arxiv: v1 [cs.it] 22 Aug 2007

Size: px
Start display at page:

Download "arxiv: v1 [cs.it] 22 Aug 2007"

Transcription

1 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, Dept. of Eec. & Comp. Eng., University of Wateroo, Canada, {p5wang, Dept. of Eec. Eng., Princeton University, USA, arxiv: v1 [cs.it] 22 Aug 2007 Abstract Mobie ad hoc networks are expected to support voice traffic. The requirement for sma deay and jitter of voice traffic poses a significant chaenge for medium access contro (MAC) in such networks. User mobiity makes it more compex due to e associated dynamic pa attenuation. In is paper, a MAC scheme for mobie ad hoc networks supporting voice traffic is proposed. Wi e aid of a ow-power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, us eading to sma deay and jitter. The proposed scheme can automaticay adapt to dynamic pa attenuation in a mobie environment. Simuation resuts demonstrate e effectiveness of e proposed scheme. Keywords medium access contro, code-division mutipe access, mobie ad hoc networks. I. INTRODUCTION Mobie ad hoc networks are expected to support mutimedia services such as voice and video wi quaity-of-service (QoS) requirements. This task is chaenging because ere is no network centra controer in such networks. User mobiity makes e case even worse because of e time-varying network topoogy and propagation oss between any two nodes. QoS support in mobie ad hoc networks incudes two directions: via routing at e network ayer or via medium access contro (MAC) scheme at e ink ayer. The function of routing is to search for a network pa (i.e., a route) from a traffic source node to its destination node, and to react (e.g., seect a new route) to possibe route faiures and/or network congestion. On e oer hand, e function of MAC is to coordinate e channe access in an ordery manner among e mobie nodes such at efficiency can be achieved. Here, we focus primariy on e MAC in a mobie ad hoc network supporting voice traffic. In such a network, a MAC scheme shoud be: 1) distributed (because of e scaabiity requirement); 2) toerant to e hidden termina probem; 3) ensuring of sma deay/jitter (due to e rea-time nature of voice traffic); and 4) adaptive to user mobiity. In is paper, we propose an effective MAC scheme wi e above desired features. The MAC scheme is fuy distributed, us scaing we to a arge network. The hidden termina probem does not exist in our scheme. Radio resource requirements are met by resource reservation, us achieving sma deay and jitter. Our scheme can aso adapt to user mobiity to a certain extent. II. RELATED WORK AND DISCUSSION The most popuar MAC schemes for ad hoc networks are carrier-sense mutipe access (CSMA) and its variants, and This work was supported by e U.S. Nationa Science Foundation under Grants ANI and CNS , and a Postdoctora Feowship and a research grant from e Natura Science and Engineering Research Counci (NSERC) of Canada. busy-tone based schemes. The CSMA schemes are inherenty distributed. However, ey suffer from e hidden termina probem. Aso, e schemes are based on an idea assumption, i.e., at ere is an interference range for each transmitter. As ong as a target receiver is outside e interference range of an interferer, it is assumed at e interferer does not generate any interference to e target receiver. However, in reaity, e aggregate interference from a number of far-away interferers (each wi a distance to e target receiver arger an e interference range) may corrupt e reception at e target receiver. On e oer hand, one motivation of busy-tone based schemes [1] is to better sove e hidden termina probem. Wi e aid of a receive busy-tone transmitted by a target receiver, e hidden terminas near e target receiver can be notified not to transmit. However, e hidden termina probem is not eiminated. For instance, coisions of request-to-send (RTS) frames can sti happen due to e hidden termina probem [2]. It is aso chaenging to determine e busy-tone coverage. Traditionay e busy-tone coverage is set to be e same as e interference range. However, simiar to e case in CSMA, e aggregate interference from mutipe interferers outside e coverage of a busy-tone (sent by a target receiver) can corrupt e reception at e target receiver. In a mobie environment, e mutipa fading can aso cause e busytone coverage to vary wi time. This can severey degrade e system performance because a strong interferer may not be notified by e busy-tone due to instantaneous deep fading of e busy-tone channe. The contention-based nature of CSMA schemes and busytone based schemes makes it very difficut to bound e deay and jitter to sma vaues for voice traffic. This observation impies at we shoud instead resort to reservation of channe resources. Resource reservation can avoid contentions, and voice traffic can be transmitted continuousy on e reserved channe, us making e transmission deay and jitter bounded. Here we consider a code-division mutipe access (CDMA)-based mobie ad hoc network, where e air interface supports mutipe simutaneous transmissions in a neighborhood. In our previous work [3], we have proposed a MAC scheme for a CDMA-based wireess mesh backbone, referred to as MESH scheme here. Before DATA transmissions, each potentia sender first transmits a ow-power probe to e network. Upon reception of e probe, each active receiver estimates a potentia interference increase due to e potentia sender s DATA transmission. The active receiver transmits a busy-tone signa in a separate busy-tone channe to notify e potentia sender if e potentia interference increase is intoerabe. If e potentia sender does not detect a busy-tone, it successfuy reserves a code channe. However, targeted at

