Cooperation in Random Access Wireless Networks

Size: px
Start display at page:

Download "Cooperation in Random Access Wireless Networks"

Transcription

1 Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department Drexel University

2 Outline of Discussion Introduction/Background Random Access Methods ALOHA NDMA Proposed Cooperation Technique ALLIANCES Current Work Relay Selection Conclusion Questions

3 Background Multimedia sources require diverse bandwidth requirements. Fixed Allocation Schemes are insufficient for variable-bitrate applications. Simple random access schemes such as ALOHA suffer from limited throughput. The focus of previous multi-user research was to avoid collisions.

4 Random Access Methods ALOHA In random access methods such as ALOHA, each user transmits its packet when it has a packet to transmit. As the traffic load in the network increases, packets at the receiver will collide. In the ALOHA scheme, collided packets are discarded. C onsider a slotted-system User 1 slot n-4 slot n-3 slot n-2 slot n-1 Collision slot n User 2 User 3 User 4 User 5 User 6

5 Random Access Methods By introducing diversity to the wireless network approach, an advantage is provided over the original ALOHA scheme. Multi-user detection and source separation can be used at the receiver to detect collisions (and the collision order). In a recent method (NDMA) it was proposed that in a K fold collision, the packets from the collision time slot are saved in buffer, and using retransmissions during the following K-1 time slots, the originally collided packets can be resolved.

6 Random Access Methods NDMA Consider the three fold collision in time slot n (previous slide) 3 Fold Collision

7 Random Access Methods NDMA

8 Random Access Methods NDMA Collision can be resolved

9 Random Access Methods NDMA NDMA exploits time diversity in the wireless network through retransmission of collided packets. Usually, channel coefficients are correlated over adjacent time slots. If a certain channel is in deep fading, it will continue to be in deep fade during the following time slots. Deep Fading will reduce the rank of the channel coefficient matrix A. NDMA provides higher throughput than ALOHA, however, it is best suited for fast varying channels.

10 Random Access Methods ALLIANCES ALLow Improved Access in the Network via Cooperation and Energy Savings In addition to time diversity, we introduce spatial diversity through user cooperation. The additional diversity introduced provides us with a higher throughput without additional hardware or bandwidth expansion. View the wireless network as a spatially distributed antenna, with all elements linked via the wireless channel. A savings in network power efficiency can be observed.

11 Random Access Methods ALLIANCES Assumptions: Small-scale multi-user slotted system Transmitters are synchronized and in half duplex mode Each node is equipped with one antenna Nodes will receive feedback from base station specifying if the transmission was successful Only non-regenerative relays will be used

12 Random Access Methods ALLIANCES When a collision is detected, the system will enter a cooperative transmission epoch (CTE). A control bit will be broadcast to all nodes indicating the start of CTE. Initially, the CTE will be of length K-1. If necessary, the base station will increase this length. Selection of relays during CTE Randomly SNR User Energy (Available Battery Power)

13 Random Access Methods ALLIANCES Consider the same collision during time slot n a 10 (n) y 0 (n) received at base station 3 Fold Collision a 20 (n) a 30 (n) Signal at BS/AP y 0 (n) = a 10 (n)x 1 (n) + a 20 (n)x 2 (n) + a 30 (n)x 3 (n) Signal at i th relay node y i (n) = a 1i (n)x 1 (n) + a 2i (n)x 2 (n) + a 3i (n)x 3 (n)

14 Random Access Methods ALLIANCES In the first time slot of the CTE, a chosen relay bounces the signal it received during the collision time slot a 40 (n+1) y 0 (n) received at base station Signals stored at BS/AP time slot n y 0 (n) = a 10 (n)x 1 (n) + a 20 (n)x 2 (n) + a 30 (n)x 3 (n) time slot n+1 y 0 (n+1) = a 40 (n)y 4 (n)

15 Random Access Methods ALLIANCES For the 3 Fold Collision example, the originally collided packets are resolved in time slot n+2 Collision can be resolved y 0 (n) received at base station a 30 (n+2) Y = AX + W Signals stored at BS/AP time slot n y 0 (n) = a 10 (n)x 1 (n) + a 20 (n)x 2 (n) + a 30 (n)x 3 (n) time slot n+1 time slot n+2 y 0 (n+1) = a 40 (n)y 4 (n) y 0 (n+2) = a 30 (n+2)x 3 (n) Note: In this situation, we show the special case where the selected relay is a source node. In this case (as shown), the user will simply retransmit its original packet.

