A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks

Size: px
Start display at page:

Download "A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Radio Networks"

Transcription

1 Globecom 04 - Wireless Networking Symposium A Slot-Asynchronous MAC Protocol Design for Blind Rendezvous in Cognitive Rdio Networks Xingy Liu nd Jing Xie Deprtment of Electricl nd Computer Engineering The University of North Crolin t Chrlotte Emil: {xliu33, Lind.Xie}@uncc.edu Abstrct In cognitive rdio networks (CRNs), two users hve to rendezvous on common vilble chnnel before communictions. Most existing rendezvous ppers focus on the chnnelhopping (CH) sequence design. However, rendezvous my suffer from the hndshke filure on the rendezvous chnnel, especilly in unsynchronized-slot scenrios. In this pper, the chllenge of slot-synchronous rendezvous in CRNs is ddressed for the first time. A protocol iming to improve the hndshke performnce during the CH process is proposed. By nlyzing the potentil fctors leding to the hndshke filure, we design novel MAC protocol with n optiml size of time slot which cn mitigte the effects of these fctors nd provide the shortest time for rendezvous. In ddition, we lso propose probbilistic model for estimting the verge rendezvous time under different CRNs. Simultion results vlidte our nlyticl model nd demonstrte tht our proposed protocol cn chieve the rendezvous time close to the theoreticl vlue under slot-synchronous scenrios. I. INTRODUCTION In order to solve the spectrum scrcity nd under-utiliztion problem, cognitive rdio emerges s promising technology which llows secondry user () to ccess the spectrum unoccupied by licensed users, or, primry users (PUs). It lso requires to vcte chnnels for the returning of PUs. In other words, the vilble chnnels for my chnge by time or its loction. Hence, unlike trditionl wireless networks, control chnnel tht is commonly vilble to ll s in cognitive rdio network (CRN) my not exist or cnnot lst for long time. It is lso imprcticl for to obtin other s chnnel informtion using such common control chnnel (CCC). Therefore, two s meeting ech other on common chnnel is bsic step before they cn estblish communictions in CRNs. This process is clled blind rendezvous. To chieve blind rendezvous, the sequence-bsed chnnelhopping (CH) technique cn be used. In this pproch, ech first senses the spectrum nd genertes set of vilble chnnels. Then, it hops onto these chnnels one by one following predefined sequence. Thus, two s cn rendezvous if they hop on sme chnnel t the sme time. The stte-of-thert CH [] cn gurntee the rendezvous between ny two s if they hve t lest one common vilble chnnel. It minly focuses on designing the CH sequence to chieve rendezvous in short time period which is clled time to rendezvous (TTR). TTR represents the number of chnnels needs to go through before hopping to sme chnnel with nother. However, in prcticl scenrios, successful hopping on sme chnnel does not necessrily led to successful hndshke which cn be ffected by mny fctors []. Only fter successful hndshke, cn two s truly estblish dt communictions. Thus, we define time to hndshke (TTH) s our performnce metric in this pper. In order to get shorter TTH, existing hopping lgorithms need to work under This work ws supported in prt by the US Ntionl Science Foundtion (NSF) under Grnt No , 875, nd pproprite MAC protocols to gurntee successful hndshke in CRNs. In such MAC protocol, the key feture to support the CH is to mintin per-unit-length the sme in ll sequences, i.e., ech s sojourn durtion on ech chnnel should be the sme. This feture ccords with the time-slotted system where the stying time on ech chnnel cn be treted s one time slot. A time slot should be long enough for two s to complete hndshke process. It mens tht Requestto-Send (RTS) nd Cler-to-Send (CTS) cn be successfully exchnged by the sender nd the receiver, bsed on the Crrier Sense Multiple Access with Collision Avoidnce (CSMA/CA) mechnism in IEEE 80.. On the other hnd, the time slot of ech might need to be synchronized in order to ensure tht two s cn hop on the sme chnnel t the sme time. Although some CH ppers [], [3] clim tht their sequence design cn work under the synchronous scenrio, it differs from the synchronous cse in the protocol design. For exmple, Fig. () shows synchronous CH cse where nd strt to hop t the sme time; Fig. (b) shows the synchronous CH cse where two s strt to hop t different time slots; nd in Fig. (c), the slots re unsynchronized. We nme the ltter two cses s user-synchronous cse nd slotsynchronous cse, respectively. In this pper, we focus on the slot-synchronous cse. CH 3 CH 3 CH 3 CH 3 CH 3 () synchronous (b) user-synchronous (c) slot-synchronous Fig.. Synchronous cse nd synchronous cses in different designs. However, not ll MAC protocols in CRNs cn be used for blind rendezvous, such s the protocols under the single chnnel [4] nd the underly model [5], [6]. Other designs [7], [8] either directly use the synchronized time slot ssumption [9] [] or chieve synchroniztion by imprcticl methods, including employing CCC [3] [7], using multiple trnsceivers [], [3], [7] [9], or brodcsting becons on ll chnnels before rendezvous [0], which is less efficient due to high overhed nd collision. The protocol proposed in [] is climed to be robust enough under synchronous slots. However, it does not fully consider the potentil problems in such scenrio nd lcks detils. In summry, ll the existing MAC designs consider time synchroniztion s necessry condition for blind rendezvous nd chieve it in different imprcticl wys. In this pper, we consider chieving rendezvous from different perspective. We propose novel RTS/CTS hndshke mechnism to mitigte the effects cused by synchronous time slots. This mechnism cn chieve successful hndshke with high probbility when the sender nd the receiver rrive on sme chnnel t different moments due to their synchronous time slots. Menwhile, this mechnism cn lso solve the problems prohibiting successful hndshke in synchronous scenrios. The length of time slot plys crucil CH /4/$ IEEE 464

2 Globecom 04 - Wireless Networking Symposium role in this design. It is trdeoff prmeter. When time slot is long, the probbility of hving successful hndshke is high, but it tkes long time for two s to hop on sme chnnel. On the other hnd, if time slot is short, the hndshke process cnnot be gurnteed, which my cost more time to get successful rendezvous. Therefore, we lso obtin the optiml length of time slot for our design in terms of the shortest TTH. Simultion results vlidte the optimlity of the time slot nd indicte tht the synchronized slot ssumption is not necessry for our rendezvous protocol design in CRNs. To the best of our knowledge, this is the first work on MAC design for blind rendezvous in CRNs under the slot-synchronous scenrio. The rest of this pper is orgnized s follows. In Section II, we nlyze three problems tht my hppen during one time slot which cn potentilly ruin hndshke process. At the sme time, we design n pproprite protocol to mitigte the effect of these problems s much s possible. In Section III, we derive the expression of the optiml length of time slot which cn minimize the TTH. Simultion results re shown in Section IV, followed by the conclusions in Section V. II. PROBLEM ANALYSIS AND PROTOCOL DESIGN In this section, we first introduce the system model in our nlysis. Then, we nlyze three min problems tht my result in hndshke filure in one time slot nd t the sme time estblish our protocol design to solve these problems. A. System Model The system considered in this pper consists of finite number of rndomly distributed PUs nd s which cn operte over set of orthogonl chnnels. Pcket rrivls of both PUs nd s follow the Poisson distribution. Ech PU is rndomly ssigned chnnel when new pcket needs to be trnsmitted. Ech source rndomly chooses within its trnsmission rnge s its destintion when new pcket needs to be trnsmitted. Both the source s nd listening s sense ll chnnels to find their own vilble chnnels nd utilize CH lgorithm to hop mong them. This process should be done periodiclly to void chnnel sttus chnge due to PU ctivities. We ssume tht ech works in hlf-duplex mode. When source wnts to communicte with its destintion, the sender sends n RTS messge on ech chnnel it hops on during ech time slot until receiving the correct CTS. We cll the in this process n ctive. On the other hnd, since pssive who hs no pcket to send my become potentil destintion of its neighbor, it keeps listening on ech chnnel it hops on during ech time slot until receiving correct RTS. The hndshke in our model is ssumed to be free of propgtion-interference loss. Compred with trditionl hndshke filures, more possible reson for hndshke filure in CRNs is tht the destintion is not on the sme chnnel in the current time slot. Hence, for the ske of quick rendezvous, the source should leve its current chnnel nd keep hopping on to other chnnels if the corresponding CTS is not received t the end of time slot. Only fter successful hndshke, cn the dt trnsmission tke plce. The totl time source spends before dt pcket being trnsmitted is the TTH. Since this pper focuses on the hndshke process, we denote the TTH s our service time in the queuing system nlysis. Moreover, even the destintion is on the sme chnnel with the source, they my still fil to hndshke. The first reson is tht n RTS cnnot be received completely due to synchronous time slots. The second reson is neighbor s interference, including chnnel contention nd the hidden terminl collision. The lst reson is clled both-shouting problem cused when the destintion is lso in n ctive mode. The ltter two issues lso exist under synchronous scenrios. B. Anlysis of the Filure Receiving Problem Fig.. Chnnel j Chnnel k RTS RTS RTS Chnnel k Chnnel h The RTS filure receiving cses. In n synchronous CRN, s illustrted in Fig., pssive my not receive complete RTS due to hopping onto potentil rendezvous chnnel lter thn the strting time of n RTS sending (on chnnel i), or leving erlier before the sending finishes (on chnnel k). RTS RTS t t + t +- t + t t + t t + i) the cse of the erliest possible t ii) the cse of the ltest possible t Fig. 3. The cses tht t lest one RTS cn be completely received. Let nd rrive on sme chnnel t moments t nd t, respectively. We normlize the length of sending n RTS/CTS to. If the length of time slot is, should be longer thn so tht t lest one pir of RTS nd CTS exchnge cn be completed in time slot. In ddition, we hve the constrint t t to ensure tht nd hve overlpping time on the common chnnel. There re lso the following constrints (see Fig. 3) to help her t lest one complete RTS from.ift t ( hops on the chnnel lter thn ), the leving time of should be t lest lter thn the end time of the first RTS sent by on the common chnnel, i.e., t + t +.Ift t ( hops on the chnnel erlier thn ), the rriving time of should be t lest erlier thn the strt time of the lst possible RTS sent by on the common chnnel, i.e., t t +. Note tht fter ech RTS is sent out, must wit for while for the potentil CTS. Thus, the lst RTS in the current time slot must be sent before. To sum up, we hve the following equivlent inequlities nd their corresponding grphic illustrtion: 0 t 0 t t + t t t t t + - t 0 - The bove shdow re represents the fesible rnges of t nd t to ensure the receiving of t lest one complete RTS. Therefore, we cn derive the probbility tht pssive t 464

