Performance Evaluation of Adaptive EY-NPMA with Variable Yield
|
|
- Alexander Boone
- 5 years ago
- Views:
Transcription
1 Performance Evaluation of Adaptive EY-PA with Variable Yield G. Dimitriadis, O. Tsigkas and F.-. Pavlidou Aristotle University of Thessaloniki Thessaloniki, Greece Abstract: Wireless Local Area etworks (WLAs) have known an impressive increase in popularity during the past decade. An important factor defining the performance of such a network is the edium Access protocol used, which defines the efficiency with which the raw bandwidth is shared between the users. In this paper a modified version of EY-PA is proposed and analysed, which employs a non-constant distribution during the yield phase, coupled to the elimination phase length. The evaluation of the analytical model shows that this approach leads to significant gains regarding throughput and medium utilization. 1. ITRODUCTIO Wireless Local Area etworks (WLAs) have known an impressive increase in popularity during the past decade. Unhindered mobility and hassle-free installation are the main attractive features of this networking solution, characteristics that have allowed WLAs to occupy a substantial share in the market. Furthermore, the major drawback of this family of networks namely reduced speed is gradually being alleviated, since the recent advances in the physical layer are raising the available bitrate figures and bringing WLAs on par with their wired counterparts. Indeed, the bps of the original 8.11 [1] standard from IEEE have quickly evolved to the bps employed by 8.11a [] and HIPERLA/ [], while even higher speeds are expected in the near future. However, the bitrate offered by the physical layer is not the sole factor regarding the performance of a WLA. The edium Access Control (AC) sublayer is a critical component of the networking stack, governing how efficiently the available raw bandwidth is distributed to the end users. Since WLAs are based on the shared channel concept, it is the duty of the medium access mechanism to coordinate transmissions, minimizing both occurrences of simultaneous transmissions (packet collisions) and the network time that passes without actual data transmissions (overhead). Unfortunately, the above stated goals are conflicting to each other and thus demand a careful approach. Furthermore, medium access protocols should possess a number of other attractive characteristics, such as support for service differentiation, robustness and stability, in order to This work was sponsored by the Greek General Secretariat of Research and Technology under the project framework Irakleitos and by the Hellenic State Scholarships Foundation (I.K.Y.). successfully serve different networking scenarios and environments. In this paper, a contention based medium access protocol is proposed, analysed and evaluated. Specifically, a modification to the EY-PA protocol of the HIPERLA [] standard is proposed, which aims at improving the medium utilization without adding to the complexity of the access mechanism. The innovation of the proposed mechanism lies in the coupling of the two contention resolution phases of EY-PA. In the standardized version of EY-PA, the elimination and the yield phase are independent from each other, while in the proposed one the characteristics of the distribution employed during the yield phase vary according to the outcome of the elimination phase. This modification is evaluated using an analytical model and compared with the corresponding results from EY-PA. The rest of the paper is structured as follows. In section, the mechanism of EY-PA is quickly outlined, together with some performance enhancing modifications that exist in the bibliography. Special attention is paid to Adaptive EY-PA, since it forms the basis on top of which the proposed protocol is built. In section, Adaptive EY- PA with Variable Yield is presented and analysed. In the next section, some performance measures are drawn from the analytical model, and finally section concludes this paper..1 EY-PA. BACKGROUD WORK EY-PA stands for Elimination-Yield on-preemptive Priority ultiple Access and has been one of the basic building blocks of the HIPERLA standard for WLAs. It is a medium access protocol following the random access (or contention based) paradigm, featuring support for differentiated services via hierarchically independent priorities and low collision rates. The impressive performance of EY-PA regarding the probability of collision is because contention resolution takes place in two phases. According to EY-PA the network time is divided into cycles, called synchronized access cycles. Each synchronized access cycle is divided in four distinct phases, namely prioritization, elimination, yield and data