2 a wireess mesh backbone wi fixed topoogy, e MESH scheme is not effective or efficient in a mobie ad hoc network for e foowing reasons: 1) The power aocation strategy in MESH argey depends on e fixed network topoogy, and us it is not appicabe to a mobie network; 2) A singefrequency busy-tone channe is used in MESH. The busy-tone transmission can be affected significanty by fading and/or shadowing in a mobie environment. The coverage of e busytone fuctuates wi time, us severey degrading e system performance. Based on e simiar approach of probing in e MESH scheme, in e foowing we propose a MAC scheme for a mobie ad hoc network supporting voice traffic. III. THE PROPOSED MAC SCHEME Consider a mobie ad hoc network wi a number, N, of mobie nodes. At e MAC ayer, a source node can communicate wi one or more of its neighbors, wi a separate queue for each destination node. Each node is assigned a unique transmitting code and a unique receiving code [4]. Constant rate voice traffic is supported. The network topoogy changes as e mobie nodes move. Each voice ink requires a minimum transmission rate (e.g., voice packet generation rate from e codec) so at its deay and jitter can be kept at a very ow eve. To keep e transmission accuracy of e voice ink, a signa to interference pus noise ratio (SINR) reshod is required for each ink, i.e., for e ink from sender i to receiver j, e foowing inequaity shoud hod: GiPt ij gij I j+η j Γ d, where G i is e spreading gain, Pij t is e transmit power, g ij is e pa gain from node i to node j, I j is e interference (received at node j) from oer inks, η j is e background noise power at node j, and Γ d is e required SINR reshod for accurate information transmission. Unike e situation for e MESH scheme, a e transmissions are wiin a frequency band, using CDMA technoogy. A RAKE receiver can coect signa energy from different pas. Hence, we assume at ere is no fast (mutipa) fading, and e transmit power is attenuated ony due to pa oss wi exponent β and shadowing. A node cannot transmit and receive at e same time, since each node s transmission and reception are wiin e same frequency band. In e time domain, we use a time frame structure as shown in Fig. 1. Time is partitioned into fixed-eng frames. In each frame, ere are M information sots (ISs), each foowed by a short bocking sot (BS). The ISs are used for information (i.e., DATA and ACK) and probe transmissions, whie e BSs are used for e transmission of bocking messages (to be discussed). In a mobie ad hoc network, it is difficut to estimate e pa attenuation in advance from a sender to a receiver due to user mobiity. Therefore, e popuar inear power aocation [5] is not adopted. Raer, we consider a common power aocation strategy, where each traffic source node uses a constant power P to transmit its DATA frames to its destination, and e traffic destination uses e same power eve to feed back ACKs. Fig. 1. Fig IS: information sot Frame 0 Time frame structure. Ca arriva at i for j IS Interference measurement by i BS Probe by i Frame BS: bocking sot Frame 1 Frame 2 Frame 3 Frame 4, 5,... k k The mutipe access procedure. A. Mutipe Access Procedure Request by i Bocking message k m m Probe by j k DATA by i m ACK by j The mutipe access capabiity of e network is based on resource reservation. Consider e case of a new ca arriva at source node i at time frame 0 to its destination node j. The mutipe access procedure is iustrated in Fig. 2. 1) Seection of DATA IS: Node i first seects an IS for DATA transmission, referred to as its DATA IS. The ISs at which e destination node j is sending traffic shoud be skipped, because node j cannot send and receive at e same time at e same band. At frame 1, node i measures its experienced interference, and monitors e transmitting code of node j. Among e ISs over which node j s transmitting code is not detected, node i seects one wi e minimum interference eve, say IS k, as its DATA IS. 2) Transmissions of Probe and Bocking Message: Prior to DATA transmission at e seected DATA IS, node i shoud make sure its DATA transmission does not corrupt any existing reception at any active receiver 1 at e IS. To achieve is goa, node i first sends a ow-power test signa into e network. Specificay, at IS k of frame 2, node i sends a probe spread by a common probe code wi a arge spreading gain, and wi transmit power eve α P (α 1). No bit information is carried in e probe. Wi e ow power, e probe is very ikey not to corrupt any existing reception at e IS. Aough e probe is sent wi ow power, we assume at it can be received by active receivers at e IS because of e arge spreading gain. At IS k, an active receiver, say node, first measures e received probe power eve denoted by and its own interference eve due to oer existing transmissions. It estimates e potentia interference increase due to DATA transmission of e probe sender as /α, and determines wheer e potentia interference increase can corrupt its own reception. If 1 Here an active receiver can be an existing traffic destination node for DATA reception, or an existing traffic source node for ACK reception.