3 Globecom 04 - Wireless Networking Symposium receives complete RTS from nother on chnnel in the synchronous scenrio, P, size of the shdow re P = size of the squre =.5,. () In synchronous CRNs, it is nturl to define the size of one time slot to be the length of n RTS nd CTS exchnge for the ske of quick rendezvous, i.e., =. However, ccording to (), this design leds to probbility of to hve successful RTS reception even fter two s hop on sme chnnel in the synchronous scenrio. Since P is monotoniclly incresing function of, from this point of view, we should design the length of time slot s long s possible nd let keep sending RTS until the current time slot ends. C. Anlysis of the Neighboring Interference Problem In CRNs, especilly in cognitive rdio d hoc networks (CRAHNs), severl other s my be within s sensing rnge. Hence, three or more s my hop on sme chnnel in one time slot during their rendezvous processes. They my interfere with ech other in two scenrios. One is the presence of RTS collisions in the hidden terminl cse. The other is the continuous contention for sending RTS between ctive neighboring s in one time slot. In trditionl wireless networks, one reson tht n ctive node cnnot receive the correct CTS is the RTS collision from hidden terminl. Thus, 80. CSMA/CA requests node to perform binry exponentil bckoff when experiencing the bsence of CTS. However, this mechnism my not increse the successful rte of hndshke when pplied to CRNs, since more possible reson for the bsence of CTS is tht the destintion node is not on the sme chnnel. In ddition, to support bckoff, the size of time slot needs to be uncceptble long. Moreover, the bckoff my still collide with new who just hops on this chnnel fter the bckoff under the synchronous scenrio. On the other hnd, ech time when resends n RTS, it is n dditionl contender for other s. If the destintion is not on the sme chnnel, the source keeps rejoining the contention, which ffects other s opportunities to send the RTS. For exmple, in Fig. 4, hs successfully sent n RTS severl times in time slot (gry RTS/CTS mens the supposed sending/receiving but not chieved). If is hidden terminl of, it will collide with s jth resend. If is neighbor of, it will lose the opportunity to send its RTS becuse of s kth resend. If s destintion is bsent on this chnnel during this time slot, this contention keeps hppening till leves the chnnel. Fig. 4. RTS CTS RTS CTS j th resend k th resend RTS RTS The neighboring interference cses. Therefore, the trditionl method for resolving the RTS collision is not desirble for synchronous rendezvous in CRNs. A better mechnism is required in our protocol. From Section II-B, note tht P is only ffected by three fctors: the sending moments of the first nd the lst RTS in time slot, nd the length of time slot. Bsed on this observtion, we redesign the protocol which cn solve the neighboring interference problem nd menwhile hs n equivlent effect s the design in Section II-B. We propose tht n ctive only sends n RTS twice in time slot: one t the beginning nd one t the end of time slot if chnnel is idle, nd listens to the chnnel during other periods, s the illustrted in Fig. 5. However, if the length of time slot,, is not long enough for sending the second RTS (with CTS receiving), gives up the resend nd listens to the chnnel until the current time slot ends. Thus, we design the length of time slot to be either >4 (neglect the lengths of DIFS, SIFS, nd the contention-window in 80.) or = (without resending nd contention mechnisms in time slot). On the other hnd, if senses chnnel busy, it wits to send the first RTS until the chnnel idle long enough for CTS time, s the in Fig. 5. The gp between the dshed line nd the solid line is the time for DIFS nd the bckoff time for contention. We neglect these obligtory frmes in our nlysis. RTSCTS listening period RTSCTS t t + t + - t + RTSCTS RTSCTS Fig. 5. t The revised resending mechnism. Let be source nd be its neighbor. Let t nd t be their rrivl times on sme chnnel. Assume tht their destintion s re not on the sme chnnel. If t <t, cn send its RTS in this time slot. If t t, in the = cse, cn send its RTS if rriving fter finishing its RTS sending, i.e., t t +. Using the sme constrint t t nd solving the inequlities the sme wy s P, the probbility tht cn successfully send n RTS with neighbor on the sme chnnel is 0.65 when =. In the >4 cse, even rrives during s first RTS sending time s in Fig. 5, cn still send its RTS s long s the moment it strts to send is erlier thn s second RTS sending, i.e., t +<t +, which lwys stnds since >4. Moreover, if rrives during s second RTS sending (t + <t <t + ), we hve t >t + when >4, or,t + (t +) >. In other words, hs enough time for sending its RTS fter leves the chnnel. Hence, the probbility tht cn successfully send n RTS, P, increses to 00% when >4. Therefore, { 0.65, = P =, > 4. () This design lso reduces the RTS collision rte due to the low RTS sending frequency. Compred with the trditionl design, the listening period in the middle of time slot provides the opportunity for nother to send n RTS without collision. Suppose tht is hidden terminl of. Then, the cse tht cn successfully send t lest one RTS without collision is when the RTS from hs no overlp with the RTS from, i.e., t + < t, or t + >t +. We nme this probbility P 3.We derive it in similr wy s P, ( ) P 3 =, =or >4. (3) It lso requires the to be s long s possible to chieve the collision-free sending. 4643