2 transmission. All stations that have data to transmit enter the access cycle, with each one of the first three phases reducing the number of active stations within the cycle. The design goal of the cycle architecture is to reduce the number of active stations to that extent, so that the station that reaches the fourth and final phase data transmission is unique. The first phase is responsible for keeping into the cycle the stations with the highest priority packets at the time. By listening to the common medium for as many slots as the priority level, hierarchical independence between priorities is accomplished. The stations that perceive the channel as idle for the whole listening interval transmit an energy burst for one slot, essentially signaling stations of lower priority to leave the access cycle. Those that do survive proceed to the next phase, elimination. During this phase, all stations transmit energy bursts of random length. At the beginning of this phase, each station picks a random number of slots to burst, which follows a truncated geometric distribution. This distribution is defined by two parameters and namely the maximum number of slots allowed for bursting (m es ) and the probability of bursting for one more slot (p e ). As soon as a station stops bursting, it immediately checks the common medium. If the medium is sensed as idle, the checking station had the longest burst and possibly among others proceeds to the next phase of the access cycle. On the other hand, if the common medium was sensed as busy, the checking station did not transmit the longest energy burst and thus is forced to leave the cycle. The yield phase is the equivalent of a normal backoff phase. During yield, all stations that survived elimination monitor the common medium for a random number of slots. If the channel is sensed as idle for the whole interval, the corresponding station proceeds to the next phase and commences transmitting its data packet. If the medium is sensed as busy, the corresponding station leaves the access cycle in order to avoid packet collisions. Each station picks up a random number of slots to back off according to a uniform distribution. This distribution can be defined by a single parameter, the maximum number of slots allowed for backing off (m ys ). From the above paragraphs, it becomes evident that the actual contention resolution takes place during the elimination and yield phases. The elimination is responsible for normalizing the number of stations that are led to the yield phase; the characteristics of the truncated geometric distribution employed during elimination guarantee that the number of stations that survive this phase is quasi-constant, regardless of how many stations did enter elimination. Of course, such a characteristic is necessary, because the distribution that determines the number of slots that each station backs off during yield is fixed. The four phase architecture employed by EY-PA leads to very good results regarding collision rates, as well as good scalability to larger network populations. However, one of the drawbacks of this scheme is the increased overhead. The elaborate synchronized access cycle is prone towards spending a significant amount of the available network time at the first three phases, reducing this way the capacity of the system to transfer actual data packets. One of the solutions employed towards reducing the number of slots spent during the first three phases is the addition of memory to the protocol. According to the standardized version of EY- PA, each synchronized access cycle is completely independent from the subsequent ones. Consequently, all the interim results of the access cycle are lost and the contention resolution process starts from scratch. On the other hand, by adding memory to the system the characteristics of a given synchronized access cycle (e.g. elimination phase length) may alter the behavior of the contending stations during subsequent cycles. This approach is taken in [] and [6], showing that the addition of memory to EY-PA may lead to substantial gains. A different approach is taken in the case of Adaptive EY-PA, which is described in the following subsection.. Adaptive EY-PA Adaptive EY-PA [] aims at improving the attained medium utilization, but employs a different mechanism to achieve this goal. According to the Adaptive EY-PA protocol, the stations comprising the network population are capable of dynamically reconfiguring the working parameters of the medium access protocol, in order to adapt to the offered traffic. As was shown in the previous subsection, each instance of the EY-PA protocol may be fully described by the three parameters m es, m ys and p e. These parameters completely define the two distributions employed during the phases involved in contention resolution, namely elimination and yield. According to the analytical model developed in [] and [8], the optimal working parameters depend on two characteristics of the offered load: number of contending stations and payload size. Adaptive EY-PA aims at allowing the network population to operate under the optimal parameters of EY-PA at any given time, by estimating the level of contention and the payload size. Using these two estimations, the optimal working parameters are calculated subsequently via an analytical model. Out of the two estimates that are needed as input for the analytical model, the average payload size is easier to obtain. By monitoring many access cycles, samples of the data transmission length can be obtained, which in turn make it trivial to find the average payload size. On the other hand, the number of contending stations is more difficult to estimate, since there is no direct information on this measure within the access cycle. However, it can easily be proven that the length of the elimination phase is strongly correlated to the level of contention. By taking samples of the elimination phase length of many subsequent cycles and feeding this data to a maximum likelihood estimator, it is possible to approximate
