Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*

Size: px
Start display at page:

Download "Performance Analysis of the IEEE n Block-ACK Mechanism in an Error-Prone Channel Xue-ping CHEN, Wen-da LI and Hong-yuan CHEN*"

Transcription

1 2016 International Conerence on ustainable nergy, nvironment and Inormation ngineering (I 2016) IBN: Perormance Analysis o the I n Block- Mechanism in an rror-prone Channel Xue-ing CHN, Wen-da LI and Hong-yuan CHN* chool o lectronic and Otical ngineering, Nanjing University o cience and Technology, Nanjing Jiangsu, China, *Corresonding author Keywords: Anomalous slots, I N, Block-. Abstract. A Block- mechanism is adoted to imrove the erormance o WLAN in I n, through Block- mechanism stations can transmit more MPDUs at one-time and receiver only resonds to a single Block- rame, thus the mechanism eectively imroves the eiciency o the MAC layer. In this aer, we analyze the saturation throughut o Block- mechanism by considering the reezing o backo counter, anomalous slots and non-ideal channel, the accuracy o our model is veriied by the N-2 simulation results. Introduction With the WLAN aearing on many emerging alications and services, the demands or the I are higher and higher, articularly in terms o seed. In order to meet the demands, I n [1] in October 2009 became the oicial standard. The rate in which can reach 600 Mbs due to MIMO and OFDM technology be adoted in the hysical layer. However, that is not well imrove the throughut o system because o the high MAC overhead. In order to reduce the MAC overhead, I n introduces the Block- mechanism that is enhanced rom the I e standard [2] to imrove the throughut o MAC layer signiicantly by shrinking the rames. Many articles have analyzed rame aggregation mechanism and Block- mechanism. Wang C Y [3], Kloa J [4] and elvam T [5] gave the detailed descrition o I n rotocol and simulation results, but they did not roose an analytical model. Daldoul Y [6] roosed an analytical model to calculate the imact o the rame aggregation o the multicast traic, however they did not consider the backo overhead. Liu [7] roosed a mathematical model o Block- mechanism in an ideal channel, although Li T [8], Chen Y [9] and Lee [10] roosed an analytical model in a noisy channel, but they did not consider the anomalous slots, the reezing o backo counter and these models were based on I e rotocol. Chen H [11] roosed a Markov model by considering anomalous slots, but the result about saturation throughut was inaccurate, and he ignored the error robability o the BAR rame and the BA rame. These articles [7-10] have enhanced the two-dimensional Markov model which was roosed by Bianchi G [12] by considering a Block- case. But they have ignored some details in the I rotocol, such as the reezing o backo counter and anomalous slots. Tinnirello [13] gave a detailed exlanation about those anomalous slots. Here we briely introduce anomalous slots: backo counter start to decrease only under the idle slots, when a TA successul transmission and the backo value equals to zero the TA occuies the channel again. In [13] a more accurate model was roosed to consider the reezing o backo counter and the anomalous slots in an ideal channel. For research erormance o the Block-, it is necessary to consider bit error rate o the channel. Chen H [14] roosed an analytical model in an erroneous channel, but it is the study o immediate mechanism not Block- mechanism. In this aer, we combine the mathematical model in [14] with Block- mechanism and take into account the anomalous slots. We derive the saturation throughut ormula o Block- by the model and use N-2 veriy the accuracy o the model. The ollowing contents are arranged as ollows: the second art introduces Block- mechanism in details, the third art gives the model 313

2 and analyze saturation throughut, the ourth art gives the simulation results and the ith art summarize the article. The Block- o n Block- mechanism has been used in the I e irstly and exanded in the I n that ut orward the comressed Block- mechanism and immediate Block- mechanism. When sender and receiver want to use the Block- mechanism, sender sends an add Block- request rame (add BA-RQ) to the receiver, receiver which suort Block- mechanism will resonds to an add Block- resonse rame (add BA-RP), so they can use Block- mechanism or data transmission. Channel access rocedure o Block- mechanism as shown in Figure 1. Ater the initialization, the sender sends a MPDU to contend channel, the TA can sends a data block that is comosed o multile MPDUs and each MPDU between IF interval once it receives the rame correctly. When the TA inishes the data block transmission, it sends a Block- request rame (BAR) that tell the receiver data block are sent over to request the BA rame. Receiver resonds a Block- rame (BA) to the sender once it receives one o MPDUs o the data block or the BAR rame correctly. BA rame is an aggregated rame that use bitma to store conirm inormation o these MPDUs. Due to a BA rame can conirm the maximum number o MPDUs which is 64, so a data block can not more than 64 MPDUs. Figure 1. An illustration o a burst transmission or the basic access. [10] Figure 1 illustrates multile MPDUs, BAR rame and BA rame are all in the same backo rocedure and only a BA rame be used to acknowledge the data block. o Block- mechanism greatly reduces the MAC layer overhead. In this article, we discuss the Block- mechanism with a basic access channel mechanism in a noisy channel. In the case o collision, at least two TAs start transmission in a slot, each o them sends out the irst MPDU and then waits or the rame, the senders can t receive the rame because collisions, so the senders have to retry their data again. In the incorrect case, only one TA start transmission, here we assume that BAR rame, rame and BA rame have the error robability. The sender sends the irst MPDU but it can t receive the rame due to the MPDU or rame transmits error, then the contention window is doubled and retry its data. I the TA successul receives the rame indicates it wins the channel and can transmits the data block. The TA can t receive the BA rame due to the data block and the BAR rame all errors or the BA rame error, then the contention window is doubled too and retry its data. Once the receiver receive one o MPDUs o the data block or the BAR rame correctly, it will resonds the BA rame in a IF interval. Once receiving the BA rame correctly, the sender should waits a DIF interval and starts a new backo rocedure. Taking into account anomalous slots, when the next backo value equals to zero the TA occuies the channel again. Meanwhile, all the other TAs should be rozen their backo counter with a DIF interval and when the channel is idle they begin to decrease their backo counter. o it can be seen that the Block- mechanism oerates in a similar way to the [14]. o it is ossible to extend the analysis [14] to study the Block- mechanism. 314

