not split among multiple TXOPs, and hence a data block corresponds to a single data burst. In addition, we consider also that the channel occupancy time is divided into three components. That is, 1 the overhead or channel access, TA O, 2 the time or data payload transmission, T P, and 3 the overhead or channel release, TR O. Speciically, a burst transmission is composed o a given number o unit times o T P because the latter only corresponds to the time or the transmission o a single data rame. Note that in these time components, denotes the short interrame space in the IEEE standard. For reerence, we summarize the values o these components in Table 2, including also that or the BA method. Given that, we can now ocus on the saturated throughput o the network represented by the data payload transmitted in a slot time divided by the average length o a slot time. That is, where S = E[m] E[T ] E[m] = P s P tr E[N s ] E[L] E[T ] = (1 P tr + P tr P s P succ T s + P tr (1 P s T c + P tr P s E[T e ] (5 In (5, E[L] is the average data payload size, and we assume that all rames have the same size, i.e., E[L] = L. E[N s ] is the average number o rames successully transmitted in a burst transmission. P tr is the probability that at least one station transmits in a time slot, and can be obtained by P tr =1 (1 i N. Thus, the probability o an empty slot can be derived by 1 P tr, which consumes an empty slot time. P s is the probability o a single successul transmission given at least one station is transmitting, i.e., 387 P s =(N i (1 i N 1 =P tr. Based on the above, we note that 1 the probability that all data rames in a burst are transmitted successully is given by P tr P s P succ, and 2 the unsuccessul transmission probability due to collisions is P tr (1 P s. The t- wo probabilities are accounted or the corresponding times, i.e., the average time the channel sensed busy due to a successul transmission or a collision, T s, and T c, respectively. And these times can be obtained by T s = TA O + N b T P + TA R + DIFS T c = RT S + DIFS (6 where DIFS denotes the distributed interrame space in the IEEE standard. In addition to that, with the new operations o EDCA, we should also take into account the average time the channel being sensed busy due to successul RTS/CTS exchange but incomplete multiple data rame transmissions in a burst. This is represented by P tr P s E[T e ]. Now, we reer to the complete Markov chain model in Fig. 2 in order to derive the parameters involved in above but not yet solved. At irst, the maximum number rames transmitted in a TXOP limit is obtained by N b = b TXOP T O A T O R + T P c (7 Here, a is involved due to its overlap between T O A and T P. Given this number, we can consider that a burst may be terminated on the i+1th data rame due to its rame error or the corresponding ACK s error. In this case, there are only the irst i rames successully transmitted. Thus, E[N s ] can be represented by E[N s ] = 0 N b i=2 (i 1 (P data (i +P ack 1 (i A + P succ N b (8
6 In above, the probability that a burst is terminated on the ith data rame includes the successul probability o RTS/CTS exchange, that o the irst i 1 data/ack transmissions, and the ailure probability o the ith data rame. That is, P data (i = (1 P rts (1 P cts (1 P data i 1 (1 P ack i 1 P data (9 Similarly, the probability that a burst is terminated on the ith ACK can be obtained by can be considered by taking into account the time required by the irst i data/ack transmissions and then T timeout. That is, T data (i =T ack (i =TA O +i T P +T timeout (15 4 Throughput Analysis o The BA Method P ack (i = (1 P rts (1 P cts (1 P data i (1 P ack i 1 P ack (10 On the contrary, i all data/ack rames in a burst are successully transmitted, the probability should be P succ = (1 P rts (1 P cts (1 P data (1 P ack Nb (11 Given these probabilities, we can now consider the corresponding times or the dierent cases. First, the average time spent or an incomplete burst transmission is obtained by inding the expectation o the times required by transmission ailures occurred at dierent points o time. That is, a burst may ail on RTS/CTS exchange or the ith data/ack transmission. Taking these into account, we can obtain the average time by E[T e ] = P rts T rts +(1 P rts P cts T cts + XN b i=1 P data (i T data (i + P ack (i T ack (i (12 Here, a ailure on RTS/CTS exchange will spend a period o time that ensures the corresponding CTS ailure, and a period o timeout beore the BEB procedure can be restarted. That is, T rts = T cts = T O A + T timeout (13 The last term in above, T timeout, is obtained by T timeout = EIFS DIFS + AIF SN [AC] + T T urnaroundt ime (14 according to [1]. For the timeout, we let AIF SN [AC] = 2 because it is the minimal