Analysis of Code-expanded Random Access
|
|
- Carmella Marshall
- 5 years ago
- Views:
Transcription
1 Analysis of Code-expanded Random Access J.Y. Park Wireless and Mobile Communication Lab. 1
2 Introduction(Random Access Procedure) When a device want to access Base Station, Random Access Procedure is processed In this paper, Message 1 is the main issue A device should transmit a preamble at a specific subframe There are 64 different preambles For M2M, H2H Devices randomly select preambles If more than 2 devices select same preamble, collision occur, and collided devices try Random Access again at next opportunity If large number of devices try random access simultaneously, the probability of collision will be increased 2
3 Introduction[1] By utilizing code-expanded random access, collision probability can be decreased M: # of preamble used for M2M, L: length of codeword Codeword: combination of preamble by virtual frame Play a role as a preamble Number of codeword: (M+1) L 1 If preamble p a, p b, and length= 2, possible codewords: (p a, idle), (p a, p b ), (p a, p a ), (p b, idle), (p b, p a ), (p b, p b ), (idle, p a ), (idle, p b ) 3
4 Introduction Consider if (# of codeword) >>> (# of devices) # of codeword = (M+1) L 1 M: # of preamble to use, L: length of codeword To increase the number of codeword, M or L should be larger # of preamble for M2M is restricted Length of codeword can be infinitely long, however it can cause long access time Access time constraint Phantom-codeword It reduces the resource for data transmission Codewords that are not used are candidate for phantom-codeword Reduce the number of codewords that are not used P idle : # of not used codewords total # of codewords = # of candidate for codewords total # of codewords constraint 4
5 Introduction[1] Consider there are 2 preambles available: A, B user1 sends codeword (B, I) user2 sends codeword (I, A) user3 sends codeword (A, A) Phantom codeword (B, A) Codeword that is not used but perceived by Base Station Base station perceive that there is a device sending codeword (B, A) Base Station sends message2 to non-exist device Decrease of downlink resource for data transmission Base Station allocate a certain uplink resource to non-exist device to get message3 Decrease of uplink resource for data transmission Shortcoming of Code-expanded random access 5
6 Introduction In [1] Efficiency = # of uncollided codewords # of total codewords = # of codewords selected by a device # of total codewords where CW = (M + 1) L 1 and N: number of device = N 1 CW (1 1 CW )N 1 CW Compare efficiency of code-expanded with reference for specific M, L Does not give algorithm to get optimal # of preamble (M) and length of codeword (L) Does not consider access time 6
7 Proposed Optimization Problem Goal Minimize the collision probability while guaranteeing idle codeword ratio requirement and average access time of devices requirement Solution: (M*, L*) M*: # of preamble used for M2M L*: length of codeword For given M, As length of codeword longer # of codeword increase; collision probability, codeword usage ratio Average access time 7
8 Proposed Optimization Problem (M*, L*) = argmin P collision s. t. C1: P idle < P req C2: F Areq < α Access time : time difference between the first subframe after its arrival and the subframe at which it successfully transmit codeword P idle : # of not used codewords total # of codewords = # of candidate for phantom codewords total # of codewords C1: codeword idle ratio requirement should be satisfied C2: Fail to access until A req ratio requirement should be satisfied α: fail rate requirement 8
9 Assumption At each frame, N new devices arrive with the rate of λ Uniformly distributed arrivals over a fixed time interval [0, T] Uniformly distributed arrival model can be a realistic scenario in which MTC devices access the network uniformly over a period of time. [2] There may be remaining unsuccessful devices from the prior Random Access There is single subframe for Random Access per frame 9