3 Analytical Model o Block- Chen H [14] has roosed a two-dimensional Markov chain (s(t),b(t)) to model the immediate mechanism backo behavior o considering anomalous slots and the reezing o backo counter in a noisy channel. o it is very suitable or Block- mechanism, but the robability o a TA double the contention window need to be comuted again due to the BAR rame and the BA rame can suer errors too. The model is based on the discrete time and the wireless channel model is divided into a series o slot times. The deinition o model slot as shown in Figure 2. Figure 2. The deinition o model slot time. [12] The Markov Chain In this aer, the Markov chain model is extended rom [14], the model considers the wireless channel is a Gaussian channel, in which each acket has the same bit error robability (BR), let ber reresents the BR and each TA is always ready to send MPDU. Let denotes the robability o the each MPDU transmits error. We assume each MPDU has the same size data, and each TA sends L BA MPDUs, so the data block is comosed o L BA MPDUs. reresents the robability o one TA double its contention window, may be collision or errors. stands or the robability that a TA transmits in a randomly chosen slot time. c reresents the robability o collision, N is the number o contend TAs. e reresents the robability that the TA double its contention window because o transmission errors, let, BAR, BA, BAR, BA,, ALL reresent the size o the rame, the size o the BAR rame, the size o the BA rame, the robability o the BAR error, the robability o the BA error, the robability o the error, the robability o these MPDUs o the data block all errors, resectively. o: ALL BA 1 1 BAR 1 ber LBA ber 1 1 data BA ber BAR ber (1) The robability e is related to the transmission situation o the MPDU, the, the data block, the BAR, the BA. o these robabilities c, and e can be exressed as ollows: N 1 c 1 1 e ALL BAR BA ALL BAR BA c e c e (2) In this model ater errors occur the contention window is doubled and R is the number o maximum retransmission. According to the regular o the Markov chain, the robability can be solved, [14] has the detailed derivation or the model. Deine = e /(W + e 1), where W = CW min + 1, W k = CW k + 1, CW k denotes the contention window in the kth retry, CW min is the minimum contention window, the inal result is derived as ollows: 315

4 R1 21 R k1 k R1 1 W k 1 * 1 W k1 aturation Throughut Beore analyzing the saturation throughut we deine some arameters, Let T MPDU, T, T BA, T BAR, T TIMOUT, T DIF, T IF, T IF denote the duration o an idle slot time, the time to transmit one MAC data acket (including MAC header, PHY header, and/or tail), an Immediate- rame, a Block- rame, a Block- request rame, the rame timeout, the DIF time, the IF time, the IF time, resectively. By the model slot time deinition o the Figure 2 we know T IF = T TIMOUT T DIF, and we can get T TIMOUT T T IF according to the I rotocol. Throughut ormula is given here: P (4) T Which deined as the ayload size o the successully transmitted rame P in an exected slot duration [T]. We irstly comute the exected slot duration [T], there are our kinds o situations need to be discussed searately. First, none o the TAs transmit any rames, the duration called idle slot, let T I denotes the length o the duration, so it is natural to know T I, where is an idle slot duration. econd, this is collision case, at least two TAs start to send data block at the same time, let T C denotes the collision duration. Ater the collision, all TAs need to delay the IF interval to begin the next backo rocedure and their backo counter is keeing the last value. As Figure 2 describes the deinition o model slot time. o T C = T MPDU + T IF +. Third, this is error case, only one TA in sending data. Here we consider the error robability o the BAR rame and the BA rame, so in this case we discuss sub-two cases searately: 1) the irst MPDU error or the rame error; 2) the irst MPDU and the rame are transmitted correctly, but the data block and the BAR rame all errors or the BA rame error. Let T FM and T denote the duration o the sub-two cases searately: 1) sender ater waiting or T TIMOUT does not receive the rame correctly shows that it contends ailure o channel and then deer T DIF interval, so T FM = T MPDU + T TIMOUT + T DIF. 2) sender ater receiving the rame correctly sends the data block and the BAR rame but can t receive the BA rame correctly, so T LBA TMPDU TIF T TIF TBAR TIF (5) Fourth, only one TA in sending data and successul accesses the channel, so it starts to transmit L BA MPDUs and each MPDU between IF slot interval. Ater the transmitter receives the BA rame correctly it starts the next backo rocedure and when the randomly backo value equal to zero it directly occuies the channel to send the next MPDU. Considering anomalous slots and bit error rate, in ourth case this sub-three cases to be discussed searately: 1) there are multile successul transmission. Maybe there are some MPDUs transmit errors in the L BA MPDUs, and as the next backo value is not zero the transmission be terminated; 2) there are multile successul transmission, as the next backo value is zero but the transmission be terminated due to the irst case o error cases; 3) the multile successul transmission be terminated due to the second case o error cases. Let T BLOCK denotes the duration o a successul transmission that is comosed o L BA MPDUs, three control rames, each them between IF time interval, so TBLOCK LBA T MPDU TIF T 2 TIF TBAR TBA T (6) DIF We assume there are i successul transmission consecutive, the duration or the above sub-three cases can be exressed as ollows: 1) i data blocks transmit time lus a backo slot, that is it BLOCK + ; 2) i data blocks transmit time lus an duration o the MPDU or the rame transmits error, 316 (3)

5 that is it BLOCK + T FM ; 3) i data block transmit time lus the second error case time, that is it BLOCK + T. Next, we are going to calculate the robability o each case. In the irst case, none o TAs transmit any rames, the robability that one TA is not transmitting data is, so the robability that N TAs are all not transmitting any rames is P I = (1) N. Where P C denotes the robability o collision, P denotes the robability o successul contend channel, P FM denotes the robability o the irst MPDU error or the rame error. P denotes the robability o the data block and the BAR rame all errors or the BA rame error. o these robabilities can be calculated as ollows: N N e N N PI 1 P N PFM N P N PC 1 PI P P e P FM (7) The ourth case can be regarded as a category o contending channel successul. o we discuss these sub-three cases searately. We take into account anomalous slots, or the irst sub-case, the robability that a TA randomly choose the backo value zero ater transmitting the data block over is 1/W, the robability o a TA randomly choose the backo value nonzero is (W)/W. Thereore, the robability that the TA choose the backo value nonzero ater isuccessul transmission is: i1 1 e 1 sn 1 W W (8) Let FM = + (1 ), = e FM, or the second sub-case, the TA ater i 1successul transmission randomly chooses backo value zero, but contend ailure o the channel by the MPDU error or the error, the robability can be exressed as: i1 1 e FM sm W W For the third sub-case, the robability can be exressed as: (9) i1 1 e sa (10) W W Thereore, taking into account the anomalous slots, the average successul transmission time T can be exressed as: T i T i T T i T T sn BLOCK sm BLOCK FM i1 i1 i1 so simliication it can be obtained: W T T BLOCK W 1 W 1 (11) FM e T FM (12) Thereore, the average time o a model slot can be exressed as: T T PI TI PC TC PFM TFM P T P T (13) Ater calculating [T], we start calculate [P]. We just need to analyze the ourth situation and assume that these are j MPDUs errors in i data blocks. These j MPDUs transmit errors only in these il BA MPDUs, so the successully transmitted valid rame [] in an erroneous case is: sa BLOCK 317

