Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels

Size: px
Start display at page:

Download "Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels"

Transcription

1 Analysis o Burst Acknowledgement Mechanisms or IEEE e WLANs over Fading Wireless Channels Department o Computer Science and Inormation Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung Hsien, 433 Taiwan chhliu@pu.edu.tw Abstract: Transmission opportunity, or TXOP, is a channel control method introduced in the IEEE e wireless local area network (WLAN standard. The control method includes some new operations developed or improving channel eiciency. In this paper, we propose an analytical model to evaluate these TXOP operations under ading channels. With this model, we calculate the maximum achievable throughput or the IEEE DCF with RTS/CTS access mode. In addition, we quantiy in the experiments how these operations can aect the system eiciency or dierent environments. The experiment results well conirm the theoretical model that provides new insights on design criterion or a WLAN in the real world. Key Words: WLAN, TXOP, Burst Transmission, Acknowledgment Aggregation, Perormance Analysis. 1 Introduction With the increasing deployment o WLANs in customer premises, came the challenge o supporting diverse networked multimedia applications over a shared wireless medium. Facing the challenge, the IEEE Task Group E proposes an enhanced MAC layer standard, namely IEEE e [1], to provide service dierentiation among WLAN users and applications. The e MAC deines two medium access schemes: contention-based Enhanced Distributed Channel Access (EDCA and centrally controlled Hybrid Coordination Channel Access (HC- CA. However, many research works only ocus on EDCA because it is currently promoted by the majority o vendors. In particular, these works concentrate mainly on how to conigure the WLAN parameters so as to achieve better service dierentiation. The various proposals or realizing EDCA are conined to the assignment o Arbitrary Inter-rame Spacing (AIFS value and Backo periods to dierent traic classes. Additionally, IEEE also provides means or increasing throughput and reducing contention through a prioritized access scheme called Transmission Opportunity (TXOP. This scheme increases aggregate system throughput by allowing multiple consecutive rame exchanges to take place between a station and access-point (AP. More precisely, two new operations, namely data transmission bursting and aggregated acknowledgments that can eiciently eliminate communication overheads in the legacy DCF, are 383 standardized as part o the IEEE e MAC, which receives quite a lot o attentions. In this paper we consider these new operations perormed under an errorprone channel. A modiied Markov chain model o the back-o window is derived to account or both rame error probability and the maximal retransmission limit or each o the ollowing methods that involve the new operations. These methods are 1 the Normal Acknowledgement (NA method that involves only the transmission bursting, and 2 the Block Acknowledgement (BA method that involves both transmission bursting and aggregated acknowledgments. For these methods, we derive their maximum throughputs with dierent rame error probabilities, TXOP limits, and the other parameters involved. Finally, in the experiments, we quantiy the two methods by showing their eects on the system perormance in dierent environments. Their results are shown to be very consistent with those o the theoretical analysis. The paper is organized as ollows. In Section 2, we briely summarize the new operations o EDCA. In Sections 3 and 4, we calculate the maximum throughput or the NA method and the BA method, respectively. The theoretical results are examined in Section 5. The related works are summarized in Section 6, and inally, conclusions are drawn in Section 7. 2 IEEE e EDCA As known widely, the IEEE e deines Enhanced Distributed Channel Access (EDCA to provide d-

2 MH RTS MH RTS BREQ AP CTS ACK ACK ACK ACK AP CTS BACK TXOP Limt (a TXOP Limt (b Figure 1: Transmission with Normal ACK (NA and Block ACK (BA: (a the NA method, and (b the BA method. ierential services among contending stations [1]. Speciically, there are two major operations o EDCA designed to improve the system eiciency. The irst allows the probability o accessing the channel to be dierentiable among stations. The second deines the transmission unit based on the channel access time. Given these operations, we ocus on the innovative aspects o the burst transmission and the corresponding acknowledgment operations. That is, we ocus on the act that once a station succeeds in competing the channel, EDCA will give the station a TXOP or its data transmission and speciy an ACK mechanism to response it. For reerence, their characteristics are summarized as ollows. 2.1 Transmission Opportunity To enhance the system eiciency, EDCA allows a s- tation wining the medium contention to gain a TXOP, deined by the starting time and the maximum duration o a transmission, with that the station can send one or more MPDUs in a burst, separated by and limited by a threshold, namely TXOP limit, to complete its channel access. Given this mechanism, ragmentation is mandatory whenever the MSDU transmission duration exceeds the TXOP limit. 2.2 Block Acknowledgment To reduce the channel wastes caused by the ACK transmissions, EDCA also deines a new acknowledgment scheme that allows a block o MPDUs to be acknowledged by a inal aggregated ACK rame, called block ACK (BACK, and thus reducing the number o ACKs required by each data rame in a burst transmission. The block ACK contains inormation about the reception o the whole block o data rames through a bitmap. However, it will not be transmitted automatically ater a burst o data transmission. Instead, it only begins ater receiving an explicit transmission request, namely block ACK request, sent by the requester. 384 In addition, or quickly identiying collisions and reducing the possibility o other transmissions occurred during a TXOP, the head-o-burst (HOB rame o each new burst transmission requires to be protected with an immediate acknowledgement. The mechanism can be done with the RTS/CTS exchange. That is, ater successully receiving a CTS rame, other stations are orbidden on the channel access during the period o time speciied in the RTS/CTS duration ields. 2.3 NA and BA Methods When these operations combined, two corresponding methods or the WLAN could be resulted. As shown in Fig. 1 (a, the method without BACK, namely the Normal Acknowledgment (NA method, transmits its data rame once a time and waits an immediate ACK until reaching the TXOP limit. On the other hand, the method with BACK, namely Block Acknowledgement (BA method, sends multiple back-to-back data rames, each separated by a period o time, and then issues a block ACK request (BREQ to expect the receipt o the corresponding BACK, as shown in Fig. 1 (b. 3 Throughput Analysis or The NA Method In this section, we irst introduce a Markov chain model or the NA method, and then, based on this model, we calculate the method s maximum achievable throughput. 3.1 Markov Chain Model In this work, we adopt a Markov chain model with a representation similar to that o [2], and also, make a similar assumption that the network consists o N contending stations and each o them always has backlog packets to be transmitted. However, unlike that

