A MAC and Physical Layer Theoretical Model for IEEE a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes

Size: px
Start display at page:

Download "A MAC and Physical Layer Theoretical Model for IEEE a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes"

Transcription

1 A MAC and Physical Layer Theoretical Model for IEEE 802.a Networks Operating Simultaneously with Basic and RTS/CTS Access Schemes Roger Pierre Faris Hoefel Department of Telecommunications Engineering - University La Salle Canoas - RS - Brazil roger@lasalle.tche.r Astract We have developed a theoretical cross-layer model that allows assessing the goodput and delay of the IEEE 802.a local area networks (WLANs) operating simultaneously under the distriuted coordination function (DCF) asic access (BA) and request-to-send/clear-to-send (RTS/CTS) medium access control (MAC) protocols under saturated traffic over correlated and uncorrelated fading channels. Resumo. Neste artigo é proposto um modelo teórico que permite analisar de maneira integrada o desempenho das camadas de enlace e física de redes locais sem fio IEEE 802.a operando simultaneamente no modo ásico e no modo RTS/CTS. As expressões analíticas propostas, validadas por meio de simulação da camada física IEEE 802.a, permitem verificar no desempenho do sistema tanto os efeitos dos protocolos de enlace (e.g. da carga no canal, do tamanho dos pacotes, do algoritmo de resolução da janela de contenção) em como os efeitos dos protocolos da camada física (e.g. esquemas de modulação, correção de erros, modelos de canal).. Introductions and Related Work The release of the first IEEE 802. standard (that specifies the MAC and the original slower frequency-hopping and direct sequence PHY layers) in 997 paved the way for a world wide development of a standardized cost-effective scalale technology for WLANs. Since then, intensive research activities have een carried out on analyze, design, implementation, and optimization issues of IEEE 802. networks. In 997, B. P. Crow et al pulished one of the first papers to explain the IEEE 802. protocol (with particular emphasis on the MAC layer) and to show simulation results for packetized data and a comination of packetized data and voice over WLANs [Crow 997]. In 2000, Bianchi proposed an analytical i-dimensional Markov model to estimate the performance of IEEE 802. networks [BIANCHI 2000] operating under saturated traffic conditions over ideal channels (i.e. only collisions were taken into account and the frames were not corrupted due to noise and interference). This Bianchi s model has een used as a framework to analyze others IEEE 802. technologies, as in [Roinson 2004] where it is proposed an analytical model to assess the performance of quality of service (QoS) schemes for IEEE 802. WLANs operating under saturated traffic conditions over ideal channels. In 2002, Qiao et al [Qiao 2002] derived an analytical model that takes the non-ideal channel into account on the performance of IEEE802.a WLANs. However, they assumed a very crude model for the MAC layer. Therefore, due to the properties of the radio channel and the use of advanced PHY layer techniques, there was a necessity to develop an accurate joint MAC and PHY theoretical

2 model to estimate the performance of IEEE802.ased networks. Hence, founded on the methodology proposed y Bianchi in [BIANCHI 2000], we have developed a crosslayer saturation goodput theoretical model that allows assessing the performance of IEEE 802.a WLANs over uncorrelated [HOEFEL 2005] and correlated fading channels [HOEFEL 2006]. We have also noticed a lack in the literature on theoretical analyzes of IEEE 802. WLANS when oth the BA and RTS/CTS access schemes are simultaneously operational, even when it is assumed an ideal PHY layer. Therefore, in the present contriution we have improved our previous theoretical results y: () developing a cross-layer model that allows to estimate the goodput and delay of IEEE 802.a WLANs operating simultaneously under the asic and RTS/CTS access schemes; (2) carrying out a unified comparison etween the performance of IEEE 802.a WLANs over uncorrelated and correlated fading channels when oth access modes are simultaneously operational. The aove contriutions are developed in Sections 4 to 0. We remark that this developed cross-layer methodology can e used, with minor modifications, to examine the performance of other 802. PHY layers (e.g and 802.g) as well as to e used as reference to analyze the effe of the PHY layer on MAC protocols for different systems (e.g. IEEE 802.6). In the next two sections we present meaningful aspe regarding to 802.a MAC (Section 2) and PHY (Section 3) layers. The contriutions of this work are developed in Sections 4 to IEEE 802. MAC The IEEE PHY standards 802., 802.a and 802. use the same MAC layer protocols. To accomplish it, a MAC service unit (MSDU) is segmented into a MAC protocol data unit (MPDU) that, on its turn, it is mapped to the physical layer using a standardized physical layer convergence procedure (PLCP). As the IEEE 802. MAC protocol is widely known, we only show at Figures a and the time diagram for the atomic transmission used y the DCF BA and RTS/CTS mechanisms [Gast 2002]. Notice that DIFS stands for DCF interframe spacing (IFS), PIFS for point coordination IFS, SIFS for short IFS and NAV for network allocation vector. Fig. a. The atomic BA scheme. Fig.. The atomic RTS/CTS scheme. Figure. The atomic cycle for the successful transmission using the atomic asic positive ACK of data and RTS/CTS schemes. 3. IEEE 802. Physical Layer In this paper we have followed the IEEE 802.a PHY layer [IEEE 802.a 999, pp. 6]. The IEEE 802.a is ased on orthogonal frequency division modulation (OFDM)