3 so, it sends a bocking message at BS k. The bocking message is spread by a common bocking code. No bit information is carried by e bocking message. The power aocation for e bocking message wi be discussed in Section III-B. At BS k, node i monitors e bocking code. If e detected bocking message power is above a reshod P r,b, it gives up IS k for DATA transmission and tries anoer IS unti no bocking message is detected. 3) Seection of ACK IS: If no bocking message is detected, node i sends a request message to its destination node j, at IS k in frame 3 spread by node j s receiving code, and sends its first DATA frame at sot k in frame 4 spread by node i s transmitting code, bo wi power P. Upon receiving e request message, node j seects an IS for its ACK, referred to as ACK IS. Generay it is desired at, at e ACK IS, e interference experienced by node i is sma so at e ACK can be received correcty. So in e request message, node i indicates (among e ISs except IS k) e IS wi minima experienced interference, say IS m. After node j receives correcty e request, it sends an probe at IS m in frame 3 2 in e same manner as node i sending a probe for DATA IS. If no bocking message is detected at BS m, node j sends an ACK at IS m in frame 4 for e DATA frame received 3 in frame 4. If node i does not receive an ACK at IS m of frame 4, it seects anoer DATA IS, and repeats e above procedure wi a maximum number of attempts. If an ACK is received, it proceeds to next step. 4) Continuous Transmissions at Reserved DATA and ACK ISs: At subsequent time frames from frame 5, nodeitransmits its DATA frames spread by its transmitting code at IS k, and node j transmits e ACKs spread by its transmitting code at IS m, unti e competion of e ca. It can be seen at ca-eve resource reservation is performed. Upon e ca competion, no ink termination procedure is necessary, because our scheme is based on rea-time interference measurement, and oer active receivers can measure e interference eve reduction when e target ink stops using e reserved resource. B. Power Aocation for e Bocking Message If an active receiver at an IS is to send a bocking message in response to a probe from a potentia sender 4, e transmit power of e bocking message shoud be designed carefuy so at e potentia sender can be notified. Unike e MESH scheme, oer active receivers at e IS do not need to hear e bocking message. As e bocking message is sent in e same frequency band as DATA frames, here we use a different meod (from at in e MESH scheme) for an active 2 The probe is sent at IS m in frame 3 when m > k, or in frame 4 when m < k. For simpicity of presentation, we use e former case as an exampe in is paper. 3 Since e request message and DATA are sent in e same way from node i, DATA can aso be received correcty if e request can be deivered successfuy. 4 Here a potentia sender can be a traffic source node for DATA transmission or a traffic destination node for ACK transmission. receiver to determine its bocking message power based on e measured probe power. The objective is to ensure at e potentia sender can detect a bocking message wi power above reshod P r,b. At an IS, it is possibe at one or more potentia senders may send probes for resource reservation. Since e resource reservation is performed at e ca eve, it is reasonabe to assume at at an IS ere are at most two potentia probe senders in a neighborhood. We aso assume channe reciprocity in terms of shadowing effect. Consider e case in which an active receiver, say node, detects e probe power eve, and wants to send a bocking message. Node sends a bocking message wi transmit power = max { 2 P r,b αp, Pr,b P } IM where IM is e interference margin [6] of node, defined as e maximum extra interference at can be toerated by node. We first consider e scenario in which ony one potentia sender, node i, sends a probe at an IS. The pa gain from node i to node is g i = Pr,p αp. From (1) we have 2 Pr,b αp (1) = 2 Pr,b. (2) g i Due to e channe reciprocity, g i = g i, we have 2 P r,b g i. Then e received bocking message power at e potentia sender i is g i 2 P r,b, which is greater an e detection reshod P r,b. So e potentia sender is notified to give up e IS. Next, we consider e scenario in which two potentia senders, node i 1 and node i 2, send probes at an IS. As a common probe code is used, and no bit information is carried by a probe, node can coect energy from bo probes via an RAKE receiver. The tota received probe power at node is aso denoted by. Suppose node wants to send a bocking message. Wiout oss of generaity, assume e pa gain from node i 1 to is arger an at from i 2 to, i.e., g i1 g i2. We have = αp g i1 +αp g i2 2αP g i1. (3) When node sends a bocking message wi power given by (1), e received bocking message power at node i 1 is g i1 = g i1 2 Pr,b αp g i1 2 Pr,b αp 2αP g i1 g i1 = P r,b. So node i 1 wi be notified to give up e IS. In e foowing, we prove at, if node i 2 s potentia information (i.e., DATA or ACK) transmission generates extra interference at is intoerabe at node, node s bocking message wi power given by (1) can reach node i 2 wi a power eve above e reshod P r,b. (4)

