Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Size: px
Start display at page:

Download "Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures"

Transcription

1 Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, , Russia E-mai: {yakhov, Abstract In this paper, we present an anaytica method for estimating the saturation throughput of an ad hoc LAN caed aso the Wi-Fi (Wireess Fideity) LAN in the presence of noise distorting transmitted frames. This is the first method that aows studying anayticay the Wi- Fi network performance with consideration of correated channe faiures usuay inherent to wireess channes. With the study, we consider the possibe packet fragmentation that can be adopted to reduce the performance waste caused by noise-induced distortions. In addition to the throughput, our method aows estimating the probabiity of a packet rejection occurring when the number of packet transmission retries attains its imit. The obtained numerica resuts of investigating Wi-Fi LANs by the deveoped method are vaidated by simuation show high estimation accuracy as we as the method efficiency in determining the optima fragmentation threshod. I. Introduction IEEE [16] is one of the most popuar technoogies for wireess ad hoc mobie networking. The fundamenta access mechanism in the IEEE protoco is the Distributed Coordination Function (DCF), which impements the Carrier Sense Mutipe Access with Coision Avoidance (CSMA/CA) method. In eary studies, the DCF performance was evauated either by simuation (e.g., [1]) or by approximate anaytica modes [5], [8] based on assumptions simpifying consideraby the DCF access rues. The DCF was studied in depth in [2], [4], [12], where anaytica methods were deveoped for evauating the performance of wireess LANs in the saturation conditions, when there are aways queues for transmitting at every wireess LAN station. This performance index caed the saturation throughput in [2] was evauated in the assumption of idea channe conditions, i.e., in the absence of noise, causing the throughput overestimation. There may be different noise sources: other devices ocated in the LAN neighborhood operating on the same icense-free frequency b, mutipath fading, co- /adjacent channe interference, etc. (Detai arguing of noise sources can be found in [15], for exampe.) In [9], [10] [13], we have deveoped the methods of [2], [4], [12] to study the infuence of noise on the Wi-Fi LAN performance, assuming channe faiures (that is, noise-induced distortions) uncorreated, for instance, in case of a channe adding white gaussian noise. However, it is known (e.g., see [14] [17]) that the wireess-medium behavior is better characterized by the Gibert mode [6] representing a two-states Markov chain. There are Good Bad states, which differ in the Bit Error Rate (BER) being constant in each state. Obviousy, according to the mode, channe faiures caused by noise infuence are correated, this correation makes hard the Wi-Fi network performance anaysis, forcing previous investigators of the probem to adopt simuation (see [3], for instance). Nevertheess, in this paper, we succeed in studying anayticay the performance of the Wi-Fi network with correated channe faiures, assuming that stochastic sojourn times in Bad Good states are distributed exponentiay. Further, in Section II we briefy review the DCF operation in saturation noise. In Sections III V, we study a fragmented packet transmission process in a Wi-Fi ad hoc LAN with correated channe faiures deveop a nove anaytica method of estimating the saturation throughput the probabiity of a packet rejection occurring when the number of packet transmission retries attains its imit. In Section VI, we give some numerica research resuts of LAN performance evauation. These resuts obtained by both our anaytica method simuation aow us to vaidate the deveoped method to show /04/$20.00 '2004 IEEE 204

2 ' ' Fig. 1. asic Access Mechanism s - S FS, b.s - backoff sots how the correation of channe faiures affects the LAN performance packet fragmentation efficiency. Finay, the obtained resuts are summarized in Section VII. II. DCF in Saturation Now we briefy outine the DCF scheme, considering ony the aspects that are exhibited in saturation. This scheme is described in detai in [16]. Under the DCF, data packets are transferred in genera via two methods. With the Basic Access mechanism shown in Fig. 1, a station confirms the successfu reception of a DATA frame by a positive acknowedgment ACK after a short SIFS interva. The optiona Request-To-Send/Cear- To-Send (RTS/CTS) mechanism, where an inquiring RTS frame a granting CTS frame anticipate the DATA transmission, is not considered in the paper, since previous studies [1], [10], [13] have shown that it is efficient ony in rare cases, when the number of active stations is very arge (more than 20). After a packet transfer attempt, the station passes to the backoff state after a DIFS interva if the attempt was successfu (i.e., there was no coision, a frames of a packet were transferred without noise-induced distortions) or after an EIFS interva if the attempt faied. Further, we use the notation δ, δ d, δ e for SIFS, DIFS, EIFS intervas. The backoff counter is reset to the initia vaue, which is caed the backoff time, measured in units of backoff sots of duration σ, chosen uniformy from a set (,..., ). The vaue, caed the contention window, depends on the number r of attempts performed for transmitting the current packet: W ( r ) W ( r ), where { W0 2 nr for r r W max for r r, i.e., is equa to the minimum W 0 before the first attempt, then is doubed after every faied attempt of the current packet transmission, reaching the maximum W max W 0 2 r. Backoff interva is reckoned ony as ong as the channe is free: the backoff counter is decreased by one ony if the channe was free in the whoe previous sot. Counting the backoff sots stops when the channe (1) %()%+* # $ &% ' # $4 " #! " %(,%.- %(,%/-! " %576 %576 " # " Fig. 2. Fragmented packet transmission becomes busy, backoff time counters of a stations can decrement next time ony when the channe is sensed ide for the duration of σ δ d or σ δ e if the ast sensed transmission is successfu or faied, respectivey. When the backoff counter attains its zero vaue, the station starts transmission. In the course of transmission of a packet, the transmitting station counts the number s of retries that is imited by s, the current packet is rejected when s attains the imit. After the rejection or success of a packet transmission, the next packet is chosen (we consider the saturation case) with the vaues of r s equa to 0. For reducing the infuence of noise, the stard [16] recommends subdividing a packet onger than a fragmentation threshod L f into fragments of size L f (except for the ast fragment). Thus, a packet is transferred as a continuous chain of DATA frames, which contain sequentia fragments are interspaced with ACK frames SIFS intervas (see Fig. 2). If a fragment (fragment 2 in Fig. 2) or an ACK frame is distorted, the station passes to the backoff state, advancing the retry counters r s by one, thereafter the packet transmission is resumed precisey with this distorted fragment. Thus, the transmission of a packet can be considered as a transfer of one or severa continuous chains of frames (there are two chains in Fig. 2), these chains are separated by backoff intervas. Ony the DATA frame being the first in a chain can be invoved into coisions, whie subsequent DATA frames as we as a ACK frames are not affected by coisions, because a other stations hear the transmission of previous DATA ACK frames defer from their attempts. Notice that, in contrary to the r - counter referring to a whoe packet, the s-counter refers to a fragment is zeroed after the fragment transmission success. III. Throughput Evauation Let us consider a sma-size Wi-Fi ad hoc LAN of statisticay homogeneous stations working in saturation. In fact, we mean by not a number of a stations of the LAN, but a number of active stations, whose queues are not empty for a quite ong observation interva. By statistica homogeneity of stations, we mean the foowing: 205