3 using a total of 52 sucarriers, of which 48 sucarriers carry actual data and four sucarriers are pilots used to facilitate coherent detection. The channel symol rate R s is of 2 Msymols/sec since the OFDM symol interval (ts) is set to 4µs. Ta. shows the OFDM PHY modes, where BpS means Bytes per Symol. For instance, the PHY mode carries 3 ytes per symol, i.e. 6 Mps* tsymol/8.0=3 BpS. Mode Modulation Code Data BpS p Rate R c Rate BPSK /2 6 Mps 3 2 BPSK 3/4 9 Mps QPSK /2 2 Mps 6 4 QPSK 3/4 8 Mps 9 Ta.. The IEEE 802.a PHY modes. Mode Modulation Code Data BpS p Rate R c Rate 5 6-QAM /2 24 Mps QAM 3/4 36 Mps QAM 2/3 48 Mps QAM 3/4 54 Mps 27 Considering the IEEE 802.a convolutional codes generator polynomials, g 0 =(33) 8 and g =(7) 8, of rate r=/2 and constrain length K=7, then the union ound on the proaility of decoding error is given y [Conan 984] Pe ( γ, p ) < P0( γ, p ) + 38 P2( γ, p ) + 93 P4( γ, p ) + () where the used notation emphasizes the dependence of P d with the received signal-tointerference-plus-noise (SINR) per it γ, and the PHY mode p. The union ound on the proaility of decoding error for the higher code rates of 2/3 and 3/4 (which are otained y puncturing the original rate-/2 code), are given y (2) and (3), respectively [Haccoun 989]. Pe ( γ, p) < P6 ( γ, p) + 6 P7 ( γ, p) + 48 P8 ( γ, p) + (2) Pe ( γ, p) < 8P5 ( γ, p) + 3 P6 ( γ, p) + 60 P7 ( γ, p) + (3) Assuming that the convolutional forward error correcting code (FEC) is decoded using hard-decision Viteri decoding, then (4-5) model the proaility of selecting incorrectly a path when the Hamming distance d is even and odd, respectively. The average it error rate (BER) for the PHY mode p modulation scheme is denoted y ρ p. P d d d d k d k, ρ p ( ρp) 2 d 2 k= d + k 2 ( ) d/2 d 2 γ p = p p ( ρp) + d d k d k, ρ p ( ρ p) k = d + k ( ) 2 ( γ p) = (4) (5) The numer of octets of the PHY layer protocol data unit (PDU) for the RTS frame is given y 6 6 N rts = N pre + Nsrv + lrts + Ntail = (6) 8 8 where N pre, N srv and N tail denote the numer of octets of the preamle, service and tail fields, respectively. The numer of octets used to carry the logical control information sent y the RTS, CTS and ACK control frames is laelled y l rts, l and l ack, respectively. The numer of octets of the PPDU that transports the CTS and ACK control frames is given y (7), where l=l =l ack =4 octets. The MAC PCLP PDU (i.e. a PPDU) length is given y (8), where l pl denotes the payload length in octets. The MPDU header and the cyclic redundant checking (CRC) fields have together a size of 34 ytes [GAST 2002] and 6 its are used to flush out the convolutional coder to the zero state N = Nack= Npre+ Nsrv+ l+ Ntail= (7) N mp= Npre+ Nsrv+ Nmh+ Npl + Ntail= lpl + (8) P d