4 Proof: If node i 2 s information transmission can corrupt node s reception, is means P g i2 IM. We have g i2 IM P. When node sends a bocking message wi power given by (1), e received bocking message power at node i 2 is g i2 = g i2 Pr,b P IM g i2 Pr,b P IM IM P = P r,b. As node i 2 detects bocking message power above e reshod, it gives up e IS. C. Impact of User Mobiity and Soutions The impact of user mobiity on each active ink at e MAC ayer is two-fod. One is due to e time-varying pa attenuation of e desired signa, and e oer is due to e varying interference eve. The pa attenuation consists of ree components: pa oss, shadowing, and fast (mutipa) fading. Fast fading can be addressed by e RAKE receiver at coects signa energy from different pas. The time-varying pa oss, shadowing, and interference eve make e SINR of each ink fuctuate wi time. Generay our scheme can automaticay adapt to e varying SINR of each ink, because e receiver makes rea-time measurement of its desired signa and interference eves. However, it is possibe at e SINR of some ongoing inks at an IS cannot remain above e reshod Γ d (a condition referred to as a ink faiure) because of e fuctuations. Aough a new route searched by e routing scheme can hep to sove e probem, it is desirabe to dea wi e probem at e MAC ayer first before resorting to e routing scheme, considering e overhead and time needed for a new route search, and e duration needed to set up a new route. To address e probem, for each active ink, e traffic destination node indicates in its ACK two candidate DATA ISs at which e destination node experiences e minimum interference and does not transmit. The destination node aso indicates a detected ink faiure (if any) in e ACK. If e traffic source node (say node i) does not receive correcty e ACK from its destination (say node j), is means a ink faiure happens because e ACK is corrupted 5. As nodeidoes not have e information of wheer e DATA transmission is corrupted or not, we et e ink be re-estabished at a new DATA IS and a new ACK IS. The main difference from e estabishment procedure given in Section III-A is as foows. Node i sends two probes at e two candidate DATA ISs indicated in e previous ACK. At each candidate IS, a request is sent if no bocking message is detected. The request aso indicates two candidate ACK ISs at which node i experiences e minimum interference and does not transmit. If at east one request is received at node j (which means a new DATA IS is estabished), node j sends two probes at e candidate ACK 5 If an expected DATA frame is not received, e traffic destination node responds wi a NACK. For presentation simpicity, we use ACK to represent bo ACK and NACK in is paper. (5) ISs. If at east one probe at a candidate ACK IS is not bocked by active receivers at at IS, a new ACK IS is estabished. If eier a new DATA IS or a new ACK IS cannot be estabished, e ca is dropped. On e oer hand, if node i successfuy receives an ACK which indicates at a faiure of DATA transmission happens, a simiar procedure is executed, except at ony e estabishment of a new DATA IS is needed. Generay, if e ink faiure is due to arge interference, it is ikey at e ca can be estabished successfuy in oer DATA and/or ACK ISs at which nodes generate arge interference are not active. However, if e ink faiure is due to a arge pa oss of e desired signa (e.g., e traffic source and destination are separated by a arge distance) or due to shadowing of e desired signa (e.g., e pa between e traffic source and destination is bocked by a ta buiding), it is very ikey at e ink quaity of e target ca at oer ISs is not good enough eier, and us e ca wi be dropped. In is case, a new route shoud be seected by e routing scheme. The proposed MAC scheme has e desired features discussed in Section I. The scheme is performed in a distributed manner at e mobie nodes, us scaabe to arge networks. The hidden termina probem does not exist, since each active receiver makes an admission decision on a new ca based on rea-time measurement of its own desired signa and interference eves. The reservation nature of our scheme can guarantee sma deay and jitter for voice traffic as ong as e minimum required rate can be met. Our scheme can adapt automaticay to user mobiity to a certain extent, aso benefiting from e fact at each active receiver makes reatime measurement of desired signa and interference eves. In addition, e idea assumption required by CSMA and busytone based schemes (as discussed in Section II) is unnecessary for our scheme. Furermore, aough e bocking message has simiar functionaity to e busy-tone in e busy-tone based scheme, our scheme does not have e probem of different channe gains in separate busy-tone frequency band and DATA frequency band, because e bocking message and DATA are sent in e same band. IV. PERFORMANCE EVALUATION We run computer simuations to evauate e performance of e proposed MAC scheme. Since MAC mainy deas wi e transmission from a node to its neighbors, ony one-hop transmission is considered here. Consider an ad hoc network consisting of N nodes, wi N/2 voice source nodes and N/2 voice destination nodes. The source nodes are randomy distributed in a 1000 meter 1000 meter square, each associated wi a destination node. A e source nodes are fixed, and a e destination nodes move wi a veocity v and a randomy seected direction. In order to maintain a satisfactory SINR, a destination node is assumed to move wiin a radius of 150 m of e associated source node 6. Each time frame has a fixed 6 Routing may be invoved when a destination node moves beyond is distance, a situation which is beyond e scope of is work.

