Performance Evaluation of Adaptive EY-NPMA with Variable Yield

Size: px
Start display at page:

Download "Performance Evaluation of Adaptive EY-NPMA with Variable Yield"

Transcription

1 Performance Evaluation of Adaptive EY-PA with Variable Yield G. Dimitriadis, O. Tsigkas and F.-. Pavlidou Aristotle University of Thessaloniki Thessaloniki, Greece Abstract: Wireless Local Area etworks (WLAs) have known an impressive increase in popularity during the past decade. An important factor defining the performance of such a network is the edium Access protocol used, which defines the efficiency with which the raw bandwidth is shared between the users. In this paper a modified version of EY-PA is proposed and analysed, which employs a non-constant distribution during the yield phase, coupled to the elimination phase length. The evaluation of the analytical model shows that this approach leads to significant gains regarding throughput and medium utilization. 1. ITRODUCTIO Wireless Local Area etworks (WLAs) have known an impressive increase in popularity during the past decade. Unhindered mobility and hassle-free installation are the main attractive features of this networking solution, characteristics that have allowed WLAs to occupy a substantial share in the market. Furthermore, the major drawback of this family of networks namely reduced speed is gradually being alleviated, since the recent advances in the physical layer are raising the available bitrate figures and bringing WLAs on par with their wired counterparts. Indeed, the bps of the original 8.11 [1] standard from IEEE have quickly evolved to the bps employed by 8.11a [] and HIPERLA/ [], while even higher speeds are expected in the near future. However, the bitrate offered by the physical layer is not the sole factor regarding the performance of a WLA. The edium Access Control (AC) sublayer is a critical component of the networking stack, governing how efficiently the available raw bandwidth is distributed to the end users. Since WLAs are based on the shared channel concept, it is the duty of the medium access mechanism to coordinate transmissions, minimizing both occurrences of simultaneous transmissions (packet collisions) and the network time that passes without actual data transmissions (overhead). Unfortunately, the above stated goals are conflicting to each other and thus demand a careful approach. Furthermore, medium access protocols should possess a number of other attractive characteristics, such as support for service differentiation, robustness and stability, in order to This work was sponsored by the Greek General Secretariat of Research and Technology under the project framework Irakleitos and by the Hellenic State Scholarships Foundation (I.K.Y.). successfully serve different networking scenarios and environments. In this paper, a contention based medium access protocol is proposed, analysed and evaluated. Specifically, a modification to the EY-PA protocol of the HIPERLA [] standard is proposed, which aims at improving the medium utilization without adding to the complexity of the access mechanism. The innovation of the proposed mechanism lies in the coupling of the two contention resolution phases of EY-PA. In the standardized version of EY-PA, the elimination and the yield phase are independent from each other, while in the proposed one the characteristics of the distribution employed during the yield phase vary according to the outcome of the elimination phase. This modification is evaluated using an analytical model and compared with the corresponding results from EY-PA. The rest of the paper is structured as follows. In section, the mechanism of EY-PA is quickly outlined, together with some performance enhancing modifications that exist in the bibliography. Special attention is paid to Adaptive EY-PA, since it forms the basis on top of which the proposed protocol is built. In section, Adaptive EY- PA with Variable Yield is presented and analysed. In the next section, some performance measures are drawn from the analytical model, and finally section concludes this paper..1 EY-PA. BACKGROUD WORK EY-PA stands for Elimination-Yield on-preemptive Priority ultiple Access and has been one of the basic building blocks of the HIPERLA standard for WLAs. It is a medium access protocol following the random access (or contention based) paradigm, featuring support for differentiated services via hierarchically independent priorities and low collision rates. The impressive performance of EY-PA regarding the probability of collision is because contention resolution takes place in two phases. According to EY-PA the network time is divided into cycles, called synchronized access cycles. Each synchronized access cycle is divided in four distinct phases, namely prioritization, elimination, yield and data