10 Proposed Optimization Problem(obj func) Collision probability (P collision )= # of collision devices total # of attemping devices [6] Total random access arrival rate in the i-th virtual frame slot : λ T [i](new+backlogged) [5] λ T [i] = λt + P collision λ T [i-1] P collision : collision probability T: period of subframe for preamble transmission (10ms) In steady state, drop slot index i λ T = λt + P collision λ T λ T = λt 1 P collision Collision probability p can be estimated by P collision = 1 Pr[no device select a given codeword] Pr[one device select a given codeword] = 1 - (1 1 CW )λ T - λ T CW (1 1 CW )λ T 1 Where # of codewords(cw) : (M+1) L 1 1 W[ln 1 P collision = 1 e CW ]λt, where W[.] is a lambert W function [5] 10
11 Proposed Optimization Problem(C1) P idle : # of not used codewords total # of codewords = # of candidate for phantom codewords total # of codewords let X be a random variable that is # of MNs selecting per codeword Probability that a given codeword is selected by k MNs among N devices Pr[X = k] = N k ( 1 CW )k (1 # of codewords(cw): (M+1) L 1 1 CW )N k [1] Probability that a given codeword is not selected Pr[X = 0] = (1 1 CW )N # of idle codewords in a cycle = Pr[X=0] * CW Total # of codewords in a cycle CW = (M+1) L 1 M: # of preamble, L: length of codeword P idle = Pr X=0 CW CW = Pr[X=0] = (1 1 CW )N = (1 1 (M+1) L 1 )N 11
12 Proposed Optimization Problem(C2) Access time requirement New devices arrive to the channel at the following uniform rate λ = N T 0 < t < T = 10ms (1 frame) 0 otherwise 12
13 Proposed Optimization Problem(C2) N i = total number of devices trying to access base station at i-th virtual frame N 1 = N P i = collision probability at i-th virtual frame N i = P i-1 N i-1 + N 1 W ln 1 P i = 1 e CW N i, where W[.] is a lambert W function [5] # of codewords(cw): (M+1) L 1 13
14 Proposed Optimization Problem(C2) Acess time requirement: A req Access time requirement Time ( 횟수 ) limit (T limit ) to satisfy A req : = A req time length of a virtual frame L: length of codeword, T: time length of a frame(10ms) Ratio of devices fail to access base station among N devices after T limit virtual frame T F Areq = limit i=1 P i Constraint 2 F Areq < α α: fail rate requirement L T 14
15 Performance (Environment) λ = arrivals/10sec [7] Max number of preamble for M2M: 30 A req : 22ms(delay sensitive), 60ms(delay nonsensitive) [9] Fail rate requirement (α): 0.2, 0.05 Time between subframes for preamble transmission T = 10ms There are one subframe for preamble transmission per frame Codeword idle ratio P idle = 0.5,
16 Performance (GA) (M*, L*) = argmin P collision = argmin (1 e W[ln(1-1 CW )]λt ) s.t. C1: (1 1 (M+1) L 1 )N < P req T C2 : limit i=1 P i < α 1 W ln 1 Where P i = 1 e CW N i Mixed Integer Nonlinear Programming The optimization of such model is typically difficult due to their combinatorial nature and potential existence of multiple local minima in the search space GAs are powerful tools for solving MINLP problems [8] 16
17 Performance (GA) Chromosome format: (X 1, X 2 ) X 1 : number of preamble, X 2 : length of codeword Fitness function f = P collision + 10*max(0, P idle P req ) + 10*max(0, F Areq - α) Penalty when constraints are not met Population size: 500 Mutation rate: 0.01 Elitist one per generation was keeped (no mutation) Natural Selection Chromosome which has function value bigger than average function value is discarded Binary tournament selection Stopping criteria : F best, n F best, (n+1) <
18 Performance 18
19 Performance 19
20 Performance 20
21 Performance 21
22 Performance 22
23 reference [1] Nuno K. Paratas, Henning Thomsen, Code-Expanded radio access protocol for machine-to-machine communications TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES [2] 3GPP Generation Partnership Project; 3GPP TR v ( ) Technical Report [3] Nuno K. Paratas, Henning Thomsen, Code-Expanded Random Access for Machine-Type Communications [4] Mehmet Koseoglu, Lower bound on the LTE-A Average Random Access Delay under Massive M2M Arrivals IEEE TRANSACTIONS ON COMMUNICATIONS [5] Dan Keun Sung, Spatial Group Based Random Access for M2M Communications IEEE COMMUNICATIONS LETTERS, VOL. 18, NO 6, JUNE 2014 [6] Challenges of Massive Access in Highly-Dense LTE-Advanced Networks with Machine-to-Machine Communications [7]Lower Bound on the LTE-A Average Random Access Delay under Massive M2M Arrivals [8]A genetic Algorithm for Mixed Integer Nonlinear Programming Problems Using Separate Constraint Approximations [9]Joint Access Control and Resource Allocation for Concurrent and Massive Access of M2M Devices 23