5 TABLE I THE PERCENTAGE OF THE ISS WITH DIFFERENT NUMBER OF PROBES. Number (N) of nodes v = 10 1 probe kph 2 probes probes v = 20 1 probe kph 2 probes probes duration of 20 ms, and is furer divided into 8 ISs and 8 BSs. The spreading gain is 32 for DATA and ACKs, and 3200 for e probe. The pa oss attenuation exponent β is 2.4, and e shadowing is modeed by e first-order autoregressive process given in [7]. Voice ca inter-arriva time at each source node is exponentiay distributed wi mean vaue 48 seconds, and e duration of a ca is exponentiay distributed wi mean vaue 30 seconds. When a ca is active, one DATA frame is generated over each time frame. The SINR requirement Γ d is 10 db. In e simuations, e number N of nodes varies from 20 to 100, and e destination node veocity v varies from 0 to 20 km/hour (kph). We first verify our assumption in Section III-B at e probabiity of more an two probe senders at an IS is negigibe. Among e ISs wi one or more probe senders, Tabe I ists e percentage of ISs at have one probe sender, two probe senders, and more an two probe senders, respectivey. No more an two probes are observed at an IS, us vaidating our assumption. For an ongoing voice ca, if its SINR requirement is not satisfied, it tries to switch from one IS to anoer. Some DATA frames wi be ost during e switching due to e switching processing time, and if e switching is not successfu, ca dropping occurs. Fig. 3 shows e DATA frame oss rate wi different N and v vaues. A arger vaue of N and/or v tends to increase e frequency of switching among e ISs, us increasing e frame oss rate. It can aso be seen at a e frame oss rates are bounded by 0.05%, which is we wiin acceptabe range for voice. It is aso observed at e ca dropping rate is bounded by 1.2%, which happens when N = 100 and v = 20 kph. So our scheme can keep e frame oss rate and ca dropping rate at a ow eve. V. CONCLUSIONS AND DISCUSSIONS It is chaenging to support voice traffic over a mobie ad hoc network due to e deay-sensitive nature of such traffic and due to user mobiity. In is paper we have proposed a MAC scheme to support voice traffic by e resource reservation mechanism. User mobiity is addressed by rea-time signa and interference measurements at e receivers. This study shoud provide hepfu insight to e deveopment and depoyment of mobie ad hoc networks supporting mutimedia services. Currenty constant rate voice traffic has been considered in is research. However, voice traffic is characterized by an on-off nature, and no information packets are generated at an off state. When an on voice fow becomes off, oer Fig. 3. Voice frame oss rate 6 x veocity = 20 kph veocity = 10 kph veocity = 0 kph Number (N) of voice nodes The DATA frame oss rate of a voice ca. active receivers measure ess interference. If subsequenty one or more new cas are admitted at e serving ISs of e off voice fow, and ater e off voice fow switches to e on state, it is ikey at some active receivers experience more interference an what ey can toerate, us eading to ink corruption. To address is probem, when a voice fow becomes off, its source and destination nodes continuousy send (on e respective serving IS) a probe (wi a different code from at used in Section III-A) wi a ow power and a arge spreading gain. Through e received probe power, an active receiver at e IS can estimate e potentia interference eve which wi be generated if e off voice fow becomes on again. The potentia interference is counted in e active receiver s current interference eve. We ca is meod 100- percent reservation, wiout a mutipexing gain. Research on statistica mutipexing of voice traffic wiin is scheme is currenty underway. REFERENCES [1] Z. J. Haas and J. Deng, Dua busy tone mutipe access (DBTMA) a mutipe access contro scheme for ad hoc networks, IEEE Trans. Commun., vo. 50, no. 6, pp , June [2] P. Wang, H. Jiang, and W. Zhuang, A dua busy-tone MAC scheme supporting voice/data traffic in wireess ad hoc networks, in Proc. IEEE GLOBECOM 06, San Francisco, Caifornia, USA, Nov. Dec [3] H. Jiang, P. Wang, W. Zhuang, and X. Shen, An interference aware distributed MAC scheme for CDMA-based wireess mesh backbone, in Proc. IEEE CCNC 07, pp , Las Vegas, Nevada, USA, Jan [4] E. S. Sousa and J. A. Sivester, Spreading code protocos for distributed spread-spectrum packet radio networks, IEEE Trans. Commun., vo. 36, no. 3, pp , Mar [5] T. Moscibroda and R. Wattenhofer, The compexity of connectivity in wireess networks, in Proc. IEEE INFOCOM 06, Barceona, Spain, Apr [6] A. Muqattash and M. Krunz, Power controed dua channe (PCDC) medium access protoco for wireess ad hoc networks, in Proc. IEEE INFOCOM 03, pp , San Francisco, Caifornia, USA, Mar. Apr [7] G. L. Stuber, Principes of Mobie Communication. Kuwer Academic Pubishers, Norwe, MA, USA, 1996, pp