3 satisfactorily the number of stations entering the synchronized access cycle. With the number of contending stations and average payload size available, the optimal working parameters are calculated using the analytical model of EY-PA. The triplet (m es, m ys, p e ) is subsequently diffused to the whole network population, essentially reconfiguring their medium access controllers. The above described scheme is presented in detail in [], where it is also shown that significant gains may be achieved when the network population dynamically adapts to the offered load.. VARIABLE YIELD FOR ADAPTIVE EY-PA.1 Description Adaptive EY-PA with Variable Yield is a medium access protocol that builds upon the Adaptive EY-PA scheme which has been described in the previous section. The addition of the Variable Yield mechanism aims at further improving the already good medium utilization characteristics of Adaptive EY-PA. As was shown in the previous section, Adaptive EY-PA does not alter the structure of the synchronized access cycle. The mechanisms dictating the behavior at each phase remain the same with those of the standardized version of EY-PA. In the case of Adaptive EY-PA, the improvement in medium utilization is caused by adapting the working parameters (m es, m ys, p e ) to the offered load. Adaptive EY-PA with Variable Yield allows the network population to reconfigure the working parameters of the medium access scheme, but also introduces a modification to the core EY-PA mechanism. Adaptive EY-PA is based on the fact that the length of the elimination phase is strongly correlated to the number of stations surviving prioritization. The same attributes of the truncated geometric distribution when viewed from another angle form the basis on which Variable Yield is based. Specifically, it can easily be proven that the elimination phase length is also correlated with the number of stations surviving elimination, and thus entering the yield phase. Consequently, the estimation of the level of contention combined with the elimination phase length can provide a helpful indication, regarding the number of stations expected to enter the yield phase. As mentioned in a previous paragraph, the elimination phase serves as a process which normalizes the number of stations entering yield. However, because of its stochastic nature, the elimination phase is not of constant length between subsequent cycles, but shows a degree of variation. When the length of this phase is longer than its mean value, on average fewer stations enter the yield phase and thus there is no need for allocating many slots for back off. On the other hand, when the elimination phase length is shorter than usual, then it would be beneficial to allow more slots for backing off since the yield phase is more populated. Consequently, instead of using a good, all-around value for the maximum number of slots available for backing off during yield (m ys ), the proposed medium access schemes opts towards using different values optimized for the different elimination phase lengths. This way the two contention resolution phases are coupled, instead of being independent as is the case with both adaptive and standardized versions of EY-PA. Instead of employing a single scalar parameter for the maximum number of slots allowable for backing off (m ys ), the proposed scheme employs a vector ys containing as many elements as the possible elimination phase lengths (m es + 1). Consequently, according to Adaptive EY-PA with Variable Yield after an l-slot long elimination phase, the surviving stations pick up a random number of slots to back off according to a uniform distribution, which lies between and ys (l).. Analytical odel In this subsection the analytical model of the proposed medium access scheme is presented. Because the model of the base EY-PA has already been covered in the literature, only the parts where the two models differ will be presented. The model aims at providing a closed analytical form of the attainable medium utilization, given the number of stations entering the access cycle in the same priority () and the duration of a packet transmission (T pck ). The medium utilization is defined as the fraction of network time spent on successful data transmissions. It is a convenient metric, because it combines the effect of both overhead and packet collisions in a single result. Consider that after an elimination phase that lasted l slots, Y stations out of the proceed to the next phase yield. The probability that a station backs off for k slots is equal to: 1 PY ( k, l) = (1) ys () l + 1 The probability that a station backs off for at least k slots, provided that an l-slot elimination took place is equal to: ys ( l) ys () l (, ) Y (, ) P k l = P i l = + 1 k + 1 Y k ys () l Consequently, the probability that the yield phase lasts k slots, provided that an l-slot elimination took place is equal to: P Y ( k, l) P Y ( k+ 1, l), if k < ys( l) () PYD ( k,, l ) = 1, if k = ys () l ys () l + 1 Using the above equation the average duration of the yield phase can be calculated, provided that the elimination ()