3 (c ack i,-2n b 3 data i, -5 ack i, -4 data i, -3 cts i, -2 rts i, -1 (1- Pc (a i, 0 P ack P data P ack P data P cts P rts P c (b (b (b (b (b (b (b (c (a 1 W , 0 0, 1 0, 2 0, W 0 2 0, W0 1 (b W 1 (a i, 0 i, 1 i, 2 i, W i 2 i, W i 1 (a (b W 1 1 i 1 1 i+1, 0 i+1, 1 i+1, 2 i+ 1, W i+ 1 2 i+ 1, W i (b W m 1 1 m, 0 m, 1 m, 2 mw, m 2 mw, m 1 Figure 2: Markov chain model or the NA method work, our model takes into account not only the backo procedure, but also the new operations o EDCA (i.e., TXOP and block ACK, the rame error probability or each type o rame involved, and the maximal allowable number o retransmission attempts. In addition, due to our analysis involving the rame error probability, we consider that 1 only RT- S will suer both collisions and rame errors while the other rames suer only rame errors, and 2 i no response or a RTS/DATA/BREQ returns, the sender will timeout and invoke the binary exponential backo (BEB procedure. The irst is made because a control rame should be transmitted with the maximum BSS basic rate equal to or lower than the data rate. In our work, a control rame is transmitted with the lowest rate to reach the most distant station in the WLAN and thus to robustly prevent collisions in the network 1. The second is made because the BEB procedure will be invoked or the transmission ails, indicated by a ailure to receive a CTS in response to an RTS, a ailure to receive an ACK rame that was expected in response to a unicast MPDU, or ailure to receive a BACK or ACK rame in response to a BREQ rame 1 The same assumption is also adopted in [3]. 385 (reerring to [1]. In such cases, a timeout period is required beore invoking the BEB procedure. The Markov chain model or the NA method is given in Fig. 2, which involves two halves. The bottom hal represents the back-o procedure with the maximal allowable number o retransmission attempts o EDCA, m. When reaching this limit, a station will give up its current transmission and go to the irst stage or the next transmission with probability o 1. On the other hand, the upper hal represents the states ater reaching the zero back-o count that accounts or the NA method. It denotes the act that ater reaching the state o 0 ( i.e., reaching the zero back-o count, the model can not decide its next back-o stage only according to the collision probability P c. Instead, it should go through the states in the upper hal that represents the collision s status, the RTS/CTS transmissions status, and the multiple DATA/ACK transmissions status. Thus, i collisionree, the chain will go to (i; 1 (as shown by the arrow with a mark o (a, and then i RTS error-ree, it will go to (i; 2, and so on. Finally, i collisionree and error-ree or all the rames involved (RT- S/CTS/DATA/ACK, the burst is successully trans-

4 mitted, which leads the chain to the irst back-o stage as indicated by the arrow with a mark o (c. On the contrary, i there is any error occurred, the burst is terminated and the back-o procedure is restarted, which leads the chain to the next back-o stage as indicated by the arrow with a mark o (b Given this model, however, in what ollows we will instead use a simpliied model to obtain the transmission probability i, and with this probability, we can then obtain the maximum achievable throughput by means o the complete Markov chain model shown in Fig. 2. For the irst step, a simpliied Markov chain is made here by merging the states in the upper hal or each stage i and the state (i; 0 in the bottom hal as a virtual state (i 0 ; 0 0, and renaming the other states (i; js by(i 0 ;j 0 s. With the simpliied and equivalent model, we let b(t and s(t denote the stochastic processes representing the back-o timer and the backo stage, respectively, or a given station at slot time t. Then, the non-null probabilities involved can be represented by 8 >< WSEAS TRANSACTIONS on COMMUNICATIONS P i 0 ;k 0 ji 0 ; (k +1 0 g = 1; i k 0 2 (0 0 ; (W i 2 0 ; and i 0 2 (0 0 ;m 0 P 0 0 ;k 0 ji 0 ; 0 0 g = e 1 P W 0 ; i k 2 (0 0 ; (W ; and i 0 2 (0 0 ;m 0 P i 0 ;k 0 j(i 1 0 ; e 0 0 P g = W i ; i k 0 2 (0 0 ; (W i 1 0 ; and i 0 2 (1 0 ;m 0 P 0 >: 0 ;k 0 jm 0 ; 0 0 g = 1 W 0 ; i k 0 2 (0 0 ; (W m 1 0 (1 where P e = 1 PT, and P T denotes the probability leading the current state to the irst back-o stage. Clearly, the latter (P T involves the probability o collision-ree, that o RTS/CTS transmission successul, and that o multiple DATA/ACK transmission successul. That is, P T = (1 P c (1 P rts (1 P cts (1 P data (1 P ack Nb (2 where P c denotes the conditional probability o collision, and can be calculated by 1 (1 i N 1 given N completing stations in the network. N b is the maximum number rames transmitted in a TXOP limit. P rts, P cts, P data, and P ack represent the rame error probabilities o RTS/CTS/DATA/ACK rames, respectively, and can be obtained by 1 (1 P b l, with bit error rate o P b and rame size o l bits. With the above, and ater some algebra manipulations similar to that in [2], we can obtain the stationary 386 probability o state (0 0 ; 0 0 as where b 0 0 ;0 0 = i = 2(1 2 P e (1 P e 8 W 0 (1 (2 P e m+1 (1 P e + i = >< >: (1 2 e P (1 e P m+1 ; i m» m 0 W 0 (1 (2 e P m 0 +1 (1 e P + (1 2 P e (1 P e m+1 + W 0 2 e m0 P m 0 +1 (1 2 P e (1 P em m 0 ; i m>m 0 (3 In above, m 0 represents the largest contention window size. Finally, we can attain the probability i that a station transmits a rame in a randomly chosen slot time by mx i = b i 0 ;0 0 = i0 =0 mx i0 =0 e P m+1 b0 0 ;0 0 e = 1 P m+1 b 1 P e 0 0 ;0 0 (4 Now, it can be seen that the relationship between ep and i in act represents a non-linear system involving the parameters W 0, m, m 0, N, N b, and P b. That is, i = (W 0 ;m;m 0 ;N;N b ;P b, which can be solved with numerical methods. 3.2 Throughput Calculation In this work, we consider the NA method with the IEEE a PHY, which provides dierent modulation schemes with corresponding dierent data rates (namely, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. According to the standard, data rame and control rame are transmitted with dierent rates. Thus, we denote the rate or data rame by r and that or control rame by r Λ. Speciically, a control rame is transmitted with the lowest rate (6 Mbps in order to reach the most distant station in the a WLAN or robustly preventing collisions in the network, as mentioned previously. The channel occupancy time o RTS/CTS exchange, data rame and ACK, are denoted by RT S, CTS, DATA, and ACK, respectively. In above, a data rame with payload size o L should also include a MAC header. As a reerence, all the times involved are summarized in Table 1, which also includes that or the BA method. However, it does not show the details such as that each rame should include a common physical header, and its transmission time has to