4 The time period spent to transmit a MPDU with a payload of l pl octets over the IEEE 802.a using the PHY mode p mp is given y (9). The length of RTS, CTS and ACK control frames are given y (0-2), respectively. l ( 6+ 6 )/8 l + ( 6+ 6) / 8 pl Tmp( pmp) = tpclp_pre+ tpclpsig _ + ts BpS( pmp) (9) ( 6 6) l + + /8 T( p) = tpclp_pre+ tpclp_ SIG+ ts. BpS ( p) () 4. Analytical Results for the Saturation Goodput T ( p ) tpclp_pre tpclp_ SIG rts rts rts = + + ts BpS ( prts) (0) ( 6 6) l T p tpclp e tpclp SIG ack + + /8 ack( ack) = _Pr + _ + ts BpS ( pack) (2) It is assumed a fixed numer of n STAs operating in saturation conditions, i.e. each STA has a packet to transmit after the completion of each successful transmission. It is also postulated that each packet collides with a constant and independent conditional collision proaility p. The capture effect is neglected in such way that the lost of frames due to collisions is independent of the lost of frames due to noise and interference. The post ackoff procedure has not een taken into account [Roison 2004]. The proaility that a transmitted MPDU is successful depends upon the following events: () no collision and successful transmission using the BA scheme; (2) no collision and successful transmission using the RTS/CTS access scheme. Thus, { P ( S S ) + P ( S S S S )} Ps = ( p) a mp ack rts rts mp ack (3) where S, S rts and S ack denote, respectively, the proaility that the RTS, CTS and ACK control frames e transmitted with success. S mp denotes the proaility the transmission of a MPDU frame is successful. Eq. (4) and (5) model the proaility that a MPDU is transmitted using the asic access and RTS/CTS schemes, respectively. Notice that these proailities depend upon the MAC payload length l pl and the RTSThreshold defined at the Management Information Base (MIB). = Pr{ l RTSThreshold} (4) Prts Pr{ lpl RTSTheshold} Pa pl < = (5) Eq. (6) details the events that cause an unsuccessful MPDU transmission: () collision; (2) no collision, ut a corrupted frame on the asis access scheme (see 7); (3) no collision, ut a corrupted frame on the RTS/CTS access scheme (see 8). ( p) ( P P + P P ) Pf = p + a f,a rts f,rts (6) = - Smp Sack Pf, a = (- Smp ) + Smp (- Sack ) [(- S ) + S ( S ) + S S (- S ) + S S S (- S )] Pf,rts = rts rts = - Srts S Smp Sack rts mp Fig. 2 shows a discrete i-dimensional Markov chain (s(t),(t)) for the ackoff window size. It is assumed that: () a MPDU is transmitted using the asic access scheme with proaility P a. ; (2) a MPDU is transmitted using the RTS/CTS scheme with proaility P rts ; (3) s(t) is the stochastic process of the ackoff stage (0,,m) of the STA at time t, where m denotes the numer of ackoff stages; (4) (t) is the random rts mp ack (7) (8)