6 LBA 1 j ( ilba 1 j) 1 i L 1 ilba 1 i BA j data i data (14) j0 j imliication the above ormula can be obtained: [] = i, the exression is: LBA data data 1 1 (15) According to the [T] calculation and taking into account the anomalous slots, the average data be transmitted o the ourth situation can be exressed as: P sn sm sa i1 i1 i1 o simliication the above ormula can be obtained: data (16) W data P (17) W 1 e In the error case, the second sub-case transmit one MPDU successul, so the ayload size o the successully transmit rame [P] is: P P P P data Thereore, by considering anomalous slots and the reezing o backo counter, the saturation throughut can be exressed as: P P P P T P T P T P I I C C FM data (19) Model Validation FM T P T Now, we validate our analytical model via N-2[15] simulations. N-2 is a commonly used oensource network simulator. Our simulation module is modiied based on the TKN module [16]. Our simulated scenario that is comosed o a single AP and a grou o associated TAs that send their data ackets to the AP. We suose that these TAs use the rates o 300Mbs or data ackets, BAR rame and BA rame and the rates o 96Mbs or immediate rame. We also consider a ixed length o one MPDU o 2048 bytes. In this module, the deault values o simulation arameters are T slottime = 20μs, T IF = 10μs, CW min = 15, CW max = 1023, R=7. In our simulation, two dierent bit error rates are designed to examine the erormance o Block- mechanism in the I n, the moderate bit error rate ( ber = 10-6 ) and the very noisy channel ( ber = 10-5 ). Figure 4 shows the throughut both the simulation results and the model results in two dierent bit error rates with the number o stations increase. According to the I n standard, the PHY and MAC layer arameters is exressed as ollows: =14 bytes, MAC sub layer overhead 26 bytes, Block Acknowledge Request 26 bytes, Block Acknowledge 32 bytes, FC 4 bytes and PHY layer overhead 16μs. And we require the numbers o MPDUs at one transmission is ixed to L BA = 10. From the igure we can know the throughut is decline with the number o stations increase because the robability o collision is increasing, and it tells us that our analytical model can accurately redict the throughut o Block- mechanism by consider anomalous slots and the reezing o backo counter. Conclusions In this aer, we introduced an analytical model that takes into account the eects not only collisions and transmission errors but also anomalous slots and the reezing o backo counter or the Block- mechanism. Based on the Markovian techniques, the analytical model or Block- mechanism is established in order to measure the saturation throughut. We imlement a 318 (18)

7 saturated version o the Block- mechanism in the N-2 simulator and validated our analytical model with N-2 simulations. From Figure 4, we can see our analytical result is very close the simulation result. This aggregation size o the data block and the channel bit error rate are the two main actors that aect the throughut o system. Acknowledgement This research was suorted by the Natural cience Foundation o Jiangsu Province (#BK ). Reerences [1] I, Part11:Wireless lan medium access control (MAC) and hysical layer (PHY) seciications: Amendment 5: nhancements or higher throughut. I n, et, [2] I, Part11:Wireless medium access control (MAC) and hysical layer(phy) seciications:amendment8:medium access control(mac) quality o service enhancements. I e,e,2005. [3] Wang C Y, Wei H Y. I n MAC enhancement and erormance evaluation [J]. Mobile Networks and Alications, 2009, 14(6): [4] Kola J, Krishnan, haha N. FRAM AGGRGATION MCHANIM FOR HIGH- THROUGHPUT N WLAN[J]. International Journal o Wireless & Mobile Networks, 2012, 4(3). [5] elvam T, rikanth. A rame aggregation scheduler or I n[c]//communications(ncc), 2010National Conerence on. I, 2010: 1-5. [6] Daldoul Y, Ahmed T, Meddour D. I n aggregation erormance study or the multicast[c]//wireless Days (WD), 2011 IFIP. I, 2011: 1-6. [7] Liu, Wen-Jiunn; Huang, Chao-Hua; Feng, Kai-Ten;, "Perormance Analysis o Block Acknowledgement Mechanisms or Next Generation Wireless Networks," Wireless Communications and Networking Conerence (WCNC), 2010 I,vol.,no.,.1-6,18-21 Aril [8] Li T, Ni Q, Turletti T, et al. Perormance analysis o the I e block scheme in a noisy channel[c]//broadband Networks, BroadNets nd International Conerence on. I, 2005: [9] Chen Y, meott, Choudhury R R. WLC24-6: An Analytical Model o Block Acknowledgement and elective Retransmission in an e WLAN Network[C]//Global Telecommunications Conerence, GLOBCOM'06. I. I, 2006: 1-5. [10] Lee, H., Tinnirello, I.,Yu, J., and Choi,., A erormance analysis o block scheme or I e networks. Comuter Networks, 54(4), Ar., , [11] Chen H. Throughut Analysis o Block-Ack in I n[j]. [12] Bianchi G. Perormance analysis o the I distributed coordination unction[j]. elected Areas in Communications, I Journal on, 2000, 18(3): [13] Tinnirello I, Bianchi G, Xiao Y. Reinements on I distributed coordination unction modeling aroaches[j]. Vehicular Technology, I Transactions on,2010,59(3): [14] Chen H. Revisit o the Markov model o I DCF or an error-rone channel[j]. Communications Letters, I, 2011,15(12):

8 [15] htt:// [16] Wietholter, Hoene C (2003) Design and veriication o an I e DCF simulation model in ns Technische Universitet at Berlin, Tech. Re. TKN , November. 320

Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels

Analysis of Burst Acknowledgement Mechanisms for IEEE e WLANs over Fading Wireless Channels Analysis o Burst Acknowledgement Mechanisms or IEEE 802.11e WLANs over Fading Wireless Channels Department o Computer Science and Inormation Engineering Providence University 200 Chung-Chi Rd., Shalu,

More information

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model

IEEE 802 Layers. The IEEE 802 family and its relation to the OSI model WIFI IEEE 802 Layers The IEEE 802 amily and its relation to the OSI model Need For Speed Wireless LAN Applications Streaming Media (HDTV, DVD) VoIP Interactive Gaming Data Transer Reuire Hundreds o Mps

More information

Performance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model

Performance Study of Block ACK and Reverse Direction in IEEE n using a Markov Chain Model Perormance Study o Block ACK and Reverse Direction in IEEE 802.11n using a Markov Chain Model Md. Akbar Hossain, Nurul I Sarkar, Jairo Gutierrez, William Liu School o Computer and Mathematical Sciences