Code-Expanded Random Access for Machine-Type Communications
Code-Expanded Random Access for Machine-Type Communications Nuno K. Pratas, Henning Thomsen, Čedomir Stefanović, Petar Popovski Department of Electronic Systems, Aalborg University, Denmark Email: nup@es.aau.dk,
More informationDynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications
IEEE SmartGridComm 22 Workshop - Cognitive and Machine-to-Machine Communications and Networking for Smart Grids Radio Resource Allocation for Group Paging Supporting Smart Meter Communications Chia-Hung
More informationConsecutive Group Paging for LTE Networks Supporting Machine-type Communications Services
Consecutive Group Paging for LTE Networks Supporting achine-type Communications Services Ruki Harwahyu +, Ray-Guang Cheng +, and Riri Fitri Sari ++ + Dept. of Electronic and Computer Engineering, National
More informationMulti-user Space Time Scheduling for Wireless Systems with Multiple Antenna
Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance
More informationJoint work with Dragana Bajović and Dušan Jakovetić. DLR/TUM Workshop, Munich,
Slotted ALOHA in Small Cell Networks: How to Design Codes on Random Geometric Graphs? Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with Dragana Bajović and
More informationKing s Research Portal
King s Research Portal DOI: 10.1109/JSAC.2017.2724442 Document Version Peer reviewed version Link to publication record in King's Research Portal Citation for published version (APA): Shirvanimoghaddam,
More informationII. FRAME STRUCTURE In this section, we present the downlink frame structure of 3GPP LTE and WiMAX standards. Here, we consider
Forward Error Correction Decoding for WiMAX and 3GPP LTE Modems Seok-Jun Lee, Manish Goel, Yuming Zhu, Jing-Fei Ren, and Yang Sun DSPS R&D Center, Texas Instruments ECE Depart., Rice University {seokjun,
More informationMAC Protocols for Massive IoT Connectivity
< 한국통신학회초저지연 / 고효율무선접속기술워크샵 > MAC Protocols for Massive IoT Connectivity 2017 년 8 월 18 일 김재현 Wireless Internet and Network Engineering Research Lab. Department of Electrical and Computer Engineering Ajou
More informationRandom Access for Machine-Type Communication based on Bloom Filtering
Random Access for Machine-Type Communication based on Bloom Filtering uno K. Pratas, Čedomir Stefanović, Germán Corrales Madueño, Petar Popovski Department of Electronic Systems, Aalborg University, Denmark
More informationDownlink Erlang Capacity of Cellular OFDMA
Downlink Erlang Capacity of Cellular OFDMA Gauri Joshi, Harshad Maral, Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology Bombay Powai, Mumbai, India 400076. Email: gaurijoshi@iitb.ac.in,
More informationEfficient LTE Access with Collision Resolution for Massive M2M Communications
Efficient LTE Access with Collision Resolution for Massive MM Communications German Corrales Madueño, Čedomir Stefanović, Petar Popovski epartment of Electronic Systems, Aalborg University, enmark Email:
More informationSolution Paper: Contention Slots in PMP 450
Solution Paper: Contention Slots in PMP 450 CN CN PMP 450 CS OG 03052014 01192014 This solution paper describes how Contention Slots are used in a PMP 450 wireless broadband access network system, and
More informationPerformance of ALOHA and CSMA in Spatially Distributed Wireless Networks
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,
More informationSmart Grid Reconfiguration Using Genetic Algorithm and NSGA-II
Smart Grid Reconfiguration Using Genetic Algorithm and NSGA-II 1 * Sangeeta Jagdish Gurjar, 2 Urvish Mewada, 3 * Parita Vinodbhai Desai 1 Department of Electrical Engineering, AIT, Gujarat Technical University,
More informationAchieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters
Achieving Desirable Gameplay Objectives by Niched Evolution of Game Parameters Scott Watson, Andrew Vardy, Wolfgang Banzhaf Department of Computer Science Memorial University of Newfoundland St John s.