setting allowed or an EDCA station, and we ignore T T urnaroundt ime when it is small as compared with the other components. Similarly, T data (i and T ack (i 388 In this section, we analyze the BA method or its throughput perormance. To this end, we consider its Markov chain model irst. As shown in Fig. 3, only the upper hal o this model is drawn here or the bottom hal has been given in Fig. 2. In this model, the upper hal similarly represents the states ater reaching the zero back-o count at stage i. However, unlike the NA method, only our states are involved here. That is, collision-ree leads the chain to (i; 1, and then RTS/CTS error-ree leads to (i; 2 and (i; 3, respectively. The irst three states are the same as those o the NA method. However, in the BA method, the multiple data rames in a burst transmission require no responses (ACKs. Thus, only BREQ and BACK should be considered with their rame errors. Hence, i RTS/CTS exchange is successul and BREQ is error-ree, the chain will go to (i; 4. Finally, i BACK is also error-ree, the burst is considered to be successully transmitted, leading the chain to a state in the irst back-o stage. Otherwise, the chain moves to the next back-o stage. With a similar simpliied Markov chain model as that or the NA method, we can obtain the transmission probability i or the BA method. Given this probability, we can obtain the method s maximum achievable throughput with the same equation o (5. O course, some parameters involved should be modiied to accommodate themselves to this method. The irst to be considered is that, instead o using a single ACK to response a data rame, in the BA method all data rames in a burst transmission is acknowledged with only one BACK. It implies that the RTS/CTS exchange and the BREQ/BACK exchange should be all successul. Otherwise, the sender can not conirm which rame is correctly received even though its multiple back-to-back data rames are all transmitted in a burst. Thus, P T in (2, which denotes the probability leading the current state to the irst back-o stage, should be replaced by P T = (1 P c (1 P rts (1 P cts (1 P breq (1 P back (16
7 (c back i, -4 breq i, -3 cts i, -2 rts i, -1 (1- Pc (a i, 0 P back P breq P cts P rts P c (b (b (b (b (b Figure 3: Markov chain model or the BA method. where P breq and P back denote the rame error probabilities o BREQ/BACK rames, respectively, and similar to those or the other rames, they can be also obtained by 1 (1 P b l with bit error rate o P b and rame size o l bits. Similarly, or the BA method, the successul probability in the denominator part o (5 should be rewritten as P succ =(1 P rts (1 P cts (1 P breq (1 P back (17 With this probability, a station can know which and how many rames are successully transmitted in a burst when the corresponding BACK is correctly received. In addition, although a transmission burst consists o N b rames, there may have only i rames located in dierent positions in the burst to be acknowledged. Taking these into account, we have E[N s ] or the BA method as E[N s ]=P succ XN b i=0 i ψ Nb i! (1 P data i (P data N b i (18 Similarly, a station can know its ailures on transmitting RTS, CTS, BREQ, and BACK rames, despite the unknown status o its multiple data transmissions that can only be solved with a BACK. Thereore, we can consider the average time spent on the ailure as E[T e ] = P rts T rts +(1 P rts P cts T cts + (1 P rts (1 P cts P breq T breq + (1 P rts (1 P cts (1 P breq P back T back (19 In above, the time or BREQ or BACK ailure consists o the whole period o time or a burst transmission 389 because a station should wait a period o time to conirm the BACK ailure, and then wait a T timeout period to restart the BEB procedure. Thus, we have T breq = T back = T O A +N b T P +T O R +T timeout (20 5 Perormance Evaluation In this section, we report on experiments made in order to veriy the perormance results derived previously. To this end, we design our experiments to ocus on the new methods in EDCA and ignore the other characteristics in the MAC. That is, we consider that each station carries a single traic low with the same access category (AC that provides only one set o parameters or each station. For example, we let r Λ be 6 Mbps, m 0 be 5, m be 7, CW min (the minimum contention window size be 31, CW max (the maximum contention window size be 1023, and L (the rame size be 1024, or each station. Speciically, we conduct our dierent sets o experiments to exhibit the dierent eects resulted rom the our major actors to be considered, which are bit error probability (P b, TXOP limit, number o stations, and data transmission rate. To ocus on the eects o a single actor, the our sets o experiments are so conducted to vary one o these actors while remaining the others ixed, as summarized in Table 3. For example, in the irst set, we let the data rate be 54 Mbps, the number o stations be 100, and the TXOP limit be 10 ms and 100 ms, respectively, while varying the bit error probability under consideration rom P b = 0 to P b = Given that, or each set we consider the normalized throughput, deined as the throughput divided by the data transmission rate adopted. The corresponding results are given in Fig. 4. The irst set s