2 transmission. All stations that have data to transmit enter the access cycle, with each one of the first three phases reducing the number of active stations within the cycle. The design goal of the cycle architecture is to reduce the number of active stations to that extent, so that the station that reaches the fourth and final phase data transmission is unique. The first phase is responsible for keeping into the cycle the stations with the highest priority packets at the time. By listening to the common medium for as many slots as the priority level, hierarchical independence between priorities is accomplished. The stations that perceive the channel as idle for the whole listening interval transmit an energy burst for one slot, essentially signaling stations of lower priority to leave the access cycle. Those that do survive proceed to the next phase, elimination. During this phase, all stations transmit energy bursts of random length. At the beginning of this phase, each station picks a random number of slots to burst, which follows a truncated geometric distribution. This distribution is defined by two parameters and namely the maximum number of slots allowed for bursting (m es ) and the probability of bursting for one more slot (p e ). As soon as a station stops bursting, it immediately checks the common medium. If the medium is sensed as idle, the checking station had the longest burst and possibly among others proceeds to the next phase of the access cycle. On the other hand, if the common medium was sensed as busy, the checking station did not transmit the longest energy burst and thus is forced to leave the cycle. The yield phase is the equivalent of a normal backoff phase. During yield, all stations that survived elimination monitor the common medium for a random number of slots. If the channel is sensed as idle for the whole interval, the corresponding station proceeds to the next phase and commences transmitting its data packet. If the medium is sensed as busy, the corresponding station leaves the access cycle in order to avoid packet collisions. Each station picks up a random number of slots to back off according to a uniform distribution. This distribution can be defined by a single parameter, the maximum number of slots allowed for backing off (m ys ). From the above paragraphs, it becomes evident that the actual contention resolution takes place during the elimination and yield phases. The elimination is responsible for normalizing the number of stations that are led to the yield phase; the characteristics of the truncated geometric distribution employed during elimination guarantee that the number of stations that survive this phase is quasi-constant, regardless of how many stations did enter elimination. Of course, such a characteristic is necessary, because the distribution that determines the number of slots that each station backs off during yield is fixed. The four phase architecture employed by EY-PA leads to very good results regarding collision rates, as well as good scalability to larger network populations. However, one of the drawbacks of this scheme is the increased overhead. The elaborate synchronized access cycle is prone towards spending a significant amount of the available network time at the first three phases, reducing this way the capacity of the system to transfer actual data packets. One of the solutions employed towards reducing the number of slots spent during the first three phases is the addition of memory to the protocol. According to the standardized version of EY- PA, each synchronized access cycle is completely independent from the subsequent ones. Consequently, all the interim results of the access cycle are lost and the contention resolution process starts from scratch. On the other hand, by adding memory to the system the characteristics of a given synchronized access cycle (e.g. elimination phase length) may alter the behavior of the contending stations during subsequent cycles. This approach is taken in [] and [6], showing that the addition of memory to EY-PA may lead to substantial gains. A different approach is taken in the case of Adaptive EY-PA, which is described in the following subsection.. Adaptive EY-PA Adaptive EY-PA [] aims at improving the attained medium utilization, but employs a different mechanism to achieve this goal. According to the Adaptive EY-PA protocol, the stations comprising the network population are capable of dynamically reconfiguring the working parameters of the medium access protocol, in order to adapt to the offered traffic. As was shown in the previous subsection, each instance of the EY-PA protocol may be fully described by the three parameters m es, m ys and p e. These parameters completely define the two distributions employed during the phases involved in contention resolution, namely elimination and yield. According to the analytical model developed in [] and [8], the optimal working parameters depend on two characteristics of the offered load: number of contending stations and payload size. Adaptive EY-PA aims at allowing the network population to operate under the optimal parameters of EY-PA at any given time, by estimating the level of contention and the payload size. Using these two estimations, the optimal working parameters are calculated subsequently via an analytical model. Out of the two estimates that are needed as input for the analytical model, the average payload size is easier to obtain. By monitoring many access cycles, samples of the data transmission length can be obtained, which in turn make it trivial to find the average payload size. On the other hand, the number of contending stations is more difficult to estimate, since there is no direct information on this measure within the access cycle. However, it can easily be proven that the length of the elimination phase is strongly correlated to the level of contention. By taking samples of the elimination phase length of many subsequent cycles and feeding this data to a maximum likelihood estimator, it is possible to approximate