More informationCongestion Control for M2M Communications in LTE Networks
Congestion Control for M2M Communications in LTE Networks by Suyang Duan B.E., Zhejiang University, 2011 A THESIS SUBMITTED IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED
More informationCompressive Sensing based Asynchronous Random Access for Wireless Networks
Compressive Sensing based Asynchronous Random Access for Wireless Networks Vahid Shah-Mansouri, Suyang Duan, Ling-Hua Chang, Vincent W.S. Wong, and Jwo-Yuh Wu Department of Electrical and Computer Engineering,
More informationMultiuser Scheduling and Power Sharing for CDMA Packet Data Systems
Multiuser Scheduling and Power Sharing for CDMA Packet Data Systems Sandeep Vangipuram NVIDIA Graphics Pvt. Ltd. No. 10, M.G. Road, Bangalore 560001. sandeep84@gmail.com Srikrishna Bhashyam Department
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationGroup Paging Optimization For Machine-Type-Communications
Group Paging Optimization For Machine-Type-Communications Osama Arouk, Adlen Ksentini, and Tarik Taleb IISA, University of ennes 1 Campus Beaulieu, 35042 ennes, France Email: firstname.lastname@irisa.fr
More informationContents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure
Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,
More informationMACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II
MACHINE TO MACHINE (M2M) COMMUNICATIONS-PART II BASICS & CHALLENGES Dr Konstantinos Dimou Senior Research Engineer Ericsson Research konstantinos.dimou@ericsson.com Overview Introduction Definition Vision
More informationCollaborative transmission in wireless sensor networks
Collaborative transmission in wireless sensor networks Cooperative transmission schemes Stephan Sigg Distributed and Ubiquitous Systems Technische Universität Braunschweig November 22, 2010 Stephan Sigg
More informationDynamic Resource Allocation of Random Access for MTC Devices
ETRI Journal, Volume 39, Number 4, August, 217 546 Dynamic Resource Allocation of Random Access for MTC Devices Sung-Hyung Lee, So-Yi Jung, and Jae-Hyun Kim In a long term evolution-advanced (LTE-A) system,
More informationr-hint: A Message-Efficient Random Access Response for mmtc in 5G Networks
r-hint: A Message-Efficient Random Access Response for mmtc in 5G Networks Teng-Wei Huang, Yi Ren, Kate Ching-Ju Lin, and Yu-Chee Tseng Department of Computer Science, National Chiao Tung University, Hsinchu,
More informationAggregation and Trunking of M2M Traffic via D2D Connections
Aggregation and Trunking of M2M Traffic via D2D Connections Giovanni Rigazzi, Nuno K. Pratas, Petar Popovski, Romano Fantacci Department of Information Engineering, University of Florence, Italy, E-mail:
More informationCollege of Engineering
WiFi and WCDMA Network Design Robert Akl, D.Sc. College of Engineering Department of Computer Science and Engineering Outline WiFi Access point selection Traffic balancing Multi-Cell WCDMA with Multiple
More informationDecentralized Resource Allocation and Effective CSI Signaling in Dense TDD Networks
Decentralized Resource Allocation and Effective CSI Signaling in Dense TDD Networks 1 Decentralized Resource Allocation and Effective CSI Signaling in Dense TDD Networks Antti Tölli with Praneeth Jayasinghe,
More informationSystem-Level Simulator for the W-CDMA Low Chip Rate TDD System y
System-Level Simulator for the W-CDMA Low Chip Rate TDD System y Sung Ho Moon Λ, Jae Hoon Chung Λ, Jae Kyun Kwon Λ, Suwon Park Λ, Dan Keun Sung Λ, Sungoh Hwang ΛΛ, and Junggon Kim ΛΛ * CNR Lab., Dept.