8 Table 3: Experiments in the Perormance Evaluation Tag bit error probability (P b TXOP limit (ms number o station data transmission rate (Mbps a 0to and b 0 and to c 0 and to d 0 and to54 results are given in Fig. 4 (a, and the other results are given in the subigures (b, (c, and (d, respectively. As shown in Fig. 4 (a, the throughput decreases when P b increases, as expected. Another expected result is that the higher TXOP limit (100 ms provides higher throughput than that o the lower one (10 ms. However, it should be noted that although the higher limit is 10 times o the lower limit (100 ms/10 ms=10, its improvement on the throughput is much lower than the scale (10 times. This is also expected because the existed overheads in the MAC, e.g., the time required by the common physical header and the necessary spacing time such as, will inevitably consume the bandwidth. In addition, we also observe that the BA method provides higher throughput than that o the NA method. This is because the ormer e- liminates the ACK overhead or each data rame in a transmission burst. However, when P b is high (e.g., 10 3, the multiple rames spaced with only in a burst will not be correctly received with a high probability, and the BA method can only provide nearly the same throughput as the NA method. In Fig. 4 (b, we show more the throughput results that correspond to not only the TXOP limit o 10 ms and 100 ms but also that rom 2 ms to 100 ms, while ixing P b at 0 and 10 5, respectively. From this igure, it can be seen that the curves or the two new methods (NA and BA increase more steeply when the TXOP limit increases at the beginning rom 2 to 10 ms as compared with that ater 10 ms. On the contrary, the IEEE MAC remains the same lat curves because no TXOP limit is given in the MAC and only P b can aect its results. From this igure as well as Fig. 4 (a, we can clearly observe the marginal beneit to be obtained with the new methods when the TXOP limit increases, and its trend would persist despite P b. In Fig. 4 (c, we show the throughput results or each station in the network. As shown in this igure, the per-station throughput decreases as the number o stations increases. This is expected because the increase o the number o stations will increase the channel contention level, which eventually decreases the throughput. Finally, in Fig. 4 (d, it can be observed that the normalized throughput decreases as 390 the data rate increases. It s no surprise because even though the data rate could continuously increase, the control overhead can not be avoided and still remain constant. This overhead will occupy more bandwidths and thus reduce more throughputs as the data rate increases. 6 Related Works In the decade, many related works or WLANs, e.g., [2, 4 8], have been done or the legacy IEEE MAC. Most o them complete their analyses with the assumptions that 1 the network is saturated (i.e., every station always has a packet waiting to be transmitted, and 2 transmission error is a result o rame collision and is not caused by medium error. Although these assumptions provide a tractable basis or the analyses and give these related works remarkable accuracy in theory, such assumptions may not be valid in the real world. As a ollower o the legacy MAC, IEEE e uses the TXOP mechanism to increase system throughput. With the same aim, there are also some other works proposed to provide better throughput when the channel condition is good or multiple rames to be transmitted in a burst [3, 9 13]. These protocols have their own speciications and mechanisms, and thus, do not provide exactly the same two operations o IEEE e. Thereore, the results or those protocols can not be directly applied to the operations under consideration. Apart rom the above, only a ew results have been reported about the new operations under consideration. Currently, only theoretical maximum throughput, theoretical throughput upper limit, and/or theoretical delay lower limit have been proposed in literature [14 17]. None o the above involves a ading channel. On the other hand, although some eorts had been done or the perormance analysis under a ading channel, e,g., [18 21], these eorts mainly ocus on the legacy IEEE MAC and involve no the operations under consideration.
