A Joint MAC and Physical Layer Analytical Model for IEEE a Networks Operating under RTS/CTS Access Scheme
|
|
- Ralph Boyd
- 6 years ago
- Views:
Transcription
1 A Joint MAC and Physical Layer Analytical Model for IEEE 80211a Networks Operating under RTS/CTS Access Schee Roger Pierre Fabris Hoefel Departent of Telecounications Engineering - University La Salle Canoas - RS - Brazil roger@lasalletchebr Abstract It is proposed an analytical cross-layer saturation goodput odel for the IEEE 80211a physical (PHY) and ediu access control (MAC) layers It is assued an ad hoc network operating under the distributed coordination function (DCF) using the request-to-send/clear-to-send (RTS/CTS) operational ode The proposed analytical expressions, which are validated by siulation, allow assessing the effects on the syste perforance of channel load, contention window resolution algorith, distinct odulation schees, forward error corrector (FEC) coding schees, receivers structures and channel odels Resuo Neste artigo é proposto u odelo teórico que perite analisar de aneira integrada o desepenho das caadas de enlace e física de redes locais se fio IEEE 80211a As expressões analíticas propostas perite verificar os efeitos no desepenho do sistea da carga no canal, do algorito de resolução da janela de contenção, de esqueas de odulação, integrados co códigos corretores de erro, das estruturas do receptor e de odelos de canal 1 Introduction In [BIANCHI 2000], it is carried out a theoretical analysis of the IEEE DCF MAC protocol in the assuption of ideal channel conditions In [QIAO 2002], considering a network loaded with two stations (STAs) that generate deterinistic traffic, it is developed an analytical odel to jointly evaluate the perforance of IEEE 80211a MAC and PHY layer protocols In [HOEFEL 2004], we developed a theoretical cross-layer odel for MAC and PHY layer protocols for networks based on the IEEE faily of specifications The analytical expressions derived allow estiate the effects of distinct odulation schees, channel odels and an adaptive link level schee on the syste perforance However, in [HOEFEL 2004] the MAC contention window (CW) resolution was not ipleented (ie the packets are dropped after the first non-successful transission attepted) in order that the siulated offered traffic follows strictly the Poisson statistics, as analytically postulated In this contribution, we use the ethodology proposed by Bianchi in [BIANCHI 2000] in order to develop a theoretical cross-layer goodput analysis for IEEE 80211a networks The proposed odel takes into account the effects of backoff schee and non-ideal channel
2 conditions (ie MAC and PHY layer issues) Siulation results, obtained using a joint C ++ IEEE syste level and link level siulator, are used in order to validate the proposed theoretical odel This paper is divided as follows Section 2 presents a brief description of the IEEE DCF ediu MAC protocol The developent of analytical expressions for the net saturation throughput (or goodput) is done at Section 3 Section 4 presents a coparison between nuerical and siulation results, while the final rearks are drawn in Section 5 2 The IEEE DCF RTS/CTS access schee The DCF ipleents the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol [IEEE ], ie a andatory rando access protocol where physical and virtual carrier sensing functions indicates if the channel is busy or idle The virtual carrier sensing is ipleented using the network allocation vector (NAV) This tier, which is updated by a control field transitted in data and control fraes, sets the aount of tie the channel is reserved to provide uninterrupted atoic transissions The DCF can be used on Infrastructure Base Service Set (IBSS) networks, where access points (APs) and wired backbones are ipleented, and on Independent BSS (or ad hoc) networks, where counication is done at peer-to-peer basis The DCF has the following distributed access polices [IEEE ]: (1) basic positive acknowledgent (ACK); (2) RTS/CTS clearing technique In this paper, we only analyze the second one due to space constraints Fig 1 shows the clearing technique used at atoic RTS/CTS operational ode The station 1 (STA1) only accesses the channel after ipleenting the physical carriersensing and virtual carrier-sensing functions If the channel is idle, then the transission of a RTS control frae can begin iediately, as long as the channel reains idle for a tie longer than the DCF interfrae spacing (DIFS) If the channel is busy, the STA1 ust backoff its transission until the channel becoes idle for the DIFS period After this DIFS period: (1) it starts to treat the channel in units of tie slot; (2) it ipleents a binary exponential backoff period (EBP) to deterine the access tie in tie slots; (3) it keeps checking the channel to verify if it is busy or idle The STA1 decreents