3 (i) the engths of packets (in bytes) chosen by every station from the queue have an identica probabiity distribution {,,..., L}; (ii) a stations adopt the same fragmentation threshod L f ; (iii) since the distance between stations is sma, we negect the propagation deay assume that there are no hidden stations noise occurs concurrenty at a stations. The ast assumption impies that a stations sense the common wireess channe identicay. Aso, to describe the channe state change, we adopt the two-states Gibert mode [6] modified as foows: the channe stays in state (, ) during a time interva distributed exponentiay with parameter λ. The channe states differ in BER. More precisey, in state, BER is equa to µ 8 µ 8 with transmitting a PHY -byte header the other frame part, respectivey, an f- byte frame transmitted entirey with the channe state is distorted with probabiity exp{ µ µ f}. We have to adopt different BERs, since PHY headers are usuay transmitted with a ower channe rate, but more reiabe coding moduation scheme. The channe state change rates λ 0 λ are assumed to be not too high, so that no more than one state change can happen during a frame transmission or an interframe space. As in [2] [13], et us subdivide the time of the LAN operation into non-uniform virtua sots such that every station changes its backoff counter at the start of a virtua sot can begin transmission if the vaue of the counter becomes zero. Such a virtua sot is either (a) an empty sot in which no station transmits, or (b) a successfu sot in which one ony one station transmits, or (c) a coisiona sot in which two or more stations transmit. As in [2], [4] [13], we assume that the probabiity that a station starts transmitting a packet in a given sot does not depend neither on the previous history, nor on the behavior of other stations, is equa to τ, which is the same for a stations depends ony on the current channe state. Hence the probabiities that an arbitrariy chosen virtua sot starting, when the channe is in state, is empty ( e ), successfu ( s ), or coisiona ( c ) are e ( τ ), s τ ( τ ), c e s. (2) With every packet transmission attempt, a chain of data frames is tried to be transferred, the first frame of the chain containing the first fragment which has not been transferred correcty yet. So et us associate every packet transmission attempt starting, when the channe is in state, with a pair (, ), where is the ength (in bytes) of the packet which the chain is reated to is the number of the packet fragments remaining to be transferred, ca it the (,, )-attempt. Let be the probabiity that an arbitrariy chosen packet transmission attempt carried out when the channe is in state is an (,, )-attempt. The throughput S is defined as the average number of successfuy transferred payoad bits per second. Obviousy, S 0 ψ S, (3) where S is the throughput observed when the channe is in state ψ λ (λ 0 λ ) is the time fraction that the channe spends in state. (Here in what foows, with with.) Note that we shoud count the transferred payoad bits ony after a successfu competion of transmitting a whoe packet, but not after each fragment transmission, because a packet transmission process can end with the packet rejection in spite of the fact that some fragments of the packet can be transferred successfuy. Thus, simiary to [9], [10], the throughput S is determined by the formua S L s T s K() 8Q 0 (, ), (4) where T s e σ st s c T c, T s T c are the mean durations of a virtua sot, the successfu coisiona sots, respectivey, starting when the channe is in state. K( ) is the number of fragments, which the packet of ength is subdivided to, that is, K( ) is the minima integer not ess than L f. Q 0 (, ) is the probabiity that an (,, )-attempt carried out in a successfu sot competes successfuy the whoe packet transmission. The duration of the coisiona sot is the sum of the transmission time of the ongest frame invoved in the coision the EIFS interva. Let d( ) H H MAC 8 V be the transmission time of a DATA frame incuding a fragment of ength PHY MAC headers transmitted in time H H MAC, respectivey, where V is the channe rate (in bits per a second) adopted for a frame parts except of the PHY header transmitted with rate V. Then the duration of a coision, where exacty stations are invoved in, is equa to d ( ) δ e if ( ony if): (i) each of these stations tries transmitting a fragment of ength 0 {,..., }, (ii) at east one of these stations transmits a fragment of ength. So the mean duration T c of such coisions starting, when the channe is in state, is: L f T c [ d ( ) δ e ][D(, ) D(, ) ], (5) r where D(, ) is the probabiity that a chain with the first fragment of ength 0 is transferred in the current 206