More information

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation

Power Efficiency in IEEE a WLAN with Cross-Layer Adaptation Power Eiciency in IEEE 802.11a WLA with Cross-Layer Adaptation Jun Zhao, Zihua Guo, and Wenwu Zhu Microsot Research Asia 3/F, Beijing Sigma Center, o.49, Zhichun Road, Haidian District Beijing 100080,

More information

Prediction Efficiency in Predictive p-csma/cd

Prediction Efficiency in Predictive p-csma/cd Prediction Efficiency in Predictive -CSMA/CD Mare Miśowicz AGH University of Science and Technology, Deartment of Electronics al. Miciewicza 30, 30-059 Kraów, Poland misow@agh.edu.l Abstract. Predictive

More information

Performance Analysis of Transmissions Opportunity Limit in e WLANs

Performance Analysis of Transmissions Opportunity Limit in e WLANs Performance Analysis of Transmissions Opportunity Limit in 82.11e WLANs Fei Peng and Matei Ripeanu Electrical & Computer Engineering, University of British Columbia Vancouver, BC V6T 1Z4, canada {feip,

More information

COSC 3213: Communication Networks Chapter 5: Handout #6

COSC 3213: Communication Networks Chapter 5: Handout #6 OS 323: ommunication Networks hapter 5: Handout #6 Instructor: Dr. Marvin Mandelbaum Department o omputer Science York University F8 Section E Topics:. Peer-to-peer and service models 2. RQ and how to

More information

Available online at ScienceDirect. Procedia CIRP 43 (2016 ) th CIRP Conference on Computer Aided Tolerancing (CAT)

Available online at   ScienceDirect. Procedia CIRP 43 (2016 ) th CIRP Conference on Computer Aided Tolerancing (CAT) Available online at www.sciencedirect.com ScienceDirect rocedia IR 43 (06 ) 68 73 4th IR onerence on omuter Aided Tolerancing (AT) Develoment and Standardization o Quality-oriented Statistical Tolerancing

More information

Modeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks

Modeling the Effect of Interferences among N Collocated Heterogeneous Wireless Networks Modeling the Eect o Intererences among N Collocated Heterogeneous Wireless Networs Bilal Khan and Jong-Su Ahn Department o Computer Science and Engineering, Donggu University, Seoul, Korea bilalhan83@hotmailcom

More information

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells

Traffic Assignment Over Licensed and Unlicensed Bands for Dual-Band Femtocells Traic Assignment Over Licensed and Unlicensed Bands or Dual-Band Femtocells Feilu Liu, Erdem Bala, Elza Erkip and Rui Yang ECE Department, Polytechnic Institute o NYU, Brooklyn, NY 11201 InterDigital Communications,

More information

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks

A Novel Image Component Transmission Approach to Improve Image Quality and Energy Efficiency in Wireless Sensor Networks Journal of Comuter Science 3 (5: 353-360, 2007 ISSN 1549-3636 2007 Science Publications A Novel Image Comonent Transmission Aroach to Imrove Image Quality and nergy fficiency in Wireless Sensor Networks

More information

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation

ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall Mohamed Essam Khedr. Channel Estimation ECE5984 Orthogonal Frequency Division Multiplexing and Related Technologies Fall 2007 Mohamed Essam Khedr Channel Estimation Matlab Assignment # Thursday 4 October 2007 Develop an OFDM system with the

More information

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello

Ilenia Tinnirello. Giuseppe Bianchi, Ilenia Tinnirello Ilenia Tinnirello Ilenia.tinnirello@tti.unipa.it WaveLAN (AT&T)) HomeRF (Proxim)!" # $ $% & ' (!! ) & " *" *+ ), -. */ 0 1 &! ( 2 1 and 2 Mbps operation 3 * " & ( Multiple Physical Layers Two operative

More information

Available online at ScienceDirect. Procedia Manufacturing 11 (2017 )

Available online at   ScienceDirect. Procedia Manufacturing 11 (2017 ) Available online at www.sciencedirect.com ScienceDirect Procedia Manuacturing 11 (2017 ) 501 508 27th International Conerence on Flexible Automation and Intelligent Manuacturing, FAIM2017, 27-30 June 2017,

More information

A Resource Allocation Algorithm using Frequency Borrowing in Hierarchical CDMA Cellular Systems

A Resource Allocation Algorithm using Frequency Borrowing in Hierarchical CDMA Cellular Systems A Resource Allocation Algorithm using Frequency Borrowing in Hierarchical CDMA Cellular Systems Young-uk Chung and Dong-Ho Cho Division o Electrical Engineering Deartment o Electrical Engineering and Comuter

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 80.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication

DRaMA: Device-specific Repetition-aided Multiple Access for Ultra-Reliable and Low-Latency Communication DRaMA: Device-speciic Repetition-aided Multiple Access or Ultra-Reliable and Low-Latency Communication itaek Lee, Sundo im, Junseok im, and Sunghyun Choi Department o ECE and INMC, Seoul National University,

More information

Saturation throughput analysis of error-prone wireless networks

Saturation throughput analysis of error-prone wireless networks Saturation throughput analysis of error-prone 802. wireless networks Qiang Ni,,, Tianji Li, Thierry Turletti 2, and Yang Xiao 3 Hamilton Institute, National University of Ireland Maynooth, Co. Kildare,

More information

High resolution radar signal detection based on feature analysis

High resolution radar signal detection based on feature analysis Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 4, 6(6):73-77 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 High resolution radar signal detection based on feature

More information

Equalization of Energy Consumption at Cluster Head for Prolonging Lifetime in Cluster-based Wireless Sensor Networks

Equalization of Energy Consumption at Cluster Head for Prolonging Lifetime in Cluster-based Wireless Sensor Networks WSS RNSIONS on OMMUNIIONS Yung-a Huang, Neng-hung Wang, hin-ling hen, Jong-Shin hen, Zong-Min Guo qualization o nergy onsumtion at luster Head or Prolonging Lietime in luster-based Wireless Sensor Networks

More information

Frequency Hopped Spread Spectrum

Frequency Hopped Spread Spectrum FH- 5. Frequency Hopped pread pectrum ntroduction n the next ew lessons we will be examining spread spectrum communications. This idea was originally developed or military communication systems. However,

More information

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs

Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and Homogeneous WLANs Journal of Engineering Volume 213, Article ID 852959, 9 pages http://dx.doi.org/1.1155/213/852959 Research Article Collision Resolution Schemes with Nonoverlapped Contention Slots for Heterogeneous and