the EBP while the channel is idle If the channel is busy, the decreent of backoff interval stops and it only resues after the channel is detected idle for a DIFS period If the channel reains idle when the EBP becoes zero, then the STA1 transits a RTS control frae If the RTS frae transission is successful, the peer station (STA2) sends a CTS control frae to confir the reservation After that, it is transitted a MAC protocol data unit (MPDU) unicast frae If the MPDU transission is successful, then the peer station ust transit an ACK control frae after a short interfrae spacing (SIFS) period The sender STA ust use the extended interfrae spacing (EIFS) to set the tie for new physical channel sensing if either data or control fraes are corrupted or due to the tieout of tier that controls the axiu expected delay It is again used a binary EBP to set the tie slot, but now the CW is doubled at each unsuccessful transission The CW is reset after a successful transission The data frae is dropped after a given nuber of transission attepts 3 Analytical results for the net saturation throughput Fig 2 shows a discrete bi-diensional Markov chain (s(t),b(t)) for the backoff window size assuing the RTS/CTS schee with positive ACK of data, where s(t) is the
3 stochastic process of the backoff stage (0,,) of the STA at tie t and b(t) is the rando process that odels the backoff tie counter for a given STA This odel assues that each packet collides with a constant and independent conditional collision probability p It is also assued a fixed nuber of n STAs operating in saturation conditions, ie each STA has a packet to transit after the copletion of each successful transission Figure 1 The clearing technique used at atoic RTS/CTS schee (1- S rts S cts S p S ack /W , 0 0, 1 0, W , 0 1, 1 { p+(1- [ (1-S rts )+S rts (1-S cts )+ S rts S cts (1-S p ) + S rts S cts S p (1-S ack ) ] }/ W 1 ' 1 1, W 1-1 { p+(1- [ (1-S rts )+S rts (1-S cts )+ S rts S cts (1-S p ) + S rts S cts S p (1-S ack ) ] }/ W 1 1, 0, 1, W -1 { p+(1- [ (1-S rts )+S rts (1-S cts )+ S rts S cts (1-S p ) + S rts S cts S p (1-S ack ) ] }/ W Figure 2 Bi-diensional Markov chain (s(t),b(t)) odel for the backoff window size and a non-ideal channel 31 Packet Transission Probability Using the short notation P{i 1,k 1 /i 0,k o }=P{s(t+1)=i 1,b(t+1)=k 1 s(t)=i o,b(t)=k o }, equations (1) to (4) odel the null one-step transition probabilities of the Markov chain depicted at Fig 2 { i k i, k + 1} = 1 for k ( 0,W 2) and i ( 0,) { 0, k i,0} = ( 1 SrtsSctsSpSack / W0 for k ( 0,W 1) and i ( 0,) P, i (1) P 0 (2)
4 {, k i 1,0 } = { p + (1 [ P i (1 Srts) + Srts(1 Scts) + SrtsScts(1 S + SrtsSctsSp(1 Sack) ]} / Wi k (0,W i -1) and i (1,) (3) {,,0} = { p + (1 [ P k (1 Srts ) + Srts(1 Scts) + SrtsScts(1 S + SrtsSctsSp(1 Sack ) ]} / W k (0,W -1) (4) The window size at backoff stage i is labeled as W i = 2 i W, where i (0,) is the backoff stage and W is the MAC CW size paraeter CW in The axiu window size is denoted as W =2 W 1=CW ax - 1 Eq (1) odels the decreasing of the backoff tier at the beginning at each slot tie of size σ Eq (2) takes into account that a new physical layer convergence procedure (PCLP) protocol data unit (PPDU) starts at backoff stage 0 and that the backoff is uniforly distributed into the range (0, W 0-1) after a successful PPDU transission S cts, S rts and S ack denote, respectively, the probability that the RTS, CTS and ACK control fraes be transitted with success S p denotes the probability that the transission of a MPDU (ie a MAC PDU) is successful Eq (3) odels the fact that a new backoff value is uniforly chosen in the range (0,W i ) after an unsuccessful transission at the backoff stage i-1 The capture effect is neglected in such way that the lost of fraes due to collisions is independent of the lost of fraes due to noise and interference Eq (4) odels the fact that the backoff is not increased in subsequent frae transissions once the backoff stage has reached the value The closed-for solution for the stationary distribution for this Markov chain can be obtained as follows For 0 < i <, we have that (1- Srts ) + Srts(1- Scts) + SrtsScts(1- S + b i-1,0 p + ( 1 = bi,0, (5a) SrtsSctsSp(1- Sack ) { p + 1 [ 1- S S S S ]} b, b i-1,0 ( rts cts p ack = i,0 (5b) i [ 1 + S S S S ( p )] b bi,0 rts cts p ack 1 0,0 = (5c) We also have that (1-S ) + S (1-S ) + S S (1-S ) +, (6a) SrtsSctsSp(1-Sack) rts rts cts rts cts p [ b 1,0 + b,0] p+ ( 1 = b, 0 [ b 1,0 + b,0] { p+ ( 1 [ 1 SrtsSctsSpSack } = b, 0, (6b)