4 attempt, i.e., D(L f, ) D(, ) r max(r) 0 L f +r with < L f. [Here max ( ) is the integer part of the ratio (L ) L f.] Since ( ) π τ ( τ ) is the probabiity that exacty of stations transmit in a sot starting when the channe is in state, we obtain the foowing formua for the mean duration of a coisiona sot: T c ( c ) 2 π T c, (6) or, after simpe transformations of (5) (6), L f T c δ e ( c ) r d( ) { ( ) ( ) s [D(, ) D(, )]}, (7) where ( ) { τ [ D(, )]}. The case of a successfu sot is more compicated, we consider it in the next section. IV. Successfu Sot Now we study a successfu sot starting when the channe is in state. At the beginning of this sot, ony one station makes an attempt of transmission that is an (,, )- attempt with probabiity. This attempt is concuded successfuy, i.e., with successfu transfer of a whoe packet of ength, with probabiity Q 0 (, ) if none of the frames exchanged between the sender receiver in this process is distorted by noise, that is, L where K() T s L K() T (, )Q 0(, ) (8) T e (,, )[Q (, ) Q (, )], T (, ) ( )[ d (L f ) δ] ACK d( 0 ) δ d is the average duration of successfu (,, )-attempt, ACK is the ACK transmission time, 0 is the ength of the ast fragment. T e (,, ) ( )[ d (L f ) ACK δ] d( ) ( ACK δ)θ (,, ) δ e is the successfu sot average duration taken under the condition that the first ( < ) fragments of the packet remainder were transmitted successfuy, whie the -th fragment which ength is fais. Q (, ) Q (, ) are the probabiities that the condition hods the channe state changes or does not after the sot competion. [Here further, we determine the probabiities separatey for cases of changing (subscript ) not changing (subscript ) the channe state.] At ast, Θ (,, ) is the probabiity that the faiure happens just because of the ast ACK frame distortion. Let us find these probabiities. A transmission of a frame of ength f bytes (incuding the MAC -byte MAC header), which starts when the channe is in state, is competed successfuy with probabiities where I that is, ν 0 (f) exp{ λ (H f V ) µ µ f} ν 0 (f) µ f I H 0 µ h λ H I (f), λ λ exp{ V [µ µ (H )]}, I λ H µh λ H (µ [ h µ h ) ] λ H (µ µ ) with λ H (µ µ ) I λ H µh otherwise. I (f) is defined simiary with the substitution of f for, f V for H, µ µ for µ µ, respectivey. The transmission fais with probabiities ν (f) exp{ λ (H f V )}[ exp{ µ µ f}] ν (f) ν 0 (f) ν 0 (f) ν (f). Now et us consider the process of transmitting a fragment of ength, incuding the possibe receipt of the response ACK frame. Let the process start when the channe is in state. Then it succeeds with probabiities η 0 ( ) ν 0 (f r )[γ ν 0 ( ACK ) γ ν 0 ( ACK )] ν 0 (f r )[γ ν 0 ( ACK ) γ ν 0 ( ACK )] η 0 ( ) ν 0 (f r )[γ ν 0 ( ACK ) γ ν 0 ( ACK )] ν 0 (f r )[γ ν 0 ( ACK ) γ ν 0 ( ACK )], where f r MAC, γ γ exp{ λ δ}, ACK is the ACK ength. The process fais with probabiities η ( ) ν (f r ) ν 0 (f r )[γ ν ( ACK ) γ ν ( ACK )] 207