5 Table 1: PHY payload and header transmission times RTS CTS ACK BREQ BACK DATA 160=r Λ 112=r Λ 112=r Λ 192=r 1216=r (MAC + P =r Table 2: Channel Occupancy Times T O A T O R T P NA RT S +2 + CTS 0 DATA +2 + ACK BA RT S +2 + CTS BREQ +2 + BACK DATA + be added to the PHY payload time, although our simulations involve all the details. For the throughput calculation, we consider that any block does not split among multiple TXOPs, and hence a data block corresponds to a single data burst. In addition, we consider also that the channel occupancy time is divided into three components. That is, 1 the overhead or channel access, TA O, 2 the time or data payload transmission, T P, and 3 the overhead or channel release, TR O. Speciically, a burst transmission is composed o a given number o unit times o T P because the latter only corresponds to the time or the transmission o a single data rame. Note that in these time components, denotes the short interrame space in the IEEE standard. For reerence, we summarize the values o these components in Table 2, including also that or the BA method. Given that, we can now ocus on the saturated throughput o the network represented by the data payload transmitted in a slot time divided by the average length o a slot time. That is, where S = E[m] E[T ] E[m] = P s P tr E[N s ] E[L] E[T ] = (1 P tr + P tr P s P succ T s + P tr (1 P s T c + P tr P s E[T e ] (5 In (5, E[L] is the average data payload size, and we assume that all rames have the same size, i.e., E[L] = L. E[N s ] is the average number o rames successully transmitted in a burst transmission. P tr is the probability that at least one station transmits in a time slot, and can be obtained by P tr =1 (1 i N. Thus, the probability o an empty slot can be derived by 1 P tr, which consumes an empty slot time. P s is the probability o a single successul transmission given at least one station is transmitting, i.e., 387 P s =(N i (1 i N 1 =P tr. Based on the above, we note that 1 the probability that all data rames in a burst are transmitted successully is given by P tr P s P succ, and 2 the unsuccessul transmission probability due to collisions is P tr (1 P s. The t- wo probabilities are accounted or the corresponding times, i.e., the average time the channel sensed busy due to a successul transmission or a collision, T s, and T c, respectively. And these times can be obtained by T s = TA O + N b T P + TA R + DIFS T c = RT S + DIFS (6 where DIFS denotes the distributed interrame space in the IEEE standard. In addition to that, with the new operations o EDCA, we should also take into account the average time the channel being sensed busy due to successul RTS/CTS exchange but incomplete multiple data rame transmissions in a burst. This is represented by P tr P s E[T e ]. Now, we reer to the complete Markov chain model in Fig. 2 in order to derive the parameters involved in above but not yet solved. At irst, the maximum number rames transmitted in a TXOP limit is obtained by N b = b TXOP T O A T O R + T P c (7 Here, a is involved due to its overlap between T O A and T P. Given this number, we can consider that a burst may be terminated on the i+1th data rame due to its rame error or the corresponding ACK s error. In this case, there are only the irst i rames successully transmitted. Thus, E[N s ] can be represented by E[N s ] = 0 N b i=2 (i 1 (P data (i +P ack 1 (i A + P succ N b (8

6 In above, the probability that a burst is terminated on the ith data rame includes the successul probability o RTS/CTS exchange, that o the irst i 1 data/ack transmissions, and the ailure probability o the ith data rame. That is, P data (i = (1 P rts (1 P cts (1 P data i 1 (1 P ack i 1 P data (9 Similarly, the probability that a burst is terminated on the ith ACK can be obtained by can be considered by taking into account the time required by the irst i data/ack transmissions and then T timeout. That is, T data (i =T ack (i =TA O +i T P +T timeout (15 4 Throughput Analysis o The BA Method P ack (i = (1 P rts (1 P cts (1 P data i (1 P ack i 1 P ack (10 On the contrary, i all data/ack rames in a burst are successully transmitted, the probability should be P succ = (1 P rts (1 P cts (1 P data (1 P ack Nb (11 Given these probabilities, we can now consider the corresponding times or the dierent cases. First, the average time spent or an incomplete burst transmission is obtained by inding the expectation o the times required by transmission ailures occurred at dierent points o time. That is, a burst may ail on RTS/CTS exchange or the ith data/ack transmission. Taking these into account, we can obtain the average time by E[T e ] = P rts T rts +(1 P rts P cts T cts + XN b i=1 P data (i T data (i + P ack (i T ack (i (12 Here, a ailure on RTS/CTS exchange will spend a period o time that ensures the corresponding CTS ailure, and a period o timeout beore the BEB procedure can be restarted. That is, T rts = T cts = T O A + T timeout (13 The last term in above, T timeout, is obtained by T timeout = EIFS DIFS + AIF SN [AC] + T T urnaroundt ime (14 according to [1]. For the timeout, we let AIF SN [AC] = 2 because it is the minimal setting allowed or an EDCA station, and we ignore T T urnaroundt ime when it is small as compared with the other components. Similarly, T data (i and T ack (i 388 In this section, we analyze the BA method or its throughput perormance. To this end, we consider its Markov chain model irst. As shown in Fig. 3, only the upper hal o this model is drawn here or the bottom hal has been given in Fig. 2. In this model, the upper hal similarly represents the states ater reaching the zero back-o count at stage i. However, unlike the NA method, only our states are involved here. That is, collision-ree leads the chain to (i; 1, and then RTS/CTS error-ree leads to (i; 2 and (i; 3, respectively. The irst three states are the same as those o the NA method. However, in the BA method, the multiple data rames in a burst transmission require no responses (ACKs. Thus, only BREQ and BACK should be considered with their rame errors. Hence, i RTS/CTS exchange is successul and BREQ is error-ree, the chain will go to (i; 4. Finally, i BACK is also error-ree, the burst is considered to be successully transmitted, leading the chain to a state in the irst back-o stage. Otherwise, the chain moves to the next back-o stage. With a similar simpliied Markov chain model as that or the NA method, we can obtain the transmission probability i or the BA method. Given this probability, we can obtain the method s maximum achievable throughput with the same equation o (5. O course, some parameters involved should be modiied to accommodate themselves to this method. The irst to be considered is that, instead o using a single ACK to response a data rame, in the BA method all data rames in a burst transmission is acknowledged with only one BACK. It implies that the RTS/CTS exchange and the BREQ/BACK exchange should be all successul. Otherwise, the sender can not conirm which rame is correctly received even though its multiple back-to-back data rames are all transmitted in a burst. Thus, P T in (2, which denotes the probability leading the current state to the irst back-o stage, should be replaced by P T = (1 P c (1 P rts (1 P cts (1 P breq (1 P back (16