16 Simulation We consider a wireless system with 32 users Orthogonal IDs were added to 4 QAM packets, with N = 424 bits. Symbols were recovered using a zero forcing function at the receiver If the packets were successfully detected at the receiver with an error probability.02, the transmission was considered successful Jake s model was used to simulate the fading channel. A bit rate of 256 kbps and Doppler frequency shift of 52 Hz. With a carrier frequency of 5.2GHz, this corresponds to a user speed of 3 m/s. The following results are simulations of the network to handle an aggregated traffic load (both new traffic and traffic from retransmissions).

17 Simulated Results

18 Application Advantage of Cooperation: Consider a military scenario, where we view the network nodes as soldiers carrying antennas. With cooperation, we can enable uninterrupted, high-bit rate (multimedia e.g. voice, data, video) communication, EVEN if the some of the users face poor channel conditions (i.e. poor SNR, no LOS etc.).

19 Selection of Relays In the originally proposed ALLIANCES scheme, relays were selected at random. For example, R i = mod(n + i, J) + 1. For this, J was the set of all users. To see an improved throughput, we can consider using different relay sets; with respect to set size and node choice. Relay selection may provide us with additional control overhead. This overhead can be justified, if an improvement in throughput is observed.

20 Selection of Relays Selection of relay via user location. Relay sets of size J/2 and K-1 Selection of relay from the joint set of user s location and user s available battery Relay set of size J/2 Compare the above with the original selection technique in the proposed method

21 Selection of Relays

22 Simulation

23 Conclusions Spatial diversity provided by the ALLIANCES scheme is robust in a wireless environment, with throughput improvement over both NDMA and ALOHA. ALLIANCES is suitable for a wireless network in which nodes are willing to cooperate. In addition to the cooperation advantage, ALLIANCES is advantageous for bursty sources. ALLIANCES only requires one node to transmit during the CTE, thus, when compared to NDMA, it provides us with a more energy efficient way of resolving collisions. Throughput performance can be increased with different relay selection techniques. However, we must make note that these additional techniques will add control overhead to the protocol.

24 Questions?

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks

A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks Bharat Sharma, Shashidhar Ram Joshi, Udaya Raj Dhungana Department of Electronics and Computer Engineering, IOE, Central Campus,

More information

Compressed Sensing for Multiple Access

Compressed Sensing for Multiple Access Compressed Sensing for Multiple Access Xiaodai Dong Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Tohoku University, Sendai, Japan Oct. 28, 2013 Outline Background Existing

More information

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential

More information

M2M massive wireless access: challenges, research issues, and ways forward

M2M massive wireless access: challenges, research issues, and ways forward M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

Cellular systems 02/10/06

Cellular systems 02/10/06 Cellular systems 02/10/06 Cellular systems Implements space division multiplex: base station covers a certain transmission area (cell) Mobile stations communicate only via the base station Cell sizes from

More information

A random access protocol assisted by retransmission diversity and energy reuse capabilities

A random access protocol assisted by retransmission diversity and energy reuse capabilities A random access protocol assisted by retransmission diversity and energy reuse capabilities Ramiro Sámano Robles Congresso Portugues da URSI 2014. 28-Nov-2014 Instituto de telecomunicações, Aveiro, Portugal

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Technical Aspects of LTE Part I: OFDM