5 η ( ) η 0 ( ) η 0 ( ) η ( ). Note that the process fais because of DATA distortion with probabiities ν (f r ), if the channe state does not change, ν (f r ), if the channe passes from state to. Now we can find the sought probabiities Q, Q, Θ : Q (, ) ( ) [η ( )γ e η ( ) γ e ] ( ) [η ( ) γ e η ( )γ e ], Q (, ) ( ) [η ( ) γ e η ( )γ e ] ( ) [η ( )γ e η ( ) γ e ], Θ (,, ) Θ (, ) Θ (, ) Q (, ) Q (, ), where γ e γ e exp{ λ δ e }, ( ),,,, η 0 (L f )γ η 0 (L f ) γ η 0 (L f )γ η 0 (L f ) γ. Moreover, Θ Θ are determined simiary to Q Q, substituting the appropriate functions ν with argument MAC for a functions η. At ast, the probabiity of a successfu (,, )-attempt competing the whoe packet transmission is obviousy equa to Q 0 (, ) the channe appears in state competion with probabiities [Q (, ) Q (, )], or upon this attempt Q 0 (, ) ( ) [η 0 ( 0 )γ d η 0 ( 0 ) γ d ] ( ) [η 0 ( 0 ) γd η 0 ( 0 )γd ] Q 0 (, ) Q 0 (, ) Q 0 (, ), respectivey, where γ d γ d exp{ λ δ d }. Thus, we have found a components of (8), the throughput S can be found by (4) (8) if the transmission beginning probabiities τ 0 τ the probabiity distribution { } are known. V. Transmission Rejection Probabiities In this section, we study the process of transmitting a packet of ength by a station. This process starts when the packet is chosen from the queue ends with either the successfu transmission of the packet or its rejection. Let f be the mean numbers of the packet transmission attempts virtua sots in which the considered station defers from transmission during this process, these attempts sots being taken into account ony if the channe is in state at their beginnings. Then τ L f L (f ). (9) To find the distribution { },..., K(), we can use the foowing formua: f L u K(u) v uf uv, (10) where f is the mean number of (,, )-attempts carried out with transferring the packet of ength. Moreover, we wi aso seek the averaged probabiity re of packet rejection taking pace when the s-counter attains its imiting vaue s. This probabiity can be found from the foowing sum: re L re (), (11) where re () is the probabiity of rejecting a packet of ength. Let us start with ooking for f. We can write it in the foowing form: f 0 ψ p F [ s, K(),, ], (12) where ψ p is the probabiity that the packet transmission process starts when the channe is in the initia state s, it is easy to show that ψ p ( Φ ) (2 Φ 0 Φ ), (13) where Φ is the probabiity that, at the end of a packet transmission process, the channe appears in the same state as at the process beginning. Function F ( s,, r, s) represents the mean number of the packet transmission attempts that remain to be perform under the foowing conditions: (i) fragments remain to be transferred; (ii) the station has just passed to the backoff state with the contention window equa to W ( r ); (iii) at the moment, the channe is in state s ; 208

6 (iv) the vaue of s-counter is s. Obviousy, the function is cacuated recursivey: { F ( s,, r, s) 0 q [ r, s ] f 0 1( s < s ) u0 cc Q u (, )]F (u,, 2 cc Q u (, )F (u,, [ [ cc Q c u ( c ) r, s ) 1( ) ]} r, ), (14) where r r with r < r r r otherwise. Here in what foows, we use the Booean function 1(condition) which takes the vaue 1 if the condition within brackets hods. Moreover, in (14), f 0 1( ), cc cc ( τ ) is the probabiity of the current attempt faiure due to a coision, during which the channe passes from state to state u with probabiity Q c u ( c ) Qc ( c ), where Q c ( ) γ e u ( γ e u γe ) exp{ λ } c is the mean duration of this coision. The duration is determined simiary to (5) (7): c δ e ( cc ) π ˆc, where L f ˆc d ( )[D(, )] rr 1 k + d( ){[D(, )] [D(, )] } is the mean duration of such coision, where exacty of other stations coide with the considered stations. After transformations, we have c d( δ ) e cc [ L f ( cc ) rr 1 k + d( )[ ( ) cc ] ( ) ( )]. At ast, q [ r, s ] is the probabiity that the channe appears in state upon competion the backoff time of the considered station, which current contention window is W ( r ), this probabiity is taken under the condition that the channe was in state s at the beginning of the backoff. It is easy to show that q [ r, s ] W ( r ) W (n r) b0 (b), where (b) b,,,, is the probabiity that the channe passes from state to for a virtua sot, during which the given station does not transmit. Obviousy, ˆe λ σ ˆcQ c ( ˆT c ) ˆsQ s, where ˆe, ˆs, ˆc, ˆT c are defined simiary to e, s, c, T c with substitution of for. Moreover, [ ] K() L Q s Q 0 (, ) Q (, ) is the probabiity that the channe does not change its state during a successfu sot. To find, f v, re (), we can aso adopt formua (12), using functions W [ s, K(),, ], F v [ s, K(),, ], R [ s, K(),, ], respectivey, instead of F ( ), whie Φ L [, K(),, ]. (15) Functions W ( ), F v ( ), R ( ), ( ) with arguments s,, r, s are defined, in turn, by (14) modified as foows: For W ( ), f 0 is excuded the item ( r ) W (n r) b W ( r ) W ( r ) (b ) starts the right part of (14). For F v ( ), we substitute f (, ) 1( )1( ) for f 0 the operator 1( ) for 1( ). For R ( ), we repace f 0 by For ( ), f 0 0 (,, s) 1( s s ){ cc cc [η ( ) η ( )]}. is repaced by 0 (,, s) cc Q 0 (, ) 1( s s ){ cc Q c ( c ) cc Q (, )}. Thus, we can cacuate the throughput S the averaged packet rejection probabiity re, using the foowing iterative procedure. Firsty, we cacuate Q (, ) Q 0 (, ) for a possibe,,,,..., K(),,...,. Then we define initia vaues for τ, Ψ p, S, re, with a possibe,, cacuate their modified vaues by (3) (12). If not both reative differences of initia modified vaues of S re are ess than a sma pre-defined imit, then we set new initia vaues of τ, Ψ p, S, re, equa to 209