More information

Analysis of Mean Access Delay in Variable-Window CSMA

Analysis of Mean Access Delay in Variable-Window CSMA Sensors 007, 7, 3535-3559 sensors ISSN 44-80 007 by MDPI www.mdi.org/sensors Full Research Paer Analysis of Mean Access Delay in Variable-Window CSMA Marek Miśkowicz AGH University of Science and Technology,

More information

AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION

AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION AN EFFICIENT SET OF FEATURES FOR PULSE REPETITION INTERVAL MODULATION RECOGNITION J-P. Kauppi, K.S. Martikainen Patria Aviation Oy, Naulakatu 3, 33100 Tampere, Finland, ax +358204692696 jukka-pekka.kauppi@patria.i,

More information

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks

Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 23-22 (28) Performance Evaluation for Next Generation Differentiated Services in Wireless Local Area Networs YU-LIANG KUO, ERIC HSIAO-KUANG WU + AND GEN-HUEY

More information

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes

Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Performance Comparison of Uplink WLANs with Single-user and Multi-user MIMO Schemes Hu Jin, Bang Chul Jung, Ho Young Hwang, and Dan Keun Sung CNR Lab., School of EECS., KAIST 373-, Guseong-dong, Yuseong-gu,

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks

The Impact of Random Waypoint Mobility on Infrastructure Wireless Networks The Imact of Random Wayoint Mobility on Infrastructure Wireless Networks Dennis Pong and Tim Moors School of Electrical Engineering and Telecommunications The University of New South Wales, NSW 5 Australia

More information

Peak to Average Power Ratio Reduction in OFDM System by Clipping and Filtering

Peak to Average Power Ratio Reduction in OFDM System by Clipping and Filtering International Journal o Electronics Communication and Comuter echnology (IJECC) Volume Issue 3 (May 0) Pea to Average Power Ratio Reduction in OFDM System by Cliing and Filtering Sanjeev Saini Deartment

More information

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac

Dynamic 20/40/60/80 MHz Channel Access for 80 MHz ac Wireless Pers Commun (2014) 79:235 248 DOI 10.1007/s11277-014-1851-7 Dynamic 20/40/60/80 MHz Channel Access for 80 MHz 802.11ac Andrzej Stelter Paweł Szulakiewicz Robert Kotrys Maciej Krasicki Piotr Remlein

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title IEEE 80.16 Broadband Wireless Access Working Group Channel and intererence model or 80.16b Physical Layer Date Submitted Source(s) Re: 000-31-09 Tal Kaitz BreezeCOM

More information

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks

The de facto standard for wireless Internet. Interference Estimation in IEEE Networks Interference Estimation in IEEE 82.11 Networks A KALMAN FILTER APPROACH FOR EVALUATING CONGESTION IN ERROR-PRONE LINKS ILENIA TINNIRELLO and GIUSEPPE BIANCHI The de facto standard for wireless Internet

More information

The Research of Electric Energy Measurement Algorithm Based on S-Transform

The Research of Electric Energy Measurement Algorithm Based on S-Transform International Conerence on Energy, Power and Electrical Engineering (EPEE 16 The Research o Electric Energy Measurement Algorithm Based on S-Transorm Xiyang Ou1,*, Bei He, Xiang Du1, Jin Zhang1, Ling Feng1,

More information

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation

Performance Comparison of Downlink User Multiplexing Schemes in IEEE ac: Multi-User MIMO vs. Frame Aggregation 2012 IEEE Wireless Communications and Networking Conference: MAC and Cross-Layer Design Performance Comparison of Downlink User Multiplexing Schemes in IEEE 80211ac: Multi-User MIMO vs Frame Aggregation

More information

The thermal model and thermal management of high power IGBT PWM inverter

The thermal model and thermal management of high power IGBT PWM inverter The thermal model and thermal management o high ower GBT PWM inverter Xiaohong Hao*, Huimin Wang, Yixiong Wang University o Electronics Scien and Technology o China haoxiaohong@uestc.edu.cn EEE PEDS 07,

More information

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes

Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes 22 IEEE Wireless Communications and Networking Conference: Mobile and Wireless Networks Delivery Delay Analysis of Network Coded Wireless Broadcast Schemes Amy Fu and Parastoo Sadeghi The Australian National

More information

Parametric Design Model of Disc-scoop-type Metering Device Based on Knowledge Engineering. Yu Yang 1, a

Parametric Design Model of Disc-scoop-type Metering Device Based on Knowledge Engineering. Yu Yang 1, a Advanced Materials Research Online: 2013-10-31 ISSN: 1662-8985, Vols. 834-836, pp 1432-1435 doi:10.4028/www.scientiic.net/amr.834-836.1432 2014 Trans Tech Publications, Switzerland Parametric Design Model

More information

Collision Target Detection Using a Single Antenna for Automotive RADAR

Collision Target Detection Using a Single Antenna for Automotive RADAR Collision Target Detection Using a Single Antenna or Automotive RADAR Souleymane Abakar Issakha, Francois Vincent, Laurent Ferro-Famil, Frantz Bodereau To cite this version: Souleymane Abakar Issakha,

More information

Image Characteristic Based Rate Control Algorithm for HEVC

Image Characteristic Based Rate Control Algorithm for HEVC Image Characteristic Based Rate Control Algorithm or HEVC Mayan Fei, Zongju Peng*, Weiguo Chen, Fen Chen Faculty o Inormation Science and Engineering, Ningbo University, Ningbo 352 China *pengzongju@26.com;

More information

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks

Non-saturated and Saturated Throughput Analysis for IEEE e EDCA Multi-hop Networks Non-saturated and Saturated Throughput Analysis for IEEE 80.e EDCA Multi-hop Networks Yuta Shimoyamada, Kosuke Sanada, and Hiroo Sekiya Graduate School of Advanced Integration Science, Chiba University,

More information

Dynamic Channel Bonding in Multicarrier Wireless Networks

Dynamic Channel Bonding in Multicarrier Wireless Networks Dynamic Channel Bonding in Multicarrier Wireless Networks Pei Huang, Xi Yang, and Li Xiao Department o Computer Science and Engineering Michigan State University Email: {huangpe3, yangxi, lxiao}@cse.msu.edu

More information

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems

Lousy Processing Increases Energy Efficiency in Massive MIMO Systems 1 Lousy Processing Increases Energy Eiciency in Massive MIMO Systems Sara Gunnarsson, Micaela Bortas, Yanxiang Huang, Cheng-Ming Chen, Liesbet Van der Perre and Ove Edors Department o EIT, Lund University,