5 process that models the ackoff time counter for a given STA; (5) the contention window (CW) size at ackoff stage i is laeled as W i = 2 i W, where i (0,m) is the ackoff stage and W is the MAC CW size parameter CW min The maximum CW size is denoted as W m =2 m W =CW max -. (-p) {P a (S mp S ack ) + P rts (S rts S S mp S ack ) } 0, 0 0, 0, W 0 -, , ', W - [p+(-p) (P a P f,a + P rts P f,rts ) ]/ W m- m cw, 0 m cw,,... m cw, W mcw - [p+(-p) (P a P f,a + P rts P f,rts ) ]/ W [p+(-p) (P a P f,a + P rts P f,rts ) ]/ W m - Figure 2. Bi-dimensional Markov chain (s(t),(t)) model for the ackoff window size and a non-ideal channel. 4.. Packet Transmission Proaility Using the notation P{i,k /i 0,k o }= P{s(t+)=i,(t+)=k s(t)=i o,(t)=k o }, equations (9) to (22) model the null one-step transition proailities of the i-dimensional Markov chain depicted at Fig. 2. The decreasing of the ackoff timer at the eginning at each slot time of size σ is modeled as { i,k i,k + } = for k ( 0,W 2) and i ( 0,m) P i (9) Eq. (20) takes into account that a new PPDU starts at the ackoff stage 0 and that the ackoff is uniformly distriuted into the range (0, W 0 -) after a successful PPDU transmission. ( Smp Sack ) + ( S S S S ) Pa P{ 0,k i, 0} = [ p] / W0 for k ( 0,W0 ) and i ( 0,m) (20) Prts rts mp ack The property that a new ackoff value is uniformly chosen in the range (0,W i ) after an unsuccessful transmission at the ackoff stage i- can e modeled as P Pa ( Smp Sack ) + { }/ Wi for k ( 0,Wi ) and i (,m) (2) Prts ( Srts S Smp Sack ) { i,k i, 0} = p + [ p] Eq. (22) models the fact that the ackoff is not increased in susequent frame transmissions once the ackoff stage has reached the value m. P { m,k m, } = p + [ p] { [ P ( S S ) + P ( S S S S )] }/ W fork ( 0,W ) 0 a mp ack rts rts mp ack m mi (22) The transmission occurs when the ackoff timer counter is equal to zero. Therefore, using an algeraic procedure similar to the one developed in [Hoefel 2005], then we can show that the proaility that a STA transmits in a randomly chosen slot time is given y (23), where, the stationary proaility of a given STA e in the time

6 slot 0 for first contention window is given y (24). The average frame success transmission proaility is denoted y (25). m 0, 0 τ = i, = (23) ( p) P S S + P S S S S 0,0 i= 0 0 = m + 2 W [ ( ) ( )] a mp ack rts rts mp ack 2 ( p) S [ + 2 S ( p ) ] m m [ + ( + p) S] + ( + p) S 2+ W+ 2 W [ + ( + p) S] ( S S ) + P ( S S S S ) { m } S = Pa mp ack rts rts mp ack (25) 0,0 Notice that for an ideal channel (i.e. S rts =S = S mp = S ack =), Eq. (24) resumes to 2( 2 p) ( p) m ( 2 p) ( W + ) + pw ( 2 p) [ ] = (26) which is in agreement with (6) of [Bianchi 2000]. Each STA transmits with proaility τ. Therefore, the conditional proaility that a transmitted PPDU encounters a collision in a given slot time can e stated as n p = ( τ ). (27) The nonlinear system represented y (23) and (27) can e solved using numerical techniques. 4.2 Goodput The goodput (net throughput) in its per second (ps) can e modeled as the ratio of the payload its transmitted with success to the average cycle time, i.e. P N P N G a a + rts rts ps = (28) Pa Ta + Prts Trts The average numer of payload its transmitted with success for the BA and RTS/CTS schemes are given y (29) and (30), respectively. The numer of payload octets when is used the BA and RTS/CTS schemes are given y l pl,a and l pl,rts, respectively. Na =8 lpl,a Ps Ptr Smp Sack (29) Nrts =8 lpl,rts Ps Ptr Srts S Smp Sack (30) The proaility that there is no collision on the channel conditioned to the fact that at least one STA transmits is given y n n τ ( τ ) n n n τ ( τ ) n τ ( τ ) P s = = = P n tr Ptr ( τ ) where P tr is the proaility that there is at least one transmission in the considered slot time. The average cycle time for the asic access and RTS/CTS scheme is given y (32) and (33), respectively. T a = Bs,a + B f,a + B f 2,a + B f 3,a + I (32) Trts = Bs,rts + Bf,rts + Bf 2,rts, + Bf 3,rts + Bf 4,rts + Bf 5, rts + I (33) For the asic access scheme, the average usy time when the atomic positive ACK asic access transmission is successful is given y ( DIFS + T ( p ) + a + SIFS + T ( p ) a) Bs,a = Ps Ptr Smp Smac mp mp ack ack + (34) (24) (3)