7 TA. Vaues of protoco parameters Sot time, σ 20 µs PHY header, 24 bytes MAC header, MAC 34 bytes PHY header transfer time, H 192 µs MAC header transfer time, H MAC 25 µs Length of ACK, ACK 14 bytes ACK transfer time, ACK 202 µs SIFS 10 µs DIFS 50 µs EIFS 364 µs Channe rate, V 11 Mbps Retry imit, s 7 Minima contention window, W 0 32 Maxima contention window, W max 1024 hafsums of their modified od initia vaues repeat the cacuation. We do not prove exacty the convergence of this iterative technique due to its compexity. In practice, numerous exampes of adopting the technique with various vaues of Wi-Fi ad hoc LAN parameters have shown that it provides very fast convergence to the soution high speed of cacuating the vaues of estimated performance indices. It takes few seconds to cacuate S re when executing its program impementation on Inte Pentium IV 3.0 GHz. VI. Numerica Resuts To vaidate our mode, we have compared its resuts with that obtained by GPSS (Genera Purpose Simuation System) simuation [11]. The object of our numerica investigations was a saturated Wi-Fi ad hoc LAN consisting of stations. The vaues of protoco parameters used to obtain numerica resuts for the anaytica mode simuation were the IEEE b defaut vaues [7] for the Long Preambe mode summarized in Tabe I. Moreover, the payoad size (in bytes) is samped uniformy from the set {,..., 2 }. In our simuation mode, we took into account of a rea features of the MAC protoco did not adopt the assumptions used in anaytica modeing described in Section III. In each run (it took about an hour on the average) of the simuation mode, we observed vaues of the measured performance indices stopped the simuation when their fuctuations became quite sma (within 0.5%). In Figs. 3 4, we present some resuts of studying the throughput the averaged rejection probabiity with varying the BER fixed 2. Figs. 3b 4b correspond to the case of uncorreated channe faiures, whie the curves in Figs. 3a 4a have been obtained for the case of correated faiures with the foowing channe mode parameters: λ 0 5, λ 5λ 0, µ 0 4 BER, µ 28 BER. (State 0 is assumed to be the Good one.) Here further in the section, we study packet transmission without fragmentation (curves n/f ), with fixed fragmentation (curves f ) when the fixed fragmentation threshod L f 56 bytes is adopted, with optima fragmentation (dotted curves o.f ) when the threshod is chosen optimay, using our method depending on vaues of channe parameters. (The optimization criterion is the maxima throughput.) Moreover, we assume that µ. µ,,. Curves n/f f have been obtained by both our anaytica method (soid curves) GPSS simuation (dashed curves). Let us note a high accuracy of the anaytica mode: the errors never exceed 3% with throughput estimation 6% with rejection probabiity estimation. Further, we see that both throughput rejection probabiity are much more sensitive to the BER growth with uncorreated faiures than with correated ones, especiay in the case of non-fragmented transmission: with very high BER.5 4, we have S. Mbps re. 9 for uncorreated faiures, S 2. Mbps re. 7 for correated ones. Packet fragmentation aows reaxing the noise infuence makes the performance measures shown with correated uncorreated faiures coser to each other: for the same high BER the fixed fragmentation, we have S.9 Mbps re. 33 with uncorreated faiures, S 2.3 Mbps re. 29 with correated ones. The optima fragmentation provides ony sighty improving the throughput (no more than by 10% in the shown cases) with respect to the maximum of throughput vaues obtained with the fixed fragmentation non-fragmented transmission. Now et us investigate in detai how the correation parameters affect the throughput fragmentation efficiency. Fig. 5 shows the throughput versus the Byte Error Rate µ 0 observed in the Good state with fixed BER 4, λ Famiies (a) (b) of curves correspond to (a) λ λ 0 (b) λ 5λ 0, in each of these famiies, soid, dashed dotted curves are reated to non-fragmented transmission, the fixed fragmentation, the optima fragmentation, respectivey. Comparing the considered cases, we see that the ess Good state BER the Bad state mean duration, the higher throughput fragmentation is ess effective. Fig. 6 concuding this investigation shows fragmentation efficiency areas in the foowing cases: (1) BER 4, 5, λ 0 5 ; (2) BER 5 5, 5, λ 0 5 ; (3) BER 5 5, 2, λ 0 5 ; (4) BER 5 5, 5, λ

8 Throughput, Mbps 4 3 n/f f (a) Correated faiures o.f Rejection probabiity (a) Correated faiures n/f o.f f BER BER n/f (b) Uncorreated faiures Throughput, Mbps 4 3 (b) Uncorreated faiures o.f Rejection probabiity n/f 2 f 0.05 o.f f BER BER Fig. 3. Throughput ersus R 10 4 Fig. 4. Rejection probabiity ersus R