4 Globecom 04 - Wireless Networking Symposium D. Anlysis of the Both-Shouting Problem In Section II-B, we consider the filure receiving problem when the destintion is pssive. However, it my lso be nother ctive. Consequently, when is hopping nd serching for its destintion, the trget my lso be serching for nother. An extreme cse is tht they re serching for ech other, which is dedlock when =. RTS RTS dt t t + - Cse : RTS CTS dt t Cse : RTS CTS dt t t + t + Fig. 6. Two successful cses when t <t under the both-shouting scenrio. Let be source nd be the trget which is lso n ctive when it rrives on the sme chnnel. If t <t, there re two cses in which cn her complete RTS from. Cse is tht rrives during s sending its first RTS. As illustrted in Fig. 6, bsed on our designed protocol from Section II-C, fter witing for CTS-long idle period, strts to send its own RTS. If s trget is, replies CTS nd they begin to trnsmit dt. In other words, the dedlock cse cn be esily solved to hve successful hndshke when >4. If s trget is not, then wits until the moment t +. If the chnnel is idle, sends its lst RTS nd will her the lst RTS from. In this cse, it requires tht t +4 t + (enough time to send the lst RTS), or, 6. Cse is tht rrives fter s first RTS (t t +). senses the chnnel idle nd sends its first RTS fter rriving. Similrly, overhers this RTS nd wits until t + if it still hs time to send its lst RTS, i.e., t + t +. It requires tht 5 in this cse. RTSCTS RTSCTS t t + t + - t + Cse : RTS dt t Cse : t RTS dt Fig. 7. Two successful cses when t >t under the both-shouting scenrio. If t >t, we lso nlyze two cses, s illustrted in Fig. 7. In cse, t <t <t +, strts to send t t +, which should before s second RTS sending (t + t + ). Then, >4 is required for this cse to ensure successful RTS reception t. In cse, t + t, cn send its first RTS fter rriving. will her this RTS s long s it is sent before s lst RTS (t t + ). This cse requires tht 3. In both cses, s end their current time slot immeditely once the hndshke is finished. To sum up, we hve the following equivlent inequlities nd their corresponding grphic illustrtion: 0 t 0 t t t t + t + t t + 4 t t t + -4 t The bove shdow re represents the fesible rnges of t nd t under different vlues of. Therefore, we cn t derive the probbility tht s RTS cn be herd by its destintion ctive on the sme chnnel, P 4, which is lso monotoniclly incresing function of. 0, = ( P 4 = 4)/, 4 <<5 ( 9)/. (4), 5 <6 ( 0)/, 6 III. PROPOSED MAC PROTOCOL We elborte the complete protocol in detils nd derive n optiml in terms of the minimum TTH in this section. A. Protocol Detils The overll flow chrt for our proposed MAC protocol is presented in Fig. 8. In the initil period, senses ll chnnels nd collects its vilble chnnel set. Existing sequence/probbilistic-bsed CH designs cn be employed in this step to generte the CH sequence. Then, the tunes its rdio to the ordered chnnel nd begins new time slot. During time slot, ny cn become destintion node once it receives n RTS crrying its ID s the receiver. If the lso hs dt to send, it postpones its own dt in queue nd receives other s trnsmission first. On the other hnd, pssive cn become source node once it hs dt to send. In synchronous environments, it hs to wit till the next time slot to chnge its role. However, in our design, it sends n RTS immeditely if there is still time left in the current time slot since there is no need for slot-synchroniztion. Once pir of s completes the hndshke in time slot, they sty on the sme chnnel trnsmitting dt until they finish the communiction. When the pir detects PU presence on the chnnel, spectrum hndoff [] is performed for resuming the trnsmission on nother chnnel. Fig. 8. Initil Hndoff Interrupt Time up Listen Receive RTS ID mtch Send CTS Dt trnsmit Tune to next chnnel Dt to send Chnnel Busy Idle time> Left time= Left time> Sent RTS once Idle from rriving The flow chrt of the proposed MAC protocol. Send RTS Receive CTS 4644

5 Globecom 04 - Wireless Networking Symposium In the figure, Left time = refers to the moment pproching. The bckoff for the lst RTS sending is counted in reverse time from. For exmple, if rndom number 0. is generted for the bckoff time, the lst RTS will be sent from the moment 0.. The use of SIFS nd DIFS in our protocol is the sme s in 80. MAC. B. Optiml Time Slot When considering the whole rendezvous process, mny time slots re needed before pir of s hop on sme chnnel nd hve successful hndshke. We denote P s the probbility tht source successfully hndshkes with its destintion in the next time slot. Use X to represent the verge service time (TTH) of. Then, X = i( P ) i P = P. (5) i= From the nlysis in Section II, long time slot cn improve the successful hndshke rte in one time slot. Thus, nd P re positive correlted. Therefore, n optiml is needed for (5) in terms of the shortest X. We derive the optiml s follows. First, let ρ represent the ctive rte of, i.e., the probbility tht is in n ctive mode. Assume tht the dt trffic is homogeneous in the secondry network, i.e., the ctive rte of is the sme everywhere in the network. Let λ be the verge pcket rrivl rte of (in the unit of one RTS sending time). Then, ρ = λx. We further denote P 0 s the probbility tht source successfully hops on sme chnnel with its destintion in time slot. P 0 vries under different CH designs [3]. If we do not consider the neighboring interference problem, we cn derive P s P I (P in n idle environment): P I = P 0 ( ρ)p + P 0 ρp 4, (6) where P nd P 4 re the sme probbilities defined in Section II-B nd II-D when the destintion is pssive or ctive, respectively. However, the neighboring-inference problem cnnot be ignored when is in dense network where the number of its neighbors is lrge. Assume tht there re n verge of K neighbors of. Excluding the destintion, the number of the potentil contenders of source is K = K. We denote K s the verge number of its hidden terminl s. Then, P =Pr(K =0, K =0)P I + Pr(K =, K =0)P P I + Pr(K =0, K =)P 3P I +... where Pr(K = 0, K = 0) is the probbility tht no neighbor nd hidden terminl exists on the sme chnnel during the source s one time slot, i.e., ( P 0 ρ) K+K. We cn further derive other probbilities regrding different vlues of K nd K. In this wy, P cn be written s: P ( P 0ρ) K +K P I ( ) K + P 0ρ( P 0ρ) K +K P P I ( ) K + P 0ρ( P 0ρ) K +K P 3P I. We do not consider the cses when K + K > due to two resons. One is tht the probbilities of K + K > re (7) negligible due to the P 0 ρ prt. P 0 is usully on the order of M, where M is the totl number of chnnels in CRN [], [3], [3]. Menwhile, ρ should be smll enough in CRNs to void network congestion []. Then, P 0 ρ is quite smll vlue. Moreover, the probbility tht K + K involving (P 0 ρ) or higher power cn be neglected. The other reson is tht the probbilities of successful hndshke under K + K > re lso negligible, referring the derivtion prt of P nd P 3 in Section II-C. From (5)-(7), we cn get (8) XP I( P 0λX) K +K [ P 0λX( K P K P 3) ]. (8) It is trnscendentl eqution becuse of independent vribles K nd K. Once the network prmeters K, K, M, nd λ re given, the expression of X in terms of cn be derived nd the optiml tht minimizes X cn be obtined. Detiled exmples re given in Section IV. IV. PERFORMANCE EVALUATION In this section, we evlute the performnce of our proposed MAC protocol under different scenrios by compring simultion results with the nlyticl vlues. In our simultion, we ssume tht the pcket rrivl of ech follows the Poisson distribution. Moreover, since P 0 is vrible independent of our nlysis, we dopt the rndom CH lgorithm under which P 0 is exctly M in order to esily djust the vlue of P 0. Additionlly, we consider grid network where K =3nd K =3. More importntly, ech in the simultion hs its own clock nd is not required to be synchronized with others. Other prmeters used in our simultion re listed in Tble I. TABLE I. SIMULATION PARAMETERS Number of s 64 (8 8 grid) Chnnel dt rte Mbps The size of (RTS+CTS) 60 + bits (80.b/g) Simultion time 0000 Fig. 9 illustrtes the expected TTH (ETTH) of the whole network under different numbers of chnnels. The simultion results mtch the nlyticl results very well with mximum difference of 5%. Fig. 9() shows tht =4is the optiml size of time slot when the verge pcket rrivl rte is low, or, the ctive rte of is low (λ =50pkt/s, ρ 0. 0.). Since ρ is smll, there re more idle time slots during rendezvous. Consequently, the dvntges of lrge ( >4) when deling with complicted cses (P, P 3, nd P 4 ) cnnot be fully utilized. Therefore, the incresing rte of the ETTH fter =4is higher when there re more chnnels to hop (M =0). ETTH Fig. 9. M=6, simultion M=6, nlyticl M=0, simultion M=0, nlyticl () λ =50pkt/s. ETTH 0 00 ETTH vs. in different trffic conditions (b) λ = 00 pkt/s. Fig. 9(b) shows the impct of different in nerly sturted network. When M is smll, =4still holds the 4645