4 # of stations 1 Packet Size bytes bytes 1 bytes phase lasted l slots and Y stations survived towards the yield phase. ys ( l) (, ) = (,, ) () S l i P i l Y Y YD Y 1 The above equation can be used to find the overall (regardless of the elimination phase length) yield phase length. In the following equation P nk_e (i,l) represents the possibility of having i stations survive an l-slot elimination. m es _ (, ) ( l, i ) () S = P i l S Y nk E Y 1 l= If Y stations survive an l-slot elimination phase, the probability that n stations are the first to finish their backoff intervals at the k-th slot is equal to: P Y k l P Y k l if k ys l n 1 Pnk _ Y ( n, k, l, ) =, if k = ys () l, n= Y ys () l 1 +, if k = ys () l, n < n n (, ) ( + 1, ), < ( ) Based on the above, the probability that there is no collision when Y stations enter yield after an l-slot elimination phase is equal to: ( l) (6) (, ys ) = ( 1,,, ) () P l P i l C Y nk _ Y Y The overall probability of not having a collision can be obtained by summing the above equation for all l and Y, weighted with the probability of having such an elimination phase. m es _ (, ) ( l, i ) (8) P = P i l P.6 C nk E C 1 l= ow, all the characteristics of the access cycle are fully defined. Consequently, the achieved medium utilization may be calculated: PC Tpck mu = (9) Tcycle In the above equation, T cycle equals to the average duration of the synchronized access cycle..6 Table I. Results for EY-PA # of stations 1 Packet Size bytes bytes 1 bytes [19,,, ].1 [9,,, ].1 [9,, 1, ] [,, 1, ] [9,, 1, ].1 [9, 1,, 1, ] [ 91,,,, ] [ 9, 1,,, 1] [9,,,,1,].6.1. Table II. Results for EY-PA with Variable Yield. PERFORACE EVALUATIO In this section, the impact of variable yield is evaluated. The comparison between EY-PA and EY-PA with Variable Yield is based on the corresponding analytical models. Each one of the protocols is optimized for a number of scenarios, with the achieved medium utilization and the optimal working parameters being recorded. The channel rate is assumed to bps, while all stations are assumed to be entering the synchronized access cycle in priority 1. The slot lengths employed during elimination and yield are equal to those defined in the HIPERLA standard. The results of this comparison are summarized in tables I and II, for EY-PA and EY-PA with Variable Yield respectively. Each cell in these tables corresponds to a specific level of contention-payload size combination. In the left hand of the cell the optimal working parameters for each protocol are presented, while in the right hand with bold italics the achieved medium utilization is recorded. The working parameters are written in the form (m es, m ys, p e ) for EY-PA and (m es, ys, p e ) for EY-PA with Variable Yield. From a quick glance it is evident that the modifications introduced by Variable Yield have a positive effect on the data transferring capacity of the system. The same collisions probabilities may be achieved, without however spending as many slots during elimination and yield as with the standardized EY-PA protocol. From table II, it can be seen that the optimal maximum slots allowed for backing off during yield are heavily dependent on the elimination phase length. As longer elimination phases are examined, the stations entering yield are fewer and thus the vector ys (l) shows a declining trend as the l increases. This way the distribution used during yield adapts to the expected number of stations entering it, in contrast to EY-PA, where a good all-around distribution is employed.. COCLUSIOS In this paper, a modification to the Adaptive EY-PA protocol is proposed and evaluated. The introduced mechanism couples the two contention resolution phases elimination and yield in order to reduce the number of slots
5 that are experienced as overhead, without however deteriorating the already low collision probabilities. The analytical model was formed and presented, allowing the determination of the optimal working parameters of the proposed scheme, as well as the comparison between EY- PA and EY-PA with Variable Yield. REFERECES [1] IEEE, 8.11: Wireless LA edium Access Control (AC) and Physical Layer Specification, 199. [] IEEE, 8.11a: Wireless LA edium Access Control (AC) and Physical Layer Specifications, High-speed Physical Layer in the GHz Band, [] ETSI, DTS BRA--1 v.m: Broadband Radio Access etworks (BRA): HIgh PErformance Radio Local Area etwork (HIPERLA) Type II: Data link control (DLC) layer: Part 1: Basic transport functions, [] ETSI, E 6 v1..1: Broadband Radio Access etworks (BRA): HIgh PErformance Radio Loacal Area etwork (HIPERLA) type I: Functional specification, [] G. Dimitriadis and F.-. Pavlidou, Two Alternative Schemes to EY-PA for edium Access in High Bitrate Wireless LAs, International Journal of Wireless Personal Communications, vol. 8, no., pp. 11 1, Jan.. [6] T. Janczak and J. Wozniak, odified EY-PA Channel Access Scheme, Electronics Letters, Vol., o. 1, pp. 6 66, 1. [] G. Dimitriadis and F.-. Pavlidou, Adaptive EY- PA: A edium Access Protocol for Wireless LAs, Journal of Communication etworks, vol. 6, no., Dec.. [8] I. Vukovic, HIPERLA type I: performance analysis of the channel access control protocol, Proceedings of 8th IEEE Vehicular Technology Conference (VTC '98) (1998), 81.
BASIC CONCEPTS OF HSPA
284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationSynchronization and Beaconing in IEEE s Mesh Networks
Synchronization and Beaconing in IEEE 80.s Mesh etworks Alexander Safonov and Andrey Lyakhov Institute for Information Transmission Problems E-mails: {safa, lyakhov}@iitp.ru Stanislav Sharov Moscow Institute
More informationEvaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems
Evaluation of HIPERLAN/2 Scalability for Mobile Broadband Systems Ken ichi Ishii 1) A. H. Aghvami 2) 1) Networking Laboratories, NEC 4-1-1, Miyazaki, Miyamae-ku, Kawasaki 216-8, Japan Tel.: +81 ()44 86
More informationContents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure
Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,
More informationPerformance Analysis of Transmissions Opportunity Limit in e WLANs
Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationImproving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques
1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,
More informationT325 Summary T305 T325 B BLOCK 3 4 PART III T325. Session 11 Block III Part 3 Access & Modulation. Dr. Saatchi, Seyed Mohsen.