5 [ 1+ S S S S ( p 1) ] rts cts p ack b,0 = b0,0, (6c) ( 1 Scts Srts Sp Sack where it is used (5c) in (6b) for =i Due to the Markov chain regularities, for each k (0,W -1), we have that [ p + (1- ( 1- S S S S ) ]( b + b ) ( 1 Srts Scts Sp Sack b j,0 j= 0 W k b = i i,k bi-1,0 [ p + (1- rts rts p ack Wi ( 1- S S S S ) ] rts rts p ack -1,0 Using (5b) and (6b), then (7) can be rewritten as Wi k bi, k bi,0 Wi,0 for i = 0 for 0 < i < (7) for i = =, (8) since (see 5c and 6c) 1 [ 1 + Srts Scts Sp Sack ( p 1) ] bi,0 = i= 0 i= 0 b0,0 = Srts Scts SpSack ( 1 i b0,0 + b,0 (9) We can ipose the following noralization condition: Wi 1 = i= 0 k= 0 i= 0 bi,k = bi,0 = Wi 1 W + i i k Wi 1 2 W + 1 bi,0 = bi,0 k= 0 Wi i= 0 2 i= (10) Using (5c), (6c) and (9), then (10) can be siplified to [ 1+ S S S S ( p 1) ] 1 i i 2 rts cts p ack + b0,0 i= 0 1 1= W + (11) 2 [ + S S S S ( p )] Srts Scts Sp Sack( 1 rts cts p ack ( ) 1 p Srts Scts Sp Sack b0,0= 1+ 2 W Using S=S rts S cts S p S ack, we can show that 21 ( S [ 1+ 2 S ( p 1) ] [ 1+ ( 1+ S] + ( 1 + S 2+ W+ 2 W [ 1+ ( 1+ S] { } Notice that for an ideal channel (ie S rts =S cts = S p = S ack =1), Eq (12) resues to b0,0 2 ( 1 2 (1 ( 1 2 ( W + 1) + pw 1 ( 2 [ ] (12) =, (13) which is in agreeent with Eq (6) of [BIANCHI 2000]
6 Any transission occurs when the backoff tier counter is equal to zero, then the probability that a STA transits in a randoly chosen slot tie is (see 9) b0,0 b0,0 τ = bi,0 = = (14) i= 0 S ( 1 Srts Scts Sp Sack ( 1 When there is no exponential backoff, then using (13) with =0, we have that 2 τ =, (15) W + 1 in according with Eq (8) of [BIANCHI 2000] Each STA transits with probability τ Therefore, the probability that a transitted PPDU encounters a collision in a given slot tie can be stated as n 1 p = 1 (1 τ ), (16) The nonlinear syste represented by (14) and (16) can be solved using nuerical techniques 32 Goodput The net throughput in bits per second (bps) can be stated as the probability that a MAC payload with N pl octets be transitted with success in the average cycle tie T, ie N pl Ps Ptr Srts Scts Sp Sack Gbps = 8 (17) T The probability that there is no collision on the channel conditioned to the fact that at least one STA transits is given by n n 1 τ ( 1 τ ) 1 n 1 n 1 n τ ( 1 τ ) n τ ( 1 τ ) Ps = = =, (18) P n tr Ptr 1 (1 τ ) where P tr is the probability that there is at least one transission in the considered slot tie Notice that it is assued in (17) and (19) that the lost of fraes due to collisions is independent of the lost of fraes due to noise The average cycle tie is given by T = Bs + B f1 + B f 2 + B f 3 + B f 4 + B f 5 + I, (19) The average busy tie when the transission is successful is given by: [ Bs = Ps Ptr Srts Scts Sp Sack DIFS + Trts ( prts ) + a + SIFS +, (20) Tcts ( pcts ) + a + SIFS + Tp ( pp ) + a + SIFS + Tack ( pack ) + a] where a is the propagation delay T rts (p rts ), T cts (p cts ) and T ack (p ack ) denote the tie necessary to transit the RTS, CTS and ACK control fraes when it is used the PHY ode p rts, p cts and p ack, respectively T p (p p ) is the tie necessary to transit a MPDU payload when it is used the PHY ode p
7 B odels the average aount of tie in which the channel is busy due to f 1, collisions at the transission of RTS control fraes, whereas B f 2, B f 3, B f 4 and odel the average tie that the channel is busy with unsuccessful transissions, B f 5 due to noise and interference, of RTS, CTS, data and ACK fraes, respectively ( 1 P ) [ EIFS + T ( p a] B f 1 = Ptr s rts rts ) + (21) ( 1 S ) [ EIFS + T ( p a] B f 2 = Ptr Ps rts rts rts ) + (22) ( 1 S )[ EIFS + T ( p ) + a + SIFS + T ( p ) ] B f 3 Ptr Ps Srts cts rts rts cts cts + a = (23) ( 1 S ) [ B f 4 = Ptr Ps S rts Scts p EIFS + Trts ( prts ) + a + SIFS + Tcts ( pcts ) + a + SIFS + Tp ( pp ) + a] B f 5 = Ptr Ps Srts Sp SIFS + Tack ( pack ) + a] ( 1 S )[ ack EIFS + Trts ( prts ) + a + SIFS + Trcs ( pcts ) + a + SIFS + Tp ( pp ) + a + where a is the propagation delay, T p is the tie necessary to transit a MAC PDU, DIFS is the DCF interfrae spacing (IFS), SIFS is the short IFS and EIFS is the extended IFS The average tie that a slot tie is idle is given by ( P ) (24) (25) I = 1 tr σ (26) For an ideal channel (ie S rts =S cts = S p = S ack =1), (17) resues 8 N pl Ps Ptr G =, (27) Bs + Bf1 + I in according with (13) of [BIANCHI 2000] 33 Frae Success Probability for 80211a The IEEE 80211a is based on Orthogonal Frequency Division Modulation (OFDM) using a total of 52 subcarriers, of which 48 subcarriers carry actual data and four subcarriers are pilots used to facilitate coherent detection [IEEE 80211a 1999] The OFDM sybol interval, tsybol, is set to 4µs Therefore, the channel sybol rate R s is of 12 Msybols/sec Tab 1 shows the OFDM PHY characteristics, where BpS eans Bytes per Sybol For instance, the PHY ode 1 carries 3 bytes per sybol, ie 6 Mbps* tsybol/80=3 BpS The convolutional encoders use the industry-standard generator polynoials, g 0 =(133) 8 and g 1 =(171) 8, of rate r=1/2 and constraint length K=7 [IEEE 80211a 1999] The transfer function, using the data tabulated in [CONAN 1984], is given by (28)