More information

Worst Case Modelling of Wireless Sensor Networks

Worst Case Modelling of Wireless Sensor Networks Worst Case Modelling o Wireless Sensor Networks Jens B. Schmitt disco Distributed Computer Systems Lab, University o Kaiserslautern, Germany jschmitt@inormatik.uni-kl.de 1 Abstract At the current state

More information

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance

On the Impact of Fading and Inter-piconet Interference on Bluetooth Performance On the Impact o Fading and Inter-piconet Intererence on Bluetooth Perormance Andrea Zanella Dept. o Inormation Engineering University o Padova, Padova, Italy zanella@dei.unipd.it Andrea Tonello Bell Labs,

More information

Simulation Results for Permutation Trellis Codes using M-ary FSK

Simulation Results for Permutation Trellis Codes using M-ary FSK Simulation Results or Permutation Trellis Codes using M-ary FSK T.G. Swart, I. de Beer, H.C. Ferreira Department o Electrical and Electronic Engineering University o Johannesburg Auckland Park, South Arica

More information

Study on Power and Rate Control Algorithm for Cognitive Wireless. Networks

Study on Power and Rate Control Algorithm for Cognitive Wireless. Networks WSEAS TANSATONS on OMMUNATONS Qian Hu Zhenzhou Tang Study on Power and ate ontrol Algorithm or ognitive Wireless Networs QAN HU and ZHENZHOU TANG ollege o Physics and Electronic normation Wenzhou University

More information

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs

Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Maximizing Throughput When Achieving Time Fairness in Multi-Rate Wireless LANs Yuan Le, Liran Ma,WeiCheng,XiuzhenCheng,BiaoChen Department of Computer Science, The George Washington University, Washington

More information

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-05/022r1. IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title Cognitive radio concepts or 802.16h Date Submitted 2005-07-11 Source(s) Mariana Goldhamer Alvarion Tel Aviv, 21

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation

Goodput Enhancement of IEEE a Wireless LAN via Link Adaptation Goodput Enhancement of IEEE 8.11a Wireless AN via ink Adaptation Daji Qiao Real-Time Computing aboratory The University of Michigan Email: dqiao@eecs.umich.edu Abstract IEEE 8.11a is a new high-speed physical

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

MFCC-based perceptual hashing for compressed domain of speech content identification

MFCC-based perceptual hashing for compressed domain of speech content identification Available online www.jocpr.com Journal o Chemical and Pharmaceutical Research, 014, 6(7):379-386 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 MFCC-based perceptual hashing or compressed domain

More information

Jan M. Kelner, Cezary Ziółkowski, Leszek Kachel The empirical verification of the location method based on the Doppler effect Proceedings:

Jan M. Kelner, Cezary Ziółkowski, Leszek Kachel The empirical verification of the location method based on the Doppler effect Proceedings: Authors: Jan M. Kelner, Cezary Ziółkowski, Leszek Kachel Title: The empirical veriication o the location method based on the Doppler eect Proceedings: Proceedings o MIKON-8 Volume: 3 Pages: 755-758 Conerence:

More information

FOUNTAIN codes [1], [2] have been introduced to achieve

FOUNTAIN codes [1], [2] have been introduced to achieve Controlled Flooding of Fountain Codes Waqas bin Abbas, Paolo Casari, Senior Member, IEEE, Michele Zorzi, Fellow, IEEE Abstract We consider a multiho network where a source node must reliably deliver a

More information

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach

Adaptive Switching between Spatial Diversity and Multiplexing: a Cross-layer Approach Adative Switching between Satial Diversity and ultilexing: a Cross-layer Aroach José Lóez Vicario and Carles Antón-Haro Centre Tecnològic de Telecomunicacions de Catalunya (CTTC) c/ Gran Caità -4, 08034

More information

% 4 (1 $ $ ! " ( # $ 5 # $ % - % +' ( % +' (( % -.

% 4 (1 $ $ !  ( # $ 5 # $ % - % +' ( % +' (( % -. ! " % - % 2 % % 4 % % & % ) % * %, % -. % -- % -2 % - % -4 % - 0 "" 1 $ (1 $ $ (1 $ $ ( # $ 5 # $$ # $ ' ( (( +'! $ /0 (1 % +' ( % +' ((!1 3 0 ( 6 ' infrastructure network AP AP: Access Point AP wired

More information

Random Access Compressed Sensing in Underwater Sensor Networks

Random Access Compressed Sensing in Underwater Sensor Networks Random Access Comressed Sensing in Underwater Sensor Networks Fatemeh Fazel Northeastern University Boston, MA 2115 Email: ffazel@ece.neu.edu Maryam Fazel University of Washington Seattle, WA 98195 Email:

More information

Computer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks

Computer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks Comuter Networks 56 (2012) 2221 2236 Contents lists available at SciVerse ScienceDirect Comuter Networks journal homeage: www.elsevier.com/locate/comnet Queen-MAC: A quorum-based energy-efficient medium

More information

A Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks

A Modified Profile-Based Location Caching with Fixed Local Anchor for Wireless Mobile Networks A Modiied Proile-Based Location Caching with Fixed Local Anchor or Wireless Mobile Networks Md. Kowsar Hossain, Tumpa Rani Roy, Mousume Bhowmick 3 Department o Computer Science and Engineering, Khulna

More information

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page

802.11b White Paper. Table of Contents. VOCAL Technologies, Ltd. Home page VOCAL Technologies, Ltd. Home age 802.b White Paer Table of Contents Page. 802.b Glossary... 2 2. Introduction to 802.b... 3 3. 802.b Overview... 6 4. CCK used in 802.b... 7 5. Walsh and Comlementary Codes

More information

On the Coexistence of Overlapping BSSs in WLANs

On the Coexistence of Overlapping BSSs in WLANs On the Coexistence of Overlapping BSSs in WLANs Ariton E. Xhafa, Anuj Batra Texas Instruments, Inc. 12500 TI Boulevard Dallas, TX 75243, USA Email:{axhafa, batra}@ti.com Artur Zaks Texas Instruments, Inc.