7 where a is the propagation delay. T mp (p mp ) is the time period necessary to transmit a MPDU when it is used the PHY mode p mp (see 9), and T ack (p ack ) is the time period spent to transmit a positive ACK control frame using the PHY mode p ack (see 2). The average usy time when the transmission is successful using the RTS/CTS scheme is given y B = P P S S S S [ DIFS + T ( p ) + a + SIFS + s,rts s tr T ( p rts mp mac ) + a + SIFS + T mp ( p mp rts rts ) + a + SIFS + Tack ( p ack where T rts (p rts ), T (p ) and denote the time necessary to transmit the RTS and CTS control frames when it is used the PHY mode p rts and p, respectively (see 0 and ). B f, a models the average amount of time that the channel is usy due to collisions of a MPDU frames when it used the BA scheme (see 36). However, for the RTS/CTS MAC scheme the waste time occurs due to RTS control frame collisions, as modeled y B f, rts (see 37). B = P ( P ) ( DIFS + T ( p ) a) ( P ) ( DIFS + T ( p ) a) B f,a = Ptr s mp mp + (36) ) + a] (35) f,rts tr s rts rts + (37) B f 2, a and B f 3, a model the average lost time due to an unsuccessful transmission of data and ACK control frames, respectively, when it is used the BA scheme. ( S ) ( DIFS + T ( p a) B f 2, a = Ptr Ps mp mp mp ) + (38) DIFS + T ( ) 3, ( ) ( ) mp pmp + a + B f a = Ptr Ps Smp Sack SIFS + Tack pack + a (39) B f 2, rts, B f 3, rts, B f 4, rts and B f 5, rts model the average time that the channel is usy with unsuccessful transmissions due to noise and interference, of RTS, CTS, data and ACK frames, respectively, when it is used the RTS/CTS access scheme. Finally, the average time that a slot time is idle is given y (39), where s is the slot time length. B ( S rts ) [ DIFS + Trts ( prts ) ]. S ( S )[ DIFS + T ( p ) + a + SIFS + T ( p ) a]. f 2, rts Ptr Ps + a = (40) Bf 3,rts = Ptr Ps rts rts rts + (4) B f 4,rts = Ptr Ps S rts S ( S ) [ mp Trcs ( p ) + a + SIFS + Tmp ( p mp ) + ( S )[ DIFS + Trts ( prts ) + a + SIFS + a] B f 5,rts = Ptr Ps S rts S mp ack DIFS + Trts ( prts ) + a + SIFS + (43) Trcs ( p ) + a + SIFS + Tmp ( pmp ) + a + SIFS + Tack ( pack ) + a] I = tr σ. (44) ( P ) 5. Analytical Results: Average Delay The average delay etween the time that a MPDU arrived at the queue until the time that an ACK for this MPDU is received can e modeled as the average numer of cycle times necessary to accomplish a successful MPDU transmission, as modeled y (45). The average cycle time for the BA and RTS/CTS schemes is given y (32) and (33), respectively. The average numer of time slots spent for a successful transmission is given y (46), where the average proaility that an atomic transmission is not successful, P f, is given y (6). (42)