8 Tab 1 The IEEE 80211a PHY odes Mode Modulation Code Rate R c Data Rate BpS 1 BPSK 1/2 6 Mbps 3 2 BPSK 3/4 9 Mbps 45 3 QPSK 1/2 12 Mbps 6 4 QPSK 3/4 18 Mbps QAM 1/2 24 Mbps QAM 3/4 36 Mbps QAM 2/3 48 Mbps QAM 3/4 54 Mbps T1/ 2( D) = 11D + 38 D + 193D D (28) D D D + The higher code rates of 2/3 and 3/4 are obtained by puncturing the original rate- 1/2 code [IEEE 80211a 1999] The transfer function, using the data tabulated in [Haccoun 1999], for the code rate 2/3 is given by (29), whereas the transfer function for the code rate 3/4 is given by (30) T2/3( D) = D + 16 D + 48 D D D D D D + (29) T3/4 ( D) = 8D + 31D + 160D + 892D D + (30) D D D + Fig 3 shows the PLCP Protocol Data Unit (PPDU) of the IEEE 80211a: (1) the PLCP preable duration, tpclppreable, is equal to 12 µs; (2) the PCLP field duration, tpclp_sig, is equal to 4 µs Both MPDU fraes and RTS, CTS and ACK control fraes are encapsulated in the PPDU as shown at Fig 3 Figure 3 PPDU frae forat of the IEEE 80211a [IEEE 1999b] The RTS and CTS control fraes ust be transitted at one of the rates of the basic service set (BSS) so that they can be decoded by all the STSs in the sae network The andatory BSS basic rate set is {6 Mbps, 12 Mbps, 24 Mbps} The ACK control frae ust be transitted using the BSS basic rate that is less than or equal to the rate of the data frae it is acknowledging As shown at Fig 3, that the SERVICE field has 16 bits and that 6 tail bits are used to flush the convolutional code to the zero state Therefore, the duration of RTS and CTS fraes are given by (31) and (32), respectively The RTS and CTS have l rts= 20 bytes and l cts =14 bytes, respectively [IEEE 80211a 1999]
9 Trts( rts) = tpclppreable+ tpclp_ SIG + ( 16 6) / lrts + + BpS( prts) ( 16 6) 8 tsybol Tcts( cts) = tpclppreable+ tpclp_ SIG + lcts + + /8 tsybol BpS( pcts) The transission period to transit a MPDU with a payload of l octets over the IEEE 80211a using the PHY ode is given by (33) The MPDU header and the cyclic redundant checking (CRC) fields have together a length of 34 bytes [IEEE , pp 52] The ACK transission tie, whose length is of l ack =14 bytes [IEEE , pp 64], is given by (34) assuing the PHY ode ack Tp( ) = tpclppreable+ tpclp_ SIG + ( 16 6) l BpS( p ( 16 6) /8 tsybol Tack ( ack ) = tpclppreable+ tpclp_ SIG + lack + + /8 tsybol BpS( pack ) Assuing that the convolutional forward error correcting code (FEC) is decoded using hard-decision Viterbi decoding, then (35) and (36) odel the probability of incorrectly selecting a path when the Haing distance d is even and odd, repesctivly The used notation ephasizes the dependence of P d with the received signal-tointerference-plus-noise (SINR) per bit γ b, and the PHY ode p [QIAO 2002] The bit error rate (BER) for the PHY ode odulation schee is denoted by ρ (31) (32) (33) (34) 1 d d d/2 d 2 d k d k Pd ( γ b, ) = (1 ) + (1 ) (35) 2 d 2 k= d 2+ 1 k Pd d d k= ( d+ 1) 2 k k d k ( b, ) = (1 ) γ (36) Considering the IEEE 80211a generator polynoials, g 0 =(133) 8 and g 1 =(171) 8, of rate r=1/2 and constrain length K=7 [IEEE , pp16] and using (28), then the union bound on the probability of decoding error is given by (37) Correspondingly, using (29) and (30), then the union bound on the probability of decoding error for the code rates 2/3 and 3/4 are given by (38) and (39), respectively Pe ( γ b, ) < 11 P10( γ b, ) + 38 P12( γ b, ) P14 ( γ b, ) + (37) Pe ( γ b, ) < P6 ( γ b, ) + 16 P7 ( γ b, ) + 48 P8 ( γ b, ) + (38) Pe ( γ b, ) < 8P5 ( γ b, ) + 31P6 ( γ b, ) P7 ( γ b, ) + (39)
10 Postulating that the errors inside of the decoder are interdependent, then Pursley and Taipale have shown that the upper bound for a successful transission of a frae with l octets is given by [PURSLEY 1987] 8 [ 1 P ( γ, )] l S( l, γ b, ) < e b (40) 34 Bit Error Rate (BER) for Uncorrelated Fading Channel It is assued a Rayleigh fading teporally independent at sybol level and independent across of the OFDM carriers Using the uncorrelated channel assuption and considering that the PCLP header with 24 bits is always transitted using PHY ode 1 (see Fig 3) Then, the successful MPDU transission is given by Sp( l, γ b, ) = S(24/8, γ b,1) S(34 + (16 + 6)/8 + N pl, γ b, ), (41) where the MPDU header and the CRC fields have together a length of 34 bytes, the SERVICE field has 16 bits and 6 bits are used to set the convolutional coder to the zero state Correspondingly, the RTS, CTS and ACK control fraes success probabilities are given by (42), (43) and (44), respectively Srts ( l, γ b, ρrts ) = S(24/8, γ b,1) S(20 + (16 + 6) /8, γ b, ρrts ) (42) Scts ( l, γ b, ρcts) = S(24/8, γ b,1) S(14+ (16+ 6)/8, γ b, ρcts) (43) Sack ( l, γ b, ρack) = S(24/8, γ b,1) S(14+ (16+ 6)/8, γ b, ρ ack) (44) Considering a axiu ratio cobining (MRC) receiver atched with the channel diversity and that the sae average power Ω is received at each diversity branch, then the probability distribution function (pdf) of the SINR per bit at the receiver is of gaa kind [HOEFEL 1999], ie L 1 1 p( γ b ) = b b > L Γ( ) γ b γ b L 1 γ b ( γ ) exp if γ 0, (45) where Γ is the gaa function, γ b is the average SINR per bit at the receiver output and L is the nuber of diversity branches The average BER for BPSK and QPSK signaling is given [PROAKIS 2001] Pe = ρ = Q 0 ( Rcγ b ) p( γ b ) dγ b 2, (46) where Q(x) is the copleentary Gaussian cuulative distribution function and R c is the code rate The average BER for M-QAM signaling is given by [Yang 2000]