7 (c back i, -4 breq i, -3 cts i, -2 rts i, -1 (1- Pc (a i, 0 P back P breq P cts P rts P c (b (b (b (b (b Figure 3: Markov chain model or the BA method. where P breq and P back denote the rame error probabilities o BREQ/BACK rames, respectively, and similar to those or the other rames, they can be also obtained by 1 (1 P b l with bit error rate o P b and rame size o l bits. Similarly, or the BA method, the successul probability in the denominator part o (5 should be rewritten as P succ =(1 P rts (1 P cts (1 P breq (1 P back (17 With this probability, a station can know which and how many rames are successully transmitted in a burst when the corresponding BACK is correctly received. In addition, although a transmission burst consists o N b rames, there may have only i rames located in dierent positions in the burst to be acknowledged. Taking these into account, we have E[N s ] or the BA method as E[N s ]=P succ XN b i=0 i ψ Nb i! (1 P data i (P data N b i (18 Similarly, a station can know its ailures on transmitting RTS, CTS, BREQ, and BACK rames, despite the unknown status o its multiple data transmissions that can only be solved with a BACK. Thereore, we can consider the average time spent on the ailure as E[T e ] = P rts T rts +(1 P rts P cts T cts + (1 P rts (1 P cts P breq T breq + (1 P rts (1 P cts (1 P breq P back T back (19 In above, the time or BREQ or BACK ailure consists o the whole period o time or a burst transmission 389 because a station should wait a period o time to conirm the BACK ailure, and then wait a T timeout period to restart the BEB procedure. Thus, we have T breq = T back = T O A +N b T P +T O R +T timeout (20 5 Perormance Evaluation In this section, we report on experiments made in order to veriy the perormance results derived previously. To this end, we design our experiments to ocus on the new methods in EDCA and ignore the other characteristics in the MAC. That is, we consider that each station carries a single traic low with the same access category (AC that provides only one set o parameters or each station. For example, we let r Λ be 6 Mbps, m 0 be 5, m be 7, CW min (the minimum contention window size be 31, CW max (the maximum contention window size be 1023, and L (the rame size be 1024, or each station. Speciically, we conduct our dierent sets o experiments to exhibit the dierent eects resulted rom the our major actors to be considered, which are bit error probability (P b, TXOP limit, number o stations, and data transmission rate. To ocus on the eects o a single actor, the our sets o experiments are so conducted to vary one o these actors while remaining the others ixed, as summarized in Table 3. For example, in the irst set, we let the data rate be 54 Mbps, the number o stations be 100, and the TXOP limit be 10 ms and 100 ms, respectively, while varying the bit error probability under consideration rom P b = 0 to P b = Given that, or each set we consider the normalized throughput, deined as the throughput divided by the data transmission rate adopted. The corresponding results are given in Fig. 4. The irst set s

8 Table 3: Experiments in the Perormance Evaluation Tag bit error probability (P b TXOP limit (ms number o station data transmission rate (Mbps a 0to and b 0 and to c 0 and to d 0 and to54 results are given in Fig. 4 (a, and the other results are given in the subigures (b, (c, and (d, respectively. As shown in Fig. 4 (a, the throughput decreases when P b increases, as expected. Another expected result is that the higher TXOP limit (100 ms provides higher throughput than that o the lower one (10 ms. However, it should be noted that although the higher limit is 10 times o the lower limit (100 ms/10 ms=10, its improvement on the throughput is much lower than the scale (10 times. This is also expected because the existed overheads in the MAC, e.g., the time required by the common physical header and the necessary spacing time such as, will inevitably consume the bandwidth. In addition, we also observe that the BA method provides higher throughput than that o the NA method. This is because the ormer e- liminates the ACK overhead or each data rame in a transmission burst. However, when P b is high (e.g., 10 3, the multiple rames spaced with only in a burst will not be correctly received with a high probability, and the BA method can only provide nearly the same throughput as the NA method. In Fig. 4 (b, we show more the throughput results that correspond to not only the TXOP limit o 10 ms and 100 ms but also that rom 2 ms to 100 ms, while ixing P b at 0 and 10 5, respectively. From this igure, it can be seen that the curves or the two new methods (NA and BA increase more steeply when the TXOP limit increases at the beginning rom 2 to 10 ms as compared with that ater 10 ms. On the contrary, the IEEE MAC remains the same lat curves because no TXOP limit is given in the MAC and only P b can aect its results. From this igure as well as Fig. 4 (a, we can clearly observe the marginal beneit to be obtained with the new methods when the TXOP limit increases, and its trend would persist despite P b. In Fig. 4 (c, we show the throughput results or each station in the network. As shown in this igure, the per-station throughput decreases as the number o stations increases. This is expected because the increase o the number o stations will increase the channel contention level, which eventually decreases the throughput. Finally, in Fig. 4 (d, it can be observed that the normalized throughput decreases as 390 the data rate increases. It s no surprise because even though the data rate could continuously increase, the control overhead can not be avoided and still remain constant. This overhead will occupy more bandwidths and thus reduce more throughputs as the data rate increases. 6 Related Works In the decade, many related works or WLANs, e.g., [2, 4 8], have been done or the legacy IEEE MAC. Most o them complete their analyses with the assumptions that 1 the network is saturated (i.e., every station always has a packet waiting to be transmitted, and 2 transmission error is a result o rame collision and is not caused by medium error. Although these assumptions provide a tractable basis or the analyses and give these related works remarkable accuracy in theory, such assumptions may not be valid in the real world. As a ollower o the legacy MAC, IEEE e uses the TXOP mechanism to increase system throughput. With the same aim, there are also some other works proposed to provide better throughput when the channel condition is good or multiple rames to be transmitted in a burst [3, 9 13]. These protocols have their own speciications and mechanisms, and thus, do not provide exactly the same two operations o IEEE e. Thereore, the results or those protocols can not be directly applied to the operations under consideration. Apart rom the above, only a ew results have been reported about the new operations under consideration. Currently, only theoretical maximum throughput, theoretical throughput upper limit, and/or theoretical delay lower limit have been proposed in literature [14 17]. None o the above involves a ading channel. On the other hand, although some eorts had been done or the perormance analysis under a ading channel, e,g., [18 21], these eorts mainly ocus on the legacy IEEE MAC and involve no the operations under consideration.

