A Joint MAC and Physical Layer Analytical Model for IEEE a Networks Operating under RTS/CTS Access Scheme

Size: px
Start display at page:

Download "A Joint MAC and Physical Layer Analytical Model for IEEE a Networks Operating under RTS/CTS Access Scheme"

Transcription

1 A Joint MAC and Physical Layer Analytical Model for IEEE 80211a Networks Operating under RTS/CTS Access Schee Roger Pierre Fabris Hoefel Departent of Telecounications Engineering - University La Salle Canoas - RS - Brazil roger@lasalletchebr Abstract It is proposed an analytical cross-layer saturation goodput odel for the IEEE 80211a physical (PHY) and ediu access control (MAC) layers It is assued an ad hoc network operating under the distributed coordination function (DCF) using the request-to-send/clear-to-send (RTS/CTS) operational ode The proposed analytical expressions, which are validated by siulation, allow assessing the effects on the syste perforance of channel load, contention window resolution algorith, distinct odulation schees, forward error corrector (FEC) coding schees, receivers structures and channel odels Resuo Neste artigo é proposto u odelo teórico que perite analisar de aneira integrada o desepenho das caadas de enlace e física de redes locais se fio IEEE 80211a As expressões analíticas propostas perite verificar os efeitos no desepenho do sistea da carga no canal, do algorito de resolução da janela de contenção, de esqueas de odulação, integrados co códigos corretores de erro, das estruturas do receptor e de odelos de canal 1 Introduction In [BIANCHI 2000], it is carried out a theoretical analysis of the IEEE DCF MAC protocol in the assuption of ideal channel conditions In [QIAO 2002], considering a network loaded with two stations (STAs) that generate deterinistic traffic, it is developed an analytical odel to jointly evaluate the perforance of IEEE 80211a MAC and PHY layer protocols In [HOEFEL 2004], we developed a theoretical cross-layer odel for MAC and PHY layer protocols for networks based on the IEEE faily of specifications The analytical expressions derived allow estiate the effects of distinct odulation schees, channel odels and an adaptive link level schee on the syste perforance However, in [HOEFEL 2004] the MAC contention window (CW) resolution was not ipleented (ie the packets are dropped after the first non-successful transission attepted) in order that the siulated offered traffic follows strictly the Poisson statistics, as analytically postulated In this contribution, we use the ethodology proposed by Bianchi in [BIANCHI 2000] in order to develop a theoretical cross-layer goodput analysis for IEEE 80211a networks The proposed odel takes into account the effects of backoff schee and non-ideal channel

2 conditions (ie MAC and PHY layer issues) Siulation results, obtained using a joint C ++ IEEE syste level and link level siulator, are used in order to validate the proposed theoretical odel This paper is divided as follows Section 2 presents a brief description of the IEEE DCF ediu MAC protocol The developent of analytical expressions for the net saturation throughput (or goodput) is done at Section 3 Section 4 presents a coparison between nuerical and siulation results, while the final rearks are drawn in Section 5 2 The IEEE DCF RTS/CTS access schee The DCF ipleents the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol [IEEE ], ie a andatory rando access protocol where physical and virtual carrier sensing functions indicates if the channel is busy or idle The virtual carrier sensing is ipleented using the network allocation vector (NAV) This tier, which is updated by a control field transitted in data and control fraes, sets the aount of tie the channel is reserved to provide uninterrupted atoic transissions The DCF can be used on Infrastructure Base Service Set (IBSS) networks, where access points (APs) and wired backbones are ipleented, and on Independent BSS (or ad hoc) networks, where counication is done at peer-to-peer basis The DCF has the following distributed access polices [IEEE ]: (1) basic positive acknowledgent (ACK); (2) RTS/CTS clearing technique In this paper, we only analyze the second one due to space constraints Fig 1 shows the clearing technique used at atoic RTS/CTS operational ode The station 1 (STA1) only accesses the channel after ipleenting the physical carriersensing and virtual carrier-sensing functions If the channel is idle, then the transission of a RTS control frae can begin iediately, as long as the channel reains idle for a tie longer than the DCF interfrae spacing (DIFS) If the channel is busy, the STA1 ust backoff its transission until the channel becoes idle for the DIFS period After this DIFS period: (1) it starts to treat the channel in units of tie slot; (2) it ipleents a binary exponential backoff period (EBP) to deterine the access tie in tie slots; (3) it keeps checking the channel to verify if it is busy or idle The STA1 decreents the EBP while the channel is idle If the channel is busy, the decreent of backoff interval stops and it only resues after the channel is detected idle for a DIFS period If the channel reains idle when the EBP becoes zero, then the STA1 transits a RTS control frae If the RTS frae transission is successful, the peer station (STA2) sends a CTS control frae to confir the reservation After that, it is transitted a MAC protocol data unit (MPDU) unicast frae If the MPDU transission is successful, then the peer station ust transit an ACK control frae after a short interfrae spacing (SIFS) period The sender STA ust use the extended interfrae spacing (EIFS) to set the tie for new physical channel sensing if either data or control fraes are corrupted or due to the tieout of tier that controls the axiu expected delay It is again used a binary EBP to set the tie slot, but now the CW is doubled at each unsuccessful transission The CW is reset after a successful transission The data frae is dropped after a given nuber of transission attepts 3 Analytical results for the net saturation throughput Fig 2 shows a discrete bi-diensional Markov chain (s(t),b(t)) for the backoff window size assuing the RTS/CTS schee with positive ACK of data, where s(t) is the