Technical Aspects of LTE Part I: OFDM Technical Aspects of LTE Part I: OFDM By Mohammad Movahhedian, Ph.D., MIET, MIEEE m.movahhedian@mci.ir ITU regional workshop on Long-Term Evolution 9-11 Dec. 2013 Outline Motivation for LTE LTE Network

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Transmit Diversity Schemes for CDMA-2000

Transmit Diversity Schemes for CDMA-2000 1 of 5 Transmit Diversity Schemes for CDMA-2000 Dinesh Rajan Rice University 6100 Main St. Houston, TX 77005 dinesh@rice.edu Steven D. Gray Nokia Research Center 6000, Connection Dr. Irving, TX 75240 steven.gray@nokia.com

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

Chapter 10. User Cooperative Communications

Chapter 10. User Cooperative Communications Chapter 10 User Cooperative Communications 1 Outline Introduction Relay Channels User-Cooperation in Wireless Networks Multi-Hop Relay Channel Summary 2 Introduction User cooperative communication is a

More information

Lecture 8 Mul+user Systems

Lecture 8 Mul+user Systems Wireless Communications Lecture 8 Mul+user Systems Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 Outline Multiuser Systems (Chapter 14 of Goldsmith

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Wireless Networks (PHY): Design for Diversity

Wireless Networks (PHY): Design for Diversity Wireless Networks (PHY): Design for Diversity Y. Richard Yang 9/20/2012 Outline Admin and recap Design for diversity 2 Admin Assignment 1 questions Assignment 1 office hours Thursday 3-4 @ AKW 307A 3 Recap:

More information

Interference management Within 3GPP LTE advanced

Interference management Within 3GPP LTE advanced Interference management Within 3GPP LTE advanced Konstantinos Dimou, PhD Senior Research Engineer, Wireless Access Networks, Ericsson research konstantinos.dimou@ericsson.com 2013-02-20 Outline Introduction

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

SourceSync. Exploiting Sender Diversity

SourceSync. Exploiting Sender Diversity SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored

More information

Unit 8 - Week 7 - Computer simulation of Rayleigh fading, Antenna Diversity

Unit 8 - Week 7 - Computer simulation of Rayleigh fading, Antenna Diversity X Courses» Introduction to Wireless and Cellular Communications Announcements Course Forum Progress Mentor Unit 8 - Week 7 - Computer simulation of Rayleigh fading, Antenna Diversity Course outline How

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

LTE-Advanced and Release 10

LTE-Advanced and Release 10 LTE-Advanced and Release 10 1. Carrier Aggregation 2. Enhanced Downlink MIMO 3. Enhanced Uplink MIMO 4. Relays 5. Release 11 and Beyond Release 10 enhances the capabilities of LTE, to make the technology

More information

The Long Range Wide Area Network - LoraWAN

The Long Range Wide Area Network - LoraWAN Politecnico di Milano Advanced Network Technologies Laboratory The Long Range Wide Area Network - LoraWAN https://www.lora-alliance.org/ 1 Lang Range Communication Technologies Wi-Fi HaLow 2 Cellular IoT

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Background: Cellular network technology

Background: Cellular network technology Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)

More information

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University

More information

Opportunistic Communication in Wireless Networks

Opportunistic Communication in Wireless Networks Opportunistic Communication in Wireless Networks David Tse Department of EECS, U.C. Berkeley October 10, 2001 Networking, Communications and DSP Seminar Communication over Wireless Channels Fundamental

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

Smart Random Channel Access in OFDM Systems by Joint Signal Processing and Packet Scheduling

Smart Random Channel Access in OFDM Systems by Joint Signal Processing and Packet Scheduling pqzuzgp Œ ˆ ˆ Gq œ ˆ G G œ Œ GzŠ Œ ŠŒGˆ GuŒ ž GzŒŠœ, VOL. 5 No.8, August 25 Smart Random Channel Access in OFDM Systems by Joint Signal Processing and Packet Scheduling aewoo Han, Xiaohua Li 2 and Jeho