6 Globecom 04 - Wireless Networking Symposium optiml size of time slot. However, note tht the ETTH when =6is lredy bit lower thn when =5. This mens tht the dvntges of lrge become dominnt in the results. In the M =0cse, the optiml size is when =6(even when =7hs the sme effect s when =4). Furthermore, the design of =cnnot stnd under this scenrio. This is becuse when =, the low probbility of the hndshke successful rte increses the TTH. Then, the long TTH leds to high ρ which further results in P 4 =0nd n infinite TTH. On the other hnd, from ()-(4), the improvement of ech probbility becomes less nd less when is lrger thn 6. It is lso shown in Fig. 9 nd 0 tht the ETTH monotoniclly increses fter =6. Fig. 0. ETTH Asyn. (=) Proposed Syn. (=) M Compre with the MAC without our design in different scenrios. Fig. 0 compres the performnce of different MAC protocols under the sme trffic condition (λ =50pkt/s). Since we lredy derive the optiml size of time slot under such scenrio, the proposed line is the performnce equipped with our MAC with =4over different M. The synchronous line belongs to the rndom CH protocol with the trditionl MAC under synchronous scenrios. The performnce of this trditionl MAC under the synchronous slot scenrio is shown s the squre-line. From Fig. 0 we cn see tht the proposed MAC performs much better thn trditionl MAC nd closer to the synchronous one (the idel cse). TABLE II. TTH VS. TTR M(λ) 6 (50) 6 (00) 0 (50) 0 (00) ETTH (in unit of slots) ETTR (theoreticl) To obtin the TTH in the unit of slots, we divide the minimum TTH using its corresponding. For exmple, the minimum TTH for the cse where M =0nd λ = 00, is 80.99/6 = 3.50 slots. Then, the verge numbers of time slots spent under different scenrios re shown in Tble II. It is shown tht our proposed MAC protocol under slot-synchronous scenrios cn mintin the ETTH with the theoreticl ETTR. Therefore, using our proposed protocol, it is not necessry to hve slots synchronized in CRNs. V. CONCLUSION In this pper, we developed probbilistic models for ech possible fctor which my influence the successful hndshke during blind rendezvous. Then, ccording to the nlysis of ech fctor, we proposed corresponding schemes nd integrted them into novel MAC protocol with the optiml size of time slot in terms of the shortest TTH. Simultion results verify the optimlity of the time slot nd show tht our design cn mintin the rendezvous performnce t the theoreticl level in different prcticl scenrios. REFERENCES [] Z. Lin, H. Liu, X. Chu, nd Y.-W. Leung, Jump-sty bsed chnnelhopping lgorithm with gurnteed rendezvous for cognitive rdio networks, in Proc. IEEE INFOCOM, 0. [] X. Liu nd J. Xie, A prcticl self-dptive rendezvous protocol in cognitive rdio d hoc networks, in Proc. IEEE INFOCOM, 04. [3] Z. Gu, Q.-S. Hu, Y. Wng, nd F. Lu, Nerly optiml synchronous blind rendezvous lgorithm for cognitive rdio networks, in Proc. IEEE SECON, 03, pp [4] Q. Chen, Y.-C. Ling, M. Motni, nd W.-C. Wong, A two-level MAC protocol strtegy for opportunistic spectrum ccess in cognitive rdio networks, IEEE Trnsctions on Vehiculr Techology, vol. 60, pp , 0. [5] S.-Y. Lien, C.-C. Tseng, nd K.-C. Chen, Crrier sensing bsed multiple ccess protocols for cognitive rdio networks, in Proc. IEEE ICC, 008, pp [6] X. Zhng nd H. Su, Opportunistic spectrum shring schemes for CDMA-bsed uplink MAC in cognitive rdio networks, IEEE Journl on Selected Ares in Communictions, vol. 9, pp , 0. [7] J. Xing, Y. Zhng, nd T. Skeie, Medium ccess control protocols in cognitive rdio networks, Wireless Communiction nd Mobile Computing, vol. 0, no., pp. 3 49, 00. [8] A. De Domenico, E. Strinti, nd M. Di Benedetto, A survey on MAC strtegies for cognitive rdio networks, IEEE Communictions Surveys nd Tutorils, vol. 4, pp. 44, 0. [9] Y. Zho, M. Song, nd C. Xin, FMAC: A fir MAC protocol for coexisting cognitive rdio networks, in Proc. IEEE INFOCOM, 03. [0] D. Hu nd S. Mo, Design nd nlysis of sensing error-wre MAC protocol for cognitive rdio networks, in Proc. IEEE GLOBECOM, 009. [] M. Felegyhzi, M. Cglj, nd J.-P. Hubux, Efficient MAC in cognitive rdio systems: A gme-theoretic pproch, IEEE Trnsctions on Wireless Communictions, vol. 8, pp , 009. [] G. Joshi nd S. W. Kim, An enhnced synchronized MAC protocol for cognitive rdio networks, in Proc. IEEE WiCOM, 0. [3] M. Shh, S. Zhng, nd C. Mple, An nlysis on decentrlized dptive MAC protocols for cognitive rdio networks, in Proc. IEEE ICAC, 0. [4] L. T. Tn nd L. B. Le, Distributed MAC protocol for cognitive rdio networks: Design, nlysis, nd optimiztion, IEEE Trnsctions on Vehiculr Techology, vol. 60, pp , 0. [5] M. Klil, A. Puschmnn, nd A. Mitschele-Thiel, SWITCH: A multichnnel MAC protocol for cognitive rdio d hoc networks, in Proc. IEEE Vehiculr Technology Conference (VTC), 0. [6] H. Hussein, H. Elsyed, nd S. Elrmly, Performnce evlution of cognitive rdio network predictive MAC (P-MAC) ccess lgorithm nd its enhncement, in Proc. IEEE ICOIN, 03. [7] S. Jh, U. Phuyl, M. Rshid, nd V. Bhrgv, Design of OMC- MAC: An opportunistic multi-chnnel MAC with QoS provisioning for distributed cognitive rdio networks, IEEE Trnsctions on Wireless Communictions, vol. 0, pp , 0. [8] C.-F. Shih, T. Y. Wu, nd W. Lio, DH-MAC: A dynmic chnnel hopping MAC protocol for cognitive rdio networks, in Proc. IEEE ICC, 00. [9] L. Jio nd F. Li, A single rdio bsed chnnel dtrte-wre prllel rendezvous MAC protocol for cognitive rdio networks, in Proc. IEEE LCN, 009. [0] S. K. Timlsin, S. Moh, llyong Chung, nd M. Kng, A concurrent ccess MAC protocol for cognitive rdio d hoc networks without common control chnnel, EURASIP Journl on Advnces in Signl Processing, vol. 69, 03. [] M. Altmimi, K. Nik, nd X. Shen, Prllel link rendezvous in d hoc cognitive rdio networks, in Proc. IEEE GLOBECOM, 00. [] Y. Song nd J. Xie, ProSpect: A proctive spectrum hndoff frmework for cognitive rdio d hoc networks without common control chnnel, IEEE Trns. Mobile Computing, vol., no. 7, pp. 7 39, 0. [3] Y. Song, J. Xie, nd X. Wng, A novel unified nlyticl model for brodcst protocols in multi-hop cognitive rdio d hoc networks, IEEE Trns. on Mobile Computing, vol. 3, no. 8, pp , August

A Cluster-based TDMA System for Inter-Vehicle Communications *

A Cluster-based TDMA System for Inter-Vehicle Communications * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 213-231 (2014) A Cluster-bsed TDMA System for Inter-Vehicle Communictions * Deprtment of Electricl Engineering Ntionl Sun Yt-Sen University Kohsiung,

More information

Energy Harvesting Two-Way Channels With Decoding and Processing Costs

Energy Harvesting Two-Way Channels With Decoding and Processing Costs IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, VOL., NO., MARCH 07 3 Energy Hrvesting Two-Wy Chnnels With Decoding nd Processing Costs Ahmed Arf, Student Member, IEEE, Abdulrhmn Bknin, Student

More information

Multi-beam antennas in a broadband wireless access system

Multi-beam antennas in a broadband wireless access system Multi-em ntenns in rodnd wireless ccess system Ulrik Engström, Mrtin Johnsson, nders Derneryd nd jörn Johnnisson ntenn Reserch Center Ericsson Reserch Ericsson SE-4 84 Mölndl Sweden E-mil: ulrik.engstrom@ericsson.com,