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel

BER Performance Analysis of Cognitive Radio Physical Layer over Rayleigh fading Channel Internationa Journa of Computer ppications (0975 8887) Voume 5 No.11, Juy 011 BER Performance naysis of Cognitive Radio Physica Layer over Rayeigh fading mandeep Kaur Virk Dr. B R mbedkar Nationa Institute

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

Wireless Communications

Wireless Communications Wireess Communications Mutipe Access Hamid Bahrami Eectrica & Computer Engineering Communication System Bock Diagram Dupexing Dupexing: transmit and receive at the same time Exampe: teephone, how about

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM Fox-1E (RadFxSat-2) Teemetry and Whoe Orbit Data Simuation Burns Fisher, W2BFJ Car Wick, N3MIM 1 Review: Fox-1 DUV Teemetry Fox-1A through Fox-1D are FM Repeater Sateites» Ony a singe downink frequency»

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Energy-efficient Video Streaming from High-speed Trains

Energy-efficient Video Streaming from High-speed Trains Energy-efficient Video Streaming from High-speed Trains Xiaoqiang Ma, Jiangchuan Liu Computing Science Schoo Simon Fraser University xma10,jciu@cs.sfu.ca Hongbo Jiang Department of EIE Huazhong University

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks

Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks Distributed scheduing scheme for video streaming over muti-channe muti-radio muti-hop wireess networks Liang Zhou, Xinbing Wang, Wei Tu, Gabrie-Miro Muntean, Benoit Geer To cite this version: Liang Zhou,

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

Ultra-wideband (UWB) transmissions, with a bandwidth

Ultra-wideband (UWB) transmissions, with a bandwidth Effective Interference Control in Ultra-Wideband Wireless Networks Hai Jiang, Weihua Zhuang, and Xuemin (Sherman) Shen, University of Waterloo, Canada COMSTOCK & STOCKBYTE Abstract: Ultra-wideband (UWB)

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Communication Systems

Communication Systems Communication Systems 1. A basic communication system consists of (1) receiver () information source (3) user of information (4) transmitter (5) channe Choose the correct sequence in which these are arranged

More information

Lesson Objective Identify the value of a quarter and count groups of coins that include quarters.

Lesson Objective Identify the value of a quarter and count groups of coins that include quarters. LESSON 9.9C Hands On Quarters PROFESSIONAL PROFESSIONAL DEVELOPMENT DEVELOPMENT LESSON AT A GLANCE Mathematics Forida Standard Te and write time. MAFS.MD.a.a Identify and combine vaues of money in cents

More information

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring

Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring Distributed Learning for Muti-Channe Seection in Wireess Network Monitoring Yuan Xue, Pan Zhou, ao Jiang, Shiwen Mao and Xiaoei Huang Department of Computer Science and Engineering, Lehigh University,

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

Performance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications

Performance of Single User vs. Multiuser Modulation in Wireless Multicarrier (MC) Communications erformance of Singe User vs. Mutiuser Moduation in Wireess Muticarrier (MC) Communications Anwaru Azim, ecturer, East West University Bangadesh Abstract-- he main objective of this paper is to compare