11 M 1 2log2M Rc γ b Pe = ρ = erfc p M log2 M 2( M 1) 0 M 2 3log2M R erfc c γ b + p b M log2 M 2( M 1) 0 where erfc(z) is the copleentary error function ( γ ) b ( γ ) dγ, b dγ b (47) 4 Model Validation The C ++ IEEE 80211a MAC and PHY layer siulator (ie an integrated syste level and link level siulator) ipleented in this paper has the following ain characteristics: It is assued an ad-hoc network, as such as the DCF MAC protocol is used It is ipleented the MAC state achine that fulfills the RTS/CTS clearing technique (Fig 1) specified at the IEEE anageent inforation base (MIB) The OFDM PHY layer is ipleented assuing perfect synchronis The physical layer signal processing algoriths ipleents the axiu-likelihood hard decision detection for the PHY ode 1 to PHY 8 The convolutional hard-decision decoding is constructed using a sei-analytic approach as follows The average BER is estiated at a frae basis using on-line statistics collected at the deodulator output Then the average BER is used in (40) to estiate the probability of the successful MPDU transission The used odular software design perits that the Viterbi convolutional decoding can be ipleented as a plug-in function This ethodology, besides speeding-up the coputational tie, offers powerful insights on the syste perforance as well as on the fundaental issue of software validation It is assued the following paraeters: slot tie σ=9µs, SIFS=16 µs, DIFS=EIFS=34 µs, CW in =16, CW ax =1023, =6, a=1µs, N pl =1023 octets Fig 4 shows a good agreeent between nuerical and siulation results when the syste is lightly (10 STAs) and heavily (30 STAs) loaded Here, it is assued that all STAs are transitting using the PHY ode 1 Fig 4 also shows the goodput does not change significantly when the nuber of STAs is increased fro 10 to 30 This occurs because the increase of collisions, besides to be restricted to the short lenght RTS control fraes, is counterbalanced by the diinishing of the average idle tie (see 26) when the channel load is increased Fig 5 shows again a good agreeent between nuerical and siulation results for the BSS PHY odes It is noticed, as theoretically expected, that the net effect of increasing the nuber of received antennas on the syste perforance follows the law of decreasing gains Fig 6a copares the goodput as a function of the SINR per bit for a syste without spatial diversity Fig 6a perit to drawn soe interesting rearks on the effects of SINR per bit on the syste perforance First, we can verify that the PHY ode 3 (QPSK with R c =1/2) allows a superior perforance in relation to that one obtained with the PHY ode 1 (BPSK with R c =1/2) since the QPSK signalling has a better spectral efficiency when it is ipleented coherent deodulation Notice that this also explains the better perforance of PHY ode 4 (QPSK with R c =3/4) in relation to the PHY ode
12 2 (BPSK with R c =3/4) signalling schee Second, PHY ode 5 (16QAM with R c =1/2) has a better perforance than the PHY ode 2 (BPSK with R c =3/4) and PHY ode 4 (QPSK with R c =3/4) This interesting characteristic occurs due to the high coding gain allowed in environents where the Rayleigh ultipath fading is teporally independent at sybol level (see 45, 46 and 47), as postulated in this contribution Third, PHY ode 7 (64QAM with R c =2/3) has a better perforance in relation to the PHY ode 6 (16QAM with R c =3/4) since the higher coding gain overwhel (in the assued channel odel) the greater noise iunity of 16QAM in relation to the 64QAM signalling schee Finally, Fig 6b shows that when the net effect of the fading is less severe due to spatial diversity, then we can deterine (differently of observed at Fig 6a) a range of γ b where the perforance of PHY ode 4 is superior in relation to the perforance obtained with the PHY ode 5 and a region where the perforance of PHY ode 6 superior in relation to the perforance observed with the PHY ode 7 5M Saturation Goodput in bps 4M 3M 2M 1M 0 Flat Rayleigh Channel RTS+CTS+Data+ACK schee PHY Mode 1 (BPSK, 6 Mbps) 10 STAs 30 STAs L=1 L=2 L=3 L=1 L= Average γ per Antenna in db b Figure 4 Analytical (straight lines) and siulation (arks) results for the saturation goodput in bps for the PHY ode 1 as a function of SINR per bit Results paraeterized by the nuber of STAs and received antennas 160M Saturation Goodput in bps 140M 120M 100M 80M 60M 40M 20M 00 Flat Rayleigh Channel RTS+CTS+Data+ACK schee 10 STAs PHY Mode 1 (BPSK, 6 Mbps) L=1 L=2 L=3 PHY Mode 3 (QPSK, 12 Mbps) L=1 L=2 L=3 PHY Mode 5 (16QAM, 24 Mbps) L=1 L=2 L= γ per Antenna in db b Figure 5 Analytical (straight lines) and siulation (arks) results for the saturation goodput in bps of the andatory BSS rate as a function of SINR per bit and the nuber of received antennas
