1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] W
|
|
- Gilbert Wilkins
- 5 years ago
- Views:
Transcription
1 [] LAN NEC 一般社団法人 電子情報通信学会 信学技報 THE INSTITUTE OF ELECTRONICS, IEICE Technical Report INFORMATION AND COMMUNICATION ENGINEERS ASN (216-5) (WLAN) WLAN WLAN WLAN WLAN IEEE 82.11, LAN Throughput characteristics Analysis of Wireless LANs considering Inter-network Interference Takumi AOKI, Kosuke SANADA, Nobuyoshi KOMURO, Gen MOTOYOSHI, Norio YAMAGAKI, Shigeo SHIODA, Shiro SAKATA, Tsutomu MURASE, and Hiroo SEKIYA Graduate School of Advanced Integration Science, Chiba University 1-33, Yayoi-cho, Inage-ku, Chiba, Japan Graduate School of Engineering, Mie University 1577, Kurimamachiya-cho, Tsu-shi, Mie, Japan Cloud System Research Laboratories, NEC Corpration 1753 Shimonumabe, Nakahara-ku, Kawasaki, Japan Information Technology Center, Nagoya University Furo-cho, Chikusa-ku, Nagoya, Japan Abstract Recently, the environment where there are many Access-Points(AP) in a small area exists everywhere. In this environment, network throughput of certain WLAN reduces significantly because of inter-network interference. This manuscript presents analitycal expressions of network throughputs for wireless LANs with airtime concepts taking into account inter-network interference. each network throughput can be obtained analytically by expressing frame collision probability and frame-existence probabilities with respect to each node. The validities of the analytical explessions are confirmed from quantitative agreements between analytical and simulation results. Key words IEEE 82.11, throughput analysis, inter-network, interference, WLAN 75 This article is a technical report without peer review, and its polished and/or extended version may be published elsewhere. Copyright 216 by IEICE
2 1. WiMAX Wi-Fi Wi-Fi (AP) Wi-Fi 1 1 AP AP WLAN [1] [1] [1] WLAN [4] WLAN WLAN WLAN 1 WLAN WLAN WLAN N =3 [1] WLAN Network 1 Network 2 Network N 1 3 WLAN 2. 2 [1] 1 [4] [4]- [7] WLAN 76
3 UDP 2. WLAN i [, T ime] i X i = lim T ime S i T ime S i i (DIFS + F RAME + SIFS + ACK) DIFS DIFS(DCF InterFrame Space) F RAME SIFS SIFS(Short InterFrame Space) ACK ACK (1) i E i = Xi(1 γi)p T γ i i T P 3. 2 i i Y i = X i 1(1 γ i 1,i)+X i+1(1 γ i+1,i) Xi 1(1 γi 1,i)Xi+1(1 γi+1,i) (3) 1 X i γ j,i j i X i γ j,i = γ i,j i i 1 i (1) (2) Z i =1 X i Y i (4) 3. 4 i i 1 ( q i =min 1, λ ) iv i σ (5) Z i σ V i i λ i i λ i = Oi P O i i q i < 1 i q i =1 i min 3. 5 [8] i K G i = Ri V i = γi s s= K γi s W s 2 s= R i i 1 2 s (CW min +1) 1 < = s < = K 1 W s = 2 K (CW min +1) 1=CW max K < = s < = K CW min CW max Contention Window K = log 2 CW max +1 CW min +1 K (5) (7) i (6) (7) (8) τ i = q ig i (9) 1 X i = q iz i G i T σ (1) σ q i Z i i (4) (1) 2 77
4 3. 6 i i ± 1 U j,i U i,i±1 = Z i±1 1 X i±1 X i(1 γ i,i±1) (11) WLAN 2 N 1 1 N 2 N 1 1 N j i γ j,i j i i i τ i (j =2,i=1or j = N 1,i= N) γ j,i = (12) U j,i τ i (otherwise) τ i i (12) γ i =1 (1 γ i,j ) (13) j=i+1 j=i 1 j =i (3) (4) (5) (7) (12) (1) X i N 4. 1 N =3, 4 N =3 1 N = (a), 4(b) Mbps 2 1 Data payload 15 bytes PHY header 24 bytes MAC header 24 bytes ACK size 1 bytes Data rate 54 Mbps ACK bit rate 24 Mbps DATA 252 μs DIFS 34 μs SIFS 16 μs Slot time(σ) 9 μs CW min 15 CW max 123 Retry limit(k) 7 Inter-network distance 3 m Transmission range 45 m Carrier sense range 45 m 1 2(c) 13.3 Mbps ,2 4(c) 4(d) Mbps N =4 5(a), 5(b) 13.2 Mbps (c) (c) 5(d) Mbps Mbps Mbps