More information

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks

Jamming-Resistant Collaborative Broadcast In Wireless Networks, Part II: Multihop Networks Jmming-Resistnt ollbortive Brodcst In Wireless Networks, Prt II: Multihop Networks Ling Xio Ximen University, hin 361005 Emil: lxio@xmu.edu.cn Huiyu Di N Stte University, Rleigh, N 27695 Emil: huiyu di@ncsu.edu

More information

Algorithms for Memory Hierarchies Lecture 14

Algorithms for Memory Hierarchies Lecture 14 Algorithms for emory Hierrchies Lecture 4 Lecturer: Nodri Sitchinv Scribe: ichel Hmnn Prllelism nd Cche Obliviousness The combintion of prllelism nd cche obliviousness is n ongoing topic of reserch, in

More information

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel

Interference Cancellation Method without Feedback Amount for Three Users Interference Channel Open Access Librry Journl 07, Volume, e57 ISSN Online: -97 ISSN Print: -9705 Interference Cncelltion Method without Feedbc Amount for Three Users Interference Chnnel Xini Tin, otin Zhng, Wenie Ji School

More information

Adaptive Network Coding for Wireless Access Networks

Adaptive Network Coding for Wireless Access Networks Adptive Network Coding for Wireless Access Networks Tun Trn School of Electricl Engineering nd Computer Science Oregon Stte University, Corvllis, Oregon 9733 Emil: trntu@eecs.orst.edu Thinh Nguyen School

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Synchronous Machine Parameter Measurement

Synchronous Machine Parameter Measurement Synchronous Mchine Prmeter Mesurement 1 Synchronous Mchine Prmeter Mesurement Introduction Wound field synchronous mchines re mostly used for power genertion but lso re well suited for motor pplictions

More information

Solutions to exercise 1 in ETS052 Computer Communication

Solutions to exercise 1 in ETS052 Computer Communication Solutions to exercise in TS52 Computer Communiction 23 Septemer, 23 If it occupies millisecond = 3 seconds, then second is occupied y 3 = 3 its = kps. kps If it occupies 2 microseconds = 2 6 seconds, then

More information

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES

MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES MAXIMUM FLOWS IN FUZZY NETWORKS WITH FUNNEL-SHAPED NODES Romn V. Tyshchuk Informtion Systems Deprtment, AMI corportion, Donetsk, Ukrine E-mil: rt_science@hotmil.com 1 INTRODUCTION During the considertion

More information

To provide data transmission in indoor

To provide data transmission in indoor Hittite Journl of Science nd Engineering, 2018, 5 (1) 25-29 ISSN NUMBER: 2148-4171 DOI: 10.17350/HJSE19030000074 A New Demodultor For Inverse Pulse Position Modultion Technique Mehmet Sönmez Osmniye Korkut

More information

CHAPTER 2 LITERATURE STUDY

CHAPTER 2 LITERATURE STUDY CHAPTER LITERATURE STUDY. Introduction Multipliction involves two bsic opertions: the genertion of the prtil products nd their ccumultion. Therefore, there re two possible wys to speed up the multipliction:

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC

ABB STOTZ-KONTAKT. ABB i-bus EIB Current Module SM/S Intelligent Installation Systems. User Manual SM/S In = 16 A AC Un = 230 V AC User Mnul ntelligent nstlltion Systems A B 1 2 3 4 5 6 7 8 30 ma 30 ma n = AC Un = 230 V AC 30 ma 9 10 11 12 C ABB STOTZ-KONTAKT Appliction Softwre Current Vlue Threshold/1 Contents Pge 1 Device Chrcteristics...

More information

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1)

Dataflow Language Model. DataFlow Models. Applications of Dataflow. Dataflow Languages. Kahn process networks. A Kahn Process (1) The slides contin revisited mterils from: Peter Mrwedel, TU Dortmund Lothr Thiele, ETH Zurich Frnk Vhid, University of liforni, Riverside Dtflow Lnguge Model Drsticlly different wy of looking t computtion:

More information

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion

CSI-SF: Estimating Wireless Channel State Using CSI Sampling & Fusion CSI-SF: Estimting Wireless Chnnel Stte Using CSI Smpling & Fusion Riccrdo Crepldi, Jeongkeun Lee, Rul Etkin, Sung-Ju Lee, Robin Krvets University of Illinois t Urbn-Chmpign Hewlett-Pckrd Lbortories Emil:{rcrepl,rhk}@illinoisedu,

More information

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication

A Stochastic Geometry Approach to the Modeling of DSRC for Vehicular Safety Communication A Stochstic Geometry Approch to the Modeling of DSRC for Vehiculr Sfety Communiction Zhen Tong, Student Member, IEEE, Hongsheng Lu 2, Mrtin Henggi, Fellow, IEEE, nd Christin Poellbuer 2, Senior Member,

More information

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability

Simulation of Transformer Based Z-Source Inverter to Obtain High Voltage Boost Ability Interntionl Journl of cience, Engineering nd Technology Reserch (IJETR), olume 4, Issue 1, October 15 imultion of Trnsformer Bsed Z-ource Inverter to Obtin High oltge Boost Ability A.hnmugpriy 1, M.Ishwry

More information

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System

Y9.ET1.3 Implementation of Secure Energy Management against Cyber/physical Attacks for FREEDM System Y9.ET1.3 Implementtion of Secure Energy ngement ginst Cyber/physicl Attcks for FREED System Project Leder: Fculty: Students: Dr. Bruce cillin Dr. o-yuen Chow Jie Dun 1. Project Gols Develop resilient cyber-physicl

More information

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM

A Novel Back EMF Zero Crossing Detection of Brushless DC Motor Based on PWM A ovel Bck EMF Zero Crossing Detection of Brushless DC Motor Bsed on PWM Zhu Bo-peng Wei Hi-feng School of Electricl nd Informtion, Jingsu niversity of Science nd Technology, Zhenjing 1003 Chin) Abstrct:

More information

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin

METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN. Inventor: Brian L. Baskin METHOD OF LOCATION USING SIGNALS OF UNKNOWN ORIGIN Inventor: Brin L. Bskin 1 ABSTRACT The present invention encompsses method of loction comprising: using plurlity of signl trnsceivers to receive one or

More information

Information-Coupled Turbo Codes for LTE Systems

Information-Coupled Turbo Codes for LTE Systems Informtion-Coupled Turbo Codes for LTE Systems Lei Yng, Yixun Xie, Xiowei Wu, Jinhong Yun, Xingqing Cheng nd Lei Wn rxiv:709.06774v [cs.it] 20 Sep 207 Abstrct We propose new clss of informtion-coupled

More information

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017

4110 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 2017 40 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 66, NO. 5, MAY 07 Trnsmit Power Control for DD-Underlid Cellulr Networs Bsed on Sttisticl Fetures Peng Sun, Kng G. Shin, Life Fellow, IEEE, Hilin Zhng,

More information

Synchronous Generator Line Synchronization

Synchronous Generator Line Synchronization Synchronous Genertor Line Synchroniztion 1 Synchronous Genertor Line Synchroniztion Introduction One issue in power genertion is synchronous genertor strting. Typiclly, synchronous genertor is connected

More information

Improving synchronized transfers in public transit networks using real-time tactics

Improving synchronized transfers in public transit networks using real-time tactics Improving synchronized trnsfers in public trnsit networks using rel-time tctics Zhongjun Wu 1,2,3, Grhm Currie 3, Wei Wng 1,2 1 Jingsu Key Lbortory of Urbn ITS, Si Pi Lou 2#, Nnjing, 210096, Chin 2 School

More information

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator)

Three-Phase Synchronous Machines The synchronous machine can be used to operate as: 1. Synchronous motors 2. Synchronous generators (Alternator) Three-Phse Synchronous Mchines The synchronous mchine cn be used to operte s: 1. Synchronous motors 2. Synchronous genertors (Alterntor) Synchronous genertor is lso referred to s lterntor since it genertes

More information

Postprint. This is the accepted version of a paper presented at IEEE PES General Meeting.

