A Study of Spatial Packet Loss Correlation in Wireless Networks

Size: px
Start display at page:

Download "A Study of Spatial Packet Loss Correlation in Wireless Networks"

Transcription

1 A Study of Spatial Packet Loss Correlation in 82. Wireless Networks Zhe Wang, Mahbub Hassan School of Computer Science and Engineering University of New South Wales, Sydney 252, Australia {zhewang, Tim Moors School of Electrical Engineering and Telecommunications University of New South Wales, Sydney 252, Australia Abstract This paper examines the spatial correlation of packet loss events in IEEE 82. wireless networks for broadcast communications. We discuss limitations of previously used metrics to measure spatial loss correlation and show that the entropy correlation coefficient, which is based on the mutual information concept of Information Theory, can overcome these limitations. In our experiments, we find that the packet losses among closely located receivers are highly correlated when signal strength is high, but the correlation decreases with decreasing signal strength. The losses become totally independent once the signal strength falls below a threshold. As a first step to model the relationship between spatial loss correlation and signal strength, we find that the relationship can be approximated as a Gaussian cumulative distribution function. I. INTRODUCTION Packet loss is an important issue for IEEE 82. wireless networks. A great amount of research has been done to study the average packet loss rate, or the packet loss probability. However, a more fine-grained study of the issue of packet loss correlation also attracts the interest of the many researchers [] [3]. There are two kinds of packet loss correlation, namely temporal correlation and spatial correlation. The temporal loss correlation measures the packet loss pattern over time. It is often related to the issue of consecutive packet losses or the burstiness of packet loss by a single receiver. However,for multicast/broadcast communication, in which a single packet has multiple receivers, it is also useful to measure the correlation of losses by different receivers. We focus on such spatial loss correlation between receivers of a single transmission. The spatial correlation between receivers is important for its effect on the performance of error recovery protocols. If there is low correlation in loss between receivers that are near each other, then when one receiver loses a packet, it may be able to recover the lost packet from a nearby receiver. Thus, local retransmission is more effective when losses are less spatially correlated. The extent to which losses among multiple receivers are disjoint also influences error recovery when network coding is used to combine (e.g., XOR) multiple lost packets into a single retransmission [4], [5]. Despite the importance of spatial loss correlation in wireless networks, not much is known about this issue. In open literature, the 82. spatial loss correlation has been reported in [2] and [3]. Reis et al [2] stated qualitatively that the loss between receivers is roughly independent but did not present quantitative data about the loss correlation. Salyers et al [3] presented the results of a small range (distances of 3m 2m and packet loss rate of 2% %) experiment, and found, using conditional loss probability as a measure of loss correlation, that the loss correlation increases with distance. However, as we will demonstrate later in this paper, conditional loss probability alone cannot truly capture the statistical dependence among the losses observed at different receivers, hence may invalidate some of the conclusions reported in [3]. Clearly, further studies are needed to explore the issue of spatial packet loss correlation in wireless networks. Given that in many applications, e.g., 82.-based vehicular safety communication, the packet loss rate is up to 4% due to distance between the packet sender and receivers can be hundreds of meters ( [6], [7]), it is important to characterise spatial loss correlation for a wider range of distances than reported in [3]. In this paper, we study the effect of distance on packet loss correlation through a series of experiments. We make the following key contributions: We discuss the limitations of the metrics used to measure loss correlation in previous works and propose a new metric to overcome these limitations. We conduct a series of experiments representing a wide range of distances between the transmitter and the receivers. Applying the proposed metric, we find that the spatial packet loss correlation in our 82. network experiments decreases with the distance between sender and receivers. We take a first step to analytically model the loss correlation. We find that with signal strength as the independent variable, the proposed loss correlation metric can be approximated as a Gaussian cumulative distribution function. The rest of this paper is organized as follows: We review the related work in Section II. The limitation of previously used metrics to measure spatial loss correlation are discussed and the proposed metric is presented in Section III. We describe our experiments and discuss the findings in Section IV. We conclude in Section V. In the rest of this paper, the term loss correlation specifically refers to the spatial packet loss correlation