3 stochastic process of the backoff stage (0,,) of the STA at tie t and b(t) is the rando process that odels the backoff tie counter for a given STA This odel assues that each packet collides with a constant and independent conditional collision probability p It is also assued a fixed nuber of n STAs operating in saturation conditions, ie each STA has a packet to transit after the copletion of each successful transission Figure 1 The clearing technique used at atoic RTS/CTS schee (1- S rts S cts S p S ack /W , 0 0, 1 0, W , 0 1, 1 { p+(1- [ (1-S rts )+S rts (1-S cts )+ S rts S cts (1-S p ) + S rts S cts S p (1-S ack ) ] }/ W 1 ' 1 1, W 1-1 { p+(1- [ (1-S rts )+S rts (1-S cts )+ S rts S cts (1-S p ) + S rts S cts S p (1-S ack ) ] }/ W 1 1, 0, 1, W -1 { p+(1- [ (1-S rts )+S rts (1-S cts )+ S rts S cts (1-S p ) + S rts S cts S p (1-S ack ) ] }/ W Figure 2 Bi-diensional Markov chain (s(t),b(t)) odel for the backoff window size and a non-ideal channel 31 Packet Transission Probability Using the short notation P{i 1,k 1 /i 0,k o }=P{s(t+1)=i 1,b(t+1)=k 1 s(t)=i o,b(t)=k o }, equations (1) to (4) odel the null one-step transition probabilities of the Markov chain depicted at Fig 2 { i k i, k + 1} = 1 for k ( 0,W 2) and i ( 0,) { 0, k i,0} = ( 1 SrtsSctsSpSack / W0 for k ( 0,W 1) and i ( 0,) P, i (1) P 0 (2)

4 {, k i 1,0 } = { p + (1 [ P i (1 Srts) + Srts(1 Scts) + SrtsScts(1 S + SrtsSctsSp(1 Sack) ]} / Wi k (0,W i -1) and i (1,) (3) {,,0} = { p + (1 [ P k (1 Srts ) + Srts(1 Scts) + SrtsScts(1 S + SrtsSctsSp(1 Sack ) ]} / W k (0,W -1) (4) The window size at backoff stage i is labeled as W i = 2 i W, where i (0,) is the backoff stage and W is the MAC CW size paraeter CW in The axiu window size is denoted as W =2 W 1=CW ax - 1 Eq (1) odels the decreasing of the backoff tier at the beginning at each slot tie of size σ Eq (2) takes into account that a new physical layer convergence procedure (PCLP) protocol data unit (PPDU) starts at backoff stage 0 and that the backoff is uniforly distributed into the range (0, W 0-1) after a successful PPDU transission S cts, S rts and S ack denote, respectively, the probability that the RTS, CTS and ACK control fraes be transitted with success S p denotes the probability that the transission of a MPDU (ie a MAC PDU) is successful Eq (3) odels the fact that a new backoff value is uniforly chosen in the range (0,W i ) after an unsuccessful transission at the backoff stage i-1 The capture effect is neglected in such way that the lost of fraes due to collisions is independent of the lost of fraes due to noise and interference Eq (4) odels the fact that the backoff is not increased in subsequent frae transissions once the backoff stage has reached the value The closed-for solution for the stationary distribution for this Markov chain can be obtained as follows For 0 < i <, we have that (1- Srts ) + Srts(1- Scts) + SrtsScts(1- S + b i-1,0 p + ( 1 = bi,0, (5a) SrtsSctsSp(1- Sack ) { p + 1 [ 1- S S S S ]} b, b i-1,0 ( rts cts p ack = i,0 (5b) i [ 1 + S S S S ( p )] b bi,0 rts cts p ack 1 0,0 = (5c) We also have that (1-S ) + S (1-S ) + S S (1-S ) +, (6a) SrtsSctsSp(1-Sack) rts rts cts rts cts p [ b 1,0 + b,0] p+ ( 1 = b, 0 [ b 1,0 + b,0] { p+ ( 1 [ 1 SrtsSctsSpSack } = b, 0, (6b)

5 [ 1+ S S S S ( p 1) ] rts cts p ack b,0 = b0,0, (6c) ( 1 Scts Srts Sp Sack where it is used (5c) in (6b) for =i Due to the Markov chain regularities, for each k (0,W -1), we have that [ p + (1- ( 1- S S S S ) ]( b + b ) ( 1 Srts Scts Sp Sack b j,0 j= 0 W k b = i i,k bi-1,0 [ p + (1- rts rts p ack Wi ( 1- S S S S ) ] rts rts p ack -1,0 Using (5b) and (6b), then (7) can be rewritten as Wi k bi, k bi,0 Wi,0 for i = 0 for 0 < i < (7) for i = =, (8) since (see 5c and 6c) 1 [ 1 + Srts Scts Sp Sack ( p 1) ] bi,0 = i= 0 i= 0 b0,0 = Srts Scts SpSack ( 1 i b0,0 + b,0 (9) We can ipose the following noralization condition: Wi 1 = i= 0 k= 0 i= 0 bi,k = bi,0 = Wi 1 W + i i k Wi 1 2 W + 1 bi,0 = bi,0 k= 0 Wi i= 0 2 i= (10) Using (5c), (6c) and (9), then (10) can be siplified to [ 1+ S S S S ( p 1) ] 1 i i 2 rts cts p ack + b0,0 i= 0 1 1= W + (11) 2 [ + S S S S ( p )] Srts Scts Sp Sack( 1 rts cts p ack ( ) 1 p Srts Scts Sp Sack b0,0= 1+ 2 W Using S=S rts S cts S p S ack, we can show that 21 ( S [ 1+ 2 S ( p 1) ] [ 1+ ( 1+ S] + ( 1 + S 2+ W+ 2 W [ 1+ ( 1+ S] { } Notice that for an ideal channel (ie S rts =S cts = S p = S ack =1), Eq (12) resues to b0,0 2 ( 1 2 (1 ( 1 2 ( W + 1) + pw 1 ( 2 [ ] (12) =, (13) which is in agreeent with Eq (6) of [BIANCHI 2000]