9 Throughput, Mbps (a) (b) (1) (2) (3) (4) Fig. 5. Throughput ersus yte rror Rate µ in the Good state Fig. 6. Fragmentation ef ciency areas µ 0 µ 1 ersus λ 0 λ 1 For each of these cases, points ocated upper the reated curve form the fragmentation efficiency area, where fragmentation with optimay chosen threshod provides higher throughput than non-fragmented transmission. First of a, et us note that the bounding curves are not monotonic: fragmentation efficiency increases when the mean Bad state duration becomes both coser to much ess than the mean Good state duration. As we coud expect, the fragmentation efficiency area widens with the BER growth [curves (1) (2)]. Further, we see [curves (2) (3)] that the area widens aso with increasing the number N of active stations. At ast, we shoud mention that a joint growth of the Good Bad durations [curves (2) (4)] does not much affect the fragmentation efficiency area. VII. Concusions In this paper, a continuation of [2], [4], [10], [9], [12], [13], we have deveoped an anaytica method for estimating the throughput of a Wi-Fi ad hoc LAN operating under saturation in the presence of noise. Besides the throughput, our method aows evauating the probabiity of a packet rejection due to attaining the retry number threshod [16]. Unike in [2], [4], [12], [13], this method is usefu in estimating the LAN performance indices under packet fragmentation recommended in the stard [16] for reducing the infuence of noise. Moreover, it is the first anaytica method for Wi- Fi network performance evauation in case of correated faiures inherent to reaistic wireess channes. The faiures correation has been described with the modified two-states Gibert mode [6], where sojourn times in each of channe states are assumed to be exponentiay distributed. According to numerica resuts obtained by both the deveoped method simuation, our method is quite exact: the errors never exceed 3% with throughput estimation 6% with rejection probabiity estimation. This method provides a high speed of cacuating the vaues of performance indices, what has aowed us to perform the exhaustive search of optima fragmentation threshod to show how the fragmentation efficiency depends on faiures correation. As a future research activity, we propose extensions of this method to take into account a possibe presence of hidden stations as we as to consider to optimize a channe rate switching mechanism what promises to be effective in the case of correated faiures. Acknowedgment This work was partiay supported by Russian Science Support Foundation. References [1] G. Anastasi L. Lenzini, QoS Provided by the IEEE Wireess LAN to dvanced Data Appications: a Simuation Anaysis, Wireess Networks, vo. 6, no. 2, pp , [2] G. Bianchi, Performance Anaysis of the IEEE Distributed Coordination Function, IEEE Journa on Seected Areas in Communications, vo. 18, pp , March

10 [3] R.Bruno, M. Conti, E. Gregori, A Simpe Protoco for the Dynamic Tuning of the Backoff Mechanism in IEEE Networks, Computer Networks, vo. 37, no.1, pp , [4] F. Caí, M. Conti, E. Gregory, Dynamic Tuning of the IEEE Protoco to Achieve a Theoretica Throughput Limit, IEEE/ACM Transactions on Networking, vo. 8, pp , December [5] H.S. Chhaya S. Gupta, Performance Modeing of Asynchronous Data Transfer Methods of IEEE MAC Protoco, Wireess Networks, vo. 3, no. 3, pp , [6] E.N. Gibert, Capacity of a Burst-Noise Channe, Be Systems Technica Journa, vo. 39, pp , September [7] Higher-Speed Physica Layer Extension in the 2.4 GHz B, Suppement to [16]. [8] T.S. Ho K.C. Chen, Performance Anaysis of IEEE CSMA/CA Medium Access Contro Protoco, in Proceedings of the 7th IEEE Internationa Symposium on Persona, Indoor Mobie Radio Communications (PIMRC 96), Taipei, Taiwan, pp , [9] A. Lyakhov V. Vishnevsky, Optiona Toos of the Wi-Fi protoco: Study in Saturation, In Proc. Int. Workshop Distributed Computer Communication Networks (Stochastic Modeing Optimization) (DCCN-2003). Moscow, Russia, June 29 - Juy 5, pp , [10] A.I. Lyakhov V.M. Vishnevsky, Comparative Study of DCF its Modification in the Presence of Noise, To appear in Wireess Networks. [11] T.J. Schriber, Simuation using GPSS, John Wiey & Sons, [12] V.M. Vishnevsky A.I. Lyakhov, IEEE Wireess LAN: Saturation Throughput Anaysis with Seizing Effect Consideration, Custer Computing, vo. 5, pp , Apri [13] V.M. Vishnevsky A.I. Lyakhov, LANs: Saturation Throughput in the Presence of Noise, in Proceedings of the 2nd Internationa IFIP TC6 Networking Conference (Networking 2002), Pisa, Itay. - Lecture Notes in Computer Science, vo. 2345, pp , Springer-Verag, [14] H.S. Wang N. Moayeri, A Usefu Mode for Radio Communication Channe. IEEE Transactions on Vehicuar Technoogy, vo. 44, pp , February [15] A. Wiig, M. Kubisch, C. Hoene, A. Woisz, Measurements of a Wireess Link in an Industria Environment using an IEEE Compiant Physica Layer, IEEE Transactions on Industria Eectronics, vo. 43, pp , December [16] Wireess LAN Medium Access Contro (MAC) Physica Layer (PHY) Specifications, ANSI/IEEE Std , 1999 Edition. [17] Zorzi, M., R.R. Rao, On statistics of bock errors in bursty channes. IEEE Transactions on Communications, 45(6): ,

An Access Delay Model for IEEE e EDCA

An Access Delay Model for IEEE e EDCA 1 An Access Deay Mode for IEEE 82.11e EDCA Dongxia Xu, Student Member, IEEE, Taka Sakurai, Member, IEEE, and Hai L. Vu, Senior Member, IEEE Abstract In this paper, we anayse the MAC access deay of the

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

International Journal of Mass Spectrometry

International Journal of Mass Spectrometry Internationa Journa of Mass Spectrometry 280 (2009) 179 183 Contents ists avaiabe at ScienceDirect Internationa Journa of Mass Spectrometry journa homepage: www.esevier.com/ocate/ijms Stark mixing by ion-rydberg

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

A Comparison Study of the Test for Right Censored and Grouped Data

A Comparison Study of the Test for Right Censored and Grouped Data Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the