More information

Transmission Capacity Of D2D Communication Under Cellular Networks *

Transmission Capacity Of D2D Communication Under Cellular Networks * nternationa Conference on Computer, Networs and Communication Engineering (CCNCE 13) Transmission Capacity Of Communication Under Ceuar Networs * Xianghai Xu 1, Jun Sun 1,Shixiang Shao 1 1 Jiangsu provincia

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

Worst case delay analysis for a wireless point-to-point transmission

Worst case delay analysis for a wireless point-to-point transmission Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies

More information

QoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation

QoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 2, DECEMBER 2009 QoS-Driven MAC-Layer Resource Aocation for Wireess Mesh Networks with n-atruistic de Cooperation and Service Differentiation Ho

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems

Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems Energy Harvesting in Heterogenous Networks with Hybrid Powered Communication Systems invited paper Ahmad Asharoa, Abdukadir Ceik, Ahmed E. Kama Iowa State University ISU, Ames, Iowa, United States, Emai:

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

CAN FD system design

CAN FD system design icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction

More information

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 1 Finite-State Markov Modeing for Wireess Channes in Tunne Communication-Based Train Contro Systems Hongwei Wang, Fei Richard Yu, Senior Member,

More information

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,

More information

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing Energy Efficient Sensor, Reay and Base Station Pacements for Coverage, Connectivity and Routing Mauin Pate*, R. Chandrasekaran and S.Venkatesan Teecommunication Engineering Program Erik Jonsson Schoo of

More information

ENERGY MANAGEMENT OF WIRELESS SENSOR NETWORK WITH MIMO TECHNIQUES

ENERGY MANAGEMENT OF WIRELESS SENSOR NETWORK WITH MIMO TECHNIQUES EERGY MAAGEMET OF WIRELESS SESOR ETWORK WITH MIMO TECHIQUES TRUPTI MAYEE BEHERA Schoo of Eectronics, KIIT University Bhubaneswar, Odisha,India trupti_behera@rediffmai.com SUDHASU SEKHAR SIGH Schoo of Eectronics,

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication

More information

Acknowledgement. Wireless History

Acknowledgement. Wireless History Acknowedgement Sides derived from cass materia posted by Dr. A. Godsmith www.stanford.edu/cass/ee359/ ectures.htm See aso: A. Godsmith, Wireess Communications, Cambridge Press Wireess History Ancient Systems:

More information

Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels

Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobility Fading Channels Top Down Design of Joint MODEM and CODEC Detection Schemes for DSRC Coded-FSK Systems over High Mobiity Fading Channes Juinn-Horng Deng, Feng-Chin Hsiao, and Yi-Hsin Lin Department of Communications Engineering

More information

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,

More information

THE EMERGING IEEE ad wireless local area

THE EMERGING IEEE ad wireless local area 1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,

More information

Analyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry

Analyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry Anayzing Upink SINR and Rate in Massive MIMO Systems Using Stochastic Geometry Tianyang Bai and Robert W. Heath, Jr. arxiv:5.2538v2 [cs.it] 2 Apr 26 Abstract This paper proposes a stochastic geometry framework

More information

P H O T O CD I N F O R M A T I O N B U L L E T I N

P H O T O CD I N F O R M A T I O N B U L L E T I N PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio

More information

CruzPro FU60. Intelligent Digital Fuel Gauge/w Alarms & Consumption Calculator

CruzPro FU60. Intelligent Digital Fuel Gauge/w Alarms & Consumption Calculator Other CruzPro Products Depthsounders & Speed/Temperature/Logs PC Based Fishfinders and Active Depth Transducers DC Vots/Amps/Amp-Hour Monitor AC Vots/Amps/Freq/kW Monitor LPG/Petro Gas Detectors/Aarms

More information

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E

More information

: taking service robots to play soccer

: taking service robots to play soccer Virbot@fied : taking service robots to pay soccer Larena Adaberto, Escaante Boris, Torres Luis, Abad Verónica, Vázquez Lauro Bio-Robotics Laboratory, Department of Eectrica Engineering Universidad Naciona

More information

Spatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz

Spatial Characteristics of 3D MIMO Wideband Channel in Indoor Hotspot Scenario at 3.5 GHz Spatia Characteristics of 3D MIMO Wideband Channe in Indoor Hotspot Scenario at 3.5 GHz ei Tian Jianhua Zhang Yuxiang Zhang State Key ab. of Networking and Switching Tech. Beijing Univ. of osts and Teecom.