6 Any transission occurs when the backoff tier counter is equal to zero, then the probability that a STA transits in a randoly chosen slot tie is (see 9) b0,0 b0,0 τ = bi,0 = = (14) i= 0 S ( 1 Srts Scts Sp Sack ( 1 When there is no exponential backoff, then using (13) with =0, we have that 2 τ =, (15) W + 1 in according with Eq (8) of [BIANCHI 2000] Each STA transits with probability τ Therefore, the probability that a transitted PPDU encounters a collision in a given slot tie can be stated as n 1 p = 1 (1 τ ), (16) The nonlinear syste represented by (14) and (16) can be solved using nuerical techniques 32 Goodput The net throughput in bits per second (bps) can be stated as the probability that a MAC payload with N pl octets be transitted with success in the average cycle tie T, ie N pl Ps Ptr Srts Scts Sp Sack Gbps = 8 (17) T The probability that there is no collision on the channel conditioned to the fact that at least one STA transits is given by n n 1 τ ( 1 τ ) 1 n 1 n 1 n τ ( 1 τ ) n τ ( 1 τ ) Ps = = =, (18) P n tr Ptr 1 (1 τ ) where P tr is the probability that there is at least one transission in the considered slot tie Notice that it is assued in (17) and (19) that the lost of fraes due to collisions is independent of the lost of fraes due to noise The average cycle tie is given by T = Bs + B f1 + B f 2 + B f 3 + B f 4 + B f 5 + I, (19) The average busy tie when the transission is successful is given by: [ Bs = Ps Ptr Srts Scts Sp Sack DIFS + Trts ( prts ) + a + SIFS +, (20) Tcts ( pcts ) + a + SIFS + Tp ( pp ) + a + SIFS + Tack ( pack ) + a] where a is the propagation delay T rts (p rts ), T cts (p cts ) and T ack (p ack ) denote the tie necessary to transit the RTS, CTS and ACK control fraes when it is used the PHY ode p rts, p cts and p ack, respectively T p (p p ) is the tie necessary to transit a MPDU payload when it is used the PHY ode p

7 B odels the average aount of tie in which the channel is busy due to f 1, collisions at the transission of RTS control fraes, whereas B f 2, B f 3, B f 4 and odel the average tie that the channel is busy with unsuccessful transissions, B f 5 due to noise and interference, of RTS, CTS, data and ACK fraes, respectively ( 1 P ) [ EIFS + T ( p a] B f 1 = Ptr s rts rts ) + (21) ( 1 S ) [ EIFS + T ( p a] B f 2 = Ptr Ps rts rts rts ) + (22) ( 1 S )[ EIFS + T ( p ) + a + SIFS + T ( p ) ] B f 3 Ptr Ps Srts cts rts rts cts cts + a = (23) ( 1 S ) [ B f 4 = Ptr Ps S rts Scts p EIFS + Trts ( prts ) + a + SIFS + Tcts ( pcts ) + a + SIFS + Tp ( pp ) + a] B f 5 = Ptr Ps Srts Sp SIFS + Tack ( pack ) + a] ( 1 S )[ ack EIFS + Trts ( prts ) + a + SIFS + Trcs ( pcts ) + a + SIFS + Tp ( pp ) + a + where a is the propagation delay, T p is the tie necessary to transit a MAC PDU, DIFS is the DCF interfrae spacing (IFS), SIFS is the short IFS and EIFS is the extended IFS The average tie that a slot tie is idle is given by ( P ) (24) (25) I = 1 tr σ (26) For an ideal channel (ie S rts =S cts = S p = S ack =1), (17) resues 8 N pl Ps Ptr G =, (27) Bs + Bf1 + I in according with (13) of [BIANCHI 2000] 33 Frae Success Probability for 80211a The IEEE 80211a is based on Orthogonal Frequency Division Modulation (OFDM) using a total of 52 subcarriers, of which 48 subcarriers carry actual data and four subcarriers are pilots used to facilitate coherent detection [IEEE 80211a 1999] The OFDM sybol interval, tsybol, is set to 4µs Therefore, the channel sybol rate R s is of 12 Msybols/sec Tab 1 shows the OFDM PHY characteristics, where BpS eans Bytes per Sybol For instance, the PHY ode 1 carries 3 bytes per sybol, ie 6 Mbps* tsybol/80=3 BpS The convolutional encoders use the industry-standard generator polynoials, g 0 =(133) 8 and g 1 =(171) 8, of rate r=1/2 and constraint length K=7 [IEEE 80211a 1999] The transfer function, using the data tabulated in [CONAN 1984], is given by (28)

8 Tab 1 The IEEE 80211a PHY odes Mode Modulation Code Rate R c Data Rate BpS 1 BPSK 1/2 6 Mbps 3 2 BPSK 3/4 9 Mbps 45 3 QPSK 1/2 12 Mbps 6 4 QPSK 3/4 18 Mbps QAM 1/2 24 Mbps QAM 3/4 36 Mbps QAM 2/3 48 Mbps QAM 3/4 54 Mbps T1/ 2( D) = 11D + 38 D + 193D D (28) D D D + The higher code rates of 2/3 and 3/4 are obtained by puncturing the original rate- 1/2 code [IEEE 80211a 1999] The transfer function, using the data tabulated in [Haccoun 1999], for the code rate 2/3 is given by (29), whereas the transfer function for the code rate 3/4 is given by (30) T2/3( D) = D + 16 D + 48 D D D D D D + (29) T3/4 ( D) = 8D + 31D + 160D + 892D D + (30) D D D + Fig 3 shows the PLCP Protocol Data Unit (PPDU) of the IEEE 80211a: (1) the PLCP preable duration, tpclppreable, is equal to 12 µs; (2) the PCLP field duration, tpclp_sig, is equal to 4 µs Both MPDU fraes and RTS, CTS and ACK control fraes are encapsulated in the PPDU as shown at Fig 3 Figure 3 PPDU frae forat of the IEEE 80211a [IEEE 1999b] The RTS and CTS control fraes ust be transitted at one of the rates of the basic service set (BSS) so that they can be decoded by all the STSs in the sae network The andatory BSS basic rate set is {6 Mbps, 12 Mbps, 24 Mbps} The ACK control frae ust be transitted using the BSS basic rate that is less than or equal to the rate of the data frae it is acknowledging As shown at Fig 3, that the SERVICE field has 16 bits and that 6 tail bits are used to flush the convolutional code to the zero state Therefore, the duration of RTS and CTS fraes are given by (31) and (32), respectively The RTS and CTS have l rts= 20 bytes and l cts =14 bytes, respectively [IEEE 80211a 1999]