9 Normalized throughput theory simulation BA theory (TXOP = 10ms 0.2 BA simulation (TXOP = 10ms NA theory (TXOP = 10ms NA simulation (TXOP = 10ms BA theory (TXOP = 100ms 0.1 BA simulation (TXOP = 100ms NA theory (TXOP = 100ms NA simulation (TXOP = 100ms ^-7 10^-6 10^-5 10^-4 10^-3 Bit error probablity (Pb Normalized throughput theory (Pb = simulation (Pb =0 BA theory (Pb =0 BA simulation (Pb =0 NA theory (Pb=0 NA simulation (Pb= theory (Pb = simulation (Pb =10-5 BA theory (Pb =10-5 BA simulation (Pb =10-5 NA theory (Pb=10-5 NA simulation (Pb= TXOP limit (ms (a (b 0.08 Normalized throughput theory (Pb = simulation (Pb =0 BA theory (Pb =0 BA simulation (Pb =0 NA theory (Pb=0 NA simulation (Pb= theory (Pb = simulation (Pb =10-5 BA theory (Pb =10-5 BA simulation (Pb =10-5 NA theory (Pb=10-5 NA simulation (Pb= number o stations Normalized throughput theory (Pb = simulation (Pb =0 BA theory (Pb =0 BA simulation (Pb =0 NA theory (Pb=0 NA simulation (Pb= theory (Pb = simulation (Pb =10-5 BA theory (Pb =10-5 BA simulation (Pb =10-5 NA theory (Pb=10-5 NA simulation (Pb= Rate (Mbps (c (d Figure 4: Analysis and simulation results o throughput or the our major actors under consideration: (a the P b results with TXOP limit = 10 ms and 100 ms, (b the TXOP limit results with P b = 0 and 10 5, (c the results rom dierent numbers o stations with P b =0and 10 5 and (d the results rom dierent numbers o rates with P b =0and Conclusion 391 In this paper, we derive the maximum achievable throughput or the new methods o EDCA (NA and BA in an error-prone WLAN with a modiied Markov chain model that can take into account the channel error. Our experiments conirm the correctness o our derivation, and show their results to be very consistent with those o the theory. From both the theory and the experiments, we can see that the two methods outperorm the IEEE MAC rom the our aspects under consideration: bit error probability, TXOP limit, number o stations, and data transmission rate. In addition, we also ind that the BA method usually outperorms the NA method because the ormer requires only a BACK or a bulk o data transmissions and thus reduces the transmission overhead under most o the ading conditions. As a summary, it could be concluded that with the especial concern on the behavior o these methods under the error-prone channel, the perormance model can provide more insights on the design criteria or the IEEE based WLANs operated in the real world, beyond that or the networks under an ideal error-ree environment. Acknowledgement This work was supported by the National Science Council, Republic o China, under grant NSC E Reerences: [1] IEEE e. Part II: Wireless LAN Medium Access Control (MAC and Physical Layer (PHY Speciications. Amendment 8: Medium

10 Access Control (MAC Quality o Service Enhancement. November [2] G. Bianchi. Perormance Analysis o the IEEE Distributed Coordination Function. IEEE Journal on Selected Areas in Communications, 18(3: , March [3] and Chun-Hung Richard Lin. ECTP: An Energy-Eiciency Label-Switching MAC Protocol or Inrastructure Wireless Networks. IEEE Transactions on Vehicular Technology, 56(3: , May [4] H.S. Chhaya and S. Gupta. Perormance Modeling o Asynchronous Transer Methods in the IEEE MAC Protocol. ACM/Balzer Wireless Networks, 3: , [5] Omesh Tickoo and Biplab Sikdar. Queueing Analysis and Delay Mitigation in IEEE Random Access MAC based Wireless Networks. in Proceedings o INFOCOM 04, 2: , March [6]. Uplink and Downlink Resource Allocation in IEEE DCF-Based WLANs. WSEAS Transactions on Communications, 5: , April [7] Shun-Ping Chung and Wei-Sin Chen. Analysis o Prioritized IEEE Wireless LAN with Non-Saturated Traic. WSEAS Transactions on Communications, 5: , Sept [8] Bai Xiang and Mao Yu-Ming. A Simple Adaptive p-persistent MAC Scheme or Service Dierentiation and Maximum Channel Utilization. WSEAS Transactions on Communications, 7:1 7, Jan [9] IrDA: Advanced Inrared (AIr MAC drat protocol speciication - version 1.0. (Inrared Association, [10] B. Sadeghi and V. Kanodia and A. Sabharwal and E. Knightly. Opportunistic Media Access or Multirate Ad Hoc Networks. Proceedings o MobiCom 2002, [11] G. Holland, N. Vaidya, and P. Bahl. A Rate- Adaptive MAC Protocol or Multi-Hop Wireless Networks. in Proceedings o ACM MOBI- COM 01, [12] C. R. Lin, and Y. J. Chang. AAR: An Adaptive Rate Control Protocol or Mobile Ad Hoc Networks. in Proceedings o ICON 2003, [13] K. Lu, D. Wu, Y. Fang, and R. Qiu. Perormance Analysis o A Burst--Based MAC Protocol or Ultra-Wideband Ad Hoc Networks. in Proceedings o IEEE International Conerence on Communications (ICC 2005, May [14] Yang Xiao and Jon Rosdahl. Perormance Analysis and Enhancement or the Current and Future IEEE MAC Protocols. Mobile Computing and Communication Review, 7(2, April [15] E. Varthis, P. Theodorou. and A.C. Boucouvals. Analysis o Burst Acknowledgment Mechanism o IEEE e MAC Protocol over Inrared Wireless LANs. in Proceedings o IEEE International Conerence on Sotware, Telecommunications and Computer Networks (SotCom, October [16] V. Vitsas and A.C. Boucouvalas. Perormance Analysis o the Advanced Inrared (Air C- SMA/CA MAC Protocol or Wireless LANs. Wireless Networks, 9: , [17] Ilenia Tinnirello and Sunghyun Choi. Eiciency analysis o burst transmissions with block ACK in contention-based e WLANs. in Proceedings o IEEE International Conerence on Communications (ICC, 5: , May [18] Pero Latkoski, Zoran Hadzi-Velkov and Borislav Popovski. Perormance analysis o IEEE a WLAN in block ading channel using SDL simulation. in Proceedings o IEEE TEL- SIKS 2005, 1:97 100, Sept [19] Xiaohui Xu and Xiaokang Lin. Throughput Enhancement o the IEEE DCF in ading channel. in Proceedings o IEEE International Conerence on Wireless and Optical Communications Networks, pages 1 5, April [20] Periklis Chatzimisios, Anthony C. Boucouvalas and Vasileos Vitsas. Perormance Analysis o IEEE DCF in Presence o Transmission Errors. in Proceedings o IEEE International Conerence on Communications, 7: , June [21] Jun Yin, Xiaodong Wang and Dharma P. Agrawal. Optimal Packet Size in Error-prone Channel or IEEE Distributed Coordination Function. in Proceedings o IEEE International Conerence on Wireless Communications and Networking Conerence (WCNC, 3: , March 2004.