3 satisfactorily the number of stations entering the synchronized access cycle. With the number of contending stations and average payload size available, the optimal working parameters are calculated using the analytical model of EY-PA. The triplet (m es, m ys, p e ) is subsequently diffused to the whole network population, essentially reconfiguring their medium access controllers. The above described scheme is presented in detail in [], where it is also shown that significant gains may be achieved when the network population dynamically adapts to the offered load.. VARIABLE YIELD FOR ADAPTIVE EY-PA.1 Description Adaptive EY-PA with Variable Yield is a medium access protocol that builds upon the Adaptive EY-PA scheme which has been described in the previous section. The addition of the Variable Yield mechanism aims at further improving the already good medium utilization characteristics of Adaptive EY-PA. As was shown in the previous section, Adaptive EY-PA does not alter the structure of the synchronized access cycle. The mechanisms dictating the behavior at each phase remain the same with those of the standardized version of EY-PA. In the case of Adaptive EY-PA, the improvement in medium utilization is caused by adapting the working parameters (m es, m ys, p e ) to the offered load. Adaptive EY-PA with Variable Yield allows the network population to reconfigure the working parameters of the medium access scheme, but also introduces a modification to the core EY-PA mechanism. Adaptive EY-PA is based on the fact that the length of the elimination phase is strongly correlated to the number of stations surviving prioritization. The same attributes of the truncated geometric distribution when viewed from another angle form the basis on which Variable Yield is based. Specifically, it can easily be proven that the elimination phase length is also correlated with the number of stations surviving elimination, and thus entering the yield phase. Consequently, the estimation of the level of contention combined with the elimination phase length can provide a helpful indication, regarding the number of stations expected to enter the yield phase. As mentioned in a previous paragraph, the elimination phase serves as a process which normalizes the number of stations entering yield. However, because of its stochastic nature, the elimination phase is not of constant length between subsequent cycles, but shows a degree of variation. When the length of this phase is longer than its mean value, on average fewer stations enter the yield phase and thus there is no need for allocating many slots for back off. On the other hand, when the elimination phase length is shorter than usual, then it would be beneficial to allow more slots for backing off since the yield phase is more populated. Consequently, instead of using a good, all-around value for the maximum number of slots available for backing off during yield (m ys ), the proposed medium access schemes opts towards using different values optimized for the different elimination phase lengths. This way the two contention resolution phases are coupled, instead of being independent as is the case with both adaptive and standardized versions of EY-PA. Instead of employing a single scalar parameter for the maximum number of slots allowable for backing off (m ys ), the proposed scheme employs a vector ys containing as many elements as the possible elimination phase lengths (m es + 1). Consequently, according to Adaptive EY-PA with Variable Yield after an l-slot long elimination phase, the surviving stations pick up a random number of slots to back off according to a uniform distribution, which lies between and ys (l).. Analytical odel In this subsection the analytical model of the proposed medium access scheme is presented. Because the model of the base EY-PA has already been covered in the literature, only the parts where the two models differ will be presented. The model aims at providing a closed analytical form of the attainable medium utilization, given the number of stations entering the access cycle in the same priority () and the duration of a packet transmission (T pck ). The medium utilization is defined as the fraction of network time spent on successful data transmissions. It is a convenient metric, because it combines the effect of both overhead and packet collisions in a single result. Consider that after an elimination phase that lasted l slots, Y stations out of the proceed to the next phase yield. The probability that a station backs off for k slots is equal to: 1 PY ( k, l) = (1) ys () l + 1 The probability that a station backs off for at least k slots, provided that an l-slot elimination took place is equal to: ys ( l) ys () l (, ) Y (, ) P k l = P i l = + 1 k + 1 Y k ys () l Consequently, the probability that the yield phase lasts k slots, provided that an l-slot elimination took place is equal to: P Y ( k, l) P Y ( k+ 1, l), if k < ys( l) () PYD ( k,, l ) = 1, if k = ys () l ys () l + 1 Using the above equation the average duration of the yield phase can be calculated, provided that the elimination ()