9 Trts( rts) = tpclppreable+ tpclp_ SIG + ( 16 6) / lrts + + BpS( prts) ( 16 6) 8 tsybol Tcts( cts) = tpclppreable+ tpclp_ SIG + lcts + + /8 tsybol BpS( pcts) The transission period to transit a MPDU with a payload of l octets over the IEEE 80211a using the PHY ode is given by (33) The MPDU header and the cyclic redundant checking (CRC) fields have together a length of 34 bytes [IEEE , pp 52] The ACK transission tie, whose length is of l ack =14 bytes [IEEE , pp 64], is given by (34) assuing the PHY ode ack Tp( ) = tpclppreable+ tpclp_ SIG + ( 16 6) l BpS( p ( 16 6) /8 tsybol Tack ( ack ) = tpclppreable+ tpclp_ SIG + lack + + /8 tsybol BpS( pack ) Assuing that the convolutional forward error correcting code (FEC) is decoded using hard-decision Viterbi decoding, then (35) and (36) odel the probability of incorrectly selecting a path when the Haing distance d is even and odd, repesctivly The used notation ephasizes the dependence of P d with the received signal-tointerference-plus-noise (SINR) per bit γ b, and the PHY ode p [QIAO 2002] The bit error rate (BER) for the PHY ode odulation schee is denoted by ρ (31) (32) (33) (34) 1 d d d/2 d 2 d k d k Pd ( γ b, ) = (1 ) + (1 ) (35) 2 d 2 k= d 2+ 1 k Pd d d k= ( d+ 1) 2 k k d k ( b, ) = (1 ) γ (36) Considering the IEEE 80211a generator polynoials, g 0 =(133) 8 and g 1 =(171) 8, of rate r=1/2 and constrain length K=7 [IEEE , pp16] and using (28), then the union bound on the probability of decoding error is given by (37) Correspondingly, using (29) and (30), then the union bound on the probability of decoding error for the code rates 2/3 and 3/4 are given by (38) and (39), respectively Pe ( γ b, ) < 11 P10( γ b, ) + 38 P12( γ b, ) P14 ( γ b, ) + (37) Pe ( γ b, ) < P6 ( γ b, ) + 16 P7 ( γ b, ) + 48 P8 ( γ b, ) + (38) Pe ( γ b, ) < 8P5 ( γ b, ) + 31P6 ( γ b, ) P7 ( γ b, ) + (39)

10 Postulating that the errors inside of the decoder are interdependent, then Pursley and Taipale have shown that the upper bound for a successful transission of a frae with l octets is given by [PURSLEY 1987] 8 [ 1 P ( γ, )] l S( l, γ b, ) < e b (40) 34 Bit Error Rate (BER) for Uncorrelated Fading Channel It is assued a Rayleigh fading teporally independent at sybol level and independent across of the OFDM carriers Using the uncorrelated channel assuption and considering that the PCLP header with 24 bits is always transitted using PHY ode 1 (see Fig 3) Then, the successful MPDU transission is given by Sp( l, γ b, ) = S(24/8, γ b,1) S(34 + (16 + 6)/8 + N pl, γ b, ), (41) where the MPDU header and the CRC fields have together a length of 34 bytes, the SERVICE field has 16 bits and 6 bits are used to set the convolutional coder to the zero state Correspondingly, the RTS, CTS and ACK control fraes success probabilities are given by (42), (43) and (44), respectively Srts ( l, γ b, ρrts ) = S(24/8, γ b,1) S(20 + (16 + 6) /8, γ b, ρrts ) (42) Scts ( l, γ b, ρcts) = S(24/8, γ b,1) S(14+ (16+ 6)/8, γ b, ρcts) (43) Sack ( l, γ b, ρack) = S(24/8, γ b,1) S(14+ (16+ 6)/8, γ b, ρ ack) (44) Considering a axiu ratio cobining (MRC) receiver atched with the channel diversity and that the sae average power Ω is received at each diversity branch, then the probability distribution function (pdf) of the SINR per bit at the receiver is of gaa kind [HOEFEL 1999], ie L 1 1 p( γ b ) = b b > L Γ( ) γ b γ b L 1 γ b ( γ ) exp if γ 0, (45) where Γ is the gaa function, γ b is the average SINR per bit at the receiver output and L is the nuber of diversity branches The average BER for BPSK and QPSK signaling is given [PROAKIS 2001] Pe = ρ = Q 0 ( Rcγ b ) p( γ b ) dγ b 2, (46) where Q(x) is the copleentary Gaussian cuulative distribution function and R c is the code rate The average BER for M-QAM signaling is given by [Yang 2000]