2 II. RELATED WORK Miu et al. [] have investigated whether separate 82. transmitters have correlated packet losses when observed at a single receiver. The metric used in [] to measure the correlation is based on the conditional and unconditional loss probability. If A is the event of the receiver losing a packet from transmitter and B is the event of the receiver losing a packet from transmitter 2, then the level of correlation can be measured by comparing the probability and P (A B). If equals P (A B), then the packet loss of is totally uncorrelated (probabilistic independent). At the other extreme, if P (A B) equals one, then the packet loss is totally correlated. The metric used to measure the loss correlation is the difference between P (A B) and. Thelevelof correlation is decided by the position of P (A B) in the range [, ].ThefurtherP (A B) is from and closer to, the higher the correlation is. Although the loss correlation issue we are investigating is different from [], the metric used in this work can also be applied to the case of one transmitter and two receivers. In our case, for any packet from the transmitter, A is the event of receiver losing the packet and B is the event of receiver 2 losing the packet. Reis et al [2] observed that the spatial loss correlation of 82. network in a office building is low. However, neither the metric used to measure the correlation nor the loss correlation data is shown in the paper. The most related work to our study is [3], in which the authors study the loss correlation for different 82. wireless cards at different distances between the sender and receivers. They measure the correlation using the conditional loss probability alone, instead of using the difference between the conditional and unconditional loss probabilities as in []. Using this metric, the authors report that the loss correlation increases when distance increased from 3m to 2m. In summary, previous works have measured the 82. packet loss correlation using different metrics. Before we start our study on how the loss correlation changes with the distance between sender and receivers, it is necessary to choose an appropriate metric to numerically measure the loss correlation. III. METRIC FOR SPATIAL LOSS CORRELATION In this section, we propose a metric to measure the loss correlation. We start by discussing the properties that the metric should have. The first property that the loss correlation metric should have is that it should indicate the statistical dependence of the packet loss between two receivers. In probability theory, the definition of two events A and B being independent is: P (AB)=P (B) [8]. Using the conditional probability P (A B) alone to measure the loss correlation as in [3] is problematic because only when P (A B)=, i.e., P (AB) P (B) =, can we get P (AB)=P (B). The conditional probability P (A B) does not indicate whether the packet losses of the two receivers are independent without considering its relationship with unconditional probability. The metric used in [], which is the relationship between conditional loss probability P (A B) and unconditional loss probability, satisfies this property. On one hand, if the ratio P (A B) =, we can get P (AB)=P (B), which means the packet loss is independent (uncorrelated). On the other hand, if the ratio P (A B) =, we can get P (A B) =, which means A B, i.e., the packet loss is % correlated. The ratio of the conditional probability P (A B) to the unconditional probability,, which is bounded by [, ], could be used to measure the loss correlation. The higher this ratio, the higher the packet loss is correlated between the two receivers. Instead of using the conditional loss probability, [9] uses the Pearson correlation coefficient to measure the spatial loss correlation in wired multicast networks. The Pearson correlation coefficient is a measure of linear dependence between two random variables [8], which ranges from - to. If the coefficient is or -, the two random variables have perfect linear positive or negative relationship (% correlated). If the coefficient is, the two random variables have no linear dependence. The coefficient being, i.e., no linear dependence, does not guarantee the statistical independence. In some cases, the two random variables (X and Y ) are dependent, e.g., Y = X 2 while the coefficient is. Therefore, the Pearson correlation coefficient is inadequate to measure the statistical dependence of the packet loss between two receivers. The second property that the loss correlation metric should have is that given the packet loss events (A and B) oftwo receivers, the metric (ρ) should have a unique value no matter which receiver is chosen as A or B, i.e.,ρ AB =ρ BA. The ratio of conditional loss probability over unconditional loss probability does not satisfy this property when P (A B) P (B A) P (B). By using conditional/unconditional loss probability ratio as the metric, we might have two possible measures for the loss correlation between the same pair of receivers. The third property the loss correlation metric should have is that the metric should have fixed upper and lower bounds. Without this property, it is hard to compare the level of loss correlation between two different pairs of receivers. For example, assume that we have two pairs of receivers (R, R2), and (R, R2 ). For (R, R2), the packet loss events are A and B respectively, and for (R, R2 ), the packet loss events are A and B respectively. By using the ratio of unconditional/conditional loss probabilities as the metric, we cannot compare the level of loss correlation of these two pairs if P (A P (A B) ) because the ratios: and P (A B ) P (A ) have different upper bounds ( and P (A )). Suppose that the packet loss of both these two pairs are % correlated (they have the same correlation level), comparing P (A B) (equals in this case) and P (A B ) P (A ) (equals P (A ) in this case) will lead to the wrong conclusion that the loss correlation of these two pairs are different. The metrics used in previous works do not have all the three properties discussed above. In the following, we propose a new metric that exhibits all these three properties. The entropy correlation coefficient [] is a metric to

3 Fig. : The experiment setup (to observe a large range of packet loss rates, the external antenna of sender node is not mounted). measure the dependency of two random variables, which is based on the entropy concept of information theory. If we have two random variables X and Y, the entropy correlation coefficient (ρ XY )isdefinedas: 2IXY ρ XY = () H X + H Y where H X and H Y are the entropies of X and Y respectively, and I XY is the mutual information of X and Y.Ifwedefine the random variables X and Y as: X = if a packet is received by receiver R, X =if the packet is lost by R ; Y =if the packet is received by receiver R 2, Y =if the packet is lost by R 2,thenwehave: H X = P (X = x)log 2 P (X = x) x=, RSSI Receiver Receiver Fig. 2: The average RSSI of the two receivers I XY = H Y = x= y= y=, P (Y = y)log 2 P (Y = y) P (X = x, Y = y)log 2 P (X = x, Y = y) P (X = x)p (Y = y) The entropy correlation coefficient (ρ XY ) in () is the measure of dependency of the packet loss of R and R 2 and it has the following properties: ρ XY =ρ YX, it has the same value no matter which receiver is chosen as X and which is chosen as Y. ρ XY, the upper and lower bounds are constants. ρ XY = if and only if X and Y are completely dependent, i.e., if we know the value of X, we can predict the value of Y with certainty. ρ XY = if and only if X and Y are independent, i.e., knowing the value of X does not help at all to predict the value of Y. In the following section, we conduct a series of experiments to study the loss correlation between two closely located receivers. By measuring the loss correlation using different metrics, we show that the entropy correlation coefficient is a better metric than the ones used in previous works. IV. EXPERIMENT A. Experiment Setup Our experiment setup consists of 3 Yawarra ALIX 3 [] single board computers. Each computer is equipped with a wireless card with the Atheros AR52 chipset. The wireless cards are driven by the Madwifi driver [2] with ath hal version.9.8. and ath pci version Because in the experiment environment there are WLAN networks operating in 82. b/g mode in 2.4GHz band, the wireless cards are set to 82.a mode in 5.8GHz to avoid interference from the existing systems. Placement of the three computers are shown in Fig.. The transmitting node is placed 4 meters away from the two receivers, which are themselves separated by 5cm 2.Thereis a clear line of sight between the transmitter and receivers. We set the packet length to bytes and the bit rate to 6Mbps, which is same as a typical vehicular safety application of 82. broadcast [3]. In our experiments, we do not change the placements of the nodes. To study the effect of transmitterreceiver distance, which affects the received signal strength at 2 In [3], the two receivers are separated by less than the wavelength of the radio signal. To compare with their results, we follow similar setup, where the inter-receiver distance of 5cm is less than the wavelength of 5.8GHz radio, which is 5.8cm.