5 3 4(c) LAN LAN [1],,,,,,,,,, Wi-Fi Wi-Fi, 215, 216. [2] Minh Huy Bui, Kokuse Sanada, Nobuyoshi Komuro, Shigeo Shioda, Shiro Sakata, Kazunori Miyoshi, Tutomu Murase and Hiroo Sekiya, Throughput analysis of wireless networks with Tethering function, IEEE Wireless communications and networking conference (WCNC215), pp , Mar [3],,,,,,,,,, vol.115, no.3, pp.81-86, Nov [4] P. C. Ng, and S. C. Liew, Throughput analysis of IEEE multi-hop ad hoc networks, IEEE/ACM Trans. Networking, vol. 15, no. 2, pp , Apr. 27. [5] Y. D. Barowski, S. Biaz, and P. Agrawal, Towards the Performance Analysis of IEEE in Multi-hop Ad-Hoc Network, Proc. WCNC, New Orleans, USA, vol. 1, pp. 1-16, Mar. 25. [6] J. Shi, H. Sekiya, K. Sanada, N. Komuro, and S. Sakata, Delay Analysis for IEEE String Topology Multi-hop Networks, Proc. NCSP, Hawaii, USA, vol. 15, no. 2, pp , Mar [7] K. Sanada, J. Shi, N. Komuro, and H. Sekiya, End-to-end delay analysis for IEEE string-topology multi-hop networks, IEICE Trans. on Communications, vol. E98-B, no. 7, pp , July [8] A. Kumar, E. Altman, D. Miorandi, and M. Goyal,, New insights from a fixed point analysis of single cell IEEE Wireless LANs, IEEE/ACM Trans. Networking, vol. 15, no. 3, pp , Jun. 27. Collision probability (a) (b) (c).3 5 Network (d) 2 3 (a): (b): (c): (d): ( ) 79
6 Carrier sense airtime (a) 1 Network (b) (a) (b) (c) Collision probability.3 5 Network (d) 3 4 (a): (c): (b): (d): ( ) (c) 8
7 Collision probability Network (d) 4 3 (a): (c): (b): (d): ( ) Carrier sense airtime 1 Network (c) (a) Collision probability.3 5 Network (d) 5 4 (a): (c): (b): (d): ( ) (b) 81
A study on wheelchair-users detection in a crowded scene by integrating multiple frames
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 一般社団法人電子情報通信学会 信学技報 THE INSTITUTE OF ELECTRONICS, IEICE Technical Report INFORMATION AND COMMUNICATION ENGINEERS
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationWiFi MAC Models David Malone
WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationPerformance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel
Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area
More informationPerformance Evaluation of Deadline Monotonic Policy over protocol
Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com
More informationModeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure Wireless LANs
Modeling the Effect of Transmission Errors on TCP Controlled Transfers over Infrastructure 8 Wireless LANs ABSTRACT Subhashini Krishnasamy Dept of Electrical Communication Engg Indian Institute of Science,
More informationService differentiation without prioritization in IEEE WLANs
Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs
More informationOptimal Association of Stations and APs in an IEEE WLAN
Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations
More informationModeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals
Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science
More informationExact Distribution of Access Delay in IEEE DCF MAC
Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,
More informationOptimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks
Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Kyung-Joon Park, Jihyuk Choi, and Jennifer C. Hou Department of Computer Science University of Illinois at
More informationMathematical Analysis of IEEE Energy Efficiency
Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne
More informationDetecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis
Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu
More informationOptimization of IEEE Multirate Wireless LAN
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 26 77-785 (200) Optimization of IEEE 802 Multirate Wireless LAN A V BABU LILLYKUTTY JACOB AND S ABDUL SUBHAN Department of Electronics and Communication Engineering
More informationFlow-level performance of wireless data networks
Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model
More informationPerformance analysis of IEEE WLANs with saturated and unsaturated sources
1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract
More informationA Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.