9 Normalized throughput theory simulation BA theory (TXOP = 10ms 0.2 BA simulation (TXOP = 10ms NA theory (TXOP = 10ms NA simulation (TXOP = 10ms BA theory (TXOP = 100ms 0.1 BA simulation (TXOP = 100ms NA theory (TXOP = 100ms NA simulation (TXOP = 100ms ^-7 10^-6 10^-5 10^-4 10^-3 Bit error probablity (Pb Normalized throughput theory (Pb = simulation (Pb =0 BA theory (Pb =0 BA simulation (Pb =0 NA theory (Pb=0 NA simulation (Pb= theory (Pb = simulation (Pb =10-5 BA theory (Pb =10-5 BA simulation (Pb =10-5 NA theory (Pb=10-5 NA simulation (Pb= TXOP limit (ms (a (b 0.08 Normalized throughput theory (Pb = simulation (Pb =0 BA theory (Pb =0 BA simulation (Pb =0 NA theory (Pb=0 NA simulation (Pb= theory (Pb = simulation (Pb =10-5 BA theory (Pb =10-5 BA simulation (Pb =10-5 NA theory (Pb=10-5 NA simulation (Pb= number o stations Normalized throughput theory (Pb = simulation (Pb =0 BA theory (Pb =0 BA simulation (Pb =0 NA theory (Pb=0 NA simulation (Pb= theory (Pb = simulation (Pb =10-5 BA theory (Pb =10-5 BA simulation (Pb =10-5 NA theory (Pb=10-5 NA simulation (Pb= Rate (Mbps (c (d Figure 4: Analysis and simulation results o throughput or the our major actors under consideration: (a the P b results with TXOP limit = 10 ms and 100 ms, (b the TXOP limit results with P b = 0 and 10 5, (c the results rom dierent numbers o stations with P b =0and 10 5 and (d the results rom dierent numbers o rates with P b =0and Conclusion 391 In this paper, we derive the maximum achievable throughput or the new methods o EDCA (NA and BA in an error-prone WLAN with a modiied Markov chain model that can take into account the channel error. Our experiments conirm the correctness o our derivation, and show their results to be very consistent with those o the theory. From both the theory and the experiments, we can see that the two methods outperorm the IEEE MAC rom the our aspects under consideration: bit error probability, TXOP limit, number o stations, and data transmission rate. In addition, we also ind that the BA method usually outperorms the NA method because the ormer requires only a BACK or a bulk o data transmissions and thus reduces the transmission overhead under most o the ading conditions. As a summary, it could be concluded that with the especial concern on the behavior o these methods under the error-prone channel, the perormance model can provide more insights on the design criteria or the IEEE based WLANs operated in the real world, beyond that or the networks under an ideal error-ree environment. Acknowledgement This work was supported by the National Science Council, Republic o China, under grant NSC E Reerences: [1] IEEE e. Part II: Wireless LAN Medium Access Control (MAC and Physical Layer (PHY Speciications. Amendment 8: Medium
10 Access Control (MAC Quality o Service Enhancement. November [2] G. Bianchi. Perormance Analysis o the IEEE Distributed Coordination Function. IEEE Journal on Selected Areas in Communications, 18(3: , March [3] and Chun-Hung Richard Lin. ECTP: An Energy-Eiciency Label-Switching MAC Protocol or Inrastructure Wireless Networks. IEEE Transactions on Vehicular Technology, 56(3: , May [4] H.S. Chhaya and S. Gupta. Perormance Modeling o Asynchronous Transer Methods in the IEEE MAC Protocol. ACM/Balzer Wireless Networks, 3: , [5] Omesh Tickoo and Biplab Sikdar. Queueing Analysis and Delay Mitigation in IEEE Random Access MAC based Wireless Networks. in Proceedings o INFOCOM 04, 2: , March [6]. Uplink and Downlink Resource Allocation in IEEE DCF-Based WLANs. WSEAS Transactions on Communications, 5: , April [7] Shun-Ping Chung and Wei-Sin Chen. Analysis o Prioritized IEEE Wireless LAN with Non-Saturated Traic. WSEAS Transactions on Communications, 5: , Sept [8] Bai Xiang and Mao Yu-Ming. A Simple Adaptive p-persistent MAC Scheme or Service Dierentiation and Maximum Channel Utilization. WSEAS Transactions on Communications, 7:1 7, Jan [9] IrDA: Advanced Inrared (AIr MAC drat protocol speciication - version 1.0. (Inrared Association, [10] B. Sadeghi and V. Kanodia and A. Sabharwal and E. Knightly. Opportunistic Media Access or Multirate Ad Hoc Networks. Proceedings o MobiCom 2002, [11] G. Holland, N. Vaidya, and P. Bahl. A Rate- Adaptive MAC Protocol or Multi-Hop Wireless Networks. in Proceedings o ACM MOBI- COM 01, [12] C. R. Lin, and Y. J. Chang. AAR: An Adaptive Rate Control Protocol or Mobile Ad Hoc Networks. in Proceedings o ICON 2003, [13] K. Lu, D. Wu, Y. Fang, and R. Qiu. Perormance Analysis o A Burst--Based MAC Protocol or Ultra-Wideband Ad Hoc Networks. in Proceedings o IEEE International Conerence on Communications (ICC 2005, May [14] Yang Xiao and Jon Rosdahl. Perormance Analysis and Enhancement or the Current and Future IEEE MAC Protocols. Mobile Computing and Communication Review, 7(2, April [15] E. Varthis, P. Theodorou. and A.C. Boucouvals. Analysis o Burst Acknowledgment Mechanism o IEEE e MAC Protocol over Inrared Wireless LANs. in Proceedings o IEEE