13 Saturation Goodput in bps 240M 220M 200M 180M 160M 140M 120M 100M 80M 60M 40M 20M 00 Flat Rayleigh Channel RTS+CTS+Data+ACK schee 10 STAs; L=1 (no spatial diversity) PHY 1 PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY 8-20M Average γ b per Antenna in db Figure 6a No spatial diversity (L=1) Saturation Goodput in bps 240M 220M 200M 180M 160M 140M 120M 100M 80M 60M 40M 20M 00 PHY 1 PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY 8 Flat Rayleigh Channel RTS+CTS+Data+ACK schee 10 STAs; L=3-20M Average γ b per Antenna in db Figure 6b Spatial diversity with 3 receiving antennas (L=3) Figure 6 Coparison between analytical (straight lines) and siulation (arks) results for the saturation goodput in bps for all IEEE 80211a PHY odes as a function of SINR per bit 5 FINAL REMARKS In this contribution we have derived and validated a joint MAC and PHY crosslayer goodput saturation odel that can be confidentially used to assess the perforance of IEEE 80211a ad hoc networks operating under the RTS/CTS operational ode We have assued a flat fading Rayleigh channel that is uncorrelated at sybol level and independent across of the OFDM carriers In a future work we are going to present the perforance of IEEE 80211a networks
14 with adaptive link techniques for teporally correlated Nakagai- fading channel in environents with spatial diversity [HOEFEL 2005] Based on the interesting rearks of anonyous reviewers, we are developing an analytical data link and physical layer odel in order to asses the syste perforance with a liited nuber of retransissions [CHATZMISIOS 2003] for saturated and un-saturated traffic conditions [WU 2002] 6 REFERENCES Bianchi, G (2000) Perforance Analysis of the IEEE Distributed coordination function, In: IEEE Journal on Selected Areas of Counication, v18, no 3, pp , March 2000 Chatziisios, P et al IEEE packet delay: a finite retry analysis, In: GLOBECOM, pp , 2003 Conan, J (1984) The weight spectra of soe short low-rate convolutional codes, In: IEEE Trans Counications, vol 32, pp , Sept 1984 Haccoun, D and Bégin, G (1989) High-rate punctured convolutional codes for Viterbi and Sequential decoding, In: In: IEEE Trans Counications, vol 37, n 11, p , Nov 1989 IEEE (1999) Wireless LAN Mediu Access Control (MAC) and Physical Layer (PHY) Specifications, Standard, IEEE, Aug 1999 IEEE 80211a (1999) Part 11: Wireless LAN Mediu Access Control (MAC) and Physical Layer (PHY) Specification Aendent 1: High-speed Physical Layer in the 5 GHz band, suppleented to IEEE standard, Sept 1999 Hoefel, R P F and de Aleida, C (1999) The perforance of CDMA/PRMA for Nakagai- frequency selective fading channel, In: Electronics Letters, vol 35, no 1, 1999, pp Hoefel, R P F and de Aleida, C (2004) Perforance of IEEE based networks with link level adaptation techniques, In: Proceedings of IEEE VTC Fall, 2004 Hoefel, R P F (2005) Cross-Layer Goodput Saturation Traffic Analysis of IEEE 80211a Networks with Link Level Techniques, In: subitted to IEEE VTC Fall, 2005 Proakis, J G (2001) Digital Counications, New York, 2001 Puersley, M B and Taipale, D J (1987) Error Probabilities for Spread-Spectru Packet Radio with Convolutional Codes and Viterbi Decoding, In: IEEE Trans Counications, vol 35, n 1, p 1-12, Jan 1987 Qiao, S D, Choi S and Shin, K G (2002) Goodput Analyzes and Link Adaptation for the IEEE 80211a Wireless LANs, In: IEEE Trans Mobile Cop, pp , 2002 Yang, L and Hanzo, L (2000) A recursive algorith for the error probability evaluation of M-QAM, In: IEEE Co Letters, vol 4, pp , Oct 2000 Wu, H-T et al (2002) Perforance of reliable transport protocol over IEEE wireless LANs: analysis and perforance, In: INFOCOM, pp , June 2002
A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE a Networks Operating Under Basic Access and RTS/CTS DCF Schemes
JOURNAL OF COMMUNICATIONS, VOL, NO 6, SEPTEMBER 2006 A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE 802a Networks Operating Under Basic Access and RTS/CTS DCF Schees Roger
More informationA MAC and Physical Layer Theoretical Model for IEEE a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes
A MAC and Physical Layer Theoretical Model for IEEE 802.a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes Roger Pierre Faris Hoefel Department of Telecommunications Engineering
More informationImpact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ
More informationMathematical Analysis of IEEE Energy Efficiency
Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.