More informationWirelessHART Modeling and Performance Evaluation
WirelessHART Modeling and Performance Evaluation Anne Remke and Xian Wu October 24, 2013 A. Remke and X. Wu (University of Twente) WirelessHART October 24, 2013 1 / 21 WirelessHART [www.hartcomm.org] A.
More informationPopulation Adaptation for Genetic Algorithm-based Cognitive Radios
Population Adaptation for Genetic Algorithm-based Cognitive Radios Timothy R. Newman, Rakesh Rajbanshi, Alexander M. Wyglinski, Joseph B. Evans, and Gary J. Minden Information Technology and Telecommunications
More informationPerformance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system
Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system Nidhi Sindhwani Department of ECE, ASET, GGSIPU, Delhi, India Abstract: In MIMO system, there are several number of users
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationThe Genetic Algorithm
The Genetic Algorithm The Genetic Algorithm, (GA) is finding increasing applications in electromagnetics including antenna design. In this lesson we will learn about some of these techniques so you are
More informationUL/DL Mode Selection and Transceiver Design for Dynamic TDD Systems
UL/DL Mode Selection and Transceiver Design for Dynamic TDD Systems 1 UL/DL Mode Selection and Transceiver Design for Dynamic TDD Systems Antti Tölli with Ganesh Venkatraman, Jarkko Kaleva and David Gesbert
More informationLTE in Unlicensed Spectrum
LTE in Unlicensed Spectrum Prof. Geoffrey Ye Li School of ECE, Georgia Tech. Email: liye@ece.gatech.edu Website: http://users.ece.gatech.edu/liye/ Contributors: Q.-M. Chen, G.-D. Yu, and A. Maaref Outline
More informationSourceSync. Exploiting Sender Diversity
SourceSync Exploiting Sender Diversity Why Develop SourceSync? Wireless diversity is intrinsic to wireless networks Many distributed protocols exploit receiver diversity Sender diversity is a largely unexplored
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationA Distributed Opportunistic Access Scheme for OFDMA Systems
A Distributed Opportunistic Access Scheme for OFDMA Systems Dandan Wang Richardson, Tx 7508 Email: dxw05000@utdallas.edu Hlaing Minn Richardson, Tx 7508 Email: hlaing.minn@utdallas.edu Naofal Al-Dhahir
More informationAnalysis of CSAT performance in Wi-Fi and LTE-U Coexistence
Analysis of CSAT performance in Wi-Fi and LTE-U Coexistence Vanlin Sathya, Morteza Mehrnoush, Monisha Ghosh, and Sumit Roy University of Chicago, Illinois, USA. University of Washington, Seattle, USA.