T305 T325 B BLOCK 3 4 PART III T325 Summary Session 11 Block III Part 3 Access & Modulation [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Prepared by:
More informationDynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System
Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun
More informationBy Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor
Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationSpectrum Sharing with Adjacent Channel Constraints
Spectrum Sharing with Adjacent Channel Constraints icholas Misiunas, Miroslava Raspopovic, Charles Thompson and Kavitha Chandra Center for Advanced Computation and Telecommunications Department of Electrical
More informationAn Opportunistic Frequency Channels Selection Scheme for Interference Minimization
Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) An Opportunistic Frequency Channels Selection Scheme for Interference Minimization 978-1-4799-5233-5/14/$31.00
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationALERT2 TDMA Manager. User s Reference. VERSION 4.0 November =AT Maintenance Report Understanding ALERT2 TDMA Terminology
ALERT2 TDMA Manager User s Reference VERSION 4.0 November 2014 =AT Maintenance Report Understanding ALERT2 TDMA Terminology i Table of Contents 1 Understanding ALERT2 TDMA Terminology... 3 1.1 General
More informationIEEE C802.16a-02/94r1. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 802.16 Broadband Wireless Access Working Group OFDM sub-channelization improvement and system performance selected topics 2002-11-14 Source(s)
More informationAverage Delay in Asynchronous Visual Light ALOHA Network
Average Delay in Asynchronous Visual Light ALOHA Network Xin Wang, Jean-Paul M.G. Linnartz, Signal Processing Systems, Dept. of Electrical Engineering Eindhoven University of Technology The Netherlands
More informationSuperposed Signaling Option for Bandwidth Efficient Wireless LANs
Superposed Signaling Option for Bandwidth Efficient Wireless LAs Thomas Deckert, Wolfgang Rave, and Gerhard Fettweis Vodafone Chair Mobile Communications Systems Dresden University of Technology, 01062
More informationIEEE TRANSACTIONS ON MOBILE COMPUTING 1. A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention
IEEE TRANSACTIONS ON MOBILE COMPUTING 1 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, J. Morris Chang, Senior Member, IEEE Abstract
More informationMulti-Robot Coordination. Chapter 11
Multi-Robot Coordination Chapter 11 Objectives To understand some of the problems being studied with multiple robots To understand the challenges involved with coordinating robots To investigate a simple
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationEfficient Assignment of Multiple MBMS Sessions in B3G Networks
Efficient Assignment of Multiple MBMS Sessions in B3G etworks Antonios Alexiou, Christos Bouras, Vasileios Kokkinos, Evangelos Rekkas Research Academic Computer Technology Institute, atras, Greece and
More informationDesign of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems
1 Design of a UE-specific Uplink Scheduler for Narrowband Internet-of-Things (NB-IoT) Systems + Bing-Zhi Hsieh, + Yu-Hsiang Chao, + Ray-Guang Cheng, and ++ Navid Nikaein + Department of Electronic and
More informationDiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers
DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationCricket: Location- Support For Wireless Mobile Networks
Cricket: Location- Support For Wireless Mobile Networks Presented By: Bill Cabral wcabral@cs.brown.edu Purpose To provide a means of localization for inbuilding, location-dependent applications Maintain
More informationSolution Paper: Contention Slots in PMP 450
Solution Paper: Contention Slots in PMP 450 CN CN PMP 450 CS OG 03052014 01192014 This solution paper describes how Contention Slots are used in a PMP 450 wireless broadband access network system, and
More informationWIRELESS 20/20. Twin-Beam Antenna. A Cost Effective Way to Double LTE Site Capacity
WIRELESS 20/20 Twin-Beam Antenna A Cost Effective Way to Double LTE Site Capacity Upgrade 3-Sector LTE sites to 6-Sector without incurring additional site CapEx or OpEx and by combining twin-beam antenna
More informationDynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications
IEEE SmartGridComm 22 Workshop - Cognitive and Machine-to-Machine Communications and Networking for Smart Grids Radio Resource Allocation for Group Paging Supporting Smart Meter Communications Chia-Hung
More informationAnalysis of Random Access Protocol and Channel Allocation Schemes for Service Differentiation in Cellular Networks
Eleventh LACCEI Latin American and Cariean Conference for Engineering and Technology (LACCEI 2013) Innovation in Engineering, Technology and Education for Competitiveness and Prosperity August 14-16, 2013
More informationOn the Coexistence of Overlapping BSSs in WLANs
On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.