International Conerence on Sotware, Telecommunications and Computer Networks (SotCom, October [16] V. Vitsas and A.C. Boucouvalas. Perormance Analysis o the Advanced Inrared (Air C- SMA/CA MAC Protocol or Wireless LANs. Wireless Networks, 9: , [17] Ilenia Tinnirello and Sunghyun Choi. Eiciency analysis o burst transmissions with block ACK in contention-based e WLANs. in Proceedings o IEEE International Conerence on Communications (ICC, 5: , May [18] Pero Latkoski, Zoran Hadzi-Velkov and Borislav Popovski. Perormance analysis o IEEE a WLAN in block ading channel using SDL simulation. in Proceedings o IEEE TEL- SIKS 2005, 1:97 100, Sept [19] Xiaohui Xu and Xiaokang Lin. Throughput Enhancement o the IEEE DCF in ading channel. in Proceedings o IEEE International Conerence on Wireless and Optical Communications Networks, pages 1 5, April [20] Periklis Chatzimisios, Anthony C. Boucouvalas and Vasileos Vitsas. Perormance Analysis o IEEE DCF in Presence o Transmission Errors. in Proceedings o IEEE International Conerence on Communications, 7: , June [21] Jun Yin, Xiaodong Wang and Dharma P. Agrawal. Optimal Packet Size in Error-prone Channel or IEEE Distributed Coordination Function. in Proceedings o IEEE International Conerence on Wireless Communications and Networking Conerence (WCNC, 3: , March 2004.
IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model
WIFI IEEE 802 Layers The IEEE 802 amily and its relation to the OSI model Need For Speed Wireless LAN Applications Streaming Media (HDTV, DVD) VoIP Interactive Gaming Data Transer Reuire Hundreds o Mps
More informationPerformance Analysis of Transmissions Opportunity Limit in e WLANs
Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,
More informationPerformance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model
Perormance Study o Block ACK and Reverse Direction in IEEE 802.11n using a Markov Chain Model Md. Akbar Hossain, Nurul I Sarkar, Jairo Gutierrez, William Liu School o Computer and Mathematical Sciences
More informationPower Efficiency in IEEE a WLAN with Cross-Layer Adaptation
Power Eiciency in IEEE 802.11a WLA with Cross-Layer Adaptation Jun Zhao, Zihua Guo, and Wenwu Zhu Microsot Research Asia 3/F, Beijing Sigma Center, o.49, Zhichun Road, Haidian District Beijing 100080,
More informationPerformance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*
2016 International Conerence on ustainable nergy, nvironment and Inormation ngineering (I 2016) IBN: 978-1-60595-337-3 Perormance Analysis o the I 802.11n Block- Mechanism in an rror-prone Channel Xue-ing
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationDRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication
DRaMA: Device-speciic Repetition-aided Multiple Access or Ultra-Reliable and Low-Latency Communication itaek Lee, Sundo im, Junseok im, and Sunghyun Choi Department o ECE and INMC, Seoul National University,
More informationModeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks
Modeling the Eect o Intererences among N Collocated Heterogeneous Wireless Networs Bilal Khan and Jong-Su Ahn Department o Computer Science and Engineering, Donggu University, Seoul, Korea bilalhan83@hotmailcom
More informationMaximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs
Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington
More informationAnalytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls
Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore
More informationCOSC 3213: Communication Networks Chapter 5: Handout #6
OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to
More informationNon-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks
Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationTraffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells
Traic Assignment Over Licensed and Unlicensed Bands or Dual-Band Femtocells Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute o NYU, Brooklyn, NY 11201 InterDigital Communications,
More informationStarvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks
Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop
More informationSPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks
SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can
More informationOn the Impact of Fading and Inter-piconet Interference on Bluetooth Performance
On the Impact o Fading and Inter-piconet Intererence on Bluetooth Perormance Andrea Zanella Dept. o Inormation Engineering University o Padova, Padova, Italy zanella@dei.unipd.it Andrea Tonello Bell Labs,
More informationWireless Communication
Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY
More informationWIRELESS communications have shifted from bit rates
IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas
More informationIEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group <
Project IEEE 802.16 Broadband Wireless Access Working Group Title Cognitive radio concepts or 802.16h Date Submitted 2005-07-11 Source(s) Mariana Goldhamer Alvarion Tel Aviv, 21