4 Packet loss probability.. Packet loss probability.. P(A) P(A B) P(B) P(B A) (a) Packet loss probability of receiver (in log-scale) (b) Packet loss probability of receiver 2 (in log-scale) Fig. 3: The conditional and unconditional loss probabilities of the two receivers. and P (B) are the unconditional loss probabilities of receiver and 2 respectively. P (A B) and P (B A) are the conditional probabilities of a receiver losing a packet given that the other receiver loses the packet. the receivers, we repeat the experiment with different transmission power levels. Starting from the maximum transmission power (7 dbm) allowed by the wireless card, the transmission power is reduced by dbm for each experiment until 5 dbm. For each transmission power, the transmitting node broadcasts 2, packets with 2 ms gap between two consecutive packets. In order to observe a large range of packet loss rates, the external antenna is not mounted on the transmitting node (as shown in Fig. ). The receiving nodes are set to work in monitor mode so that the Receiving Signal Strength Indicator (RSSI) is included in the captured packet traces. Although the two receivers are very close to each other, which makes the path loss and channel fading have the same effect on them, they have different loss rates. By analyzing the RSSI of received packets as shown in Fig. 2, we find that the two receivers have slightly different signal to noise ratios (In Madwifi, the reported RSSI for each packet is equivalent to the signal to noise ratio [4]). The average RSSI of receiver is always lower than that of receiver 2. The difference remains the same even when we swap the locations and the external antennas. This might be caused by the variation of analog part of the hardware. B. Conditional/Unconditional Loss Probability The conditional and unconditional packet loss probabilities at different transmission powers are shown in Fig. 3. Note that, the transmission power range we applied increased unconditional loss probability by about folds from. at 7 dbm to.997 at 5 dbm. This would reflect a large variation in the transmitter-receiver distance for a fixed transmission power (In [3], the unconditional probability changes from.2 to., an increase of about 5 fold, when the distance increases from 3m to 2m). While the unconditional loss probabilities monotonically decrease with transmission power, the conditional loss prob- Conditional/unconditional loss probability ratio P(A B)/P(A) P(B A)/P(B) Fig. 4: The ratio of conditional/unconditional loss probability (in log-scale). abilities are V shape curves. When the transmission power is low, the conditional loss probability is close to one and decreases with the transmission power until it reaches the lowest point of the V shape and starts increasing with the transmission power until it reaches one. Fig. 3 clearly shows that the conditional loss probability alone cannot capture the statistical dependence among the losses of the two receivers. For example, when the transmission power is 8dBm, =.93 and P (A B)=.93; when the transmission power is 4dBm, =.9 and P (A B)=.93. Although the conditional loss probabilities are the same, the statistical dependence of packet loss of these two cases is fairly different. For 8dBm, we have P (A B)=, suggesting that there is little dependency, whereas for the case of 4dBm, P (A B) is much larger than, suggesting that the packet losses at two receivers are highly dependent.

5 Probability density function txpower=4dbm txpower=dbm txpower=6dbm txpower=2dbm μ =2.2 μ =7.4 μ =22.5 μ =9.2 σ=.68 σ=.77 σ=.7 σ=.79 Probability density function txpower=dbm μ =8.4 σ=.82 txpower=2dbm μ =2.9 σ=.79 σ=.79 txpower=4dbm μ =23. σ=.9 txpower=6dbm μ = RSSI RSSI (a) Receiver (b) Receiver 2 Fig. 6: The probability density of RSSI Reception Probability (R2) Reception Probability (R) Entropy Correlation Coefficient Fig. 5: The entropy correlation coefficient and packet reception probabilities (- and -P (B)) Fig. 3 also shows that the difference between the conditional loss probability and unconditional loss probability increases with transmission power. The ratio of conditional/unconditional loss probability is plotted in Fig. 4. Using the ratio as the loss correlation metric, we can see from Fig. 4 that the loss correlation monotonically increases with transmission power. Fig. 4 also shows that the two ratios: P (A B) are not always equal. For example, when the transmission power is 5dBm, is.5 times of P (A B) and P (B A) P (B) P (B A) P (B). Using the conditional/unconditional loss probability ratio as a metric to measure dependency, there would be two different measures for the loss correlation between the same pair of receivers. C. Entropy Correlation Coefficient From the packet trace collected by the two receivers, we derive the joint distribution of X and Y defined in Section III and calculate the entropy correlation coefficient using (). The results are shown in Fig. 5 (along with the packet reception probabilities at the receivers). We can see that the loss correlation decreases monotonically with decreasing transmission power. When the transmission power is high, i.e., above 6dBm, the entropy correlation coefficient is one, which means that the two receivers lose the same set of packets and if one receiver loses (or receives) a packet, we know the other also loses (or receives) it. Loss correlation starts to decrease as transmission power is reduced. When the transmission power is less than 8dBm, the entropy correlation coefficient is almost zero, which means that the two receivers independently lose packets and the knowledge of one receiver losing (receiving) a packet is not useful to predict the loss (reception) at the other receiver. Another interesting observation we make from Fig. 5 is that the curves of both the entropy correlation coefficient and the packet reception probabilities have the S shape, albeit the centre points and steepness are different. This observation suggests that we may be able to model loss correlation in a similar fashion the packet reception probability is modelled. We first discuss the possible reasons for the packet reception probabilities to exhibit the S shape. It is known that, if the signal strength attenuates according to log-normal shadowing model, then the S shaped Gaussian cumulative distribution function (CDF) can be used to determine the probability that the received signal strength (RSS) is greater than a threshold R (R th ) [5]. If our experimental radio environment is characterised by log-normal shadowing model, and if we assume that packets are received correctly only when the RSS exceeds a threshold (this assumption is used widely in the literature and simulation tools [6]), the packet reception probability can be approximated by Gaussian CDF. To investigated the radio model of our experimental environment, we plot the RSSI distribution for different transmission power in Fig. 6. Log-normal shadowing implies that RSS at specific transmitter-receiver separation is Gaussian (normal) distributed with the distance dependent mean and a constant standard