4 # of stations 1 Packet Size bytes bytes 1 bytes phase lasted l slots and Y stations survived towards the yield phase. ys ( l) (, ) = (,, ) () S l i P i l Y Y YD Y 1 The above equation can be used to find the overall (regardless of the elimination phase length) yield phase length. In the following equation P nk_e (i,l) represents the possibility of having i stations survive an l-slot elimination. m es _ (, ) ( l, i ) () S = P i l S Y nk E Y 1 l= If Y stations survive an l-slot elimination phase, the probability that n stations are the first to finish their backoff intervals at the k-th slot is equal to: P Y k l P Y k l if k ys l n 1 Pnk _ Y ( n, k, l, ) =, if k = ys () l, n= Y ys () l 1 +, if k = ys () l, n < n n (, ) ( + 1, ), < ( ) Based on the above, the probability that there is no collision when Y stations enter yield after an l-slot elimination phase is equal to: ( l) (6) (, ys ) = ( 1,,, ) () P l P i l C Y nk _ Y Y The overall probability of not having a collision can be obtained by summing the above equation for all l and Y, weighted with the probability of having such an elimination phase. m es _ (, ) ( l, i ) (8) P = P i l P.6 C nk E C 1 l= ow, all the characteristics of the access cycle are fully defined. Consequently, the achieved medium utilization may be calculated: PC Tpck mu = (9) Tcycle In the above equation, T cycle equals to the average duration of the synchronized access cycle..6 Table I. Results for EY-PA # of stations 1 Packet Size bytes bytes 1 bytes [19,,, ].1 [9,,, ].1 [9,, 1, ] [,, 1, ] [9,, 1, ].1 [9, 1,, 1, ] [ 91,,,, ] [ 9, 1,,, 1] [9,,,,1,].6.1. Table II. Results for EY-PA with Variable Yield. PERFORACE EVALUATIO In this section, the impact of variable yield is evaluated. The comparison between EY-PA and EY-PA with Variable Yield is based on the corresponding analytical models. Each one of the protocols is optimized for a number of scenarios, with the achieved medium utilization and the optimal working parameters being recorded. The channel rate is assumed to bps, while all stations are assumed to be entering the synchronized access cycle in priority 1. The slot lengths employed during elimination and yield are equal to those defined in the HIPERLA standard. The results of this comparison are summarized in tables I and II, for EY-PA and EY-PA with Variable Yield respectively. Each cell in these tables corresponds to a specific level of contention-payload size combination. In the left hand of the cell the optimal working parameters for each protocol are presented, while in the right hand with bold italics the achieved medium utilization is recorded. The working parameters are written in the form (m es, m ys, p e ) for EY-PA and (m es, ys, p e ) for EY-PA with Variable Yield. From a quick glance it is evident that the modifications introduced by Variable Yield have a positive effect on the data transferring capacity of the system. The same collisions probabilities may be achieved, without however spending as many slots during elimination and yield as with the standardized EY-PA protocol. From table II, it can be seen that the optimal maximum slots allowed for backing off during yield are heavily dependent on the elimination phase length. As longer elimination phases are examined, the stations entering yield are fewer and thus the vector ys (l) shows a declining trend as the l increases. This way the distribution used during yield adapts to the expected number of stations entering it, in contrast to EY-PA, where a good all-around distribution is employed.. COCLUSIOS In this paper, a modification to the Adaptive EY-PA protocol is proposed and evaluated. The introduced mechanism couples the two contention resolution phases elimination and yield in order to reduce the number of slots

5 that are experienced as overhead, without however deteriorating the already low collision probabilities. The analytical model was formed and presented, allowing the determination of the optimal working parameters of the proposed scheme, as well as the comparison between EY- PA and EY-PA with Variable Yield. REFERECES [1] IEEE, 8.11: Wireless LA edium Access Control (AC) and Physical Layer Specification, 199. [] IEEE, 8.11a: Wireless LA edium Access Control (AC) and Physical Layer Specifications, High-speed Physical Layer in the GHz Band, [] ETSI, DTS BRA--1 v.m: Broadband Radio Access etworks (BRA): HIgh PErformance Radio Local Area etwork (HIPERLA) Type II: Data link control (DLC) layer: Part 1: Basic transport functions, [] ETSI, E 6 v1..1: Broadband Radio Access etworks (BRA): HIgh PErformance Radio Loacal Area etwork (HIPERLA) type I: Functional specification, [] G. Dimitriadis and F.-. Pavlidou, Two Alternative Schemes to EY-PA for edium Access in High Bitrate Wireless LAs, International Journal of Wireless Personal Communications, vol. 8, no., pp. 11 1, Jan.. [6] T. Janczak and J. Wozniak, odified EY-PA Channel Access Scheme, Electronics Letters, Vol., o. 1, pp. 6 66, 1. [] G. Dimitriadis and F.-. Pavlidou, Adaptive EY- PA: A edium Access Protocol for Wireless LAs, Journal of Communication etworks, vol. 6, no., Dec.. [8] I. Vukovic, HIPERLA type I: performance analysis of the channel access control protocol, Proceedings of 8th IEEE Vehicular Technology Conference (VTC '98) (1998), 81.