Report No. UIUCDCS-R-26-27 UILU-ENG-26-743 A Comprehensive Study of the IEEE 82.e Enhanced Distributed Control Access EDCA) Function by Chunyu Hu and Jennifer C. Hou April 26 A Comprehensive Study of the
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationA Game-Theoretic Model for Medium Access Control
A Game-Theoretic Model for Medium Access Control (Invited Paper) Lijun Chen, Tao Cui, Steven H. Low, and John C. Doyle Division of Engineering and Applied Science California Institute of Technology Pasadena,
More informationEffective Carrier Sensing in CSMA Networks under Cumulative Interference
INFOCOM 2010 Effective Carrier Sensing in MA Networks under Cumulative Interference Liqun Fu Soung Chang Liew Jianwei Huang Department of Information Engineering, The Chinese University of Hong Kong Introduction
More informationMax-min Fairness in Mesh Networks
Max-min Fairness in 802. Mesh Networks Douglas J. Leith, Qizhi Cao, Vijay G. Subramanian Hamilton Institute, NUI Maynooth arxiv:002.58v2 [cs.ni] 3 Mar 200 Abstract In this paper we build upon the recent
More informationTCP over Cognitive Radio Channels
1/43 TCP over Cognitive Radio Channels Sudheer Poojary Department of ECE, Indian Institute of Science, Bangalore IEEE-IISc I-YES seminar 19 May 2016 2/43 Acknowledgments The work presented here was done
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationCross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)
Cross-layer Theoretical Analysis of NC-aided Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Angelos Antonopoulos, Member, IEEE, Aris S. Lalos, Member, IEEE, arxiv:408.609v
More informationComputer Networks ( Classroom Practice Booklet Solutions)
Computer Networks ( Classroom Practice Booklet Solutions). Concept Of Layering 0. Ans: (b) Sol: Data Link Layer is responsible for decoding bit stream into frames. 0. Ans: (c) Sol: Network Layer has the
More informationMeta-heuristic Solution for Dynamic Association Control in Virtualized Multi-rate WLANs
Meta-heuristic Solution for Dynamic Association Control in Virtualized Multi-rate WLANs Dawood Sajjadi, Maryam Tanha, Jianping Pan Department of Computer Science, University of Victoria, BC, Canada November
More informationIntercomparison of delayed neutron summation calculations among JEF2.2, ENDF/B-VI and JNDC-V2
Intercomparison of delayed neutron summation calculations among JEF2.2, ENDF/B-VI and JNDC-V2 M.Sagisaka, K.Oyamatsu*, Y.Kukita* Department of Nuclear Engineering, Nagoya University *Department of Energy
More informationOn the Validity of IEEE MAC Modeling Hypotheses
On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie
More informationModeling and Simulation NETW 707
Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides
More informationPower Controlled FCFS Splitting Algorithm for Wireless Networks
Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July
More informationAnalytical Design for Resonant Inductively Coupled Wireless Power Transfer With Class-E 2 DC-DC Converter
THE INTITUTE OF ELECTRONIC, INFORATION AND COUNICATION ENGINEER TECHNICAL REPORT OF IEICE. E DC-DC 63-85 1-33 814-18 19-1 E-mail: nagashima@chiba-u.jp E DC-DC E E E Ppice 5 Hz 5W, 3 cm 65.9 % DC-DC AC-AC
More informationOn Selfish Behavior in CSMA/CA Networks
On Selfish Behavior in CSMA/CA Networks Mario Čagalj, Saurabh Ganeriwal,ImadAad and Jean-Pierre Hubaux School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL), CH-1015
More informationrequests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1
Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet
More informationP e = 0.1. P e = 0.01
23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function
More informationUtility Fair RAT Selection in Multi-Homed LTE/ Networks
Utility Fair RAT Selection in Multi-Homed LTE/82. Networks Bahar Partov, Douglas J. Leith Trinity College Dublin, Ireland Abstract We consider proportional fair rate allocation in a heterogeneous network
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationRandom Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,
Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen
More informationThroughput and Fairness Analysis of based Vehicle-to-Infrastructure Data Transfers
211 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems Throughput and Fairness Analysis of 82.11-based Vehicle-to-Infrastructure Data Transfers Raffaele Bruno, Marco Conti Institute