11 M 1 2log2M Rc γ b Pe = ρ = erfc p M log2 M 2( M 1) 0 M 2 3log2M R erfc c γ b + p b M log2 M 2( M 1) 0 where erfc(z) is the copleentary error function ( γ ) b ( γ ) dγ, b dγ b (47) 4 Model Validation The C ++ IEEE 80211a MAC and PHY layer siulator (ie an integrated syste level and link level siulator) ipleented in this paper has the following ain characteristics: It is assued an ad-hoc network, as such as the DCF MAC protocol is used It is ipleented the MAC state achine that fulfills the RTS/CTS clearing technique (Fig 1) specified at the IEEE anageent inforation base (MIB) The OFDM PHY layer is ipleented assuing perfect synchronis The physical layer signal processing algoriths ipleents the axiu-likelihood hard decision detection for the PHY ode 1 to PHY 8 The convolutional hard-decision decoding is constructed using a sei-analytic approach as follows The average BER is estiated at a frae basis using on-line statistics collected at the deodulator output Then the average BER is used in (40) to estiate the probability of the successful MPDU transission The used odular software design perits that the Viterbi convolutional decoding can be ipleented as a plug-in function This ethodology, besides speeding-up the coputational tie, offers powerful insights on the syste perforance as well as on the fundaental issue of software validation It is assued the following paraeters: slot tie σ=9µs, SIFS=16 µs, DIFS=EIFS=34 µs, CW in =16, CW ax =1023, =6, a=1µs, N pl =1023 octets Fig 4 shows a good agreeent between nuerical and siulation results when the syste is lightly (10 STAs) and heavily (30 STAs) loaded Here, it is assued that all STAs are transitting using the PHY ode 1 Fig 4 also shows the goodput does not change significantly when the nuber of STAs is increased fro 10 to 30 This occurs because the increase of collisions, besides to be restricted to the short lenght RTS control fraes, is counterbalanced by the diinishing of the average idle tie (see 26) when the channel load is increased Fig 5 shows again a good agreeent between nuerical and siulation results for the BSS PHY odes It is noticed, as theoretically expected, that the net effect of increasing the nuber of received antennas on the syste perforance follows the law of decreasing gains Fig 6a copares the goodput as a function of the SINR per bit for a syste without spatial diversity Fig 6a perit to drawn soe interesting rearks on the effects of SINR per bit on the syste perforance First, we can verify that the PHY ode 3 (QPSK with R c =1/2) allows a superior perforance in relation to that one obtained with the PHY ode 1 (BPSK with R c =1/2) since the QPSK signalling has a better spectral efficiency when it is ipleented coherent deodulation Notice that this also explains the better perforance of PHY ode 4 (QPSK with R c =3/4) in relation to the PHY ode

12 2 (BPSK with R c =3/4) signalling schee Second, PHY ode 5 (16QAM with R c =1/2) has a better perforance than the PHY ode 2 (BPSK with R c =3/4) and PHY ode 4 (QPSK with R c =3/4) This interesting characteristic occurs due to the high coding gain allowed in environents where the Rayleigh ultipath fading is teporally independent at sybol level (see 45, 46 and 47), as postulated in this contribution Third, PHY ode 7 (64QAM with R c =2/3) has a better perforance in relation to the PHY ode 6 (16QAM with R c =3/4) since the higher coding gain overwhel (in the assued channel odel) the greater noise iunity of 16QAM in relation to the 64QAM signalling schee Finally, Fig 6b shows that when the net effect of the fading is less severe due to spatial diversity, then we can deterine (differently of observed at Fig 6a) a range of γ b where the perforance of PHY ode 4 is superior in relation to the perforance obtained with the PHY ode 5 and a region where the perforance of PHY ode 6 superior in relation to the perforance observed with the PHY ode 7 5M Saturation Goodput in bps 4M 3M 2M 1M 0 Flat Rayleigh Channel RTS+CTS+Data+ACK schee PHY Mode 1 (BPSK, 6 Mbps) 10 STAs 30 STAs L=1 L=2 L=3 L=1 L= Average γ per Antenna in db b Figure 4 Analytical (straight lines) and siulation (arks) results for the saturation goodput in bps for the PHY ode 1 as a function of SINR per bit Results paraeterized by the nuber of STAs and received antennas 160M Saturation Goodput in bps 140M 120M 100M 80M 60M 40M 20M 00 Flat Rayleigh Channel RTS+CTS+Data+ACK schee 10 STAs PHY Mode 1 (BPSK, 6 Mbps) L=1 L=2 L=3 PHY Mode 3 (QPSK, 12 Mbps) L=1 L=2 L=3 PHY Mode 5 (16QAM, 24 Mbps) L=1 L=2 L= γ per Antenna in db b Figure 5 Analytical (straight lines) and siulation (arks) results for the saturation goodput in bps of the andatory BSS rate as a function of SINR per bit and the nuber of received antennas

13 Saturation Goodput in bps 240M 220M 200M 180M 160M 140M 120M 100M 80M 60M 40M 20M 00 Flat Rayleigh Channel RTS+CTS+Data+ACK schee 10 STAs; L=1 (no spatial diversity) PHY 1 PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY 8-20M Average γ b per Antenna in db Figure 6a No spatial diversity (L=1) Saturation Goodput in bps 240M 220M 200M 180M 160M 140M 120M 100M 80M 60M 40M 20M 00 PHY 1 PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY 8 Flat Rayleigh Channel RTS+CTS+Data+ACK schee 10 STAs; L=3-20M Average γ b per Antenna in db Figure 6b Spatial diversity with 3 receiving antennas (L=3) Figure 6 Coparison between analytical (straight lines) and siulation (arks) results for the saturation goodput in bps for all IEEE 80211a PHY odes as a function of SINR per bit 5 FINAL REMARKS In this contribution we have derived and validated a joint MAC and PHY crosslayer goodput saturation odel that can be confidentially used to assess the perforance of IEEE 80211a ad hoc networks operating under the RTS/CTS operational ode We have assued a flat fading Rayleigh channel that is uncorrelated at sybol level and independent across of the OFDM carriers In a future work we are going to present the perforance of IEEE 80211a networks