BASIC CONCEPTS OF HSPA

BASIC CONCEPTS OF HSPA 284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Synchronization and Beaconing in IEEE s Mesh Networks

Synchronization and Beaconing in IEEE s Mesh Networks Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute

More information

Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems

Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems Ken ichi Ishii 1) A. H. Aghvami 2) 1) Networking Laboratories, NEC 4-1-1, Miyazaki, Miyamae-ku, Kawasaki 216-8, Japan Tel.: +81 ()44 86

More information

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Cooperation in Random Access Wireless Networks

Cooperation in Random Access Wireless Networks Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department

More information

Modeling the impact of buffering on

Modeling the impact of buffering on Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.

T325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen. T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:

More information

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Spectrum Sharing with Adjacent Channel Constraints

Spectrum Sharing with Adjacent Channel Constraints Spectrum Sharing with Adjacent Channel Constraints icholas Misiunas, Miroslava Raspopovic, Charles Thompson and Kavitha Chandra Center for Advanced Computation and Telecommunications Department of Electrical

More information

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) An Opportunistic Frequency Channels Selection Scheme for Interference Minimization 978-1-4799-5233-5/14/$31.00

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

ALERT2 TDMA Manager. User s Reference. VERSION 4.0 November =AT Maintenance Report Understanding ALERT2 TDMA Terminology

ALERT2 TDMA Manager. User s Reference. VERSION 4.0 November =AT Maintenance Report Understanding ALERT2 TDMA Terminology ALERT2 TDMA Manager User s Reference VERSION 4.0 November 2014 =AT Maintenance Report Understanding ALERT2 TDMA Terminology i Table of Contents 1 Understanding ALERT2 TDMA Terminology... 3 1.1 General

More information

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group < Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group OFDM sub-channelization improvement and system performance selected topics 2002-11-14 Source(s)

More information

Average Delay in Asynchronous Visual Light ALOHA Network

Average Delay in Asynchronous Visual Light ALOHA Network Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands

More information

Superposed Signaling Option for Bandwidth Efficient Wireless LANs

Superposed Signaling Option for Bandwidth Efficient Wireless LANs Superposed Signaling Option for Bandwidth Efficient Wireless LAs Thomas Deckert, Wolfgang Rave, and Gerhard Fettweis Vodafone Chair Mobile Communications Systems Dresden University of Technology, 01062

More information

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention

IEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract

More information

Multi-Robot Coordination. Chapter 11

Multi-Robot Coordination. Chapter 11 Multi-Robot Coordination Chapter 11 Objectives To understand some of the problems being studied with multiple robots To understand the challenges involved with coordinating robots To investigate a simple

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Efficient Assignment of Multiple MBMS Sessions in B3G Networks

Efficient Assignment of Multiple MBMS Sessions in B3G Networks Efficient Assignment of Multiple MBMS Sessions in B3G etworks Antonios Alexiou, Christos Bouras, Vasileios Kokkinos, Evangelos Rekkas Research Academic Computer Technology Institute, atras, Greece and

More information

Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems

Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems 1 Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems + Bing-Zhi Hsieh, + Yu-Hsiang Chao, + Ray-Guang Cheng, and ++ Navid Nikaein + Department of Electronic and

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Cricket: Location- Support For Wireless Mobile Networks