Postprint.   This is the accepted version of a paper presented at IEEE PES General Meeting. http://www.div-portl.org Postprint This is the ccepted version of pper presented t IEEE PES Generl Meeting. Cittion for the originl published pper: Mhmood, F., Hooshyr, H., Vnfretti, L. (217) Sensitivity

More information

Adaptive VoIP Smoothing of Pareto Traffic Based on Optimal E-Model Quality

Adaptive VoIP Smoothing of Pareto Traffic Based on Optimal E-Model Quality Adptive VoIP Smoothing of Preto Trffic Bsed on Optiml E-Model Qulity Shyh-Fng Hung 1, Eric Hsio-Kung Wu 2, nd Po-Chi Chng 3 1 Deprtment of Electricl Engineering, Ntionl Centrl University, Tiwn hsf@vplb.ee.ncu.edu.tw

More information

Module 9. DC Machines. Version 2 EE IIT, Kharagpur

Module 9. DC Machines. Version 2 EE IIT, Kharagpur Module 9 DC Mchines Version EE IIT, Khrgpur esson 40 osses, Efficiency nd Testing of D.C. Mchines Version EE IIT, Khrgpur Contents 40 osses, efficiency nd testing of D.C. mchines (esson-40) 4 40.1 Gols

More information

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels

Network-coded Cooperation for Multi-unicast with Non-Ideal Source-Relay Channels This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE ICC 2010 proceedings Network-coded Coopertion for Multi-unicst with Non-Idel

More information

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center

The Math Learning Center PO Box 12929, Salem, Oregon Math Learning Center Resource Overview Quntile Mesure: Skill or Concept: 300Q Model the concept of ddition for sums to 10. (QT N 36) Model the concept of sutrction using numers less thn or equl to 10. (QT N 37) Write ddition

More information

The Discussion of this exercise covers the following points:

The Discussion of this exercise covers the following points: Exercise 4 Bttery Chrging Methods EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the different chrging methods nd chrge-control techniques commonly used when chrging Ni-MI

More information

(CATALYST GROUP) B"sic Electric"l Engineering

(CATALYST GROUP) Bsic Electricl Engineering (CATALYST GROUP) B"sic Electric"l Engineering 1. Kirchhoff s current l"w st"tes th"t (") net current flow "t the junction is positive (b) Hebr"ic sum of the currents meeting "t the junction is zero (c)

More information

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators

Network Sharing and its Energy Benefits: a Study of European Mobile Network Operators Network Shring nd its Energy Benefits: Study of Europen Mobile Network Opertors Mrco Ajmone Mrsn Electronics nd Telecommunictions Dept Politecnico di Torino, nd Institute IMDEA Networks, mrco.jmone@polito.it

More information

A Development of Earthing-Resistance-Estimation Instrument

A Development of Earthing-Resistance-Estimation Instrument A Development of Erthing-Resistnce-Estimtion Instrument HITOSHI KIJIMA Abstrct: - Whenever erth construction work is done, the implnted number nd depth of electrodes hve to be estimted in order to obtin

More information

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units

On the Prediction of EPON Traffic Using Polynomial Fitting in Optical Network Units On the Prediction of EP Trffic Using Polynomil Fitting in Opticl Networ Units I. Mmounis (1),(3), K. Yinnopoulos (2), G. Ppdimitriou (4), E. Vrvrigos (1),(3) (1) Computer Technology Institute nd Press

More information

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding*

Analysis of Coding-aware MAC Protocols based on Reverse Direction Protocol for IEEE based Wireless Networks using Network Coding* Anlysis of oding-wre MA Protocols sed on Reverse irection Protocol for IEEE 8.-sed Wireless Networks using Network oding* Rul Plcios, Htegereil Kssye Hile, Jesus Alonso-Zrte nd Frizio Grnelli {plciostrujillo,

More information

Mixed CMOS PTL Adders

Mixed CMOS PTL Adders Anis do XXVI Congresso d SBC WCOMPA l I Workshop de Computção e Aplicções 14 20 de julho de 2006 Cmpo Grnde, MS Mixed CMOS PTL Adders Déor Mott, Reginldo d N. Tvres Engenhri em Sistems Digitis Universidde

More information

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter

Fuzzy Logic Controller for Three Phase PWM AC-DC Converter Journl of Electrotechnology, Electricl Engineering nd Mngement (2017) Vol. 1, Number 1 Clusius Scientific Press, Cnd Fuzzy Logic Controller for Three Phse PWM AC-DC Converter Min Muhmmd Kml1,, Husn Ali2,b

More information

Study on SLT calibration method of 2-port waveguide DUT

Study on SLT calibration method of 2-port waveguide DUT Interntionl Conference on Advnced Electronic cience nd Technology (AET 206) tudy on LT clibrtion method of 2-port wveguide DUT Wenqing Luo, Anyong Hu, Ki Liu nd Xi Chen chool of Electronics nd Informtion

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: eydy@gtech.edu Frmrz Feri School

More information

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks

Signaling-Embedded Preamble Design for Flexible Optical Transport Networks Signling-Embedded Premble Design for Flexible Opticl Trnsport Networks Linglong Di nd Zhocheng Wng Tsinghu Ntionl Lbortory for Informtion Science nd Technology, Deprtment of Electronic Engineering, Tsinghu

More information

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION

Exercise 1-1. The Sine Wave EXERCISE OBJECTIVE DISCUSSION OUTLINE. Relationship between a rotating phasor and a sine wave DISCUSSION Exercise 1-1 The Sine Wve EXERCISE OBJECTIVE When you hve completed this exercise, you will be fmilir with the notion of sine wve nd how it cn be expressed s phsor rotting round the center of circle. You

More information

Distance dependent Call Blocking Probability, and Area Erlang Efficiency of Cellular Networks

Distance dependent Call Blocking Probability, and Area Erlang Efficiency of Cellular Networks Distnce dependent Cll Blocking Probbility, nd Are Erlng Efficiency of Cellulr Networks Subhendu Btbyl 1, Suvr Sekhr Ds 1,2 1 G.S.Snyl School of Telecommuniction, Indin Institute of Technology Khrgpur,

More information

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report

Travel Prediction-based Data Forwarding for Sparse Vehicular Networks. Technical Report Trvel Prediction-sed Dt Forwrding for Sprse Vehiculr Networks Technicl Report Deprtment of Computer Science nd Engineering University of Minnesot 4-192 Keller Hll 200 Union Street SE Minnepolis, MN 55455-0159

More information

Eliminating Non-Determinism During Test of High-Speed Source Synchronous Differential Buses

Eliminating Non-Determinism During Test of High-Speed Source Synchronous Differential Buses Eliminting Non-Determinism During of High-Speed Source Synchronous Differentil Buses Abstrct The t-speed functionl testing of deep sub-micron devices equipped with high-speed I/O ports nd the synchronous

More information

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad

INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigal, Hyderabad Hll Ticket No Question Pper Code: AEC009 INSTITUTE OF AERONAUTICAL ENGINEERING (Autonomous) Dundigl, Hyderd - 500 043 MODEL QUESTION PAPER Four Yer B.Tech V Semester End Exmintions, Novemer - 2018 Regultions:

More information

Temporal Secondary Access Opportunities for WLAN in Radar Bands

Temporal Secondary Access Opportunities for WLAN in Radar Bands The 4th Interntionl Symposium on Wireless Personl Multimedi Communictions WPMC'), Temporl Secondry Access Opportunities for WLAN in Rdr Bnds Miurel Tercero, Ki Won Sung, nd Jens Znder Wireless@KTH, Royl

More information

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks

Distributed two-hop proportional fair resource allocation in Long Term Evolution Advanced networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2016; 16:264 278 Published online 12 August 2014 in Wiley Online Librry (wileyonlinelibrry.com)..2517 RESEARCH ARTICLE Distributed

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers Fll 2009 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials

Design and Modeling of Substrate Integrated Waveguide based Antenna to Study the Effect of Different Dielectric Materials Design nd Modeling of Substrte Integrted Wveguide bsed Antenn to Study the Effect of Different Dielectric Mterils Jgmeet Kour 1, Gurpdm Singh 1, Sndeep Ary 2 1Deprtment of Electronics nd Communiction Engineering,

More information

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks

BP-P2P: Belief Propagation-Based Trust and Reputation Management for P2P Networks 1 9th Annul IEEE Communictions Society Conference on Sensor, Mesh nd Ad Hoc Communictions nd Networs (SECON) BP-PP: Belief Propgtion-Bsed Trust nd Reputtion Mngement for PP Networs Ermn Aydy School of