6 deviation [5]. In Fig. 6, we find that the probability density of RSSI is indeed Gaussian shaped, the mean is changing with transmission power (distance) and the standard deviation remains relatively stable. Such results indicate that the lognormal shadowing model is a good approximation of the received signal strength in our experiments (note that the unit of μ and σ in Fig. 6 is not dbm since RSSI is defined as an arbitrary integer value the 82. standard [7], and the precision of the integer is vendor dependent [8]). According to the log-normal shadowing model [5], the received signal strength (R) can be expressed as: Φ μ,σ (X) μ=, σ=.5 μ=, σ= μ=, σ=2 μ=-2, σ= R = T L + N (2) where T is the transmission signal strength, L is the path loss and N is a Gaussian random variable with zero mean and standard deviation σ (R, T and σ are measured in dbm). Given that T and L are static variables, R is Gaussian distributed with mean μ = T L and standard deviation σ. Based on (2), if we assume that there is a threshold of R(R th ) above which the packet will be successfully received, the packet reception probability (r) can be derived as: r = P (R >R th ) = P (N >R th T + L) = P (N <T R th L) Since N is Gaussian distributed with mean and standard deviation σ, weget: where r = 2 μ ( + erf(t )) (3) 2σ 2 μ = R th + L 2 z erf(z) = exp( x 2 ) dx. π Equation (3) has the same form as the CDF (Φ-function) of a Gaussian random variable with mean μ and standard deviation σ: Φ μ,σ (X) = μ ( + erf(x )) (4) 2 2σ 2 The Φ μ,σ (X) function with different parameters values are plotted in Fig. 7. It can be seen that parameter μ controls the position of the center point of the curve (increasing μ will shift the center point rightwards). Parameter σ controls the steepness of the curve (increasing σ will make the curve less steep). Using the curve fitting tool [9], we fit the packet reception probability from the experiment to the function Φ μ,σ (X) with unknown parameters μ and σ. The curve fitting results in Fig. 8 shows that the packet loss rate at different transmission powers can be accurately modeled by Φ μ,σ (X) function with parameters μ and σ being slightly different for different receivers. Now that we have reasonable clues why packet reception probability follows a Gaussian CDF, we proceed to examine Fig. 7: The Φ μ,σ (X) function with different parameters the curve of entropy correlation coefficient. Again using the curve fitting tool [9], we fit the entropy correlation coefficient to function Φ μ,σ (X). Fig. 9 shows that, like the packet reception probability, the entropy correlation coefficient also has a good fit to Gaussian CDF except the fact that the values of both its parameters, μ and σ, are larger than those of the packet reception probability. How to derive the parameters μ and σ of the Gaussian CDF that approximates spatial loss correlation remains a topic of ongoing research. V. CONCLUSION AND FUTURE WORKS Using indoor experiments, we have studied the spatial correlation of packet loss in IEEE 82. wireless networks when a packet transmitted by a single transmitter is to be received by multiple receivers. We have found that the metric used to measure the spatial loss correlation is an important factor. Specifically, we have shown that simply using conditional loss probabilities to measure loss correlation can lead to misleading conclusions. We have proposed and demonstrated that the entropy correlation coefficient, which is based on the mutual information concept of Information Theory, is a good metric to measure spatial packet loss correlation in wireless networks. Using this metric, we have discovered that the received signal strength (distance between the transmitter and the receivers) is a key factor that affects the spatial loss correlation. In our experiments, the packet losses among closely located receivers are highly correlated when the signal is strong, but the correlation falls with decreasing signal strength. The losses become totally independent once the signal strength falls below a threshold. Our finding suggests that the decay of entropy correlation coefficient can be approximated as a Gaussian CDF, the same function that models the packet reception probability at the receivers in a log-normal shadowing radio propagation environment. This finding serves as a first step to analytically model the spatial packet loss correlation. In future work, it will be useful to conduct more experiments to investigate the impact of 82. mode (a/b/g), data rate, packet size, and the distance between the two receivers, on the X