Cricket: Location- Support For Wireless Mobile Networks Cricket: Location- Support For Wireless Mobile Networks Presented By: Bill Cabral wcabral@cs.brown.edu Purpose To provide a means of localization for inbuilding, location-dependent applications Maintain

More information

Solution Paper: Contention Slots in PMP 450

Solution Paper: Contention Slots in PMP 450 Solution Paper: Contention Slots in PMP 450 CN CN PMP 450 CS OG 03052014 01192014 This solution paper describes how Contention Slots are used in a PMP 450 wireless broadband access network system, and

More information

WIRELESS 20/20. Twin-Beam Antenna. A Cost Effective Way to Double LTE Site Capacity

WIRELESS 20/20. Twin-Beam Antenna. A Cost Effective Way to Double LTE Site Capacity WIRELESS 20/20 Twin-Beam Antenna A Cost Effective Way to Double LTE Site Capacity Upgrade 3-Sector LTE sites to 6-Sector without incurring additional site CapEx or OpEx and by combining twin-beam antenna

More information

Dynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications

Dynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications IEEE SmartGridComm 22 Workshop - Cognitive and Machine-to-Machine Communications and Networking for Smart Grids Radio Resource Allocation for Group Paging Supporting Smart Meter Communications Chia-Hung

More information

Analysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks

Analysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Doppler Frequency Effect on Network Throughput Using Transmit Diversity

Doppler Frequency Effect on Network Throughput Using Transmit Diversity International Journal of Sciences: Basic and Applied Research (IJSBAR) ISSN 2307-4531 (Print & Online) http://gssrr.org/index.php?journal=journalofbasicandapplied ---------------------------------------------------------------------------------------------------------------------------

More information

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory

How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory Prev Sci (2007) 8:206 213 DOI 10.1007/s11121-007-0070-9 How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory John W. Graham & Allison E. Olchowski & Tamika

More information

Minimum requirements related to technical performance for IMT-2020 radio interface(s)

Minimum requirements related to technical performance for IMT-2020 radio interface(s) Report ITU-R M.2410-0 (11/2017) Minimum requirements related to technical performance for IMT-2020 radio interface(s) M Series Mobile, radiodetermination, amateur and related satellite services ii Rep.

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

The Bitrate Limits of HSPA+ Enhanced Uplink

The Bitrate Limits of HSPA+ Enhanced Uplink Introduction In 29 mobile broadband is living its success story and demand for higher data rates is growing constantly. More advanced HSPA technologies have been released recently by manufacturers, and

More information

IEEE Wireless Access Method and Physical Specification

IEEE Wireless Access Method and Physical Specification IEEE 802.11 Wireless Access Method and Physical Specification Title: The importance of Power Management provisions in the MAC. Presented by: Abstract: Wim Diepstraten NCR WCND-Utrecht NCR/AT&T Network

More information

A Methodology for the Efficient Application of Controlled Switching to Current Interruption Cases in High-Voltage Networks

A Methodology for the Efficient Application of Controlled Switching to Current Interruption Cases in High-Voltage Networks A Methodology for the Efficient Application of Controlled Switching to Current Interruption Cases in High-Voltage Networks C. D. TSIREKIS Hellenic Transmission System Operator Kastoros 72, Piraeus GREECE

More information

Traffic behavior simulation of a DECT technology network

Traffic behavior simulation of a DECT technology network Traffic behavior simulation of a DECT technology network A. Dimitriou, T. Vasiliadis, G. Sergiadis Aristotle University of Thessaloniki, School of Engineering, Dept. of Electrical & Computer Engineering,

More information

Transmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage

Transmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage Transmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage Ardian Ulvan 1 and Robert Bestak 1 1 Czech Technical University in Prague, Technicka 166 7 Praha 6,

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B

Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B Department of Electronics and Communication Engineering K L University, Guntur, India Abstract In multi user environment number of users

More information

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin

More information

Contrail TDMA Manager User s Reference

Contrail TDMA Manager User s Reference Contrail TDMA Manager User s Reference VERSION 6 Published: May 2018 =AT Maintenance Report Understanding Contrail TDMA Terminology i Contents Chapter 1: Understanding Contrail TDMA Terminology... 3 General

More information

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm

Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,

More information

SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG AV POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1

SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG AV POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1 SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1 Brent Mashburn 1, Haniph Latchman 2, Tim VanderMey 3, Larry Yonge 1 and Kartikeya

More information

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast

A Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang

More information

IEEE Broadband Wireless Access Working Group < Consolidation of Uncoordinated Coexistence Mechanisms

IEEE Broadband Wireless Access Working Group <  Consolidation of Uncoordinated Coexistence Mechanisms IEEE C802.16h-07/NNN Project Title Date ubmitted 2007-07-09 IEEE 802.16 roadband Wireless Access Working Group Consolidation of Uncoordinated Coexistence Mechanisms ource(s) Ken

More information

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su

AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS enjamin W. Wah and Xiao Su Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign

More information

Network Management System for Telecommunication and Internet Application

Network Management System for Telecommunication and Internet Application Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,

More information

WirelessHART Modeling and Performance Evaluation

WirelessHART Modeling and Performance Evaluation WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.

More information

Deployment scenarios and interference analysis using V-band beam-steering antennas

Deployment scenarios and interference analysis using V-band beam-steering antennas Deployment scenarios and interference analysis using V-band beam-steering antennas 07/2017 Siklu 2017 Table of Contents 1. V-band P2P/P2MP beam-steering motivation and use-case... 2 2. Beam-steering antenna

More information

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION

BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOC CODES WITH MMSE CHANNEL ESTIMATION Lennert Jacobs, Frederik Van Cauter, Frederik Simoens and Marc Moeneclaey

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

Evaluating Performance of the HIPERLAN CAC Layer Protocol for Asynchronous Traffic

Evaluating Performance of the HIPERLAN CAC Layer Protocol for Asynchronous Traffic Evaluating Performance of the HIPERLAN CAC Layer Protocol for Asynchronous raffic Constantine Coutras Department of Computer Science Illinois Institute of echnology 10 West 31st Street Chicago, IL 60616

More information

Datasheet LoRaWAN prototype PCB v Table of Contents 1. Specifications Data rates... 3

Datasheet LoRaWAN prototype PCB v Table of Contents 1. Specifications Data rates... 3 Datasheet LoRaWAN prototype PCB v1.0.1 Table of Contents 1. Specifications... 2 2. Data rates... 3 2.1 LoRaWAN TM... 3 Receive limitation... 3 Transmit limitation... 4 2.2 LoRa TM... 5 1 1. Specifications

More information

LTE-Unlicensed. Sreekanth Dama, Dr. Kiran Kuchi, Dr. Abhinav Kumar IIT Hyderabad

LTE-Unlicensed. Sreekanth Dama, Dr. Kiran Kuchi, Dr. Abhinav Kumar IIT Hyderabad LTE-Unlicensed Sreekanth Dama, Dr. Kiran Kuchi, Dr. Abhinav Kumar IIT Hyderabad Unlicensed Bands Shared spectrum Huge available spectrum Regulations Dynamic frequency selection Restrictions over maximum

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

THE use of wireless networks in everyday computing has

THE use of wireless networks in everyday computing has IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 191 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, and J. Morris

More information

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS

OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS 9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

An HARQ scheme with antenna switching for V-BLAST system

An HARQ scheme with antenna switching for V-BLAST system An HARQ scheme with antenna switching for V-BLAST system Bonghoe Kim* and Donghee Shim* *Standardization & System Research Gr., Mobile Communication Technology Research LAB., LG Electronics Inc., 533,

More information

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song

DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment

More information

Subcarrier Assignment for OFDM Based Wireless Networks Using Multiple Base Stations

Subcarrier Assignment for OFDM Based Wireless Networks Using Multiple Base Stations Subcarrier Assignment for OFDM Based Wireless Networks Using Multiple Base Stations Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes

More information

Christen Rauscher NOTICE. The above identified patent application is available for licensing. Requests for information should be addressed to:

Christen Rauscher NOTICE. The above identified patent application is available for licensing. Requests for information should be addressed to: Serial Number Filing Date Inventor 069.855 30 April 1998 Christen Rauscher NOTICE The above identified patent application is available for licensing. Requests for information should be addressed to: OFFICE