More informationDoppler Frequency Effect on Network Throughput Using Transmit Diversity
International Journal of Sciences: Basic and Applied Research (IJSBAR) ISSN 2307-4531 (Print & Online) http://gssrr.org/index.php?journal=journalofbasicandapplied ---------------------------------------------------------------------------------------------------------------------------
More informationHow Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory
Prev Sci (2007) 8:206 213 DOI 10.1007/s11121-007-0070-9 How Many Imputations are Really Needed? Some Practical Clarifications of Multiple Imputation Theory John W. Graham & Allison E. Olchowski & Tamika
More informationMinimum requirements related to technical performance for IMT-2020 radio interface(s)
Report ITU-R M.2410-0 (11/2017) Minimum requirements related to technical performance for IMT-2020 radio interface(s) M Series Mobile, radiodetermination, amateur and related satellite services ii Rep.
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationThe Bitrate Limits of HSPA+ Enhanced Uplink
Introduction In 29 mobile broadband is living its success story and demand for higher data rates is growing constantly. More advanced HSPA technologies have been released recently by manufacturers, and
More informationIEEE Wireless Access Method and Physical Specification
IEEE 802.11 Wireless Access Method and Physical Specification Title: The importance of Power Management provisions in the MAC. Presented by: Abstract: Wim Diepstraten NCR WCND-Utrecht NCR/AT&T Network
More informationA Methodology for the Efficient Application of Controlled Switching to Current Interruption Cases in High-Voltage Networks
A Methodology for the Efficient Application of Controlled Switching to Current Interruption Cases in High-Voltage Networks C. D. TSIREKIS Hellenic Transmission System Operator Kastoros 72, Piraeus GREECE
More informationTraffic behavior simulation of a DECT technology network
Traffic behavior simulation of a DECT technology network A. Dimitriou, T. Vasiliadis, G. Sergiadis Aristotle University of Thessaloniki, School of Engineering, Dept. of Electrical & Computer Engineering,
More informationTransmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage
Transmission Performance of Flexible Relay-based Networks on The Purpose of Extending Network Coverage Ardian Ulvan 1 and Robert Bestak 1 1 Czech Technical University in Prague, Technicka 166 7 Praha 6,
More informationLecture 8: Media Access Control
Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing
More informationSurvey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B
Survey of Power Control Schemes for LTE Uplink E Tejaswi, Suresh B Department of Electronics and Communication Engineering K L University, Guntur, India Abstract In multi user environment number of users
More informationOn the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks
On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin
More informationContrail TDMA Manager User s Reference
Contrail TDMA Manager User s Reference VERSION 6 Published: May 2018 =AT Maintenance Report Understanding Contrail TDMA Terminology i Contents Chapter 1: Understanding Contrail TDMA Terminology... 3 General
More informationEffect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm
Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco QUINTYNE Department of Computer Science, Physics and Mathematics, University of the West Indies Cave Hill,
More informationSIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG AV POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1
SIGNAL PROCESSING CHALLENGES IN THE DESIGN OF THE HOMEPLUG POWERLINE STANDARD TO ENSURE CO-EXISTENCE WITH HOMEPLUG 1.0.1 Brent Mashburn 1, Haniph Latchman 2, Tim VanderMey 3, Larry Yonge 1 and Kartikeya
More informationA Random Network Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast
ISSN 746-7659, England, U Journal of Information and Computing Science Vol. 4, No., 9, pp. 4-3 A Random Networ Coding-based ARQ Scheme and Performance Analysis for Wireless Broadcast in Yang,, +, Gang
More informationIEEE Broadband Wireless Access Working Group < Consolidation of Uncoordinated Coexistence Mechanisms
IEEE C802.16h-07/NNN Project Title Date ubmitted 2007-07-09 IEEE 802.16 roadband Wireless Access Working Group Consolidation of Uncoordinated Coexistence Mechanisms ource(s) Ken
More informationAN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su
AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS enjamin W. Wah and Xiao Su Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign
More informationNetwork Management System for Telecommunication and Internet Application
Network Management System for Telecommunication and Internet Application Gerd Bumiller GmbH Unterschlauersbacher-Hauptstr. 10, D-906 13 Groahabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49 9105 9960-19,
More informationWirelessHART Modeling and Performance Evaluation
WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.