7 .9 Experiment data Φ μ,σ (X).9 Experiment Data Φ μ,σ (X).8.8 Packet Reception Probability Packet Reception Probability Transmission Power (dbm) Transmission Power (dbm) (a) Receiver : μ= 9.65 ( 95% confidence interval: (9.526, 9.777)) σ=.5 ( 95% confidence interval: (.973,.328)) SSE:.88 R-square:.9963 RMSE:.2825 (b) Receiver 2: μ= 8.94 ( 95% confidence interval: (8.82, 9.67)) σ=.957 ( 95% confidence interval: (.776,.38)) SSE:.9 R-square:.9953 RMSE:.349 Fig. 8: Φ μ,σ (X) approximation of packet reception probability. Entrophy Correlation Coefficient Experiment data Φ μ,σ (X) Transmission Power (dbm) Fig. 9: Φ μ,σ (X) curve fitting of entropy correlation coefficient μ=3.75 ( 95% confidence interval: [3.48, 4.2]) σ=.629, ( 95% confidence interval: [.25, 2.]) SSE:.28 R-square:.985 RMSE:.54 spatial packet loss correlation. These experiments may provide useful insight into the factors that affect the key features of the Gaussian CDF, i.e., the centre point and the steepness of the curve. In addition to studying the loss correlation in the interference free scenario, it may be worth considering the case when packet losses are also caused by collisions, which is common for applications where every node is a potential broadcaster (such as vehicular safety communication). REFERENCES [] A. Miu, G. Tan, H. Balakrishnan, and J. Apostolopoulos, Divert: finegrained path selection for wireless lans, in Proceedings of the 2nd international conference on Mobile systems, applications, and services. Boston, MA, USA: ACM, 24. [2] C. Reis, R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, Measurement-based models of delivery and interference in static wireless networks, in Proceedings of the 26 conference on Applications, technologies, architectures, and protocols for computer communications. Pisa, Italy: ACM, 26. [3] D. Salyers, A. Striegel, and C. Poellabauer, Wireless reliability: Rethinking 82. packet loss, in International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 28., June 28, pp. 4. [4] D. Nguyen, T. Tuan, N. Thinh, and B. Bose, Wireless broadcast using network coding, IEEE Transactions on Vehicular Technology, vol. 58, no. 2, pp , 29. [5] Z. Wang, M. Hassan, and T. Moors, Efficient loss recovery using network coding in vehicular safety communication, in IEEE Wireless Communications and Networking Conference, WCNC 2, Sydney, Australia, 2. [6] D. Jiang, T. Vikas, M. Andreas, H. Wieland, and H. Ralf, Design of 5.9Ghz DSRC-based vehicular safety communication, IEEE Wireless Communications, vol. 3, no. 5, pp , 26. [7] B. Fan and H. Krishnan, Reliability Analysis of DSRC Wireless Communication for Vehicle Safety Applications, in Intelligent Transportation Systems Conference, 26. ITSC 6. IEEE, 26, pp [8] J.L.Devore,Probability and statistics for engineering and the sciences, 7th ed. Belmont, 28. [9] M. Yajnik, J. Kurose, and D. Towsley, Packet loss correlation in the MBone multicast network, in Global Telecommunications Conference, 996. GLOBECOM 96., 996, pp [] I. Virtanen and J. Astola, On entropy-based dependence measures for two and three dimensional categorical variable distributions, in Proceedings of The First World Congress of Bernoulli Society for Mathematical Statistics and Probability, Tashkent, USSR, 986. [] Yawarra ALIX 3. [Online]. Available: [2] The MadWifi project. [Online]. Available: [3] T. ElBatt, K. G. Siddhartha, H. Gavin, K. Hariharan, and P. Jayendra, Cooperative collision warning using dedicated short range wireless

8 communications, in Proceedings of the 3rd international workshop on Vehicular ad hoc networks, VANET6. ACM Press, 26. [4] RSSI in Madwifi. [Online]. Available: [5] T. Rappaport, Wireless communications : principles and practice, 2nd ed. Prentice Hall, 22. [6] The official NS-2 webpage. [Online]. Available: Page [7] Part : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std. 82., 999. [8] The truth about 82. signal and noise metrics. [Online]. Available: believe D2.pdf [9] Curve fitting toolbox 2.2. The MathWorks, Inc. [Online]. Available:

The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation

The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation The Factor: Inferring Protocol Performance Using Inter-link Reception Correlation Kannan Srinivasan, Mayank Jain, Jung Il Choi, Tahir Azim, Edward S Kim, Philip Levis and Bhaskar Krishnamachari MobiCom

More information

A Black Box Measurement Method for Reliability of Wireless Communication

A Black Box Measurement Method for Reliability of Wireless Communication A Black Box Measurement Method for Reliability of Wireless Communication .@salzburgresearch.at ABSTRACT In the future, connected vehicles and automated factories will use wireless

More information

How long before I regain my signal?

How long before I regain my signal? How long before I regain my signal? Tingting Lu, Pei Liu and Shivendra S. Panwar Polytechnic School of Engineering New York University Brooklyn, New York Email: tl984@nyu.edu, peiliu@gmail.com, panwar@catt.poly.edu

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

DISTRIBUTED, CONFIDENCE-BASED LOCALIZATION FOR MOBILE SDRS

DISTRIBUTED, CONFIDENCE-BASED LOCALIZATION FOR MOBILE SDRS DISTRIBUTED, CONFIDENCE-BASED LOCALIZATION FOR MOBILE SDRS David Brady (ECE Dept, brady@ece.neu.edu) Mieczyslaw Kokar (ECE Dept, mkokar@coe.neu.edu) Kenneth Baclawski (College of CS, kenb@ccs.neu.edu)

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

VEHICULAR TRAFFIC FLOW MODELS

VEHICULAR TRAFFIC FLOW MODELS BBCR Group meeting Fri. 25 th Nov, 2011 VEHICULAR TRAFFIC FLOW MODELS AN OVERVIEW Khadige Abboud Outline Introduction VANETs Why we need to know traffic flow theories Traffic flow models Microscopic Macroscopic

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #19 Vehicular Network Security & Privacy 2016 Patrick Tague 1 Class #19 Review of some vehicular network stuff How wireless attacks affect vehicle

More information

A Computationally Efficient Block Transmission Scheme Based on Approximated Cholesky Factors

A Computationally Efficient Block Transmission Scheme Based on Approximated Cholesky Factors A Computationally Efficient Block Transmission Scheme Based on Approximated Cholesky Factors C. Vincent Sinn Telecommunications Laboratory University of Sydney, Australia cvsinn@ee.usyd.edu.au Daniel Bielefeld

More information

Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks

Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Collaborative Localization Using Weighted Centroid Localization (WCL) Algorithm in CR Networks Simulation and Theoretical Results Jun Wang Paulo Urriza Prof. Danijela Čabrić UCLA CORES Lab March 12, 2010

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining

Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining Secrecy Outage erformance of Cooperative Relay Network With Diversity Combining Khyati Chopra Dept. of lectrical ngineering Indian Institute of Technology, Delhi New Delhi-110016, India mail: eez148071@ee.iitd.ac.in

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

Acceptance Test Report. C CVII Task 2

Acceptance Test Report. C CVII Task 2 6980-02941-01-07 1.1 02-Feb-2010 1 (30) Customer Contract Number C030588 Customer Contract Start/Finish Dates 21-Jan-2009 to 31-Dec-2010 C030588 CVII Task 2 Task 2 provides the base VII infrastructure

More information

Achievable Performance Improvements. Provided by Route Diversity in Multihop. Wireless Networks