More information

On the Description of Communications Between Software Components with UML

On the Description of Communications Between Software Components with UML On the Description of Communictions Between Softwre Components with UML Zhiwei An Dennis Peters Fculty of Engineering nd Applied Science Memoril University of Newfoundlnd St. John s NL A1B 3X5 zhiwei@engr.mun.c

More information

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF)

A New Algorithm to Compute Alternate Paths in Reliable OSPF (ROSPF) A New Algorithm to Compute Alternte Pths in Relile OSPF (ROSPF) Jin Pu *, Eric Mnning, Gholmli C. Shoj, Annd Srinivsn ** PANDA Group, Computer Science Deprtment University of Victori Victori, BC, Cnd Astrct

More information

First Round Solutions Grades 4, 5, and 6

First Round Solutions Grades 4, 5, and 6 First Round Solutions Grdes 4, 5, nd 1) There re four bsic rectngles not mde up of smller ones There re three more rectngles mde up of two smller ones ech, two rectngles mde up of three smller ones ech,

More information

Spiral Tilings with C-curves

Spiral Tilings with C-curves Spirl Tilings with -curves Using ombintorics to Augment Trdition hris K. Plmer 19 North Albny Avenue hicgo, Illinois, 0 chris@shdowfolds.com www.shdowfolds.com Abstrct Spirl tilings used by rtisns through

More information

Experiment 3: Non-Ideal Operational Amplifiers

Experiment 3: Non-Ideal Operational Amplifiers Experiment 3: Non-Idel Opertionl Amplifiers 9/11/06 Equivlent Circuits The bsic ssumptions for n idel opertionl mplifier re n infinite differentil gin ( d ), n infinite input resistnce (R i ), zero output

More information

Kyushu Institute of Technology

Kyushu Institute of Technology Title: Integrted Rescue Service Stellite (IRS-St) Primry Point of Contct (POC): Mohmed Ibrhim Co-uthors: Btsuren Amglnbt, Puline Fure, Kevin Chou Orgniztion:, 1-1 Sensui, Tobt, Kitkyushu 804-8550, Jpn

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-297 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Math Circles Finite Automata Question Sheet 3 (Solutions)

Math Circles Finite Automata Question Sheet 3 (Solutions) Mth Circles Finite Automt Question Sheet 3 (Solutions) Nickols Rollick nrollick@uwterloo.c Novemer 2, 28 Note: These solutions my give you the nswers to ll the prolems, ut they usully won t tell you how

More information

Exponential-Hyperbolic Model for Actual Operating Conditions of Three Phase Arc Furnaces

Exponential-Hyperbolic Model for Actual Operating Conditions of Three Phase Arc Furnaces Americn Journl of Applied Sciences 6 (8): 1539-1547, 2009 ISSN 1546-9239 2009 Science Publictions Exponentil-Hyperbolic Model for Actul Operting Conditions of Three Phse Arc Furnces 1 Mhdi Bnejd, 2 Rhmt-Allh

More information

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine

EET 438a Automatic Control Systems Technology Laboratory 5 Control of a Separately Excited DC Machine EE 438 Automtic Control Systems echnology bortory 5 Control of Seprtely Excited DC Mchine Objective: Apply proportionl controller to n electromechnicl system nd observe the effects tht feedbck control

More information

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office

Joanna Towler, Roading Engineer, Professional Services, NZTA National Office Dave Bates, Operations Manager, NZTA National Office . TECHNICA MEMOANDM To Cc repred By Endorsed By NZTA Network Mngement Consultnts nd Contrctors NZTA egionl Opertions Mngers nd Are Mngers Dve Btes, Opertions Mnger, NZTA Ntionl Office Jonn Towler, oding

More information

Application of Wavelet De-noising in Vibration Torque Measurement

Application of Wavelet De-noising in Vibration Torque Measurement IJCSI Interntionl Journl of Computer Science Issues, Vol. 9, Issue 5, No 3, September 01 www.ijcsi.org 9 Appliction of Wvelet De-noising in Vibrtion orque Mesurement Ho Zho 1 1 Jixing University, Jixing,

More information

Application Note. Differential Amplifier

Application Note. Differential Amplifier Appliction Note AN367 Differentil Amplifier Author: Dve n Ess Associted Project: Yes Associted Prt Fmily: CY8C9x66, CY8C7x43, CY8C4x3A PSoC Designer ersion: 4. SP3 Abstrct For mny sensing pplictions, desirble

More information

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12

Sequential Logic (2) Synchronous vs Asynchronous Sequential Circuit. Clock Signal. Synchronous Sequential Circuits. FSM Overview 9/10/12 9//2 Sequentil (2) ENGG5 st Semester, 22 Dr. Hden So Deprtment of Electricl nd Electronic Engineering http://www.eee.hku.hk/~engg5 Snchronous vs Asnchronous Sequentil Circuit This Course snchronous Sequentil

More information

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance

Energy-efficient scheduling and hybrid communication architecture for underwater littoral surveillance Computer Communictions xxx (26) xxx xxx www.elsevier.com/locte/comcom Energy-efficient scheduling nd hybrid communiction rchitecture for underwter littorl surveillnce Mihel Crdei * Deprtment of Computer

More information

MATH 118 PROBLEM SET 6

MATH 118 PROBLEM SET 6 MATH 118 PROBLEM SET 6 WASEEM LUTFI, GABRIEL MATSON, AND AMY PIRCHER Section 1 #16: Show tht if is qudrtic residue modulo m, nd b 1 (mod m, then b is lso qudrtic residue Then rove tht the roduct of the

More information

High-speed Simulation of the GPRS Link Layer

High-speed Simulation of the GPRS Link Layer 989 High-speed Simultion of the GPRS Link Lyer J Gozlvez nd J Dunlop Deprtment of Electronic nd Electricl Engineering, University of Strthclyde 204 George St, Glsgow G-lXW, Scotlnd Tel: +44 4 548 206,

More information

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 20. Intro to line integrals. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 2 Intro to line integrls Dn Nichols nichols@mth.umss.edu MATH 233, Spring 218 University of Msschusetts April 12, 218 (2) onservtive vector fields We wnt to determine if F P (x, y), Q(x, y) is

More information

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates

CS 135: Computer Architecture I. Boolean Algebra. Basic Logic Gates Bsic Logic Gtes : Computer Architecture I Boolen Algebr Instructor: Prof. Bhgi Nrhri Dept. of Computer Science Course URL: www.ses.gwu.edu/~bhgiweb/cs35/ Digitl Logic Circuits We sw how we cn build the

More information

RSS based Localization of Sensor Nodes by Learning Movement Model

RSS based Localization of Sensor Nodes by Learning Movement Model RSS bsed Locliztion of Sensor Nodes by Lerning Movement Model 1 R.ARTHI, 2 P.DEVARAJ, 1 K.MURUGAN 1 Rmnujn Computing Centre, Ann University, Guindy, Chenni, Indi 2 Deprtment of Mthemtics, College of Engineering,

More information

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks

A Channel Splitting Technique for Reducing Handoff Delay in Wireless Networks Interntionl Journl o Engineering Reserch & Technology (IJERT) A Chnnel Splitting Technique or Reducing Hndo ely in Wireless Networks Jeykumr. J #1, Venktesh. * 2, Vigneswri. G* 3, Nivethith. V *4 # 1 PG

More information

Address for Correspondence

Address for Correspondence Mrndn et l., Interntionl Journl of Advnced Engineering Technology E-ISSN 0976-3945 Reserch Pper A LATTICE REDUCTION-AIDED INFORMATION PRECODER FOR MULTIUSER COMMUNICATION SYSTEM S. Mrndn, N. Venteswrn

More information

EE Controls Lab #2: Implementing State-Transition Logic on a PLC

EE Controls Lab #2: Implementing State-Transition Logic on a PLC Objective: EE 44 - Controls Lb #2: Implementing Stte-rnsition Logic on PLC ssuming tht speed is not of essence, PLC's cn be used to implement stte trnsition logic. he dvntge of using PLC over using hrdwre

More information

High Speed On-Chip Interconnects: Trade offs in Passive Termination

High Speed On-Chip Interconnects: Trade offs in Passive Termination High Speed On-Chip Interconnects: Trde offs in Pssive Termintion Rj Prihr University of Rochester, NY, USA prihr@ece.rochester.edu Abstrct In this pper, severl pssive termintion schemes for high speed