More informationDeployment scenarios and interference analysis using V-band beam-steering antennas
Deployment scenarios and interference analysis using V-band beam-steering antennas 07/2017 Siklu 2017 Table of Contents 1. V-band P2P/P2MP beam-steering motivation and use-case... 2 2. Beam-steering antenna
More informationBER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOCK CODES WITH MMSE CHANNEL ESTIMATION
BER PERFORMANCE AND OPTIMUM TRAINING STRATEGY FOR UNCODED SIMO AND ALAMOUTI SPACE-TIME BLOC CODES WITH MMSE CHANNEL ESTIMATION Lennert Jacobs, Frederik Van Cauter, Frederik Simoens and Marc Moeneclaey
More informationAS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks
AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline
More informationOn Practical Selective Jamming of Bluetooth Low Energy Advertising
On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,
More informationEvaluating Performance of the HIPERLAN CAC Layer Protocol for Asynchronous Traffic
Evaluating Performance of the HIPERLAN CAC Layer Protocol for Asynchronous raffic Constantine Coutras Department of Computer Science Illinois Institute of echnology 10 West 31st Street Chicago, IL 60616
More informationDatasheet LoRaWAN prototype PCB v Table of Contents 1. Specifications Data rates... 3
Datasheet LoRaWAN prototype PCB v1.0.1 Table of Contents 1. Specifications... 2 2. Data rates... 3 2.1 LoRaWAN TM... 3 Receive limitation... 3 Transmit limitation... 4 2.2 LoRa TM... 5 1 1. Specifications
More informationLTE-Unlicensed. Sreekanth Dama, Dr. Kiran Kuchi, Dr. Abhinav Kumar IIT Hyderabad
LTE-Unlicensed Sreekanth Dama, Dr. Kiran Kuchi, Dr. Abhinav Kumar IIT Hyderabad Unlicensed Bands Shared spectrum Huge available spectrum Regulations Dynamic frequency selection Restrictions over maximum
More informationMaximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs
Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington
More informationTHE use of wireless networks in everyday computing has
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 191 A Medium Access Control Scheme for Wireless LANs with Constant-Time Contention Zakhia Abichar, Student Member, IEEE, and J. Morris
More informationOPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS
9th European Signal Processing Conference (EUSIPCO 0) Barcelona, Spain, August 9 - September, 0 OPPORTUNISTIC SPECTRUM ACCESS IN MULTI-USER MULTI-CHANNEL COGNITIVE RADIO NETWORKS Sachin Shetty, Kodzo Agbedanu,
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationAn HARQ scheme with antenna switching for V-BLAST system
An HARQ scheme with antenna switching for V-BLAST system Bonghoe Kim* and Donghee Shim* *Standardization & System Research Gr., Mobile Communication Technology Research LAB., LG Electronics Inc., 533,
More informationDISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. Yi Song
DISTRIBUTED INTELLIGENT SPECTRUM MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS by Yi Song A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment
More informationSubcarrier Assignment for OFDM Based Wireless Networks Using Multiple Base Stations
Subcarrier Assignment for OFDM Based Wireless Networks Using Multiple Base Stations Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes
More informationChristen Rauscher NOTICE. The above identified patent application is available for licensing. Requests for information should be addressed to:
Serial Number Filing Date Inventor 069.855 30 April 1998 Christen Rauscher NOTICE The above identified patent application is available for licensing. Requests for information should be addressed to: OFFICE
More informationDeployment and Radio Resource Reuse in IEEE j Multi-hop Relay Network in Manhattan-like Environment
Deployment and Radio Resource Reuse in IEEE 802.16j Multi-hop Relay Network in Manhattan-like Environment I-Kang Fu and Wern-Ho Sheen Department of Communication Engineering National Chiao Tung University
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More information3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla
More informationDelay Performance Modeling and Analysis in Clustered Cognitive Radio Networks
Delay Performance Modeling and Analysis in Clustered Cognitive Radio Networks Nadia Adem and Bechir Hamdaoui School of Electrical Engineering and Computer Science Oregon State University, Corvallis, Oregon
More informationRESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS
RESOURCE ALLOCATION IN CELLULAR WIRELESS SYSTEMS Villy B. Iversen and Arne J. Glenstrup Abstract Keywords: In mobile communications an efficient utilisation of the channels is of great importance. In this
More informationTHE success of future wireless systems will depend on the