More informationPerformance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel
Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informationA Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair
Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving
More informationDetecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis
Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationNon-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT
ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,
More informationECS455: Chapter 5 OFDM
ECS455: Chapter 5 OFDM 5.4 Cyclic Prefix (CP) 1 Dr.Prapun Suksopong prapun.co/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Friday 14:00-16:00 Three steps towards odern OFDM 1. Mitigate Multipath
More informationBirthday Paradox Calculations and Approximation
Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays
More informationSecret-Key Sharing Based on Layered Broadcast Coding over Fading Channels
Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationOn the Design of MIMO-NOMA Downlink and Uplink Transmission
On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for
More informationAnalytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China
Analytical Model of Epideic Routing for Delay-Tolerant etwors Qingshan Wang School of Matheatics Hefei University of Technology Hefei, China qswang@hfut.edu.cn Zygunt J. Haas School of Electrical and Coputer
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationCommunications and Signal Processing Spring 2017 MSE Exam
Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing
More informationExact Distribution of Access Delay in IEEE DCF MAC
Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,
More informationPerformance Evaluation of Deadline Monotonic Policy over protocol
Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com
More informationConvolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder
Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with
More informationEnergy Efficient Predictive Resource Allocation for VoD and Real-time Services
Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted
More informationFinite-State Markov Modeling of Flat Fading Channels
International Telecounications Syposiu ITS, Natal, Brazil Finite-State Markov Modeling of Flat Fading Channels Cecilio Pientel, Tiago Falk and Luciano Lisbôa Counications Research Group - CODEC Departent
More informationAnalyzing Simulation Results
Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient
More informationGeneral Properties of Radiation Detectors Supplements
Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent
More informationExtension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels
Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique
More informationAdaptive Bit-Interleaved Coded OFDM over Time-Varying Channels
Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Jin Soo Choi, Chang Kyung Sung, Sung Hyun Moon, and Inkyu Lee School of Electrical Engineering Korea University Seoul, Korea Email:jinsoo@wireless.korea.ac.kr,
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne
More informationAn Improved Particle Filter with Applications in Ballistic Target Tracking
Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing
More informationMulti-Scale/Multi-Resolution: Wavelet Transform
Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the
More informationRateless Codes for MIMO Channels
Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT
More informationSEISMIC FRAGILITY ANALYSIS
9 th ASCE Specialty Conference on Probabilistic Mechanics and Structural Reliability PMC24 SEISMIC FRAGILITY ANALYSIS C. Kafali, Student M. ASCE Cornell University, Ithaca, NY 483 ck22@cornell.edu M. Grigoriu,
More informationDetection and Estimation Theory
ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer
More informationOptimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks
1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster
More informationReceived Signal, Interference and Noise
Optimum Combining Maximum ratio combining (MRC) maximizes the output signal-to-noise ratio (SNR) and is the optimal combining method in a maximum likelihood sense for channels where the additive impairment
More informationA remark on a success rate model for DPA and CPA
A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance
More informationOutline. Digital Communications. Lecture 12 Performance over Fading Channels and Diversity Techniques. Flat-Flat Fading. Intuition
Digital Counications Lecture 2 Perforance over Fading Channels and Diversity Techniques Pierluigi SALVO ROSSI Outline Noncoherent/Coherent Detection 2 Channel Estiation Departent of Industrial and Inforation
More informationDevice-to-Device Collaboration through Distributed Storage
Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern
More informationCOS 424: Interacting with Data. Written Exercises
COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well
More information2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all
Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationUfuk Demirci* and Feza Kerestecioglu**
1 INDIRECT ADAPTIVE CONTROL OF MISSILES Ufuk Deirci* and Feza Kerestecioglu** *Turkish Navy Guided Missile Test Station, Beykoz, Istanbul, TURKEY **Departent of Electrical and Electronics Engineering,
More informationAnalysis of Bit Error Rates for Multiple Access CSK and DCSK Communication Systems
7 I TRASACTIOS O CIRCUITS AD SYSTMS I: FUDAMTAL THORY AD APPLICATIOS, VOL. 5, O. 5, MAY The cases of H () (z) and H () (z) are trivial because we can tae =in Step 4), and write H () (z)= H () (z)= (z )
More informationFigure 1: Equivalent electric (RC) circuit of a neurons membrane
Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationUsing EM To Estimate A Probablity Density With A Mixture Of Gaussians
Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points
More informationSimulation of Discrete Event Systems
Siulation of Discrete Event Systes Unit 9 Queueing Models Fall Winter 207/208 Prof. Dr.-Ing. Dipl.-Wirt.-Ing. Sven Tackenberg Benedikt Andrew Latos M.Sc.RWTH Chair and Institute of Industrial Engineering
More informationIntroduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.
Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information
More informationANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER
IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel
More informationSymbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm
Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat
More informationThe Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks
The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The
More informationResearch Article Rapidly-Converging Series Representations of a Mutual-Information Integral
International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation
More informationIN modern society that various systems have become more
Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto
More informationUpper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels
ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster
More informationAdaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems
ACSTSK Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems Professor Sheng Chen Electronics and Computer Science University of Southampton Southampton SO7 BJ, UK E-mail: sqc@ecs.soton.ac.uk
More informationPhysically Based Modeling CS Notes Spring 1997 Particle Collision and Contact
Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which
More informationNonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy
Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo
More informationOn the Mixed Discretization of the Time Domain Magnetic Field Integral Equation
On the Mixed Discretization of the Tie Doain Magnetic Field Integral Equation H. A. Ülkü 1 I. Bogaert K. Cools 3 F. P. Andriulli 4 H. Bağ 1 Abstract Tie doain agnetic field integral equation (MFIE) is
More informationAdaptation to the Primary User CSI in Cognitive Radio Sensing and Access
Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,
More information2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,
2 IEEE. Personal use of this aterial is peritted. Perission fro IEEE ust be obtained for all other uses, in any current or future edia, including reprinting/republishing this aterial for advertising or
More informationModeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals
Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science
More informationEE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques
EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information
More informationCompression and Predictive Distributions for Large Alphabet i.i.d and Markov models
2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511
More informationELEMENTARY MARKOV QUEUEING SYSTEMS WITH UNRELIABLE SERVER
Nuber 4. Volue IV. Deceber 2009 EMENTARY MARKOV QUEUEING SYSTEMS WITH UNRIABLE SERVER Michal Dorda Suary:This paper presents soe exaples of eleentary Marov unreliable queueing systes and their atheatical
More informationHIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES
ICONIC 2007 St. Louis, O, USA June 27-29, 2007 HIGH RESOLUTION NEAR-FIELD ULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR ACHINES A. Randazzo,. A. Abou-Khousa 2,.Pastorino, and R. Zoughi
More informationOn the Validity of IEEE MAC Modeling Hypotheses
On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract
More informationPerformance Evaluation of Voice-Data Integrated Traffic in IEEE and IEEE e WLAN
Perforance Evaluation of Voice-Data Integrated Traffic in IEEE 8. IEEE 8.6e WLAN ANUPAM ROY MD. IMDADUL ISLAM AND M. R. AMIN 3 Departent of Coputer Science Engineering Departent Jahangirnagar University
More informationEstimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals
Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,
More informationApproximation in Stochastic Scheduling: The Power of LP-Based Priority Policies
Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing
More informationFast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials
Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter
More informationPartition-Based Distribution Matching
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co Partition-Based Distribution Matching Fehenberger, T.; Millar, D.S.; Koike-Akino, T.; Kojia, K.; Parsons, K. TR2018-023 January 2018 Abstract
More informationInspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information
Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub
More informationAlgebraic Approach for Performance Bound Calculus on Transportation Networks
Algebraic Approach for Perforance Bound Calculus on Transportation Networks (Road Network Calculus) Nadir Farhi, Habib Haj-Sale & Jean-Patrick Lebacque Université Paris-Est, IFSTTAR, GRETTIA, F-93166 Noisy-le-Grand,
More informationJ. Electrical Systems x-x (xxx): x-xx. Regular paper. Reflected Signal on a Nonuniform Overhead Transmission Line at High Frequency
A. Boudjeaa S. Tahi B. Bennaane T. B. Berbar B. Lehouidj J. Electrical Systes x-x (xxx): x-xx Regular paper Reflected Signal on a Nonunifor Overhead Transission Line at High Frequency The effect of the
More informationARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA
S1051-200406)00002-9/FLA AID:621 Vol ) [+odel] P1 1-7) YDSPR:3SC+ v 153 Prn:13/02/2006; 15:33 ydspr621 by:laurynas p 1 Digital Signal Processing ) wwwelsevierco/locate/dsp Neural network ipleentation of
More informationOn Conditions for Linearity of Optimal Estimation
On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at
More informationSystem Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity
Syste Perforance of Interference Alignent under TDD Mode with Liited Bachaul Capacity Matha Deghel, Mohaad Assaad and Mérouane Debbah Departent of Telecounications SUPELEC, Gif-sur-Yvette, France Matheatical
More informationSparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc
3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College
More informationPattern Recognition and Machine Learning. Artificial Neural networks
Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial
More informationAlgorithms for parallel processor scheduling with distinct due windows and unit-time jobs
BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationProc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES
Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co
More informationData-Driven Imaging in Anisotropic Media
18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands
More informationUplink Transmission Design with Massive Machine Type Devices in Tactile Internet
Uplink Transission Design wi Massive Machine Type Devices in Tactile Internet Changyang She and Chenyang Yang School of Electronics and Inforation Engineering, Beihang University, Beijing, China Eail:
More informationBit Error Probability of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagami-m Fading Channel
7th nternational Syposiu on age and and Analysis (SPA ) Septeer 4-6,, Durovnik, Croatia Bit Error Proaility of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagai- Fading Channel Vepati Srinivasa
More information1 Generalization bounds based on Rademacher complexity
COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges
More informationControlled Flooding Search with Delay Constraints
Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu
More informationFeature Extraction Techniques
Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that
More informationPerformance analysis of free-space optical communication systems over atmospheric turbulence channels H.E. Nistazakis 1 T.A. Tsiftsis 2 G.S.
Published in IET Counications Received on 8th pril 8 Revised on 8th Noveber 8 doi:.49/iet-co.8. ISSN 75-868 Perforance analysis of free-space optical counication systes over atospheric turbulence channels
More informationRandom Vibration Fatigue Analysis with LS-DYNA
1 th International LS-DYNA Users Conference Siulation() Rando Vibration Fatigue Analysis with LS-DYNA Arnaud Ringeval 1, Yun Huang 1 CIMES, France 36 rue Marc Lefrancq, Les Ateliers Nuériques, 593 Valenciennes,
More informationInternational Scientific and Technological Conference EXTREME ROBOTICS October 8-9, 2015, Saint-Petersburg, Russia
International Scientific and Technological Conference EXTREME ROBOTICS October 8-9, 215, Saint-Petersburg, Russia LEARNING MOBILE ROBOT BASED ON ADAPTIVE CONTROLLED MARKOV CHAINS V.Ya. Vilisov University
More information