Achievable Performance Improvements. Provided by Route Diversity in Multihop. Wireless Networks Achievable Performance Improvements 1 Provided by Route Diversity in Multihop Wireless Networks Stephan Bohacek University of Delaware Department of Electrical and Computer Engineering Newark, DE 19716

More information

Discrete Random Variables

Discrete Random Variables CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is

More information

2DI90 Probability & Statistics. 2DI90 Chapter 4 of MR

2DI90 Probability & Statistics. 2DI90 Chapter 4 of MR 2DI90 Probability & Statistics 2DI90 Chapter 4 of MR Recap - Random Variables ( 2.8 MR)! Example: X is the random variable corresponding to the temperature of the room at time t. x is the measured temperature

More information

Realistic Performance Model for Vehicle-to-Infrastructure Communications

Realistic Performance Model for Vehicle-to-Infrastructure Communications Realistic Performance Model for Vehicle-to-Infrastructure Communications Veronika Shivaldova,AndreasWinkelbauer,ChristophF.Mecklenbräuker Institute of Telecommunications, Vienna University of Technology

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Empirical Study of Traffic Velocity Distribution and its Effect on VANETs Connectivity

Empirical Study of Traffic Velocity Distribution and its Effect on VANETs Connectivity Empirical Study of Traffic Velocity Distribution and its Effect on VANETs Connectivity Sherif M. Abuelenin Department of Electrical Engineering Faculty of Engineering, Port-Said University Port-Fouad,

More information

Probability theory. References:

Probability theory. References: Reasoning Under Uncertainty References: Probability theory Mathematical methods in artificial intelligence, Bender, Chapter 7. Expert systems: Principles and programming, g, Giarratano and Riley, pag.

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

A tool oriented approach to network capacity. Ralf Koetter Michelle Effros Muriel Medard

A tool oriented approach to network capacity. Ralf Koetter Michelle Effros Muriel Medard A tool oriented approach to network capacity Ralf Koetter Michelle Effros Muriel Medard ralf.koetter@tum.de effros@caltech.edu medard@mit.edu The main theorem of NC [Ahlswede, Cai, Li Young, 2001] Links

More information

Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure

Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure Abdulla A. Hammad, Terence D. Todd, George Karakostas and Dongmei Zhao Department of Electrical and Computer Engineering McMaster

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

A GENERALISED (M, N R ) MIMO RAYLEIGH CHANNEL MODEL FOR NON- ISOTROPIC SCATTERER DISTRIBUTIONS

A GENERALISED (M, N R ) MIMO RAYLEIGH CHANNEL MODEL FOR NON- ISOTROPIC SCATTERER DISTRIBUTIONS A GENERALISED (M, N R MIMO RAYLEIGH CHANNEL MODEL FOR NON- ISOTROPIC SCATTERER DISTRIBUTIONS David B. Smith (1, Thushara D. Abhayapala (2, Tim Aubrey (3 (1 Faculty of Engineering (ICT Group, University

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Radio Network Clustering from Scratch

Radio Network Clustering from Scratch Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

A Network Shadow Fading Gain Model For. Autonomous Cellular Networks

A Network Shadow Fading Gain Model For. Autonomous Cellular Networks A Network Shadow Fading Gain Model For 1 Autonomous Cellular Networks Bijan Golkar, Student Member, IEEE and Elvino S. Sousa, Fellow, IEEE Department of Electrical and Computer Engineering, University

More information

Aerial Anchors Positioning for Reliable RSS-Based Outdoor Localization in Urban Environments

Aerial Anchors Positioning for Reliable RSS-Based Outdoor Localization in Urban Environments 1 Aerial Anchors Positioning for Reliable RSS-Based Outdoor Localization in Urban Environments Hazem Sallouha, Mohammad Mahdi Azari, Alessandro Chiumento, Sofie Pollin arxiv:1711.06014v2 [cs.ni] 5 Dec

More information

The Impact of Correlated Blocking on Millimeter-Wave Personal Networks

The Impact of Correlated Blocking on Millimeter-Wave Personal Networks The Impact of Correlated Blocking on Millimeter-Wave Personal Networks Enass Hriba and Matthew C. Valenti West Virginia University, Morgantown, WV, USA. arxiv:89.8372v [cs.it] 22 Sep 28 Abstract Due to

More information

The Fading Number of a Multiple-Access Rician Fading Channel

The Fading Number of a Multiple-Access Rician Fading Channel The Fading Number of a Multiple-Access Rician Fading Channel Intermediate Report of NSC Project Capacity Analysis of Various Multiple-Antenna Multiple-Users Communication Channels with Joint Estimation

More information

A Systematic Description of Source Significance Information

A Systematic Description of Source Significance Information A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh

More information

Integrating an physical layer simulator in NS-3

Integrating an physical layer simulator in NS-3 Integrating an 802.11 physical layer simulator in NS-3 Stylianos Papanastasiou Signals and Systems stypap@chalmers.se Outline Motivation Planned activity The implementation Validation, tradeoffs Future

More information

Analysis of Urban Millimeter Wave Microcellular Networks

Analysis of Urban Millimeter Wave Microcellular Networks Analysis of Urban Millimeter Wave Microcellular Networks Yuyang Wang, KiranVenugopal, Andreas F. Molisch, and Robert W. Heath Jr. The University of Texas at Austin University of Southern California TheUT

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

The Impact of Fading and Interference Cancelation On Node Density Outage Probability Tradeoff in Wireless Networks

The Impact of Fading and Interference Cancelation On Node Density Outage Probability Tradeoff in Wireless Networks The Impact of Fading and Interference Cancelation On Node Density Outage Probability Tradeoff in Wireless Networks Vladimir Mordachev Electromagnetic Compatibility Laboratory Belorussian State University