SCVT 23 1 Efficient Signaling of Spectral Resources in Spectrum Pooling Systems Timo Weiss, Joerg Hillenbrand, Albert Krohn (IEEE Student Members), Friedrich K. Jondral (IEEE Senior Member) Abstract Public
More information2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU
2.4GHz & 900MHz UNLICENSED SPECTRUM COMPARISON A WHITE PAPER BY INGENU 2.4 GHZ AND 900 MHZ UNLICENSED SPECTRUM COMPARISON Wireless connectivity providers have to make many choices when designing their
More informationConsecutive Group Paging for LTE Networks Supporting Machine-type Communications Services
Consecutive Group Paging for LTE Networks Supporting achine-type Communications Services Ruki Harwahyu +, Ray-Guang Cheng +, and Riri Fitri Sari ++ + Dept. of Electronic and Computer Engineering, National
More informationAnalysis Techniques for WiMAX Network Design Simulations
Technical White Paper Analysis Techniques for WiMAX Network Design Simulations The Power of Smart Planning 1 Analysis Techniques for WiMAX Network Jerome Berryhill, Ph.D. EDX Wireless, LLC Eugene, Oregon
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationDYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS
DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS Mark Dale Comtech EF Data Tempe, AZ Abstract Dynamic Bandwidth Allocation is used in many current VSAT networks as a means of efficiently allocating
More informationRESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS
Abstract of Doctorate Thesis RESEARCH ON METHODS FOR ANALYZING AND PROCESSING SIGNALS USED BY INTERCEPTION SYSTEMS WITH SPECIAL APPLICATIONS PhD Coordinator: Prof. Dr. Eng. Radu MUNTEANU Author: Radu MITRAN
More informationCHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN
CHANNEL ASSIGNMENT AND LOAD DISTRIBUTION IN A POWER- MANAGED WLAN Mohamad Haidar Robert Akl Hussain Al-Rizzo Yupo Chan University of Arkansas at University of Arkansas at University of Arkansas at University
More informationMedium Access Schemes
Medium Access Schemes Winter Semester 2010/11 Integrated Communication Systems Group Ilmenau University of Technology Media Access: Motivation The problem: multiple users compete for a common, shared resource
More informationChutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.
Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS
More informationMESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS
MESSAGE BROADCASTING IN WIRELESS VEHICULAR AD HOC NETWORKS CARLA F. CHIASSERINI, ROSSANO GAETA, MICHELE GARETTO, MARCO GRIBAUDO, AND MATTEO SERENO Abstract. Message broadcasting is one of the fundamental
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationStochastic Modelling for Wireless Communication Networks-Multiple Access Methods.
Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:
More informationUsing the epmp Link Budget Tool
Using the epmp Link Budget Tool The epmp Series Link Budget Tool can offer a help to determine the expected performances in terms of distances of a epmp Series system operating in line-of-sight (LOS) propagation
More informationEUROPEAN ETS TELECOMMUNICATION July 1997 STANDARD
EUROPEAN ETS 300 719-2 TELECOMMUNICATION July 1997 STANDARD Source: ETSI TC-RES Reference: DE/RES-04005-2 ICS: 33.020 Key words: Paging, private, radio Radio Equipment and Systems (RES); Private wide area
More informationHow to Improve OFDM-like Data Estimation by Using Weighted Overlapping
How to Improve OFDM-like Estimation by Using Weighted Overlapping C. Vincent Sinn, Telecommunications Laboratory University of Sydney, Australia, cvsinn@ee.usyd.edu.au Klaus Hueske, Information Processing
More informationCross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment
Cross-layer Network Design for Quality of Services in Wireless Local Area Networks: Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka Abstract This paper
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationRedline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow.
Redline Communications Inc. Combining Fixed and Mobile WiMAX Networks Supporting the Advanced Communication Services of Tomorrow WiMAX Whitepaper Author: Frank Rayal, Redline Communications Inc. Redline
More informationSimple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.
18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/
More informationMultiple Access Schemes
Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many
More informationBurst Error Correction Method Based on Arithmetic Weighted Checksums
Engineering, 0, 4, 768-773 http://dxdoiorg/0436/eng04098 Published Online November 0 (http://wwwscirporg/journal/eng) Burst Error Correction Method Based on Arithmetic Weighted Checksums Saleh Al-Omar,
More information