More informationPerformance Analysis of License Assisted Access LTE with Asymmetric Hidden Terminals
Performance Analysis of License Assisted Access LTE with Asymmetric idden Terminals arim Lee, yoil Kim, Senior Member, IEEE, yun Jong Yang, Member, IEEE, Jeong Tak Kim, and SeungKwon Baek arxiv:62.4244v
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More informationMean Field Markov Models of Wireless Local Area Networks
Mean Field Markov Models of Wireless Local Area Networks Ken R. Duffy 26 th September 2010; revised 8 th April 2010. To appear in Markov Processes and Related Fields Abstract In 1998, Giuseppe Bianchi
More informationSPECIALIZATION ORDERS ON ATOM SPECTRA OF GROTHENDIECK CATEGORIES
SPECIALIZATION ORDERS ON ATOM SPECTRA OF GROTHENDIECK CATEGORIES RYO KANDA Abstract. This report is a survey of our result in [Kan13]. We introduce systematic methods to construct Grothendieck categories
More informationLan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN
Lan Performance LAB Ethernet : CSMA/CD TOKEN RING: TOKEN Ethernet Frame Format 7 b y te s 1 b y te 2 o r 6 b y te s 2 o r 6 b y te s 2 b y te s 4-1 5 0 0 b y te s 4 b y te s P r e a m b le S ta r t F r
More informationThroughput Analysis of a Probabilistic Topology-Unaware TDMA MAC Policy for Ad-Hoc Networks
Throughput Analysis of a Probabilistic Topology-Unaware TDMA MAC Policy for Ad-Hoc Networks Konstantinos Oikonomou 1 and Ioannis tavrakakis 2 1 INTRACOM.A., Development Programmes Department, 19.5 Markopoulou
More informationOn Selfish Behavior in CSMA/CA Networks
On Selfish Behavior in CSMA/CA Networks Mario Čagalj1 Saurabh Ganeriwal 2 Imad Aad 1 Jean-Pierre Hubaux 1 1 LCA-IC-EPFL 2 NESL-EE-UCLA March 17, 2005 - IEEE Infocom 2005 - Introduction CSMA/CA is the most
More informationIntegrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks
VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,
More informationIEEE C /058r3
Project Title IEEE 802.16 Broadband Wireless Access Working Group MAC support and the general structure of the Coexistence Protocol messages Date Submitted 2006-07-13 Source(s)
More informationOn the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs
On the MAC for Power-Line Communications: Modeling Assumptions and Performance Tradeoffs Technical Report Christina Vlachou, Albert Banchs, Julien Herzen, Patrick Thiran EPFL, Switzerland, Institute IMDEA
More informationCognitive WSN access based on local WLAN traffic estimation
Cognitive WSN access based on local WLAN traffic estimation MARCELLO LAGANÀ Master s Degree Project Stockholm, Sweden XR-EE-LCN 211:13 KTH ROYAL INSTITUTE OF TECHNOLOGY School of Electrical Engineering
More informationOn the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
More informationA Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying
A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying Ahmad Abu Al Haija, and Mai Vu, Department of Electrical and Computer Engineering McGill University Montreal, QC H3A A7 Emails: ahmadabualhaija@mailmcgillca,
More informationCollision-aware Design of Rate Adaptation for Multi-rate WLANs
Collision-aware Design of Rate Adaptation for Multi-rate 82. WLANs Jaehyuk Choi, Jongkeun Na, Yeon-sup Lim, Kihong Park, Member, IEEE, and Chong-kwon Kim, Member, IEEE Abstract One of the key challenges
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationAdaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems
Adaptive Reverse Link Rate Control Scheme for cdma2000 1xEV-DO Systems HyeJeong Lee, Woon-Young Yeo and Dong-Ho Cho Korea Advanced Institute of Science and Technology Abstract The cdma2000 1xEV-DO standard
More informationdistributed approaches For Proportional and max-min fairness in random access ad-hoc networks
distributed approaches For Proportional and max-min fairness in random access ad-hoc networks Xin Wang, Koushik Kar Rensselaer Polytechnic Institute OUTline Introduction Motivation and System model Proportional
More informationANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT
ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,
More informationFast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems
Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems Michael A. Enright and C.-C. Jay Kuo Department of Electrical Engineering and Signal and Image Processing Institute University