More informationA Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks
A Modiied Proile-Based Location Caching with Fixed Local Anchor or Wireless Mobile Networks Md. Kowsar Hossain, Tumpa Rani Roy, Mousume Bhowmick 3 Department o Computer Science and Engineering, Khulna
More informationRADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags
A Multiple Hashing Approach to Complete Identiication o Missing RFID ags Xiulong Liu, Keqiu Li*, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu Abstract Owing to its superior properties, such as ast identiication
More informationAn Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks
1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationPerformance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 23-22 (28) Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networs YU-LIANG KUO, ERIC HSIAO-KUANG WU + AND GEN-HUEY
More informationEnhancement of Wide Bandwidth Operation in IEEE ac Networks
Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea
More informationPerformance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation
2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation
More informationEffect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI
2016 International Conerence on Sustainable Energy, Environment and Inormation Engineering (SEEIE 2016) ISBN: 978-1-60595-337-3 Eect o Layer Spacing and Line Width o PCB Coil on Resonant Frequency Shen
More informationSoftware Defined Radio Forum Contribution
Committee: Technical Sotware Deined Radio Forum Contribution Title: VITA-49 Drat Speciication Appendices Source Lee Pucker SDR Forum 604-828-9846 Lee.Pucker@sdrorum.org Date: 7 March 2007 Distribution:
More informationSequence-based Rendezvous for Dynamic Spectrum Access
Sequence-based endezvous or Dynamic Spectrum Access Luiz A. DaSilva Bradley Dept. o Electrical and Computer Engineering Virginia Tech Arlington, VA, USA ldasilva@vt.edu Igor Guerreiro Wireless Telecommunications
More informationIlenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello
Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative
More informationIEEE ax / OFDMA
#WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed
More informationSpectrum allocation with beamforming antenna in heterogeneous overlaying networks
2st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Spectrum allocation with beamorming antenna in heterogeneous overlaying networks Sunheui Ryoo, Changhee Joo and
More informationA new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks
A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,
More informationAn Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks
An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU
More informationOn Improving Voice Capacity in Infrastructure Networks
On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in
More informationAN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION
AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION J-P. Kauppi, K.S. Martikainen Patria Aviation Oy, Naulakatu 3, 33100 Tampere, Finland, ax +358204692696 jukka-pekka.kauppi@patria.i,
More informationResearch Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs
Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and
More informationPerformance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes
Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationOn the Coexistence of Overlapping BSSs in WLANs
On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.
More informationEfficient Monitoring of Dynamic Tag Populations in RFID Systems
2 2 Ninth IFIP IEEE/IFIP Ninth International Conerence on on Embedded and and Ubiquitous Computing Eicient Monitoring o Dynamic Tag Populations in RFID Systems Qingjun Xiao, Kai Bu, Bin Xiao Department
More informationMedium Access Diversity with Uplink-Downlink Duality and Transmit Beamforming in Multiple-Antenna Wireless Networks
Medium Access Diversity with Uplink-Downlink Duality and Transmit Beamforming in Multiple-Antenna Wireless Networks Miao Zhao, Zhenghao Zhang and Yuanyuan Yang Dept. of Electrical & Computer Engineering,
More informationPower-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks
Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex
More informationSynchronization and Beaconing in IEEE s Mesh Networks
Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute
More informationECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation
ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the
More informationMax Covering Phasor Measurement Units Placement for Partial Power System Observability
Engineering Management Research; Vol. 2, No. 1; 2013 ISSN 1927-7318 E-ISSN 1927-7326 Published by Canadian Center o Science and Education Max Covering Phasor Measurement Units Placement or Partial Power
More informationOutline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.
Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationIEEE Broadband Wireless Access Working Group <
Project Title IEEE 80.16 Broadband Wireless Access Working Group Channel and intererence model or 80.16b Physical Layer Date Submitted Source(s) Re: 000-31-09 Tal Kaitz BreezeCOM
More informationGenerating Function Analysis of Wireless Networks and ARQ Systems
Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical
More informationNext Generation Wireless LANs
Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationDynamic Channel Bonding in Multicarrier Wireless Networks
Dynamic Channel Bonding in Multicarrier Wireless Networks Pei Huang, Xi Yang, and Li Xiao Department o Computer Science and Engineering Michigan State University Email: {huangpe3, yangxi, lxiao}@cse.msu.edu
More informationOpportunism vs. Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading
1 Opportunism vs. Cooperation: Analysis o Forwarding Strategies in Multihop Wireless Networks with Random Fading Chi-Kin Chau, Anand Seetharam, Jim Kurose, Don Towsley Masdar Institute o Science and Technology,
More informationA Distributed Opportunistic Access Scheme for OFDMA Systems
A Distributed Opportunistic Access Scheme for OFDMA Systems Dandan Wang Richardson, Tx 7508 Email: dxw05000@utdallas.edu Hlaing Minn Richardson, Tx 7508 Email: hlaing.minn@utdallas.edu Naofal Al-Dhahir
More informationAnalyzing Split Channel Medium Access Control Schemes
IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More informationMultiple access techniques
Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ
More informationAccess Point Selection for Multi-Rate IEEE Wireless LANs
Access Point Selection for Multi-Rate IEEE 802.11 Wireless LANs Shicong Yang Avideh Zakhor Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2014-104
More informationPower Optimization in Stratix IV FPGAs
Power Optimization in Stratix IV FPGAs May 2008, ver.1.0 Application Note 514 Introduction The Stratix IV amily o devices rom Altera is based on 0.9 V, 40 nm Process technology. Stratix IV FPGAs deliver
More informationPredicting the performance of a photodetector
Page 1 Predicting the perormance o a photodetector by Fred Perry, Boston Electronics Corporation, 91 Boylston Street, Brookline, MA 02445 USA. Comments and corrections and questions are welcome. The perormance
More informationChutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.
Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS
More informationChapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University
Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional
More informationLousy Processing Increases Energy Efficiency in Massive MIMO Systems
1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,
More informationOptimal Placement of Phasor Measurement Units for State Estimation
PSERC Optimal Placement o Phasor Measurement Units or State Estimation Final Project Report Power Systems Engineering Research Center A National Science Foundation Industry/University Cooperative Research
More informationA MATLAB Model of Hybrid Active Filter Based on SVPWM Technique
International Journal o Electrical Engineering. ISSN 0974-2158 olume 5, Number 5 (2012), pp. 557-569 International Research Publication House http://www.irphouse.com A MATLAB Model o Hybrid Active Filter
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationSpatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks
Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks A. Singh, P. Ramanathan and B. Van Veen Department of Electrical and Computer Engineering University of Wisconsin-Madison
More informationPerformance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs
Wireless Networks 9, 495 507, 003 003 Kluwer Academic Publishers. Manufactured in The Netherlands. Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs V. VITSAS Department
More information% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.
! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired
More informationIntroduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)
Introduction to OFDM Characteristics o OFDM (Orthogonal Frequency Division Multiplexing Parallel data transmission with very long symbol duration - Robust under multi-path channels Transormation o a requency-selective
More informationFrequency-Foldback Technique Optimizes PFC Efficiency Over The Full Load Range
ISSUE: October 2012 Frequency-Foldback Technique Optimizes PFC Eiciency Over The Full Load Range by Joel Turchi, ON Semiconductor, Toulouse, France Environmental concerns lead to new eiciency requirements
More information3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE
3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER 2008 Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks Yaser Pourmohammadi Fallah,
More informationEnhancing Wireless Networks with Directional Antenna and Multiple Receivers
Enhancing 802.11 Wireless Networks with Directional Antenna and Multiple Receivers Chenxi Zhu Fujitsu Labs of America 8400 Baltimore Ave., Suite 302 College Park, Maryland 20740 chenxi.zhu@us.fujitsu.com
More informationCross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment
Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper
More informationDynamic 20/40/60/80 MHz Channel Access for 80 MHz ac
Wireless Pers Commun (2014) 79:235 248 DOI 10.1007/s11277-014-1851-7 Dynamic 20/40/60/80 MHz Channel Access for 80 MHz 802.11ac Andrzej Stelter Paweł Szulakiewicz Robert Kotrys Maciej Krasicki Piotr Remlein
More informationOptimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm
IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), V1 PP 44-57 www.iosrjen.org Optimizing Reception Perormance o new UWB Pulse shape over Multipath
More informationWorst Case Modelling of Wireless Sensor Networks
Worst Case Modelling o Wireless Sensor Networks Jens B. Schmitt disco Distributed Computer Systems Lab, University o Kaiserslautern, Germany jschmitt@inormatik.uni-kl.de 1 Abstract At the current state
More informationLoad Balancing for Centralized Wireless Networks
Load Balancing for Centralized Wireless Networks Hong Bong Kim and Adam Wolisz Telecommunication Networks Group Technische Universität Berlin Sekr FT5 Einsteinufer 5 0587 Berlin Germany Email: {hbkim,
More informationSaturation throughput analysis of error-prone wireless networks
Saturation throughput analysis of error-prone 802. wireless networks Qiang Ni,,, Tianji Li, Thierry Turletti 2, and Yang Xiao 3 Hamilton Institute, National University of Ireland Maynooth, Co. Kildare,
More informationVEHICULAR ad hoc networks (VANETs) are becoming
Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast
More informationA Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks
1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac
More informationAchieving Temporal Fairness in Multi-Rate WLANs with Capture Effect
Achieving emporal Fairness in Multi-Rate 82.11 WLANs with Capture Effect Lin Luo, Marco Gruteser WINLAB, Rutgers University {clarylin, gruteser}@winlab.rutgers.edu Hang Liu Corporate Research Lab, homson
More informationIEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention
IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract
More informationEnd-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference
End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern
More informationOpportunistic Routing in Wireless Mesh Networks
Opportunistic Routing in Wireless Mesh Networks Amir arehshoorzadeh amir@ac.upc.edu Llorenç Cerdá-Alabern llorenc@ac.upc.edu Vicent Pla vpla@dcom.upv.es August 31, 2012 Opportunistic Routing in Wireless
More informationPerformance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability
Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering,
More informationState Estimation over Customized Wireless Network
Wireless Engineering and echnology, 2012, 3, 221-228 http://dx.doi.org/10.4236/wet.2012.34032 Published Online October 2012 (http://www.scirp.org/ournal/wet) 221 Sayed Vahid Naghavi 1, Ali Azami 2, Freidoon
More informationDKAN0008A PIC18 Software UART Timing Requirements
DKAN0008A PIC18 Sotware UART Timing Requirements 11 June 2009 Introduction Design conditions oten limit the hardware peripherals available or an embedded system. Perhaps the available hardware UARTs are
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationDesign of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment
2016 Sixth International Conerence on Instrumentation & Measurement, Computer, Communication and Control Design o Multidimensional Space Motion Simulation System For Spacecrat Attitude and Orbit Guidance
More informationInformation-Theoretic Study on Routing Path Selection in Two-Way Relay Networks
Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Shanshan Wu, Wenguang Mao, and Xudong Wang UM-SJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China Email:
More informationAnalysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate
Analysis o Power Consumption o H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Bambang A.B. Sari, Panos Nasiopoulos and Victor C.M. eung Department o Electrical
More informationDesign of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems
1 Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems + Bing-Zhi Hsieh, + Yu-Hsiang Chao, + Ray-Guang Cheng, and ++ Navid Nikaein + Department of Electronic and
More informationImage Characteristic Based Rate Control Algorithm for HEVC
Image Characteristic Based Rate Control Algorithm or HEVC Mayan Fei, Zongju Peng*, Weiguo Chen, Fen Chen Faculty o Inormation Science and Engineering, Ningbo University, Ningbo 352 China *pengzongju@26.com;
More informationMultiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios
Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More information