14 with adaptive link techniques for teporally correlated Nakagai- fading channel in environents with spatial diversity [HOEFEL 2005] Based on the interesting rearks of anonyous reviewers, we are developing an analytical data link and physical layer odel in order to asses the syste perforance with a liited nuber of retransissions [CHATZMISIOS 2003] for saturated and un-saturated traffic conditions [WU 2002] 6 REFERENCES Bianchi, G (2000) Perforance Analysis of the IEEE Distributed coordination function, In: IEEE Journal on Selected Areas of Counication, v18, no 3, pp , March 2000 Chatziisios, P et al IEEE packet delay: a finite retry analysis, In: GLOBECOM, pp , 2003 Conan, J (1984) The weight spectra of soe short low-rate convolutional codes, In: IEEE Trans Counications, vol 32, pp , Sept 1984 Haccoun, D and Bégin, G (1989) High-rate punctured convolutional codes for Viterbi and Sequential decoding, In: In: IEEE Trans Counications, vol 37, n 11, p , Nov 1989 IEEE (1999) Wireless LAN Mediu Access Control (MAC) and Physical Layer (PHY) Specifications, Standard, IEEE, Aug 1999 IEEE 80211a (1999) Part 11: Wireless LAN Mediu Access Control (MAC) and Physical Layer (PHY) Specification Aendent 1: High-speed Physical Layer in the 5 GHz band, suppleented to IEEE standard, Sept 1999 Hoefel, R P F and de Aleida, C (1999) The perforance of CDMA/PRMA for Nakagai- frequency selective fading channel, In: Electronics Letters, vol 35, no 1, 1999, pp Hoefel, R P F and de Aleida, C (2004) Perforance of IEEE based networks with link level adaptation techniques, In: Proceedings of IEEE VTC Fall, 2004 Hoefel, R P F (2005) Cross-Layer Goodput Saturation Traffic Analysis of IEEE 80211a Networks with Link Level Techniques, In: subitted to IEEE VTC Fall, 2005 Proakis, J G (2001) Digital Counications, New York, 2001 Puersley, M B and Taipale, D J (1987) Error Probabilities for Spread-Spectru Packet Radio with Convolutional Codes and Viterbi Decoding, In: IEEE Trans Counications, vol 35, n 1, p 1-12, Jan 1987 Qiao, S D, Choi S and Shin, K G (2002) Goodput Analyzes and Link Adaptation for the IEEE 80211a Wireless LANs, In: IEEE Trans Mobile Cop, pp , 2002 Yang, L and Hanzo, L (2000) A recursive algorith for the error probability evaluation of M-QAM, In: IEEE Co Letters, vol 4, pp , Oct 2000 Wu, H-T et al (2002) Perforance of reliable transport protocol over IEEE wireless LANs: analysis and perforance, In: INFOCOM, pp , June 2002

A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE a Networks Operating Under Basic Access and RTS/CTS DCF Schemes

A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE a Networks Operating Under Basic Access and RTS/CTS DCF Schemes JOURNAL OF COMMUNICATIONS, VOL, NO 6, SEPTEMBER 2006 A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE 802a Networks Operating Under Basic Access and RTS/CTS DCF Schees Roger

More information

A MAC and Physical Layer Theoretical Model for IEEE a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes

A MAC and Physical Layer Theoretical Model for IEEE a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes A MAC and Physical Layer Theoretical Model for IEEE 802.a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes Roger Pierre Faris Hoefel Department of Telecommunications Engineering

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

ECS455: Chapter 5 OFDM

ECS455: Chapter 5 OFDM ECS455: Chapter 5 OFDM 5.4 Cyclic Prefix (CP) 1 Dr.Prapun Suksopong prapun.co/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Friday 14:00-16:00 Three steps towards odern OFDM 1. Mitigate Multipath

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China Analytical Model of Epideic Routing for Delay-Tolerant etwors Qingshan Wang School of Matheatics Hefei University of Technology Hefei, China qswang@hfut.edu.cn Zygunt J. Haas School of Electrical and Coputer

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

Communications and Signal Processing Spring 2017 MSE Exam

Communications and Signal Processing Spring 2017 MSE Exam Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing

More information

Exact Distribution of Access Delay in IEEE DCF MAC

Exact Distribution of Access Delay in IEEE DCF MAC Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

Finite-State Markov Modeling of Flat Fading Channels

Finite-State Markov Modeling of Flat Fading Channels International Telecounications Syposiu ITS, Natal, Brazil Finite-State Markov Modeling of Flat Fading Channels Cecilio Pientel, Tiago Falk and Luciano Lisbôa Counications Research Group - CODEC Departent

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels

Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Jin Soo Choi, Chang Kyung Sung, Sung Hyun Moon, and Inkyu Lee School of Electrical Engineering Korea University Seoul, Korea Email:jinsoo@wireless.korea.ac.kr,

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

Multi-Scale/Multi-Resolution: Wavelet Transform

Multi-Scale/Multi-Resolution: Wavelet Transform Multi-Scale/Multi-Resolution: Wavelet Transfor Proble with Fourier Fourier analysis -- breaks down a signal into constituent sinusoids of different frequencies. A serious drawback in transforing to the

More information

Rateless Codes for MIMO Channels

Rateless Codes for MIMO Channels Rateless Codes for MIMO Channels Marya Modir Shanechi Dept EECS, MIT Cabridge, MA Eail: shanechi@itedu Uri Erez Tel Aviv University Raat Aviv, Israel Eail: uri@engtauacil Gregory W Wornell Dept EECS, MIT