More informationCSE 123: Computer Networks
CSE 123: Computer Networks Total points: 40 Homework 1 - Solutions Out: 10/4, Due: 10/11 Solutions 1. Two-dimensional parity Given below is a series of 7 7-bit items of data, with an additional bit each
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.2: Error Detection & Correction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationA Byzantine Attack Defender: the Conditional Frequency Check
A Byzantine Attack Defender: the Conditional Frequency Check Xiaofan He and Huaiyu Dai Peng Ning Department of ECE Department of CSC North Carolina State University, USA North Carolina State University,
More informationSimplified Measuring Method of kq Product for Wireless Power Transfer via Magnetic Resonance Coupling
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. kq, 277-8561 5-1-5 DC1 102-0083 5-3-1 E-mail: hata@hflab.k.u-tokyo.ac.jp, imura@hori.k.u-toyko.ac.jp, hori@k.u-tokyo.ac.jp
More informationSTABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS
The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung
More informationDesign and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks
Design and Analysis of a Propagation Delay Tolerant ALOHA Protocol for Underwater Networks Joon Ahn a, Affan Syed b, Bhaskar Krishnamachari a, John Heidemann b a Ming Hsieh Department of Electrical Engineering,
More informationA Tractable Framework for Exact Probability. of Node Isolation and Minimum Node Degree. Distribution in Finite Multi-hop Networks
A Tractable Framework for Exact Probability of Node Isolation and Minimum Node Degree Distribution in Finite Multi-hop Networks arxiv:22.283v3 [cs.it] 29 Nov 203 Zubair Khalid, Member, IEEE, Salman Durrani,
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationPerformance Effects of Two-way FAST TCP
Performance Effects of Two-way FAST TCP Fei Ge a, Sammy Chan b, Lachlan L. H. Andrew c, Fan Li b, Liansheng Tan a, Moshe Zukerman b a Dept. of Computer Science, Huazhong Normal University, Wuhan, P.R.China
More informationDistributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks
Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Rajat Talak, Sertac Karaman, and Eytan Modiano arxiv:803.06469v [cs.it] 7 Mar 208 Abstract Age of Information
More informationNetworks: space-time stochastic models for networks
Mobile and Delay Tolerant Networks: space-time stochastic models for networks Philippe Jacquet Alcatel-Lucent Bell Labs France Plan of the talk Short history of wireless networking Information in space-time
More informationSupporting Information for the manuscript. Microscopic Formation Mechanism of Solid Electrolyte Interphase Film
Supporting Information for the manuscript Microscopic Formation Mechanism of Solid Electrolyte Interphase Film in Lithium-Ion Batteries with Highly Concentrated Electrolyte Norio Takenaka 1,2, Takuya Fujie
More informationImproved MU-MIMO Performance for Future Systems Using Differential Feedback
Improved MU-MIMO Performance for Future 80. Systems Using Differential Feedback Ron Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg Broadcom Corp. {rporat, eo, njindal, mfischer, verceg}@broadcom.com
More informationAn Algorithm for Inversion in GF(2 m ) Suitable for Implementation Using a Polynomial Multiply Instruction on GF(2)
An Algorithm for Inversion in GF2 m Suitable for Implementation Using a Polynomial Multiply Instruction on GF2 Katsuki Kobayashi, Naofumi Takagi, and Kazuyoshi Takagi Department of Information Engineering,
More informationEnhance & Explore: an Adaptive Algorithm to Maximize the Utility of Wireless Networks
Enhance & Explore: an Adaptive Algorithm to Maximize the Utility of Wireless Networks Julien Herzen joint work with Adel Aziz, Ruben Merz, Seva Shneer and Patrick Thiran September 5th, 2011 1/20 Context
More informationWindow Flow Control Systems with Random Service
Window Flow Control Systems with Random Service Alireza Shekaramiz Joint work with Prof. Jörg Liebeherr and Prof. Almut Burchard April 6, 2016 1 / 20 Content 1 Introduction 2 Related work 3 State-of-the-art
More informationHow do Wireless Chains Behave? The Impact of MAC Interactions
The Impact of MAC Interactions S. Razak 1 Vinay Kolar 2 N. Abu-Ghazaleh 1 K. Harras 1 1 Department of Computer Science Carnegie Mellon University, Qatar 2 Department of Wireless Networks RWTH Aachen University,