More information

Multiple access techniques

Multiple access techniques Multiple access techniques Narrowband and wideband systems FDMA TDMA CDMA /FHMA SDMA Random-access techniques Summary Wireless Systems 2015 Narrowband and wideband systems Coherence BW B coh 1/σ τ σ τ

More information

Power Allocation based Hybrid Multihop Relaying Protocol for Sensor Networks

Power Allocation based Hybrid Multihop Relaying Protocol for Sensor Networks , pp.70-74 http://dx.doi.org/10.14257/astl.2014.46.16 Power Allocation based Hybrid Multihop Relaying Protocol for Sensor Networks Saransh Malik 1,Sangmi Moon 1, Bora Kim 1, Hun Choi 1, Jinsul Kim 1, Cheolhong

More information

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS Jie Chen, Tiejun Lv and Haitao Zheng Prepared by Cenker Demir The purpose of the authors To propose a Joint cross-layer design between MAC layer and Physical

More information

Mobile Computing. Chapter 3: Medium Access Control

Mobile Computing. Chapter 3: Medium Access Control Mobile Computing Chapter 3: Medium Access Control Prof. Sang-Jo Yoo Contents Motivation Access methods SDMA/FDMA/TDMA Aloha Other access methods Access method CDMA 2 1. Motivation Can we apply media access

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III ECE 333: Introduction to Communication Networks Fall 200 Lecture 5: Medium Access Control III CSMA CSMA/CD Carrier Sense Multiple Access (CSMA) In studying Aloha, we assumed that a node simply transmitted

More information

Professor Paulraj and Bringing MIMO to Practice

Professor Paulraj and Bringing MIMO to Practice Professor Paulraj and Bringing MIMO to Practice Michael P. Fitz UnWiReD Laboratory-UCLA http://www.unwired.ee.ucla.edu/ April 21, 24 UnWiReD Lab A Little Reminiscence PhD in 1989 First research area after

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

SNS COLLEGE OF ENGINEERING COIMBATORE DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK

SNS COLLEGE OF ENGINEERING COIMBATORE DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK SNS COLLEGE OF ENGINEERING COIMBATORE 641107 DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK EC6801 WIRELESS COMMUNICATION UNIT-I WIRELESS CHANNELS PART-A 1. What is propagation model? 2. What are the

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) Long Term Evolution (LTE) What is LTE? LTE is the next generation of Mobile broadband technology Data Rates up to 100Mbps Next level of

More information

Information Theory at the Extremes

Information Theory at the Extremes Information Theory at the Extremes David Tse Department of EECS, U.C. Berkeley September 5, 2002 Wireless Networks Workshop at Cornell Information Theory in Wireless Wireless communication is an old subject.

More information

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques 1 Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques Bin Song and Martin Haardt Outline 2 Multi-user user MIMO System (main topic in phase I and phase II) critical problem Downlink

More information

ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION

ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION Aihua Hong, Reiner Thomä Institute for Information Technology Technische

More information

On Distributed Space-Time Coding Techniques for Cooperative Wireless Networks and their Sensitivity to Frequency Offsets

On Distributed Space-Time Coding Techniques for Cooperative Wireless Networks and their Sensitivity to Frequency Offsets On Distributed Space-Time Coding Techniques for Cooperative Wireless Networks and their Sensitivity to Frequency Offsets Jan Mietzner, Jan Eick, and Peter A. Hoeher (ICT) University of Kiel, Germany {jm,jei,ph}@tf.uni-kiel.de

More information

Reliable and Efficient RFID Networks

Reliable and Efficient RFID Networks Reliable and Efficient RFID Networks Jue Wang with Haitham Hassanieh, Dina Katabi, Piotr Indyk Machine Generated Data RFID will be a major source of such traffic In Oil & Gas about 30% annual growth rate

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Medium Access Control Protocol for WBANS