More information

Effect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI

Effect of Layer Spacing and Line Width of PCB Coil on Resonant Frequency Shen WANG, Zhi-qiang WEI, Yan-ping CONG * and Hao-kun CHI 2016 International Conerence on Sustainable Energy, Environment and Inormation Engineering (SEEIE 2016) ISBN: 978-1-60595-337-3 Eect o Layer Spacing and Line Width o PCB Coil on Resonant Frequency Shen

More information

Study on Visual Style of Twist Silk Knitted Fabrics

Study on Visual Style of Twist Silk Knitted Fabrics 2nd International Conerence on Inormation, Electronics and Computer (ICIEAC 2014) Study on Visual Style o Twist Sil Knitted Fabrics Yuan Fang, Ya-qun Zhang Department o Textile Engineering, College o Textile

More information

and assigned priority levels in accordance with the QoS requirements of their applications.

and assigned priority levels in accordance with the QoS requirements of their applications. Effect of Priority Class Ratios on the Novel Delay Weighted Priority Scheduling Algorithm Vasco Quintyne *, Adrian Als Deartment of Comuter Science, Physics and Mathematics University of the West Indies

More information

Properties of Mobile Tactical Radio Networks on VHF Bands

Properties of Mobile Tactical Radio Networks on VHF Bands Proerties of Mobile Tactical Radio Networks on VHF Bands Li Li, Phil Vigneron Communications Research Centre Canada Ottawa, Canada li.li@crc.gc.ca / hil.vigneron@crc.gc.ca ABSTRACT This work extends a

More information

Sinusoidal signal. Arbitrary signal. Periodic rectangular pulse. Sampling function. Sampled sinusoidal signal. Sampled arbitrary signal

Sinusoidal signal. Arbitrary signal. Periodic rectangular pulse. Sampling function. Sampled sinusoidal signal. Sampled arbitrary signal Techniques o Physics Worksheet 4 Digital Signal Processing 1 Introduction to Digital Signal Processing The ield o digital signal processing (DSP) is concerned with the processing o signals that have been

More information

ADAPTIVE LINE DIFFERENTIAL PROTECTION ENHANCED BY PHASE ANGLE INFORMATION

ADAPTIVE LINE DIFFERENTIAL PROTECTION ENHANCED BY PHASE ANGLE INFORMATION ADAPTIVE INE DIEENTIA POTECTION ENHANCED BY PHASE ANGE INOMATION Youyi I Jianping WANG Kai IU Ivo BNCIC hanpeng SHI ABB Sweden ABB Sweden ABB China ABB Sweden ABB - Sweden youyi.li@se.abb.com jianping.wang@se.abb.com

More information

Time Syntonization and Frequency Stabilizing Using GPS Carrier Phase with Extension Controller

Time Syntonization and Frequency Stabilizing Using GPS Carrier Phase with Extension Controller WEA TANACTION on ELECTONIC Manuscript received Apr. 25, 2007; revised July 14, 2007 Guo-hing Huang Time yntonization and Frequency tabilizing Using GP Carrier Phase with Extension Controller GUO-HING HUANG

More information

Efficient Monitoring of Dynamic Tag Populations in RFID Systems

Efficient Monitoring of Dynamic Tag Populations in RFID Systems 2 2 Ninth IFIP IEEE/IFIP Ninth International Conerence on on Embedded and and Ubiquitous Computing Eicient Monitoring o Dynamic Tag Populations in RFID Systems Qingjun Xiao, Kai Bu, Bin Xiao Department

More information

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks

Optimal p-persistent MAC algorithm for event-driven Wireless Sensor Networks Otimal -ersistent MAC algorithm for event-driven Wireless Sensor Networks J. Vales-Alonso,E.Egea-Lóez, M. V. Bueno-Delgado, J. L. Sieiro-Lomba, J. García-Haro Deartment of Information Technologies and

More information

Transformer and LCL Filter Design for DPFCs

Transformer and LCL Filter Design for DPFCs Transormer and LCL Filter Design or DPFCs Ivo Martins, J. Silva, Sónia Pinto, Isménio Martins To cite this version: Ivo Martins, J. Silva, Sónia Pinto, Isménio Martins. Transormer and LCL Filter Design

More information

PLL AND NUMBER OF SAMPLE SYNCHRONISATION TECHNIQUES FOR ELECTRICAL POWER QUALITY MEASURMENTS

PLL AND NUMBER OF SAMPLE SYNCHRONISATION TECHNIQUES FOR ELECTRICAL POWER QUALITY MEASURMENTS XX IMEKO World Congress Metrology or Green Growth September 9 14, 2012, Busan, Republic o Korea PLL AND NUMBER OF SAMPLE SYNCHRONISATION TECHNIQUES FOR ELECTRICAL POWER QUALITY MEASURMENTS Richárd Bátori

More information

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1

Transmitter Antenna Diversity and Adaptive Signaling Using Long Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Transmitter Antenna Diversity and Adative Signaling Using ong Range Prediction for Fast Fading DS/CDMA Mobile Radio Channels 1 Shengquan Hu, Tugay Eyceoz, Alexandra Duel-Hallen North Carolina State University

More information

RADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags

RADIO Frequency Identification (RFID) devices are widely. A Multiple Hashing Approach to Complete Identification of Missing RFID Tags A Multiple Hashing Approach to Complete Identiication o Missing RFID ags Xiulong Liu, Keqiu Li*, Geyong Min, Yanming Shen, Alex X. Liu, Wenyu Qu Abstract Owing to its superior properties, such as ast identiication

More information

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems

Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional Spread-Spectrum Systems I TRANSACTIONS ON CIRCUITS AND SYTMS I: FUNDAMNTAL THORY AND APPLICATIONS, VOL. 50, NO., NOVMBR 2003 475 Performance of Chaos-Based Communication Systems Under the Influence of Coexisting Conventional

More information

Multiple access techniques

Multiple access techniques Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ

More information

OPTIMAL MODULATION SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR NETWORKS

OPTIMAL MODULATION SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR NETWORKS OTIMA MODUATION SCHM FOR NRGY FFICINT WIRSS SNSOR NTWORKS Rajoua Anane 1,, Kosai Raoo 1, Maha Ben Zid 3, Ridha Bouallegue 1 aboratory o Acoustics at University o Maine, AUM UMR CNRS no. 6613, e Mans, France

More information

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm

Optimizing Reception Performance of new UWB Pulse shape over Multipath Channel using MMSE Adaptive Algorithm IOSR Journal o Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 05, Issue 01 (January. 2015), V1 PP 44-57 www.iosrjen.org Optimizing Reception Perormance o new UWB Pulse shape over Multipath

More information

Predicting the performance of a photodetector

Predicting the performance of a photodetector Page 1 Predicting the perormance o a photodetector by Fred Perry, Boston Electronics Corporation, 91 Boylston Street, Brookline, MA 02445 USA. Comments and corrections and questions are welcome. The perormance

More information

Overexcitation protection function block description

Overexcitation protection function block description unction block description Document ID: PRELIMIARY VERSIO ser s manual version inormation Version Date Modiication Compiled by Preliminary 24.11.2009. Preliminary version, without technical inormation Petri