More informationM2M massive wireless access: challenges, research issues, and ways forward
M2M massive wireless access: challenges, research issues, and ways forward Petar Popovski Aalborg University Andrea Zanella, Michele Zorzi André D. F. Santos Uni Padova Alcatel Lucent Nuno Pratas, Cedomir
More informationIntelligent Adaptation And Cognitive Networking
Intelligent Adaptation And Cognitive Networking Kevin Langley MAE 298 5/14/2009 Media Wired o Can react to local conditions near speed of light o Generally reactive systems rather than predictive work
More informationJoint Mode Selection and Resource Allocation Using Evolutionary Algorithm for Device-to-Device Communication Underlaying Cellular Networks
Journal of Communications Vol. 8 No. November Joint Mode Selection Resource Allocation Using Evolutionary Algorithm for Device-to-Device Communication Underlaying Cellular Networks Huifang Pang Ping Wang
More informationAdaptive Transmission Scheme for Vehicle Communication System
Sangmi Moon, Sara Bae, Myeonghun Chu, Jihye Lee, Soonho Kwon and Intae Hwang Dept. of Electronics and Computer Engineering, Chonnam National University, 300 Yongbongdong Bukgu Gwangju, 500-757, Republic
More informationStochastic Coalitional Games for Cooperative Random Access in M2M Communications
Stochastic Coalitional Games for Cooperative Random Access in M2M Communications Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, and Hossein Saidi allocation phase as explained in [4] and [7].
More informationCooperation in Random Access Wireless Networks
Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationAN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS. Benjamin W. Wah and Xiao Su
AN EFFICIENT MULTIACCESS PROTOCOL FOR WIRELESS NETWORKS enjamin W. Wah and Xiao Su Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationPHY Link Channel for EPoC TDD mode. Nicola Varanese, Qualcomm
PHY Link Channel for EPoC TDD mode Nicola Varanese, Qualcomm 1 Proposed PHY Frame Structure Regular pilot symbols (this example shows the TDD configuration) Frame idx 0 1 Subframe idx 0 1 2 3 (n-2)/2 0
More informationDynamic Resource Allocation and Access Class Barring Scheme for Delay-Sensitive Devices in Machine to Machine (M2M) Communications
sensors Article Dynamic Resource Allocation and Access Class Barring Scheme for Delay-Sensitive Devices in achine to achine 2) Communications Ning Li, Chao Cao * and Cong Wang * College of Communications
More informationDIFFERENTIAL EVOLUTION TECHNIQUE OF HEPWM FOR THREE- PHASE VOLTAGE SOURCE INVERTER
VOL. 11, NO. 14, JULY 216 ISSN 1819-668 26-216 Asian Research Publishing Network (ARPN). All rights reserved. DIFFERENTIAL EVOLUTION TECHNIQUE OF HEPW FOR THREE- PHASE VOLTAGE SOURCE INVERTER Azziddin.
More informationVEHICULAR ad hoc networks (VANETs) are becoming
Repetition-based Broadcast in Vehicular Ad Hoc Networks in Rician Channel with Capture Farzad Farnoud, Shahrokh Valaee Abstract In this paper we study the performance of different vehicular wireless broadcast
More informationRandom access on graphs: Capture-or tree evaluation
Random access on graphs: Capture-or tree evaluation Čedomir Stefanović, cs@es.aau.dk joint work with Petar Popovski, AAU 1 Preliminaries N users Each user wants to send a packet over shared medium Eual
More informationOptimal Resource Allocation in Multihop Relay-enhanced WiMAX Networks
Optimal Resource Allocation in Multihop Relay-enhanced WiMAX Networks Yongchul Kim and Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina State University Email: yckim2@ncsu.edu
More informationBackground: Cellular network technology
Background: Cellular network technology Overview 1G: Analog voice (no global standard ) 2G: Digital voice (again GSM vs. CDMA) 3G: Digital voice and data Again... UMTS (WCDMA) vs. CDMA2000 (both CDMA-based)
More informationA virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time
Telecommunication Systems 10 (1998) 135 147 135 A virtually nonblocking self-routing permutation network which routes packets in O(log 2 N) time G.A. De Biase and A. Massini Dipartimento di Scienze dell
More informationThe Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks
The Optimal Packet Duration of ALOHA and CSMA in Ad Hoc Wireless Networks Jon Even Corneliussen Master of Science in Electronics Submission date: June 2009 Supervisor: Geir Egil Øien, IET Co-supervisor:
More informationEasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network
EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationMIMO Z CHANNEL INTERFERENCE MANAGEMENT
MIMO Z CHANNEL INTERFERENCE MANAGEMENT Ian Lim 1, Chedd Marley 2, and Jorge Kitazuru 3 1 National University of Singapore, Singapore ianlimsg@gmail.com 2 University of Sydney, Sydney, Australia 3 University
More informationBeamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks
1 Beamforming and Binary Power Based Resource Allocation Strategies for Cognitive Radio Networks UWB Walter project Workshop, ETSI October 6th 2009, Sophia Antipolis A. Hayar EURÉCOM Institute, Mobile
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationOpportunistic Communications under Energy & Delay Constraints
Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationCapacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (TO APPEAR) Capacity Analysis and Call Admission Control in Distributed Cognitive Radio Networks SubodhaGunawardena, Student Member, IEEE, and Weihua Zhuang,
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 537 Exploiting Decentralized Channel State Information for Random Access Srihari Adireddy, Student Member, IEEE, and Lang Tong, Fellow,
More informationInitial Uplink Synchronization and Power Control (Ranging Process) for OFDMA Systems
Initial Uplink Synchronization and Power Control (Ranging Process) for OFDMA Systems Xiaoyu Fu and Hlaing Minn*, Member, IEEE Department of Electrical Engineering, School of Engineering and Computer Science
More informationHow Many Smart Meters can be Deployed in a GSM cell?
How Many Smart Meters can be Deployed in a GSM cell? Germán Corrales Madueño, Čedomir Stefanović, Petar Popovski Department of Electronic Systems, Aalborg University, Denmark Email: {gco,cs,petarp}@es.aau.dk
More informationFANTASTIC-5G: Novel, flexible air interface for enabling efficient multiservice coexistence for 5G below 6GHz
FANTASTIC-5G: Novel, flexible air interface for enabling efficient multiservice coexistence for 5G below 6GHz Frank Schaich with support from the whole consortium January 28. 2016 1 Agenda Introduction
More informationLocalization (Position Estimation) Problem in WSN
Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationAssessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid
Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid Germán C. Madueño, Jimmy J. Nielsen, Dong Min Kim, Nuno K. Pratas, arxiv:1508.02556v2 [cs.it] 30 Nov 2015 Čedomir
More informationOptimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic
Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Mohammad Katoozian, Keivan Navaie Electrical and Computer Engineering Department Tarbiat Modares University, Tehran,
More informationMassive MIMO: Signal Structure, Efficient Processing, and Open Problems I
Massive MIMO: Signal Structure, Efficient Processing, and Open Problems I Saeid Haghighatshoar Communications and Information Theory Group (CommIT) Technische Universität Berlin CoSIP Winter Retreat Berlin,
More informationError Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance
Error Detection and Correction: Parity Check Code; Bounds Based on Hamming Distance Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin
More informationA Two-Layer Coalitional Game among Rational Cognitive Radio Users
A Two-Layer Coalitional Game among Rational Cognitive Radio Users This research was supported by the NSF grant CNS-1018447. Yuan Lu ylu8@ncsu.edu Alexandra Duel-Hallen sasha@ncsu.edu Department of Electrical
More informationJoint Power Control and Scheduling for Context-Aware Unicast Cellular Networks
Joint Power Control and Scheduling for Context-Aware Unicast Cellular Networks Linyu Huang College of Electronics and Information Eng. Sichuan University lyhuang@scu.edu.cn Chi Wan Sung Dept. of Electronic
More informationOptimization of RRU/UE Pairs for Multi-Point to Multi-UE Coordinated (MP2MUC) Transmissions
Optimization of RRU/UE Pairs for Multi-Point to Multi-UE Coordinated (MP2MUC) Transmissions Yongzhao Li, Simon Armour and Joe McGeehan 14 th December 2011, London UK Outline Background and problems Multi-Point
More informationFine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012
Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel
More informationOn the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels
On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH
More information(some) Device Localization, Mobility Management and 5G RAN Perspectives
(some) Device Localization, Mobility Management and 5G RAN Perspectives Mikko Valkama Tampere University of Technology Finland mikko.e.valkama@tut.fi +358408490756 December 16th, 2016 TAKE-5 and TUT, shortly
More informationMultiple Antenna Processing for WiMAX
Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery
More informationLTE-Advanced and Release 10
LTE-Advanced and Release 10 1. Carrier Aggregation 2. Enhanced Downlink MIMO 3. Enhanced Uplink MIMO 4. Relays 5. Release 11 and Beyond Release 10 enhances the capabilities of LTE, to make the technology
More informationIN ADDITION to the traditional human-to-human or
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, XXXX 27 RF Energy Harvesting and Transfer for Spectrum Sharing Cellular IoT Communications in 5G Systems Ali Ö. Ercan, Senior Member, IEEE, M. Oğuz
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationImprovement of the LPWAN AMI backhaul s latency thanks to reinforcement learning algorithms
Bonnefoi et al. EURASIP Journal on Wireless Communications and Networking 2018) 2018:34 https://doi.org/10.1186/s13638-018-1044-2 RESEARCH Open Access Improvement of the LPWAN AMI backhaul s latency thanks
More informationUser Association for Load Balancing in Cellular Network with Hybrid Cognitive Radio Relays
User Association for Load Balancing in Cellular Network with Hybrid Cognitive Radio Relays Hongfu Guo, Fanqin Zhou, Lei Feng, Peng Yu, and Wenjing Li State Key Laboratory of Networking and Switching Technology,
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationEstimating the Transmission Probability in Wireless Networks with Configuration Models
Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)
More informationMulti-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks
Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks Yang Gao 1, Zhaoquan Gu 1, Qiang-Sheng Hua 2, Hai Jin 2 1 Institute for Interdisciplinary
More informationSelective Offloading to WiFi Devices for 5G Mobile Users by Fog Computing
Appeared in 13th InternationalWireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, June 26-30 2017 Selective Offloading to WiFi Devices for 5G Mobile Users by Fog Computing
More informationCoordination of overcurrent relay using Hybrid GA- NLP method
Coordination of overcurrent relay using Hybrid GA- NLP method 1 Sanjivkumar K. Shakya, 2 Prof.G.R.Patel 1 P.G. Student, 2 Assistant professor Department Of Electrical Engineering Sankalchand Patel College
More informationIEEE Broadband Wireless Access Working Group <
Project Title IEEE 802.16 Broadband Wireless Access Working Group Proposed 802.16m Frame Structure for Co-deployment / Co-existence with other TDD networks Date Submitted Source(s)
More informationDynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks
Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networs Christian Müller*, Anja Klein*, Fran Wegner**, Martin Kuipers**, Bernhard Raaf** *Communications Engineering Lab, Technische Universität
More informationFrequency Synchronization in Global Satellite Communications Systems
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 3, MARCH 2003 359 Frequency Synchronization in Global Satellite Communications Systems Qingchong Liu, Member, IEEE Abstract A frequency synchronization
More informationIEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 3, MARCH
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 3, MARCH 2010 1401 Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications Fangwen Fu, Student Member,
More informationSpectrum Sharing with Adjacent Channel Constraints
Spectrum Sharing with Adjacent Channel Constraints icholas Misiunas, Miroslava Raspopovic, Charles Thompson and Kavitha Chandra Center for Advanced Computation and Telecommunications Department of Electrical
More informationOptimizing Client Association in 60 GHz Wireless Access Networks
Optimizing Client Association in 60 GHz Wireless Access Networks G Athanasiou, C Weeraddana, C Fischione, and L Tassiulas KTH Royal Institute of Technology, Stockholm, Sweden University of Thessaly, Volos,
More information