More information

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong Multi-User Gain Maximum Eigenmode Beamforming, and IDMA Peng Wang and Li Ping City University of Hong Kong 1 Contents Introduction Multi-user gain (MUG) Maximum eigenmode beamforming (MEB) MEB performance

More information

Estimation of the Capacity of Multipath Infrared Channels

Estimation of the Capacity of Multipath Infrared Channels Estimation of the Capacity of Multipath Infrared Channels Jeffrey B. Carruthers Department of Electrical and Computer Engineering Boston University jbc@bu.edu Sachin Padma Department of Electrical and

More information

TCP over Cognitive Radio Channels

TCP over Cognitive Radio Channels 1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done

More information

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment

Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Failure-Resilient Ad Hoc and Sensor Networks in a Shadow Fading Environment Christian Bettstetter DoCoMo Euro-Labs, Future Networking Lab, Munich, Germany lastname at docomolab-euro.com Abstract This paper

More information

Multiple-Input Multiple-Output Systems

Multiple-Input Multiple-Output Systems Multiple-Input Multiple-Output Systems What is the best way to use antenna arrays? MIMO! This is a totally new approach ( paradigm ) to wireless communications, which has been discovered in 95-96. Performance

More information

The Impact of Directional Antenna Models on Simulation Accuracy

The Impact of Directional Antenna Models on Simulation Accuracy The Impact of Directional Antenna Models on Simulation Accuracy Eric Anderson, Gary Yee, Caleb Phillips, Douglas Sicker, and Dirk Grunwald eric.anderson@colorado.edu University of Colorado Department of

More information

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels

The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels The Effect of Memory Order on the Capacity of Finite-State Markov and Flat-Fading Channels Parastoo Sadeghi National ICT Australia (NICTA) Sydney NSW 252 Australia Email: parastoo@student.unsw.edu.au Predrag

More information

A Markov Chain Model for Coarse Timescale Channel Variation in an e Wireless Network

A Markov Chain Model for Coarse Timescale Channel Variation in an e Wireless Network 212 Proceedings IEEE INFOCOM A Markov Chain Model for Coarse Timescale Channel Variation in an 82.16e Wireless Network Anand Seetharam 1, Jim Kurose 1, Dennis Goeckel 2, Gautam Bhanage 3, 1 Department

More information

Optimal Association of Stations and APs in an IEEE WLAN

Optimal Association of Stations and APs in an IEEE WLAN Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

Comparisons of Performance of Various Transmission Schemes of MIMO System Operating under Rician Channel Conditions

Comparisons of Performance of Various Transmission Schemes of MIMO System Operating under Rician Channel Conditions Comparisons of Performance of Various ransmission Schemes of MIMO System Operating under ician Channel Conditions Peerapong Uthansakul and Marek E. Bialkowski School of Information echnology and Electrical

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN

Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

2314 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE 2011

2314 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE 2011 2314 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, JUNE 2011 On the Information Propagation Process in Mobile Vehicular Ad Hoc Networks Zijie Zhang, Student Member, IEEE, Guoqiang Mao, Senior

More information

Identifying multiple RFID tags in high interference environments

Identifying multiple RFID tags in high interference environments Identifying multiple RFID tags in high interference environments Jonnatan Avilés-González jonnatan.aviles@gmail.com Tecnológico de Monterrey Neale R. Smith nsmith@itesm.mx Tecnológico de Monterrey César

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

These are special traffic patterns that create more stress on a switch

These are special traffic patterns that create more stress on a switch Myths about Microbursts What are Microbursts? Microbursts are traffic patterns where traffic arrives in small bursts. While almost all network traffic is bursty to some extent, storage traffic usually

More information

Fine-Grained vs. Average Reliability for V2V Communications around Intersections

Fine-Grained vs. Average Reliability for V2V Communications around Intersections Fine-Grained vs. Average Reliability for V2V Communications around Intersections Mouhamed Abdulla and Henk Wymeersch Department of Electrical Engineering, Division of Communication and Antenna Systems

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

Session III: New ETSI Model on Wideband Speech and Noise Transmission Quality Phase II. STF Validation results

Session III: New ETSI Model on Wideband Speech and Noise Transmission Quality Phase II. STF Validation results Session III: New ETSI Model on Wideband Speech and Noise Transmission Quality Phase II STF 294 - Validation results ETSI Workshop on Speech and Noise in Wideband Communication Javier Aguiar (University

More information

Meta-heuristic Solution for Dynamic Association Control in Virtualized Multi-rate WLANs

Meta-heuristic Solution for Dynamic Association Control in Virtualized Multi-rate WLANs Meta-heuristic Solution for Dynamic Association Control in Virtualized Multi-rate WLANs Dawood Sajjadi, Maryam Tanha, Jianping Pan Department of Computer Science, University of Victoria, BC, Canada November

More information

Performance Analysis of MIMO-OSTBC based Selective DF Cooperative Wireless System with Node Mobility and Channel Estimation Errors

Performance Analysis of MIMO-OSTBC based Selective DF Cooperative Wireless System with Node Mobility and Channel Estimation Errors System Model Performance Analysis of MIMO-OSTBC based Selective DF Cooperative Wireless System with Node Mobility and Channel Estimation Errors Multimedia Wireless Networks (MWN) Group, Indian Institute

More information

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

SINR Model with Best Server Association for High Availability Studies of Wireless Networks

SINR Model with Best Server Association for High Availability Studies of Wireless Networks SINR Model with Best Server Association for High Availability Studies of Wireless Networks 1 David Öhmann, Ahmad Awada, Ingo Viering, Meryem Simsek, Gerhard P. Fettweis arxiv:1510.04503v2 [cs.ni] 29 Oct

More information

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

Kalman filtering with intermittent heavy tailed observations

Kalman filtering with intermittent heavy tailed observations Kalman filtering with intermittent heavy tailed observations Sabina Zejnilović Abstract In large wireless sensor networks, data can experience loss and significant delay which from the aspect of control