More information

Deployment and Radio Resource Reuse in IEEE j Multi-hop Relay Network in Manhattan-like Environment

Deployment and Radio Resource Reuse in IEEE j Multi-hop Relay Network in Manhattan-like Environment Deployment and Radio Resource Reuse in IEEE 802.16j Multi-hop Relay Network in Manhattan-like Environment I-Kang Fu and Wern-Ho Sheen Department of Communication Engineering National Chiao Tung University

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks

Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon

More information

RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS

RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS Villy B. Iversen and Arne J. Glenstrup Abstract Keywords: In mobile communications an efficient utilisation of the channels is of great importance. In this

More information

THE success of future wireless systems will depend on the

THE success of future wireless systems will depend on the SCVT 23 1 Efficient Signaling of Spectral Resources in Spectrum Pooling Systems Timo Weiss, Joerg Hillenbrand, Albert Krohn (IEEE Student Members), Friedrich K. Jondral (IEEE Senior Member) Abstract Public

More information

2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU

2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU 2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU 2.4 GHZ AND 900 MHZ UNLICENSED SPECTRUM COMPARISON Wireless connectivity providers have to make many choices when designing their

More information

Consecutive Group Paging for LTE Networks Supporting Machine-type Communications Services

Consecutive Group Paging for LTE Networks Supporting Machine-type Communications Services Consecutive Group Paging for LTE Networks Supporting achine-type Communications Services Ruki Harwahyu +, Ray-Guang Cheng +, and Riri Fitri Sari ++ + Dept. of Electronic and Computer Engineering, National

More information

Analysis Techniques for WiMAX Network Design Simulations

Analysis Techniques for WiMAX Network Design Simulations Technical White Paper Analysis Techniques for WiMAX Network Design Simulations The Power of Smart Planning 1 Analysis Techniques for WiMAX Network Jerome Berryhill, Ph.D. EDX Wireless, LLC Eugene, Oregon

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS

DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS Mark Dale Comtech EF Data Tempe, AZ Abstract Dynamic Bandwidth Allocation is used in many current VSAT networks as a means of efficiently allocating

More information

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS

RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS Abstract of Doctorate Thesis RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS PhD Coordinator: Prof. Dr. Eng. Radu MUNTEANU Author: Radu MITRAN

More information

CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN

CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN Mohamad Haidar Robert Akl Hussain Al-Rizzo Yupo Chan University of Arkansas at University of Arkansas at University of Arkansas at University

More information

Medium Access Schemes

Medium Access Schemes Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS

MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods.

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods. Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:

More information

Using the epmp Link Budget Tool

Using the epmp Link Budget Tool Using the epmp Link Budget Tool The epmp Series Link Budget Tool can offer a help to determine the expected performances in terms of distances of a epmp Series system operating in line-of-sight (LOS) propagation

More information

EUROPEAN ETS TELECOMMUNICATION July 1997 STANDARD

EUROPEAN ETS TELECOMMUNICATION July 1997 STANDARD EUROPEAN ETS 300 719-2 TELECOMMUNICATION July 1997 STANDARD Source: ETSI TC-RES Reference: DE/RES-04005-2 ICS: 33.020 Key words: Paging, private, radio Radio Equipment and Systems (RES); Private wide area

More information

How to Improve OFDM-like Data Estimation by Using Weighted Overlapping

How to Improve OFDM-like Data Estimation by Using Weighted Overlapping How to Improve OFDM-like Estimation by Using Weighted Overlapping C. Vincent Sinn, Telecommunications Laboratory University of Sydney, Australia, cvsinn@ee.usyd.edu.au Klaus Hueske, Information Processing

More information

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment

Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Redline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow.

Redline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow. Redline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow WiMAX Whitepaper Author: Frank Rayal, Redline Communications Inc. Redline

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

Burst Error Correction Method Based on Arithmetic Weighted Checksums

Burst Error Correction Method Based on Arithmetic Weighted Checksums Engineering, 0, 4, 768-773 http://dxdoiorg/0436/eng04098 Published Online November 0 (http://wwwscirporg/journal/eng) Burst Error Correction Method Based on Arithmetic Weighted Checksums Saleh Al-Omar,

More information