More information

HYDROGEN ATOM SELECTION RULES TRANSITION RATES

HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOING PHYSICS WITH MATLAB QUANTUM PHYSICS Ian Cooper Schoo of Physics, University of Sydney ian.cooper@sydney.edu.au HYDROGEN ATOM SELECTION RULES TRANSITION RATES DOWNLOAD DIRECTORY FOR MATLAB SCRIPTS

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels Deay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channes Jian Tan, Yang Yang, Ness B. Shroff, Hesham E Gama Department of Eectrica and Computer Engineering The Ohio State University,

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance

Radar/ESM Tracking of Constant Velocity Target : Comparison of Batch (MLE) and EKF Performance adar/ racing of Constant Veocity arget : Comparison of Batch (LE) and EKF Performance I. Leibowicz homson-csf Deteis/IISA La cef de Saint-Pierre 1 Bd Jean ouin 7885 Eancourt Cede France Isabee.Leibowicz

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Traffic data collection

Traffic data collection Chapter 32 Traffic data coection 32.1 Overview Unike many other discipines of the engineering, the situations that are interesting to a traffic engineer cannot be reproduced in a aboratory. Even if road

More information

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008 Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE

DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE DISTRIBUTION OF TEMPERATURE IN A SPATIALLY ONE- DIMENSIONAL OBJECT AS A RESULT OF THE ACTIVE POINT SOURCE Yury Iyushin and Anton Mokeev Saint-Petersburg Mining University, Vasiievsky Isand, 1 st ine, Saint-Petersburg,

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

FREQUENCY modulated differential chaos shift key (FM-

FREQUENCY modulated differential chaos shift key (FM- Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Age of Information: The Gamma Awakening

Age of Information: The Gamma Awakening Age of Information: The Gamma Awakening Eie Najm and Rajai Nasser LTHI, EPFL, Lausanne, Switzerand Emai: {eie.najm, rajai.nasser}@epf.ch arxiv:604.086v [cs.it] 5 Apr 06 Abstract Status update systems is

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Delay Analysis of Physical Layer Key Generation in Multi-user Dynamic Wireless Networks

Delay Analysis of Physical Layer Key Generation in Multi-user Dynamic Wireless Networks 1 Deay Anaysis of Physica Layer Key Generation in Muti-user Dynamic Wireess Networks Rong Jin, Xianru Du, Kai Zeng,Laiyuan Xiao, Jing Xu Department of Computer and Information Science, University of Michigan

More information

Asymptotic Gains of Generalized Selection Combining

Asymptotic Gains of Generalized Selection Combining Asymptotic Gains of Generaized Seection Combining Yao a Z Wang S Pasupathy Dept of ECpE Dept of ECE Dept of ECE Iowa State Univ Iowa State Univ Univ of Toronto, Emai: mayao@iastateedu Emai: zhengdao@iastateedu

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS

PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION SYSTEMS USING PARALLEL INTERFERENCE CANCELLATION RECEIVERS Internationa Journa of Bifurcation and Chaos, Vo. 14, No. 10 (2004) 3633 3646 c Word Scientific Pubishing Company PERFORMANCE ANALYSIS OF MULTIPLE ACCESS CHAOTIC-SEQUENCE SPREAD-SPECTRUM COMMUNICATION

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

An approximate method for solving the inverse scattering problem with fixed-energy data

An approximate method for solving the inverse scattering problem with fixed-energy data J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

AST 418/518 Instrumentation and Statistics

AST 418/518 Instrumentation and Statistics AST 418/518 Instrumentation and Statistics Cass Website: http://ircamera.as.arizona.edu/astr_518 Cass Texts: Practica Statistics for Astronomers, J.V. Wa, and C.R. Jenkins, Second Edition. Measuring the

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet

Numerical solution of one dimensional contaminant transport equation with variable coefficient (temporal) by using Haar wavelet Goba Journa of Pure and Appied Mathematics. ISSN 973-1768 Voume 1, Number (16), pp. 183-19 Research India Pubications http://www.ripubication.com Numerica soution of one dimensiona contaminant transport

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

Simplified analysis of EXAFS data and determination of bond lengths

Simplified analysis of EXAFS data and determination of bond lengths Indian Journa of Pure & Appied Physics Vo. 49, January 0, pp. 5-9 Simpified anaysis of EXAFS data and determination of bond engths A Mishra, N Parsai & B D Shrivastava * Schoo of Physics, Devi Ahiya University,

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

Width of Percolation Transition in Complex Networks

Width of Percolation Transition in Complex Networks APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model On the Performance of Wireess Energy Harvesting Networks in a Booean-Poisson Mode Han-Bae Kong, Ian Fint, Dusit Niyato, and Nicoas Privaut Schoo of Computer Engineering, Nanyang Technoogica University,

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

On some problems of synthesis of spatial five-bar hinged mechanisms with two degrees of freedom

On some problems of synthesis of spatial five-bar hinged mechanisms with two degrees of freedom Internationa Journa of Mechanica Engineering and Appications 014 (6): 104-110 Puished onine ecemer 18, 014 (http://www.sciencepuishinggroup.com/j/ijmea) doi: 10.11648/j.ijmea.014006.14 ISSN: 330-03X (Print)

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

MONTE CARLO SIMULATIONS

MONTE CARLO SIMULATIONS MONTE CARLO SIMULATIONS Current physics research 1) Theoretica 2) Experimenta 3) Computationa Monte Caro (MC) Method (1953) used to study 1) Discrete spin systems 2) Fuids 3) Poymers, membranes, soft matter