More information

(Classical) Information Theory III: Noisy channel coding

(Classical) Information Theory III: Noisy channel coding (Classical) Information Theory III: Noisy channel coding Sibasish Ghosh The Institute of Mathematical Sciences CIT Campus, Taramani, Chennai 600 113, India. p. 1 Abstract What is the best possible way

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

Statistics of Correlated Generalized Gamma Variates

Statistics of Correlated Generalized Gamma Variates Statistics of Correlated Generalized Gamma Variates Petros S. Bithas 1 and Theodoros A. Tsiftsis 2 1 Department of Electrical & Computer Engineering, University of Patras, Rion, GR-26500, Patras, Greece,

More information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr

More information

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming

Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Random Access: An Information-Theoretic Perspective

Random Access: An Information-Theoretic Perspective Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of

More information

Modeling realistic underwater acoustic networks using experimental data

Modeling realistic underwater acoustic networks using experimental data Modeling realistic underwater acoustic networks using experimental data Mandar Chitre Department of Electrical and Computer Engineering, and ARL, Tropical Marine Science Institute, National University

More information

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks

Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works

More information

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS 1 AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS Shensheng Tang, Brian L. Mark, and Alexe E. Leu Dept. of Electrical and Computer Engineering George Mason University Abstract We apply a

More information

Ranging detection algorithm for indoor UWB channels

Ranging detection algorithm for indoor UWB channels Ranging detection algorithm for indoor UWB channels Choi Look LAW and Chi XU Positioning and Wireless Technology Centre Nanyang Technological University 1. Measurement Campaign Objectives Obtain a database

More information

On capacity of multi-antenna wireless channels: Effects of antenna separation and spatial correlation

On capacity of multi-antenna wireless channels: Effects of antenna separation and spatial correlation 3rd AusCTW, Canberra, Australia, Feb. 4 5, 22 On capacity of multi-antenna wireless channels: Effects of antenna separation and spatial correlation Thushara D. Abhayapala 1, Rodney A. Kennedy, and Jaunty

More information

Review of the role of uncertainties in room acoustics

Review of the role of uncertainties in room acoustics Review of the role of uncertainties in room acoustics Ralph T. Muehleisen, Ph.D. PE, FASA, INCE Board Certified Principal Building Scientist and BEDTR Technical Lead Division of Decision and Information

More information

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity

On the K-user Cognitive Interference Channel with Cumulative Message Sharing Sum-Capacity 03 EEE nternational Symposium on nformation Theory On the K-user Cognitive nterference Channel with Cumulative Message Sharing Sum-Capacity Diana Maamari, Daniela Tuninetti and Natasha Devroye Department

More information

Fading Statistical description of the wireless channel

Fading Statistical description of the wireless channel Channel Modelling ETIM10 Lecture no: 3 Fading Statistical description of the wireless channel Fredrik Tufvesson Department of Electrical and Information Technology Lund University, Sweden Fredrik.Tufvesson@eit.lth.se

More information

Beam Based Stochastic Model of the Coverage Probability in 5G Millimeter Wave Systems

Beam Based Stochastic Model of the Coverage Probability in 5G Millimeter Wave Systems Beam Based Stochastic Model of the Coverage Probability in 5G Millimeter Wave Systems Cristian Tatino, Ilaria Malanchini, Danish Aziz, Di Yuan Department of Science and Technology, Linköping University,

More information

CONSTRAINT KALMAN FILTER FOR INDOOR BLUETOOTH LOCALIZATION

CONSTRAINT KALMAN FILTER FOR INDOOR BLUETOOTH LOCALIZATION CONSTRAINT KALMAN FILTER FOR INDOOR BLUETOOTH LOCALIZATION Liang Chen, Heidi Kuusniemi, Yuwei Chen, Jingbin Liu, Ling Pei, Laura Ruotsalainen, and Ruizhi Chen NLS Finnish Geospatial Research Institute

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

Revision of Lecture 4

Revision of Lecture 4 Revision of Lecture 4 We have completed studying digital sources from information theory viewpoint We have learnt all fundamental principles for source coding, provided by information theory Practical

More information

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Cross-layer Theoretical Analysis of NC-aided Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Angelos Antonopoulos, Member, IEEE, Aris S. Lalos, Member, IEEE, arxiv:408.609v

More information

A Model of Soft Handoff under Dynamic Shadow Fading

A Model of Soft Handoff under Dynamic Shadow Fading A Model of Soft Handoff under Dynamic Shadow Fading Kenneth L Clarkson John D Hobby September 22, 2003 Abstract We introduce a simple model of the effect of temporal variation in signal strength on active-set

More information

Perfect Modeling and Simulation of Measured Spatio-Temporal Wireless Channels

Perfect Modeling and Simulation of Measured Spatio-Temporal Wireless Channels Perfect Modeling and Simulation of Measured Spatio-Temporal Wireless Channels Matthias Pätzold Agder University College Faculty of Engineering and Science N-4876 Grimstad, Norway matthiaspaetzold@hiano

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

Vehicle-to-Vehicle Communications with Urban Intersection Path Loss Models

Vehicle-to-Vehicle Communications with Urban Intersection Path Loss Models Vehicle-to-Vehicle Communications with Urban ntersection Path Loss Models Mouhamed Abdulla, Erik Steinmetz, and Henk Wymeersch Department of Signals and Systems Chalmers University of Technology, Sweden

More information

MATHEMATICAL TOOLS FOR DIGITAL TRANSMISSION ANALYSIS

MATHEMATICAL TOOLS FOR DIGITAL TRANSMISSION ANALYSIS ch03.qxd 1/9/03 09:14 AM Page 35 CHAPTER 3 MATHEMATICAL TOOLS FOR DIGITAL TRANSMISSION ANALYSIS 3.1 INTRODUCTION The study of digital wireless transmission is in large measure the study of (a) the conversion

More information