More information

SEISMIC FRAGILITY ANALYSIS

SEISMIC FRAGILITY ANALYSIS 9 th ASCE Specialty Conference on Probabilistic Mechanics and Structural Reliability PMC24 SEISMIC FRAGILITY ANALYSIS C. Kafali, Student M. ASCE Cornell University, Ithaca, NY 483 ck22@cornell.edu M. Grigoriu,

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

Received Signal, Interference and Noise

Received Signal, Interference and Noise Optimum Combining Maximum ratio combining (MRC) maximizes the output signal-to-noise ratio (SNR) and is the optimal combining method in a maximum likelihood sense for channels where the additive impairment

More information

A remark on a success rate model for DPA and CPA

A remark on a success rate model for DPA and CPA A reark on a success rate odel for DPA and CPA A. Wieers, BSI Version 0.5 andreas.wieers@bsi.bund.de Septeber 5, 2018 Abstract The success rate is the ost coon evaluation etric for easuring the perforance

More information

Outline. Digital Communications. Lecture 12 Performance over Fading Channels and Diversity Techniques. Flat-Flat Fading. Intuition

Outline. Digital Communications. Lecture 12 Performance over Fading Channels and Diversity Techniques. Flat-Flat Fading. Intuition Digital Counications Lecture 2 Perforance over Fading Channels and Diversity Techniques Pierluigi SALVO ROSSI Outline Noncoherent/Coherent Detection 2 Channel Estiation Departent of Industrial and Inforation

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Ufuk Demirci* and Feza Kerestecioglu**

Ufuk Demirci* and Feza Kerestecioglu** 1 INDIRECT ADAPTIVE CONTROL OF MISSILES Ufuk Deirci* and Feza Kerestecioglu** *Turkish Navy Guided Missile Test Station, Beykoz, Istanbul, TURKEY **Departent of Electrical and Electronics Engineering,

More information

Analysis of Bit Error Rates for Multiple Access CSK and DCSK Communication Systems

Analysis of Bit Error Rates for Multiple Access CSK and DCSK Communication Systems 7 I TRASACTIOS O CIRCUITS AD SYSTMS I: FUDAMTAL THORY AD APPLICATIOS, VOL. 5, O. 5, MAY The cases of H () (z) and H () (z) are trivial because we can tae =in Step 4), and write H () (z)= H () (z)= (z )

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

Simulation of Discrete Event Systems

Simulation of Discrete Event Systems Siulation of Discrete Event Systes Unit 9 Queueing Models Fall Winter 207/208 Prof. Dr.-Ing. Dipl.-Wirt.-Ing. Sven Tackenberg Benedikt Andrew Latos M.Sc.RWTH Chair and Institute of Industrial Engineering

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels

Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels ISIT7, Nice, France, June 4 June 9, 7 Upper and Lower Bounds on the Capacity of Wireless Optical Intensity Channels Ahed A. Farid and Steve Hranilovic Dept. Electrical and Coputer Engineering McMaster

More information

Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems

Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems ACSTSK Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems Professor Sheng Chen Electronics and Computer Science University of Southampton Southampton SO7 BJ, UK E-mail: sqc@ecs.soton.ac.uk

More information

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

On the Mixed Discretization of the Time Domain Magnetic Field Integral Equation

On the Mixed Discretization of the Time Domain Magnetic Field Integral Equation On the Mixed Discretization of the Tie Doain Magnetic Field Integral Equation H. A. Ülkü 1 I. Bogaert K. Cools 3 F. P. Andriulli 4 H. Bağ 1 Abstract Tie doain agnetic field integral equation (MFIE) is

More information

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access

Adaptation to the Primary User CSI in Cognitive Radio Sensing and Access Adaptation to e Priary User CSI in Cognitive Radio Sensing and Access Yuan Lu, Alexandra Duel-Hallen Departent of Electrical and Coputer Engineering Nor Carolina State University Raleigh, NC, 2766 {ylu8,

More information

2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2 IEEE. Personal use of this aterial is peritted. Perission fro IEEE ust be obtained for all other uses, in any current or future edia, including reprinting/republishing this aterial for advertising or

More information

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science

More information

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

ELEMENTARY MARKOV QUEUEING SYSTEMS WITH UNRELIABLE SERVER

ELEMENTARY MARKOV QUEUEING SYSTEMS WITH UNRELIABLE SERVER Nuber 4. Volue IV. Deceber 2009 EMENTARY MARKOV QUEUEING SYSTEMS WITH UNRIABLE SERVER Michal Dorda Suary:This paper presents soe exaples of eleentary Marov unreliable queueing systes and their atheatical

More information

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES

HIGH RESOLUTION NEAR-FIELD MULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR MACHINES ICONIC 2007 St. Louis, O, USA June 27-29, 2007 HIGH RESOLUTION NEAR-FIELD ULTIPLE TARGET DETECTION AND LOCALIZATION USING SUPPORT VECTOR ACHINES A. Randazzo,. A. Abou-Khousa 2,.Pastorino, and R. Zoughi

More information

On the Validity of IEEE MAC Modeling Hypotheses

On the Validity of IEEE MAC Modeling Hypotheses On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources 1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract

More information

Performance Evaluation of Voice-Data Integrated Traffic in IEEE and IEEE e WLAN

Performance Evaluation of Voice-Data Integrated Traffic in IEEE and IEEE e WLAN Perforance Evaluation of Voice-Data Integrated Traffic in IEEE 8. IEEE 8.6e WLAN ANUPAM ROY MD. IMDADUL ISLAM AND M. R. AMIN 3 Departent of Coputer Science Engineering Departent Jahangirnagar University