More information

Geometric quantities for polar curves

Geometric quantities for polar curves Roerto s Notes on Integrl Clculus Chpter 5: Bsic pplictions of integrtion Section 10 Geometric quntities for polr curves Wht you need to know lredy: How to use integrls to compute res nd lengths of regions

More information

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment

Efficient and Resilient Key Discovery based on Pseudo-Random Key Pre-Deployment Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment p. 1 Efficient nd Resilient Key Discovery sed on Pseudo-Rndom Key Pre-Deployment Roerto Di Pietro, Luigi V. Mncini, nd Alessndro

More information

Design And Implementation Of Luo Converter For Electric Vehicle Applications

Design And Implementation Of Luo Converter For Electric Vehicle Applications Design And Implementtion Of Luo Converter For Electric Vehicle Applictions A.Mnikndn #1, N.Vdivel #2 ME (Power Electronics nd Drives) Deprtment of Electricl nd Electronics Engineering Sri Shkthi Institute

More information

Genetic Representations for Evolutionary Minimization of Network Coding Resources

Genetic Representations for Evolutionary Minimization of Network Coding Resources Genetic Representtions for Evolutionry Minimiztion of Network Coding Resources Minkyu Kim 1, Vrun Aggrwl 2, Un-My O Reilly 2, Muriel Médrd 1, nd Wonsik Kim 1 1 Lortory for Informtion nd Decision Systems

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Aggregate Interference from Secondary Users with Heterogeneous Density

Aggregate Interference from Secondary Users with Heterogeneous Density 22nd IEEE Personl Indoor Mobile Rdio Communictions Aggregte Interference from Secondry Users with Heterogeneous Density Miurel Tercero, Ki Won Sung, nd Jens Znder Wireless@KTH, Royl Institute of Technology(KTH),

More information

Direct AC Generation from Solar Cell Arrays

Direct AC Generation from Solar Cell Arrays Missouri University of Science nd Technology Scholrs' Mine UMR-MEC Conference 1975 Direct AC Genertion from Solr Cell Arrys Fernndo L. Alvrdo Follow this nd dditionl works t: http://scholrsmine.mst.edu/umr-mec

More information

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply

Open Access A Novel Parallel Current-sharing Control Method of Switch Power Supply Send Orders for Reprints to reprints@enthmscience.e 170 The Open Electricl & Electronic Engineering Journl, 2014, 8, 170-177 Open Access A Novel Prllel Current-shring Control Method of Switch Power Supply

More information

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor

Three-Phase NPC Inverter Using Three-Phase Coupled Inductor ThreePhse NPC Inverter Using ThreePhse Coupled Inductor Romeu Husmnn 1, Rodrigo d Silv 2 nd Ivo Brbi 2 1 Deprtment of Electricl nd Telecommuniction Engineering, University of Blumenu FURB Blumenu SC Brzil,

More information

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR):

Kirchhoff s Rules. Kirchhoff s Laws. Kirchhoff s Rules. Kirchhoff s Laws. Practice. Understanding SPH4UW. Kirchhoff s Voltage Rule (KVR): SPH4UW Kirchhoff s ules Kirchhoff s oltge ule (K): Sum of voltge drops round loop is zero. Kirchhoff s Lws Kirchhoff s Current ule (KC): Current going in equls current coming out. Kirchhoff s ules etween

More information

An Analog Baseband Approach for Designing Full-Duplex Radios

An Analog Baseband Approach for Designing Full-Duplex Radios An Anlog Bsend Approch for Designing Full-Duplex Rdios Brett Kufmn, Jorm Lilleerg, nd Behnm Azhng Center for Multimedi Communiction, Rice University, Houston, Texs, USA Centre for Wireless Communictions,

More information

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES

CHAPTER 3 AMPLIFIER DESIGN TECHNIQUES CHAPTER 3 AMPLIFIER DEIGN TECHNIQUE 3.0 Introduction olid-stte microwve mplifiers ply n importnt role in communiction where it hs different pplictions, including low noise, high gin, nd high power mplifiers.

More information

AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS

AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS AN IMPROVED METHOD FOR RADIO FREQUENCY DIRECTION FINDING USING WIRELESS SENSOR NETWORKS Mickey S. Btson, John C. McEchen, nd Murli Tumml Deprtment of Electricl nd Computer Engineering Nvl Postgrdute School

More information

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato

Soft-decision Viterbi Decoding with Diversity Combining. T.Sakai, K.Kobayashi, S.Kubota, M.Morikura, S.Kato Softdecision Viterbi Decoding with Diversity Combining T.Ski, K.Kobyshi, S.Kubot, M.Morikur, S.Kto NTT Rdio Communiction Systems Lbortories 2356 Tke, Yokosukshi, Kngw, 2383 Jpn ABSTRACT Diversity combining

More information

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17.

Section 17.2: Line Integrals. 1 Objectives. 2 Assignments. 3 Maple Commands. 1. Compute line integrals in IR 2 and IR Read Section 17. Section 7.: Line Integrls Objectives. ompute line integrls in IR nd IR 3. Assignments. Red Section 7.. Problems:,5,9,,3,7,,4 3. hllenge: 6,3,37 4. Red Section 7.3 3 Mple ommnds Mple cn ctully evlute line

More information

CDMA One. International summer students courses: "Plugged In: Modern Networks and Services in Telecommunication"

CDMA One. International summer students courses: Plugged In: Modern Networks and Services in Telecommunication INTRAROM S.A. ROMANIAN TELECOMMUNICATIONS AND ELECTRONICS INDUSTRY ROMANIA, Buchrest, 17 Fbric de Glucoz St., Sector 2 Cod 72322, Tel:(+40 1) 2040600 Fx:(+40 1) 2040611 http://www.intrrom.ro Interntionl

More information

System-Wide Harmonic Mitigation in a Diesel Electric Ship by Model Predictive Control

System-Wide Harmonic Mitigation in a Diesel Electric Ship by Model Predictive Control IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS System-Wide Hrmonic Mitigtion in Diesel Electric Ship by Model Predictive Control Espen Skjong, Jon Are Suul, Member, IEEE, Atle Rygg, Tor Arne Johnsen, Senior

More information

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks

RT-Link: A Time-Synchronized Link Protocol for Energy Constrained Multi-hop Wireless Networks RT-Link: A Time-Synchronized Link Protocol for Energy Constrined Multi-hop Wireless Networks Anthony Rowe, Rhul Mnghrm, Rj Rjkumr Electricl nd Computer Engineering Deprtment, Crnegie Mellon University,

More information

Electronic Circuits I - Tutorial 03 Diode Applications I

Electronic Circuits I - Tutorial 03 Diode Applications I Electronic Circuits I - Tutoril 03 Diode Applictions I -1 / 9 - T & F # Question 1 A diode cn conduct current in two directions with equl ese. F 2 When reverse-bised, diode idelly ppers s short. F 3 A

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-247 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Foot-Pedal: Haptic Feedback Human Interface Bridging Sensational Gap between Remote Places

Foot-Pedal: Haptic Feedback Human Interface Bridging Sensational Gap between Remote Places Foot-Pedl: Hptic Feedbck Humn Interfce Bridging Senstionl Gp between Remote Plces Mincheol Kim 1, De-Keun Yoon 2, Shin-Young Kim 1, Ji-Hi Cho 1, Kwng-Kyu Lee 1, Bum-Je You 1,3 1 Center of Humn-centered

More information

Example. Check that the Jacobian of the transformation to spherical coordinates is

Example. Check that the Jacobian of the transformation to spherical coordinates is lss, given on Feb 3, 2, for Mth 3, Winter 2 Recll tht the fctor which ppers in chnge of vrible formul when integrting is the Jcobin, which is the determinnt of mtrix of first order prtil derivtives. Exmple.

More information

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID

DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID THERMAL SCIENCE, Yer 2015, Vol. 19, No. 4, pp. 1311-1315 1311 DYE SOLUBILITY IN SUPERCRITICAL CARBON DIOXIDE FLUID by Jun YAN, Li-Jiu ZHENG *, Bing DU, Yong-Fng QIAN, nd Fng YE Lioning Provincil Key Lbortory

More information