More information

Sparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems

Sparse Channel Estimation Based on Compressed Sensing for Massive MIMO Systems Sparse Channe Estimation Based on Compressed Sensing for Massive MIMO Systems Chenhao Qi, Yongming Huang, Shi Jin and Lenan Wu Schoo of Information Science and Engineering, Southeast University, Nanjing

More information

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo

More information

Uplink Massive MIMO SIR Analysis: How do Antennas Scale with Users?

Uplink Massive MIMO SIR Analysis: How do Antennas Scale with Users? Upink Massive MIMO SIR Anaysis: How do Antennas Scae with Users? Tianyang Bai and Robert W. Heath, Jr. Wireess Networking and Communication Group The University of Texas at Austin 66 Guadaupe Street, C83,

More information

Resource management for network-assisted D2D communication DEMIA DELLA PENDA

Resource management for network-assisted D2D communication DEMIA DELLA PENDA Resource management for network-assisted D2D communication DEMIA DELLA PENDA Licentiate Thesis Stockhom, Sweden 2016 TRITA-EE 2016:035 ISSN 1653-5146 ISBN 978-91-7595-885-9 KTH Roya Institute of Technoogy

More information

Multi-user video streaming using unequal error protection network coding in wireless networks

Multi-user video streaming using unequal error protection network coding in wireless networks Vukobratović and Stanković EURASIP Journa on Wireess Communications and Networking 202, 202:28 RESEARCH Open Access Muti-user video streaming using unequa error protection network coding in wireess networks

More information

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his

More information

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks 1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,

More information

Low Delay Wind Noise Cancellation for Binaural Hearing Aids

Low Delay Wind Noise Cancellation for Binaural Hearing Aids INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,

More information

Dual Relay Selection for Cooperative NOMA with Distributed Space Time Coding

Dual Relay Selection for Cooperative NOMA with Distributed Space Time Coding This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI.9/ACCESS.8.846, IEEE Access

More information

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S

More information

Cooperative Caching in Dynamic Shared Spectrum Networks

Cooperative Caching in Dynamic Shared Spectrum Networks Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE

More information

arxiv: v1 [cs.it] 21 Feb 2015

arxiv: v1 [cs.it] 21 Feb 2015 1 Opportunistic Cooperative Channel Access in Distributed Wireless Networks with Decode-and-Forward Relays Zhou Zhang, Shuai Zhou, and Hai Jiang arxiv:1502.06085v1 [cs.it] 21 Feb 2015 Dept. of Electrical

More information

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks Joint Congestion Contro, Routing and Media Access Contro Optimization via Dua Decomposition for Ad Hoc Wireess Networks Francesco Lo Presti Dipartimento di Informatica Università de L Aquia opresti@di.univaq.it

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information

Software Process & Agile Software Development

Software Process & Agile Software Development CSE516 Science for Society Software Process & Agie Software Deveopment Apri 25, 2014 Ichu Yoon (icyoon@sunykorea.ac.kr) Software A textbook description Instructions (computer programs) that when executed

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

A Multiband OFDMA Heterogeneous Network for Millimeter Wave 5G Wireless Applications

A Multiband OFDMA Heterogeneous Network for Millimeter Wave 5G Wireless Applications SPECIAL SECTION ON OPTIMIZATION FOR EMERGING WIRELESS NETWORKS: IoT, 5G AND SMART GRID COMMUNICATIONS Received Juy 24, 2016, accepted August 15, 2016, date of pubication September 22, 2016, date of current

More information

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,

More information

Hybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications

Hybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications 217 25th European Signa Processing Conference (EUSIPCO) Hybrid Digita-Anaog Joint Source Channe Coding for Broadcast Mutiresoution Communications O. Fresnedo, P. Suárez-Casa, L. Castedo Department of Eectronics

More information

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department

More information

A Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System

A Novel Method for Doppler and DOD- DOA Jointly Estimation Based on FRFT in Bistatic MIMO Radar System 7 Asia-Pacific Engineering and Technoogy Conference (APETC 7) ISBN: 978--6595-443- A Nove Method for Dopper and DOD- DOA Jointy Estimation Based on FRFT in Bistatic MIMO Radar System Derui Song, Li Li,

More information

Group Sparse Beamforming for Green Cloud-RAN

Group Sparse Beamforming for Green Cloud-RAN IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 5, MAY 2014 2809 Group Sparse Beamforming for Green Coud-RAN Yuanming Shi, Student Member, IEEE, Jun Zhang, Member, IEEE, and Khaed B. Letaief,

More information

Operation Guide

Operation Guide MO0907-EB Operation Guide 709 713 Getting Acquainted Congratuations upon your seection of this CASO watch. To get the most out of your purchase, be sure to read this manua carefuy. Expose the watch to

More information