More information

SAS-2 6Gbps PHY Specification

SAS-2 6Gbps PHY Specification SAS-2 6Gbps PHY Speciication T10/07-063r2 Date: March 8, 2007 To: T10 Technical Committee From: Alvin Cox (alvin.cox@seagate.com) Subject: SAS-2 6Gbps PHY Electrical Speciication Abstract: The attached

More information

GSM Remote Sensing for Copper Cable Transmission Line Monitoring System Using FPGA

GSM Remote Sensing for Copper Cable Transmission Line Monitoring System Using FPGA GSM Remote Sensing or Copper Cable Transmission Line Monitoring System Using FPGA Mohd Natashah Norizan, Roslin Jamaludin, Ili Salwani Mohamad, Tan Chiang Li School o Microelectronic Engineering Universiti

More information

A MATLAB Model of Hybrid Active Filter Based on SVPWM Technique

A MATLAB Model of Hybrid Active Filter Based on SVPWM Technique International Journal o Electrical Engineering. ISSN 0974-2158 olume 5, Number 5 (2012), pp. 557-569 International Research Publication House http://www.irphouse.com A MATLAB Model o Hybrid Active Filter

More information

Physics 54. Lenses and Mirrors. And now for the sequence of events, in no particular order. Dan Rather

Physics 54. Lenses and Mirrors. And now for the sequence of events, in no particular order. Dan Rather Physics 54 Lenses and Mirrors And now or the seuence o events, in no articular order. Dan Rather Overview We will now study transmission o light energy in the ray aroximation, which assumes that the energy

More information

Consumers are looking to wireless

Consumers are looking to wireless Phase Noise Eects on OFDM Wireless LAN Perormance This article quantiies the eects o phase noise on bit-error rate and oers guidelines or noise reduction By John R. Pelliccio, Heinz Bachmann and Bruce

More information

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation

Capacity Gain From Two-Transmitter and Two-Receiver Cooperation 3822 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Caacity Gain From Two-Transmitter and Two-Receiver Cooeration Chris T. K. Ng, Student Member, IEEE, Nihar Jindal, Member, IEEE,

More information

On the Performance of TCP over Free-Space Optical Atmospheric Turbulence Channels

On the Performance of TCP over Free-Space Optical Atmospheric Turbulence Channels JOURNAL OF L A TEX CLASS FILES, VOL. 6, NO. 1, JANUARY 7 1 On the Perormance o TCP over Free-Space Optical Atmospheric Turbulence Channels Vuong V. Mai, Truong C. Thang, and Anh T. Pham Abstract This paper

More information

A 3D Beamforming Analytical Model for 5G Wireless Networks

A 3D Beamforming Analytical Model for 5G Wireless Networks 1 A 3D Beamorming Analytical Model or 5G Wireless Networks Jean-Marc Keli 1, Marceau Coupechoux 2, Mathieu Mansanarez 3 Abstract This paper proposes an analytical study o 3D beamorming or 5G wireless networks.

More information

Section III. Area, Timing and Power Optimization

Section III. Area, Timing and Power Optimization Section III. Area, Timing and Power Optimization Introduction Physical implementation can be an intimidating and challenging phase o the design process. This section introduces eatures in Altera s Quartus

More information

Enhancement of Wide Bandwidth Operation in IEEE ac Networks

Enhancement of Wide Bandwidth Operation in IEEE ac Networks Enhancement of Wide Bandwidth Operation in IEEE 82.11ac Networks Seongho Byeon, Changmok Yang, Okhwan Lee, Kangjin Yoon and Sunghyun Choi Department of ECE and INMC, Seoul National University, Seoul, Korea

More information

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference

Design and Optimal Configuration of Full-Duplex MAC Protocol for Cognitive Radio Networks Considering Self-Interference IEEE ACCE Design and Optimal Coniguration o Full-Duplex MAC Protocol or Cognitive Radio Networks Considering el-intererence Le hanh an, Member, IEEE, Long Bao Le, enior Member, IEEE arxiv:5.3839v [cs.ni]

More information

DKAN0008A PIC18 Software UART Timing Requirements

DKAN0008A PIC18 Software UART Timing Requirements DKAN0008A PIC18 Sotware UART Timing Requirements 11 June 2009 Introduction Design conditions oten limit the hardware peripherals available or an embedded system. Perhaps the available hardware UARTs are

More information

Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency

Practical Evaluation of Cooperative Communication for Ultra-Reliability and Low-Latency Practical Evaluation of Cooerative Communication for Ultra-Reliability and Low-Latency Martin Serror, Sebastian Vaaßen, Klaus Wehrle, James Gross Chair of Communication and Distributed Systems, RWTH Aachen

More information

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt. Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics

More information

Measuring the Speed of Light

Measuring the Speed of Light Physics Teaching Laboratory Measuring the peed o Light Introduction: The goal o this experiment is to measure the speed o light, c. The experiment relies on the technique o heterodyning, a very useul tool

More information

Design of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment

Design of Multidimensional Space Motion Simulation System For Spacecraft Attitude and Orbit Guidance and Control Based on Radar RF Environment 2016 Sixth International Conerence on Instrumentation & Measurement, Computer, Communication and Control Design o Multidimensional Space Motion Simulation System For Spacecrat Attitude and Orbit Guidance

More information

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing)

Introduction to OFDM. Characteristics of OFDM (Orthogonal Frequency Division Multiplexing) Introduction to OFDM Characteristics o OFDM (Orthogonal Frequency Division Multiplexing Parallel data transmission with very long symbol duration - Robust under multi-path channels Transormation o a requency-selective

More information

A Novel Adaptive Baseband Digital Predistortion Technique

A Novel Adaptive Baseband Digital Predistortion Technique 119 NTERNATONAL JOURNAL OF MCROWAE AND OPTCAL TECHNOLOGY OL. 2, NO. 2, APRL 2007 A Novel Adative Baseband Digital Predistortion Technique Jianeng Zhai,Ngde Xie,Jianyi Zhou, Jiang Zhao, Lei Zhang, and Wei

More information

Performance of LTE Linear MIMO Detectors: Achievable Data Rates and Complexity

Performance of LTE Linear MIMO Detectors: Achievable Data Rates and Complexity Perormance o LTE Linear MIMO Detectors: Achievable Data Rates and Complexity Dragan Samardzija, Milos Pilipovic, Dusica Marijan, Jaroslav Farkas, Miodrag Temerinac University o Novi Sad Novi Sad, Serbia

More information