More informationNICTA Short Course. Network Analysis. Vijay Sivaraman. Day 1 Queueing Systems and Markov Chains. Network Analysis, 2008s2 1-1
NICTA Short Course Network Analysis Vijay Sivaraman Day 1 Queueing Systems and Markov Chains Network Analysis, 2008s2 1-1 Outline Why a short course on mathematical analysis? Limited current course offering
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationDistributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks
Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,
More informationPERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH
PERFORMANCE ANALYSIS OF WIRELESS LANS: AN INTEGRATED PACKET/FLOW LEVEL APPROACH Remco Litjens 1,FrankRoijers, Hans van den Berg,, Richard J. Boucherie, and Maria Fleuren Knowledge Innovation Center, TNO
More informationNOMA: Principles and Recent Results
NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve
More informationBit Error Period Determination and Optimal Frame Length Prediction for a Noisy Communication Channel
Bit Error Period Determination and Optimal Frame Length Prediction for a oisy Communication Channel Georgi Atanasov aydenov and Petko Stoyanov Stoyanov Faculty of Science and Technology, Technical University
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationON SOME STATISTICAL INDICATORS OF THE TRAFFIC IN WIRELESS LOCAL AREA NETWORKS
U.P.B. Sci. Bull., Series C, Vol. 70, No. 3, 008 ISSN 1454-34x ON SOME STATISTICAL INDICATORS OF THE TRAFFIC IN WIRELESS LOCAL AREA NETWORKS Şerban Alexanru STĂNĂŞILĂ 1 În ultimul timp, capacitatea e protocol
More informationOn the Energy Efficiency of IEEE WLANs
On the Energy Efficiency of IEEE 8. WLs Pablo Serrano, ndres Garcia-Saavedra Depto. de Ingeniería Telemática Universidad arlos III de Madrid vda. Universidad, 3 89 Leganés, Spain {pablo, agsaaved}@it.uc3m.es
More informationTorque Performance and Permanent Magnet Arrangement for Interior Permanent Magnet Synchronous Motor
Extended Summary pp.954 960 Torque Performance and Permanent Magnet Arrangement for Interior Permanent Magnet Synchronous Motor Naohisa Matsumoto Student Member (Osaka Prefecture University, matumoto@eis.osakafu-u.ac.jp)
More informationDistributed Optimal TXOP Control for Throughput Requirements in IEEE e Wireless LAN
Dstrbuted Optmal TXOP Control for Throughput Requrements n IEEE 80.e Wreless LAN Ju Yong Lee, Ho Young Hwang, Jtae Shn, and Shahrokh Valaee KAIST Insttute for Informaton Technology Convergence, KAIST,
More informationPacket Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures
Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia
More informationNode-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance
Node-based Service-Balanced Scheduling for Provably Guaranteed Throughput and Evacuation Time Performance Yu Sang, Gagan R. Gupta, and Bo Ji Member, IEEE arxiv:52.02328v2 [cs.ni] 8 Nov 207 Abstract This
More informationVEHICULAR ad-hoc networks (VANETs) have drawn. Cooperative Content Transmission for Vehicular Ad Hoc Networks using Robust Optimization
Cooperative Content Transmission or Vehicular Ad Hoc Networks using Robust Optimization Daxin Tian, Jianshan Zhou, Min Chen, Zhengguo Sheng, Qiang Ni and Victor C.M. Leung School o Transportation Science
More informationA Stochastic Model for TCP with Stationary Random Losses
A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline
More informationOn Network Interference Management
On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationOpportunistic Spectrum Access for Energy-Constrained Cognitive Radios
1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong,
More information[11] [3] [1], [12] HITS [4] [2] k-means[9] 2 [11] [3] [6], [13] 1 ( ) k n O(n k ) 1 2
情報処理学会研究報告 1,a) 1 1 2 IT Clustering by Clique Enumeration and Data Cleaning like Method Abstract: Recent development on information technology has made bigdata analysis more familiar in research and industrial
More informationCongestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach
Congestion Control for Infrastructure-based CRNs: A Multiple Model Predictive Control Approach Kefan Xiao, Shiwen Mao, and Jitendra K Tugnait Department of Electrical and Computer Engineering, Auburn University,
More information