More information

USPAS Course on Recirculated and Energy Recovered Linacs

USPAS Course on Recirculated and Energy Recovered Linacs USPAS Course on Recircuated and Energy Recovered Linacs I. V. Bazarov Corne University D.R. Dougas, G. A. Krafft, and L. Merminga Jefferson Lab Computer Cass: Linear Optics in JLAB IRFEL, Longitudina gymnastics,

More information

Multiuser Power and Bandwidth Allocation in Ad Hoc Networks with Type-I HARQ under Rician Channel with Statistical CSI

Multiuser Power and Bandwidth Allocation in Ad Hoc Networks with Type-I HARQ under Rician Channel with Statistical CSI Mutiuser Power and Bandwidth Aocation in Ad Hoc Networks with Type-I HARQ under Rician Channe with Statistica CSI Xavier Leturc Thaes Communications and Security France xavier.eturc@thaesgroup.com Christophe

More information

Copyright information to be inserted by the Publishers. Unsplitting BGK-type Schemes for the Shallow. Water Equations KUN XU

Copyright information to be inserted by the Publishers. Unsplitting BGK-type Schemes for the Shallow. Water Equations KUN XU Copyright information to be inserted by the Pubishers Unspitting BGK-type Schemes for the Shaow Water Equations KUN XU Mathematics Department, Hong Kong University of Science and Technoogy, Cear Water

More information

Applied Nuclear Physics (Fall 2006) Lecture 7 (10/2/06) Overview of Cross Section Calculation

Applied Nuclear Physics (Fall 2006) Lecture 7 (10/2/06) Overview of Cross Section Calculation 22.101 Appied Nucear Physics (Fa 2006) Lecture 7 (10/2/06) Overview of Cross Section Cacuation References P. Roman, Advanced Quantum Theory (Addison-Wesey, Reading, 1965), Chap 3. A. Foderaro, The Eements

More information

c 2016 Georgios Rovatsos

c 2016 Georgios Rovatsos c 2016 Georgios Rovatsos QUICKEST CHANGE DETECTION WITH APPLICATIONS TO LINE OUTAGE DETECTION BY GEORGIOS ROVATSOS THESIS Submitted in partia fufiment of the requirements for the degree of Master of Science

More information

General Certificate of Education Advanced Level Examination June 2010

General Certificate of Education Advanced Level Examination June 2010 Genera Certificate of Education Advanced Leve Examination June 2010 Human Bioogy HBI6T/Q10/task Unit 6T A2 Investigative Skis Assignment Task Sheet The effect of using one or two eyes on the perception

More information

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy Rate Adaptation Games in Wireess LANs: Nash Equiibrium and Price of Anarchy Prasanna Chaporkar, Aexandre Proutiere, and Božidar Radunović Technica Report MSR-TR-2008-137 Microsoft Research Microsoft Corporation

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

REACTION BARRIER TRANSPARENCY FOR COLD FUSION WITH DEUTERIUM AND HYDROGEN

REACTION BARRIER TRANSPARENCY FOR COLD FUSION WITH DEUTERIUM AND HYDROGEN REACTION BARRIER TRANSPARENCY FOR COLD FUSION WITH DEUTERIUM AND HYDROGEN Yeong E. Kim, Jin-Hee Yoon Department of Physics, Purdue University West Lafayette, IN 4797 Aexander L. Zubarev Racah Institute

More information

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES 6 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES Sakae NAGAOKA* *Eectronic

More information

c 2007 Society for Industrial and Applied Mathematics

c 2007 Society for Industrial and Applied Mathematics SIAM REVIEW Vo. 49,No. 1,pp. 111 1 c 7 Society for Industria and Appied Mathematics Domino Waves C. J. Efthimiou M. D. Johnson Abstract. Motivated by a proposa of Daykin [Probem 71-19*, SIAM Rev., 13 (1971),

More information

Chemical Kinetics Part 2

Chemical Kinetics Part 2 Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate

More information

Statistical Inference, Econometric Analysis and Matrix Algebra

Statistical Inference, Econometric Analysis and Matrix Algebra Statistica Inference, Econometric Anaysis and Matrix Agebra Bernhard Schipp Water Krämer Editors Statistica Inference, Econometric Anaysis and Matrix Agebra Festschrift in Honour of Götz Trenker Physica-Verag

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Research Article Solution of Point Reactor Neutron Kinetics Equations with Temperature Feedback by Singularly Perturbed Method

Research Article Solution of Point Reactor Neutron Kinetics Equations with Temperature Feedback by Singularly Perturbed Method Science and Technoogy of Nucear Instaations Voume 213, Artice ID 261327, 6 pages http://dx.doi.org/1.1155/213/261327 Research Artice Soution of Point Reactor Neutron Kinetics Equations with Temperature

More information

A Robust Voice Activity Detection based on Noise Eigenspace Projection

A Robust Voice Activity Detection based on Noise Eigenspace Projection A Robust Voice Activity Detection based on Noise Eigenspace Projection Dongwen Ying 1, Yu Shi 2, Frank Soong 2, Jianwu Dang 1, and Xugang Lu 1 1 Japan Advanced Institute of Science and Technoogy, Nomi

More information