Medium Access Control Protocol for WBANS Medium Access Control Protocol for WBANS Using the slides presented by the following group: An Efficient Multi-channel Management Protocol for Wireless Body Area Networks Wangjong Lee *, Seung Hyong Rhee

More information

Collaborative transmission in wireless sensor networks

Collaborative transmission in wireless sensor networks Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Selected answers * Problem set 6

Selected answers * Problem set 6 Selected answers * Problem set 6 Wireless Communications, 2nd Ed 243/212 2 (the second one) GSM channel correlation across a burst A time slot in GSM has a length of 15625 bit-times (577 ) Of these, 825

More information

Technical Bulletin. DIFFERENT OPERATING MODES, SPECTRAL BEHAVIOUR & DATA THROUGHPUT Prepared by: Jack Van der Star, P.Eng.

Technical Bulletin. DIFFERENT OPERATING MODES, SPECTRAL BEHAVIOUR & DATA THROUGHPUT Prepared by: Jack Van der Star, P.Eng. DIFFERENT OPERATING MODES, SPECTRAL BEHAVIOUR & DATA THROUGHPUT Prepared by: Jack Van der Star, P.Eng. This technical bulletin provides observations of spectrum and data throughput behavior under different

More information

FAQs about OFDMA-Enabled Wi-Fi backscatter

FAQs about OFDMA-Enabled Wi-Fi backscatter FAQs about OFDMA-Enabled Wi-Fi backscatter We categorize frequently asked questions (FAQs) about OFDMA Wi-Fi backscatter into the following classes for the convenience of readers: 1) What is the motivation

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

Research Letter Throughput of Type II HARQ-OFDM/TDM Using MMSE-FDE in a Multipath Channel

Research Letter Throughput of Type II HARQ-OFDM/TDM Using MMSE-FDE in a Multipath Channel Research Letters in Communications Volume 2009, Article ID 695620, 4 pages doi:0.55/2009/695620 Research Letter Throughput of Type II HARQ-OFDM/TDM Using MMSE-FDE in a Multipath Channel Haris Gacanin and

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications The first Nordic Workshop on Cross-Layer Optimization in Wireless Networks at Levi, Finland Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications Ahmed M. Masri

More information

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum Wireless replacement for cables in CAN Network Pros and Cons by Derek Sum TABLE OF CONTENT - Introduction - Concept of wireless cable replacement - Wireless CAN cable hardware - Real time performance and

More information

Qualcomm Research Dual-Cell HSDPA

Qualcomm Research Dual-Cell HSDPA Qualcomm Technologies, Inc. Qualcomm Research Dual-Cell HSDPA February 2015 Qualcomm Research is a division of Qualcomm Technologies, Inc. 1 Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. 5775

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

Study of Performance Evaluation of Quasi Orthogonal Space Time Block Code MIMO-OFDM System in Rician Channel for Different Modulation Schemes

Study of Performance Evaluation of Quasi Orthogonal Space Time Block Code MIMO-OFDM System in Rician Channel for Different Modulation Schemes Volume 4, Issue 6, June (016) Study of Performance Evaluation of Quasi Orthogonal Space Time Block Code MIMO-OFDM System in Rician Channel for Different Modulation Schemes Pranil S Mengane D. Y. Patil

More information

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt. Wireless Networks (PHY): Design or Diversity Admin and recap Design or diversity Y. Richard Yang 9/2/212 2 Admin Assignment 1 questions Assignment 1 oice hours Thursday 3-4 @ AKW 37A Channel characteristics

More information

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks ISHIK UNIVERSITY Faculty of Science Department of Information Technology 2017-2018 Fall Course Name: Wireless Networks Agenda Lecture 4 Multiple Access Techniques: FDMA, TDMA, SDMA and CDMA 1. Frequency

More information

An Introduction to Wireless Technologies Part 2. F. Ricci

An Introduction to Wireless Technologies Part 2. F. Ricci An Introduction to Wireless Technologies Part 2 F. Ricci Content Medium access control (MAC): FDMA = Frequency Division Multiple Access TDMA = Time Division Multiple Access CDMA = Code Division Multiple