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model WIFI IEEE 802 Layers The IEEE 802 amily and its relation to the OSI model Need For Speed Wireless LAN Applications Streaming Media (HDTV, DVD) VoIP Interactive Gaming Data Transer Reuire Hundreds o Mps

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Performance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model

Performance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model Perormance Study o Block ACK and Reverse Direction in IEEE 802.11n using a Markov Chain Model Md. Akbar Hossain, Nurul I Sarkar, Jairo Gutierrez, William Liu School o Computer and Mathematical Sciences

More information

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation Power Eiciency in IEEE 802.11a WLA with Cross-Layer Adaptation Jun Zhao, Zihua Guo, and Wenwu Zhu Microsot Research Asia 3/F, Beijing Sigma Center, o.49, Zhichun Road, Haidian District Beijing 100080,

More information

Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*

Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN* 2016 International Conerence on ustainable nergy, nvironment and Inormation ngineering (I 2016) IBN: 978-1-60595-337-3 Perormance Analysis o the I 802.11n Block- Mechanism in an rror-prone Channel Xue-ing

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication DRaMA: Device-speciic Repetition-aided Multiple Access or Ultra-Reliable and Low-Latency Communication itaek Lee, Sundo im, Junseok im, and Sunghyun Choi Department o ECE and INMC, Seoul National University,

More information

Modeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks

Modeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks Modeling the Eect o Intererences among N Collocated Heterogeneous Wireless Networs Bilal Khan and Jong-Su Ahn Department o Computer Science and Engineering, Donggu University, Seoul, Korea bilalhan83@hotmailcom

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

COSC 3213: Communication Networks Chapter 5: Handout #6

COSC 3213: Communication Networks Chapter 5: Handout #6 OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to

More information

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells Traic Assignment Over Licensed and Unlicensed Bands or Dual-Band Femtocells Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute o NYU, Brooklyn, NY 11201 InterDigital Communications,

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks

SPLASH: a Simple Multi-Channel Migration Scheme for IEEE Networks SPLASH: a Simple Multi-Channel Migration Scheme for IEEE 82.11 Networks Seungnam Yang, Kyungsoo Lee, Hyundoc Seo and Hyogon Kim Korea University Abstract Simultaneously utilizing multiple channels can

More information

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance On the Impact o Fading and Inter-piconet Intererence on Bluetooth Perormance Andrea Zanella Dept. o Inormation Engineering University o Padova, Padova, Italy zanella@dei.unipd.it Andrea Tonello Bell Labs,

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

WIRELESS communications have shifted from bit rates

WIRELESS communications have shifted from bit rates IEEE COMMUNICATIONS LETTERS, VOL. XX, NO. X, XXX XXX 1 Maximising LTE Capacity in Unlicensed Bands LTE-U/LAA while Fairly Coexisting with WLANs Víctor Valls, Andrés Garcia-Saavedra, Xavier Costa and Douglas

More information

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title Cognitive radio concepts or 802.16h Date Submitted 2005-07-11 Source(s) Mariana Goldhamer Alvarion Tel Aviv, 21

More information

A Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks

A Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks A Modiied Proile-Based Location Caching with Fixed Local Anchor or Wireless Mobile Networks Md. Kowsar Hossain, Tumpa Rani Roy, Mousume Bhowmick 3 Department o Computer Science and Engineering, Khulna

More information

RADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags

RADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags A Multiple Hashing Approach to Complete Identiication o Missing RFID ags Xiulong Liu, Keqiu Li*, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu Abstract Owing to its superior properties, such as ast identiication

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 23-22 (28) Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networs YU-LIANG KUO, ERIC HSIAO-KUANG WU + AND GEN-HUEY

More information

Enhancement of Wide Bandwidth Operation in IEEE ac Networks

Enhancement of Wide Bandwidth Operation in IEEE ac Networks Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea

More information

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation 2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation

More information

Effect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI

Effect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI 2016 International Conerence on Sustainable Energy, Environment and Inormation Engineering (SEEIE 2016) ISBN: 978-1-60595-337-3 Eect o Layer Spacing and Line Width o PCB Coil on Resonant Frequency Shen

More information

Software Defined Radio Forum Contribution

Software Defined Radio Forum Contribution Committee: Technical Sotware Deined Radio Forum Contribution Title: VITA-49 Drat Speciication Appendices Source Lee Pucker SDR Forum 604-828-9846 Lee.Pucker@sdrorum.org Date: 7 March 2007 Distribution:

More information

Sequence-based Rendezvous for Dynamic Spectrum Access

Sequence-based Rendezvous for Dynamic Spectrum Access Sequence-based endezvous or Dynamic Spectrum Access Luiz A. DaSilva Bradley Dept. o Electrical and Computer Engineering Virginia Tech Arlington, VA, USA ldasilva@vt.edu Igor Guerreiro Wireless Telecommunications

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

Spectrum allocation with beamforming antenna in heterogeneous overlaying networks

Spectrum allocation with beamforming antenna in heterogeneous overlaying networks 2st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Spectrum allocation with beamorming antenna in heterogeneous overlaying networks Sunheui Ryoo, Changhee Joo and

More information

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks

A new Opportunistic MAC Layer Protocol for Cognitive IEEE based Wireless Networks A new Opportunistic MAC Layer Protocol for Cognitive IEEE 8.11-based Wireless Networks Abderrahim Benslimane,ArshadAli, Abdellatif Kobbane and Tarik Taleb LIA/CERI, University of Avignon, Agroparc BP 18,

More information

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (M2M) Networks An Adaptive Multichannel Protocol for Large-Scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University Intel-NTU

More information

On Improving Voice Capacity in Infrastructure Networks

On Improving Voice Capacity in Infrastructure Networks On Improving Voice Capacity in 8 Infrastructure Networks Peter Clifford Ken Duffy Douglas Leith and David Malone Hamilton Institute NUI Maynooth Ireland Abstract In this paper we consider voice calls in