More information

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals

Estimation of ADC Nonlinearities from the Measurement in Input Voltage Intervals Estiation of ADC Nonlinearities fro the Measureent in Input Voltage Intervals M. Godla, L. Michaeli, 3 J. Šaliga, 4 R. Palenčár,,3 Deptartent of Electronics and Multiedia Counications, FEI TU of Košice,

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

Partition-Based Distribution Matching

Partition-Based Distribution Matching MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co Partition-Based Distribution Matching Fehenberger, T.; Millar, D.S.; Koike-Akino, T.; Kojia, K.; Parsons, K. TR2018-023 January 2018 Abstract

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Algebraic Approach for Performance Bound Calculus on Transportation Networks

Algebraic Approach for Performance Bound Calculus on Transportation Networks Algebraic Approach for Perforance Bound Calculus on Transportation Networks (Road Network Calculus) Nadir Farhi, Habib Haj-Sale & Jean-Patrick Lebacque Université Paris-Est, IFSTTAR, GRETTIA, F-93166 Noisy-le-Grand,

More information

J. Electrical Systems x-x (xxx): x-xx. Regular paper. Reflected Signal on a Nonuniform Overhead Transmission Line at High Frequency

J. Electrical Systems x-x (xxx): x-xx. Regular paper. Reflected Signal on a Nonuniform Overhead Transmission Line at High Frequency A. Boudjeaa S. Tahi B. Bennaane T. B. Berbar B. Lehouidj J. Electrical Systes x-x (xxx): x-xx Regular paper Reflected Signal on a Nonunifor Overhead Transission Line at High Frequency The effect of the

More information

ARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA

ARTICLE IN PRESS. Murat Hüsnü Sazlı a,,canişık b. Syracuse, NY 13244, USA S1051-200406)00002-9/FLA AID:621 Vol ) [+odel] P1 1-7) YDSPR:3SC+ v 153 Prn:13/02/2006; 15:33 ydspr621 by:laurynas p 1 Digital Signal Processing ) wwwelsevierco/locate/dsp Neural network ipleentation of

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity

System Performance of Interference Alignment under TDD Mode with Limited Backhaul Capacity Syste Perforance of Interference Alignent under TDD Mode with Liited Bachaul Capacity Matha Deghel, Mohaad Assaad and Mérouane Debbah Departent of Telecounications SUPELEC, Gif-sur-Yvette, France Matheatical

More information

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc

Sparse beamforming in peer-to-peer relay networks Yunshan Hou a, Zhijuan Qi b, Jianhua Chenc 3rd International Conference on Machinery, Materials and Inforation echnology Applications (ICMMIA 015) Sparse beaforing in peer-to-peer relay networs Yunshan ou a, Zhijuan Qi b, Jianhua Chenc College

More information

Pattern Recognition and Machine Learning. Artificial Neural networks

Pattern Recognition and Machine Learning. Artificial Neural networks Pattern Recognition and Machine Learning Jaes L. Crowley ENSIMAG 3 - MMIS Fall Seester 2016 Lessons 7 14 Dec 2016 Outline Artificial Neural networks Notation...2 1. Introduction...3... 3 The Artificial

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet

Uplink Transmission Design with Massive Machine Type Devices in Tactile Internet Uplink Transission Design wi Massive Machine Type Devices in Tactile Internet Changyang She and Chenyang Yang School of Electronics and Inforation Engineering, Beihang University, Beijing, China Eail:

More information

Bit Error Probability of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagami-m Fading Channel

Bit Error Probability of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagami-m Fading Channel 7th nternational Syposiu on age and and Analysis (SPA ) Septeer 4-6,, Durovnik, Croatia Bit Error Proaility of M-ary Phase Shift Keying with MRC Receive Diversity over Nakagai- Fading Channel Vepati Srinivasa

More information

1 Generalization bounds based on Rademacher complexity

1 Generalization bounds based on Rademacher complexity COS 5: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #0 Scribe: Suqi Liu March 07, 08 Last tie we started proving this very general result about how quickly the epirical average converges

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu

More information

Feature Extraction Techniques

Feature Extraction Techniques Feature Extraction Techniques Unsupervised Learning II Feature Extraction Unsupervised ethods can also be used to find features which can be useful for categorization. There are unsupervised ethods that

More information

Performance analysis of free-space optical communication systems over atmospheric turbulence channels H.E. Nistazakis 1 T.A. Tsiftsis 2 G.S.

Performance analysis of free-space optical communication systems over atmospheric turbulence channels H.E. Nistazakis 1 T.A. Tsiftsis 2 G.S. Published in IET Counications Received on 8th pril 8 Revised on 8th Noveber 8 doi:.49/iet-co.8. ISSN 75-868 Perforance analysis of free-space optical counication systes over atospheric turbulence channels

More information

Random Vibration Fatigue Analysis with LS-DYNA

Random Vibration Fatigue Analysis with LS-DYNA 1 th International LS-DYNA Users Conference Siulation() Rando Vibration Fatigue Analysis with LS-DYNA Arnaud Ringeval 1, Yun Huang 1 CIMES, France 36 rue Marc Lefrancq, Les Ateliers Nuériques, 593 Valenciennes,

More information

International Scientific and Technological Conference EXTREME ROBOTICS October 8-9, 2015, Saint-Petersburg, Russia

International Scientific and Technological Conference EXTREME ROBOTICS October 8-9, 2015, Saint-Petersburg, Russia International Scientific and Technological Conference EXTREME ROBOTICS October 8-9, 215, Saint-Petersburg, Russia LEARNING MOBILE ROBOT BASED ON ADAPTIVE CONTROLLED MARKOV CHAINS V.Ya. Vilisov University

More information