More information

Boosting Microwave Capacity Using Line-of-Sight MIMO

Boosting Microwave Capacity Using Line-of-Sight MIMO Boosting Microwave Capacity Using Line-of-Sight MIMO Introduction Demand for network capacity continues to escalate as mobile subscribers get accustomed to using more data-rich and video-oriented services

More information

TECHNOLOGY : MATLAB DOMAIN : COMMUNICATION

TECHNOLOGY : MATLAB DOMAIN : COMMUNICATION TECHNOLOGY : MATLAB DOMAIN : COMMUNICATION S.NO CODE PROJECT TITLES APPLICATION YEAR 1. 2. 3. 4. 5. 6. ITCM01 ITCM02 ITCM03 ITCM04 ITCM05 ITCM06 ON THE SUM-RATE OF THE GAUSSIAN MIMO Z CHANNEL AND THE GAUSSIAN

More information

PERFORMANCE ANALYSIS OF COLLABORATIVE HYBRID-ARQ INCREMENTAL REDUNDANCY PROTOCOLS OVER FADING CHANNELS

PERFORMANCE ANALYSIS OF COLLABORATIVE HYBRID-ARQ INCREMENTAL REDUNDANCY PROTOCOLS OVER FADING CHANNELS PERFORMANCE ANALYSIS OF COLLABORATIVE HYBRID-ARQ INCREMENTAL REDUNDANCY PROTOCOLS OVER FADING CHANNELS Igor Stanojev, Osvaldo Simeone and Yeheskel Bar-Ness Center for Wireless Communications and Signal

More information

Wireless TDMA Mesh Networks

Wireless TDMA Mesh Networks Wireless TDMA Mesh Networks Vinay Ribeiro Department of Computer Science and Engineering IIT Delhi Outline What are mesh networks Applications of wireless mesh Quality-of-service Design and development

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005 Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks Plenary Talk at: Jack H. Winters September 13, 2005 jwinters@motia.com 12/05/03 Slide 1 1 Outline Service Limitations Smart Antennas

More information

Next Generation Wireless LANs

Next Generation Wireless LANs Next Generation Wireless LANs 802.11n and 802.11ac ELDAD PERAHIA Intel Corporation ROBERTSTACEY Apple Inc. и CAMBRIDGE UNIVERSITY PRESS Contents Foreword by Dr. Andrew Myles Preface to the first edition

More information

RECOMMENDATION ITU-R F Characteristics of advanced digital high frequency (HF) radiocommunication systems

RECOMMENDATION ITU-R F Characteristics of advanced digital high frequency (HF) radiocommunication systems Rec. ITU-R F.1821 1 RECOMMENDATION ITU-R F.1821 Characteristics of advanced digital high frequency (HF) radiocommunication systems (Question ITU-R 147/9) (2007) Scope This Recommendation specifies the

More information

ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation

ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation 0 ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation Xin Liu, John Kountouriotis, Athina P. Petropulu and Kapil R. Dandekar Electrical & Computer Engineering Department,

More information

Randomized spatial multiplexing for distributed cooperative communications

Randomized spatial multiplexing for distributed cooperative communications Randomized spatial multiplexing for distributed cooperative communications Pei Liu and Shivendra Panwar Department of Electrical and Computer Engineering, Polytechnic Institute of NYU, Brooklyn, NY 1121

More information

Resource Allocation in Energy-constrained Cooperative Wireless Networks

Resource Allocation in Energy-constrained Cooperative Wireless Networks Resource Allocation in Energy-constrained Cooperative Wireless Networks Lin Dai City University of Hong ong Jun. 4, 2011 1 Outline Resource Allocation in Wireless Networks Tradeoff between Fairness and