More information

AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION

AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION J-P. Kauppi, K.S. Martikainen Patria Aviation Oy, Naulakatu 3, 33100 Tampere, Finland, ax +358204692696 jukka-pekka.kauppi@patria.i,

More information

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and

More information

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Efficient Monitoring of Dynamic Tag Populations in RFID Systems

Efficient Monitoring of Dynamic Tag Populations in RFID Systems 2 2 Ninth IFIP IEEE/IFIP Ninth International Conerence on on Embedded and and Ubiquitous Computing Eicient Monitoring o Dynamic Tag Populations in RFID Systems Qingjun Xiao, Kai Bu, Bin Xiao Department

More information

Medium Access Diversity with Uplink-Downlink Duality and Transmit Beamforming in Multiple-Antenna Wireless Networks

Medium Access Diversity with Uplink-Downlink Duality and Transmit Beamforming in Multiple-Antenna Wireless Networks Medium Access Diversity with Uplink-Downlink Duality and Transmit Beamforming in Multiple-Antenna Wireless Networks Miao Zhao, Zhenghao Zhang and Yuanyuan Yang Dept. of Electrical & Computer Engineering,

More information

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks

Power-Controlled Medium Access Control. Protocol for Full-Duplex WiFi Networks Power-Controlled Medium Access Control 1 Protocol for Full-Duplex WiFi Networks Wooyeol Choi, Hyuk Lim, and Ashutosh Sabharwal Abstract Recent advances in signal processing have demonstrated in-band full-duplex

More information

Synchronization and Beaconing in IEEE s Mesh Networks

Synchronization and Beaconing in IEEE s Mesh Networks Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute

More information

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the

More information

Max Covering Phasor Measurement Units Placement for Partial Power System Observability

Max Covering Phasor Measurement Units Placement for Partial Power System Observability Engineering Management Research; Vol. 2, No. 1; 2013 ISSN 1927-7318 E-ISSN 1927-7326 Published by Canadian Center o Science and Education Max Covering Phasor Measurement Units Placement or Partial Power

More information

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards.

Outline / Wireless Networks and Applications Lecture 14: Wireless LANs * IEEE Family. Some IEEE Standards. Page 1 Outline 18-452/18-750 Wireless Networks and Applications Lecture 14: Wireless LANs 802.11* Peter Steenkiste Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/ Brief history 802 protocol

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title IEEE 80.16 Broadband Wireless Access Working Group Channel and intererence model or 80.16b Physical Layer Date Submitted Source(s) Re: 000-31-09 Tal Kaitz BreezeCOM

More information

Generating Function Analysis of Wireless Networks and ARQ Systems

Generating Function Analysis of Wireless Networks and ARQ Systems Generating Function Analysis of Wireless Networks and ARQ Systems by Shihyu Chang A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical

More information

Next Generation Wireless LANs

Next Generation Wireless LANs Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Dynamic Channel Bonding in Multicarrier Wireless Networks

Dynamic Channel Bonding in Multicarrier Wireless Networks Dynamic Channel Bonding in Multicarrier Wireless Networks Pei Huang, Xi Yang, and Li Xiao Department o Computer Science and Engineering Michigan State University Email: {huangpe3, yangxi, lxiao}@cse.msu.edu

More information

Opportunism vs. Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading

Opportunism vs. Cooperation: Analysis of Forwarding Strategies in Multihop Wireless Networks with Random Fading 1 Opportunism vs. Cooperation: Analysis o Forwarding Strategies in Multihop Wireless Networks with Random Fading Chi-Kin Chau, Anand Seetharam, Jim Kurose, Don Towsley Masdar Institute o Science and Technology,

More information

A Distributed Opportunistic Access Scheme for OFDMA Systems

A Distributed Opportunistic Access Scheme for OFDMA Systems A Distributed Opportunistic Access Scheme for OFDMA Systems Dandan Wang Richardson, Tx 7508 Email: dxw05000@utdallas.edu Hlaing Minn Richardson, Tx 7508 Email: hlaing.minn@utdallas.edu Naofal Al-Dhahir

More information

Analyzing Split Channel Medium Access Control Schemes

Analyzing Split Channel Medium Access Control Schemes IEEE TRANS. ON WIRELESS COMMNICATIONS, TO APPEAR Analyzing Split Channel Medium Access Control Schemes Jing Deng, Member, IEEE, Yunghsiang S. Han, Member, IEEE, and Zygmunt J. Haas, Senior Member, IEEE

More information

LTE in Unlicensed Spectrum

LTE in Unlicensed Spectrum LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline

More information

Multiple access techniques

Multiple access techniques Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ

More information

Access Point Selection for Multi-Rate IEEE Wireless LANs

Access Point Selection for Multi-Rate IEEE Wireless LANs Access Point Selection for Multi-Rate IEEE 802.11 Wireless LANs Shicong Yang Avideh Zakhor Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report No. UCB/EECS-2014-104

More information

Power Optimization in Stratix IV FPGAs

Power Optimization in Stratix IV FPGAs Power Optimization in Stratix IV FPGAs May 2008, ver.1.0 Application Note 514 Introduction The Stratix IV amily o devices rom Altera is based on 0.9 V, 40 nm Process technology. Stratix IV FPGAs deliver

More information

Predicting the performance of a photodetector

Predicting the performance of a photodetector Page 1 Predicting the perormance o a photodetector by Fred Perry, Boston Electronics Corporation, 91 Boylston Street, Brookline, MA 02445 USA. Comments and corrections and questions are welcome. The perormance

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional

More information

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems 1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,

More information

Optimal Placement of Phasor Measurement Units for State Estimation

Optimal Placement of Phasor Measurement Units for State Estimation PSERC Optimal Placement o Phasor Measurement Units or State Estimation Final Project Report Power Systems Engineering Research Center A National Science Foundation Industry/University Cooperative Research

More information

A MATLAB Model of Hybrid Active Filter Based on SVPWM Technique

A MATLAB Model of Hybrid Active Filter Based on SVPWM Technique International Journal o Electrical Engineering. ISSN 0974-2158 olume 5, Number 5 (2012), pp. 557-569 International Research Publication House http://www.irphouse.com A MATLAB Model o Hybrid Active Filter

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks

Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks Spatial Reuse through Adaptive Interference Cancellation in Multi-Antenna Wireless Networks A. Singh, P. Ramanathan and B. Van Veen Department of Electrical and Computer Engineering University of Wisconsin-Madison

More information

Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs

Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs Wireless Networks 9, 495 507, 003 003 Kluwer Academic Publishers. Manufactured in The Netherlands. Performance Analysis of the Advanced Infrared (AIr) CSMA/CA MAC Protocol for Wireless LANs V. VITSAS Department

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing) Introduction to OFDM Characteristics o OFDM (Orthogonal Frequency Division Multiplexing Parallel data transmission with very long symbol duration - Robust under multi-path channels Transormation o a requency-selective

More information

Frequency-Foldback Technique Optimizes PFC Efficiency Over The Full Load Range

Frequency-Foldback Technique Optimizes PFC Efficiency Over The Full Load Range ISSUE: October 2012 Frequency-Foldback Technique Optimizes PFC Eiciency Over The Full Load Range by Joel Turchi, ON Semiconductor, Toulouse, France Environmental concerns lead to new eiciency requirements

More information

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE

3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER /$ IEEE 3094 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 57, NO. 5, SEPTEMBER 2008 Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks Yaser Pourmohammadi Fallah,

More information

Enhancing Wireless Networks with Directional Antenna and Multiple Receivers

Enhancing Wireless Networks with Directional Antenna and Multiple Receivers Enhancing 802.11 Wireless Networks with Directional Antenna and Multiple Receivers Chenxi Zhu Fujitsu Labs of America 8400 Baltimore Ave., Suite 302 College Park, Maryland 20740 chenxi.zhu@us.fujitsu.com

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac Wireless Pers Commun (2014) 79:235 248 DOI 10.1007/s11277-014-1851-7 Dynamic 20/40/60/80 MHz Channel Access for 80 MHz 802.11ac Andrzej Stelter Paweł Szulakiewicz Robert Kotrys Maciej Krasicki Piotr Remlein

More information

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), V1 PP 44-57 www.iosrjen.org Optimizing Reception Perormance o new UWB Pulse shape over Multipath

More information

Worst Case Modelling of Wireless Sensor Networks

Worst Case Modelling of Wireless Sensor Networks Worst Case Modelling o Wireless Sensor Networks Jens B. Schmitt disco Distributed Computer Systems Lab, University o Kaiserslautern, Germany jschmitt@inormatik.uni-kl.de 1 Abstract At the current state

More information

Load Balancing for Centralized Wireless Networks

Load Balancing for Centralized Wireless Networks Load Balancing for Centralized Wireless Networks Hong Bong Kim and Adam Wolisz Telecommunication Networks Group Technische Universität Berlin Sekr FT5 Einsteinufer 5 0587 Berlin Germany Email: {hbkim,

More information

Saturation throughput analysis of error-prone wireless networks

Saturation throughput analysis of error-prone wireless networks Saturation throughput analysis of error-prone 802. wireless networks Qiang Ni,,, Tianji Li, Thierry Turletti 2, and Yang Xiao 3 Hamilton Institute, National University of Ireland Maynooth, Co. Kildare,

More information

VEHICULAR ad hoc networks (VANETs) are becoming

VEHICULAR ad hoc networks (VANETs) are becoming Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast

More information

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks

A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in ac Networks 1 A Channel Allocation Algorithm for Reducing the Channel Sensing/Reserving Asymmetry in 82.11ac Networks Seowoo Jang, Student Member, Saewoong Bahk, Senior Member Abstract The major goal of IEEE 82.11ac

More information

Achieving Temporal Fairness in Multi-Rate WLANs with Capture Effect

Achieving Temporal Fairness in Multi-Rate WLANs with Capture Effect Achieving emporal Fairness in Multi-Rate 82.11 WLANs with Capture Effect Lin Luo, Marco Gruteser WINLAB, Rutgers University {clarylin, gruteser}@winlab.rutgers.edu Hang Liu Corporate Research Lab, homson

More information

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Opportunistic Routing in Wireless Mesh Networks

Opportunistic Routing in Wireless Mesh Networks Opportunistic Routing in Wireless Mesh Networks Amir arehshoorzadeh amir@ac.upc.edu Llorenç Cerdá-Alabern llorenc@ac.upc.edu Vicent Pla vpla@dcom.upv.es August 31, 2012 Opportunistic Routing in Wireless

More information

Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability

Performance Modeling of Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Performance Modeling of 802. Ad Hoc Networks with Time-Varying Carrier Sense Range and Physical Capture Capability Jin Sheng and Kenneth S. Vastola Department of Electrical, Computer and Systems Engineering,

More information

State Estimation over Customized Wireless Network

State Estimation over Customized Wireless Network Wireless Engineering and echnology, 2012, 3, 221-228 http://dx.doi.org/10.4236/wet.2012.34032 Published Online October 2012 (http://www.scirp.org/ournal/wet) 221 Sayed Vahid Naghavi 1, Ali Azami 2, Freidoon

More information

DKAN0008A PIC18 Software UART Timing Requirements

DKAN0008A PIC18 Software UART Timing Requirements DKAN0008A PIC18 Sotware UART Timing Requirements 11 June 2009 Introduction Design conditions oten limit the hardware peripherals available or an embedded system. Perhaps the available hardware UARTs are

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Design of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment

Design of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment 2016 Sixth International Conerence on Instrumentation & Measurement, Computer, Communication and Control Design o Multidimensional Space Motion Simulation System For Spacecrat Attitude and Orbit Guidance

More information

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Shanshan Wu, Wenguang Mao, and Xudong Wang UM-SJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China Email:

More information

Analysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate

Analysis of Power Consumption of H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Analysis o Power Consumption o H.264/AVC-based Video Sensor Networks through Modeling the Encoding Complexity and Bitrate Bambang A.B. Sari, Panos Nasiopoulos and Victor C.M. eung Department o Electrical

More information

Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems

Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems 1 Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems + Bing-Zhi Hsieh, + Yu-Hsiang Chao, + Ray-Guang Cheng, and ++ Navid Nikaein + Department of Electronic and

More information

Image Characteristic Based Rate Control Algorithm for HEVC

Image Characteristic Based Rate Control Algorithm for HEVC Image Characteristic Based Rate Control Algorithm or HEVC Mayan Fei, Zongju Peng*, Weiguo Chen, Fen Chen Faculty o Inormation Science and Engineering, Ningbo University, Ningbo 352 China *pengzongju@26.com;

More information

Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios

Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Multiband Joint Detection with Correlated Spectral Occupancy in Wideband Cognitive Radios Khalid Hossain, Ayman Assra, and Benoît Champagne, Senior Member, IEEE Department o Electrical and Computer Engineering,

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information