More information

IEEE ax / OFDMA

IEEE ax / OFDMA #WLPC 2018 PRAGUE CZECH REPUBLIC IEEE 802.11ax / OFDMA WFA CERTIFIED Wi-Fi 6 PERRY CORRELL DIR. PRODUCT MANAGEMENT 1 2018 Aerohive Networks. All Rights Reserved. IEEE 802.11ax Timeline IEEE 802.11ax Passed

More information

Investigation on Multiple Antenna Transmission Techniques in Evolved UTRA. OFDM-Based Radio Access in Downlink. Features of Evolved UTRA and UTRAN

Investigation on Multiple Antenna Transmission Techniques in Evolved UTRA. OFDM-Based Radio Access in Downlink. Features of Evolved UTRA and UTRAN Evolved UTRA and UTRAN Investigation on Multiple Antenna Transmission Techniques in Evolved UTRA Evolved UTRA (E-UTRA) and UTRAN represent long-term evolution (LTE) of technology to maintain continuous

More information

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren Lecture 23: Media Access Control CSE 123: Computer Networks Alex C. Snoeren Overview Finish encoding schemes Manchester, 4B/5B, etc. Methods to share physical media: multiple access Fixed partitioning

More information

1. Introduction. 2. OFDM Primer

1. Introduction. 2. OFDM Primer A Novel Frequency Domain Reciprocal Modulation Technique to Mitigate Multipath Effect for HF Channel *Kumaresh K, *Sree Divya S.P & **T. R Rammohan Central Research Laboratory Bharat Electronics Limited

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Ad hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl

Ad hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl Ad hoc and Sensor Networks Chapter 4: Physical layer Holger Karl Goals of this chapter Get an understanding of the peculiarities of wireless communication Wireless channel as abstraction of these properties

More information

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System (AeroMACS) Candidate: Paola Pulini Advisor: Marco Chiani Outline Introduction and Motivations Thesis

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N. WPANs) (WPANs( January doc.: IEEE 802.

Project: IEEE P Working Group for Wireless Personal Area Networks N. WPANs) (WPANs( January doc.: IEEE 802. Slide Project: IEEE P82.5 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [Impulsive Direct-Sequence UWB Wireless Networks with Node Cooperation Relaying ] Date Submitted: [January,

More information

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods.

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods. Stochastic Modelling for Wireless Communication etworks-multiple Access Methods. By Hassan KHALIL U.U.D.M. Project Report 2003: **** Examensarbete i matematisk statistik 20 poäng Handledare och examinator:

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study

On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study Beatrice Tomasi, Prof. James C. Preisig, Prof. Michele Zorzi Objectives and motivations Underwater

More information

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, 6.4.2 CSE 3213, Fall 2010 Instructor: N. Vlajic 2 Medium Sharing Techniques Static Channelization FDMA TDMA Attempt to produce an orderly access

More information

Chapter 2 Overview - 1 -

Chapter 2 Overview - 1 - Chapter 2 Overview Part 1 (last week) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (today) Modulation, Coding, Error Correction Part 3 (next

More information

Communication Efficiency of Error Correction Mechanism Based on Retransmissions

Communication Efficiency of Error Correction Mechanism Based on Retransmissions Communication Efficiency of Error Correction Mechanism Based on Retransmissions Dragan Samardzija Summary The SNR gap between the capacity and throughput stays constant as SNR increases. The relative efficiency

More information

White Rose Research Online URL for this paper: Version: Accepted Version

White Rose Research Online URL for this paper:   Version: Accepted Version This is a repository copy of Network Diversity Multiple Access in Rayleigh Fading Correlated Channels with Imperfect Channel and Collision Multiplicity Estimation. White Rose Research Online URL for this

More information

Randomized Channel Access Reduces Network Local Delay

Randomized Channel Access Reduces Network Local Delay Randomized Channel Access Reduces Network Local Delay Wenyi Zhang USTC Joint work with Yi Zhong (Ph.D. student) and Martin Haenggi (Notre Dame) 2013 Joint HK/TW Workshop on ITC CUHK, January 19, 2013 Acknowledgement

More information