8 D = P Pa T a+ Prts T rts m W i i (45) P ( P ) i = ( P ) i= 0 f 2 + i= m f Wm 2 (46) 6. Analytical Results for Frame Success Proaility over Uncorrelated Fading Channels In order to have a unified analytical framework upon the modeling of fading effe on the MAC protocols we have summarized in this Section the theoretical results developed in [Hoefel 2005]. We elieve that this approach is time saving to the reader. Postulating that the errors inside of the decoder are interdependent, then the upper ound for a successful transmission of a frame with l octets is given y (47) [Puersley 987]. Notice that the union ound on the proaility of decoding error is given y: () Eq. () for the PHY modes, 3 and 5; (2) Eq. (2) for the PHY mode 7; (3) Eq. (3) for the PHY modes 2, 4, 6 and 8. S( l, γ 8 [ P ( γ, p ] l, p ) < e ) (47) The PCLP header is always transmitted using PHY mode. Then, for an uncorrelated multipath fading channel, the successful MPDU transmission when it is used the PHY mode p mp is given y (48). Correspondingly, the RTS, CTS and ACK control frames success proailities are given y (49), (50) and (5), respectively. Smp(l mp, γ,pmp) = S( 24 / 8, γ, )S( 34+ ( 6+ 6)/ 8+ lmp, γ,pmp) (48) Srts( lrts, γ, ρrts ) = S( 24 / 8, γ, ) S( 20 + ( ) / 8, γ, ρrts ) (49) S (l, γ, ρ ) = S( 24 / 8, γ, ) S( 4 + ( 6 + 6)/ 8, γ, ρ ) (50) Sack(lack, γ, ρack ) = S( 24 / 8, γ, ) S( 4 + ( )/ 8, γ, ρack) (5) In this susection we have assumed a flat fading Nakagami-m channel temporally independent at symol level and independent across of the OFDM carriers. Therefore, the average BER for the PHY mode p can e stated as ρ p = Pp ( γ, p) p( γ ) dγ (52) 0 where the P p (γ ) is a function that depends on the signal-to-noise-plus-interference ratio (SINR)γ, the modulation/coding scheme p, the receiver structure and the channel. Considering a maximum ratio comining (MRC) receiver matched with the channel diversity and that the same average power Ω is received at each diversity ranch, then the proaility distriution function (pdf) of the SINR per it at the Viteri decoder input is of gamma kind [Hoefel 2005], i.e. L m m p( γ ) = Γ( L mn ) γ n m γ γ n L m ( ) n n γ exp if γ > 0, m 0.5 (53) where m n is the fading figure, γ is the average SINR per it at the detector output (or at Viteri decoder input) and L is the numer of diversity ranches. Notice that m n = models a Rayleigh channel. n

9 For inary phase-shift keying (BPSK used in PHY modes and 2) and quaternary PSK (QPSK used in PHY modes 3 and 4) signaling schemes, then the BER is given y [Proakis 200, pp. 269] ( 2 R ) for p =, 2, 3,, Pp ( γ, p ) = Q γ c 4 (54) where R c is the code rate and Q(x) is the complementary Gaussian cumulative distriution function. For rectangular M-ary quadrature amplitude modulation (M-QAM signaling used in PHY modes 5, 6, 7 and 8), P p (γ ) is given y y (55), where M is the cardinality of the modulation and erfc(z) is the complementary error function and p=5, 6, 7 and 8 [Yang 2000]. M 2log M R M 2 c 3log 2 M Rc Pp (, p ) erfc erfc. M log M ( M ) M log M ( M ) γ 2 γ γ = (55) 7. Analytical Results for Frame Success Proaility over Block Correlated Fading Channels Here, we have assumed that the fading is correlated at each atomic cycle (see Fig. and 2) and uncorrelated among distinct atomic cycles. As stated for uncorrelated fading channels, the union ound on the proaility of decoding error is given y: () Eq. () for the PHY modes, 3 and 5; (2) Eq. (2) for the PHY mode 7; (3) Eq. (3) for the PHY modes 2, 4, 6 and 8. Assuming that the errors inside of the hard decision Viteri decoder are interdependent, then Pursley and Taipale have shown that the upper ound for a successful transmission of a frame with l octets is given y [Puersley 987] 8 [ P ( γ,m ] l S( l, γ,m ) < e ) (56) For a lock-fading channel, this upper ound may e modified to (57a), where the p(g ) is the pdf of the SINR per it at the demodulator output (e.g. p(g ) is given y (53) for MRC receiver over a Nakagami-m fading channel) and g inf is chosen to satisfy the inequality (57). 8l S( l, γ, p ) < [ Pe( γ, p )] p( γ )dγ Pe ( γ inf, p). (57a,) γ inf 7. PHY Mode (BPSK@6Mps) For the PHY mode, the union ound on the decoding error can e estimated using () and (4), where ρ m is given y (58) with R c =/2. ρ 2 ( γ R ) = Pp ( γ ) = Q c. (58) Since all frames are transmitted using the PHY mode, then S rts, S, S mp and S ack can e estimated using (59-65) with p=. Srts( prts ) = S( Nrts, γ, prts ); (59) S ( p ) = P{ CTS is ack / RTS was ack}; (60) S ( p ) = S( N rts + N, γ, p ) ; Srts (6)

10 S S ( p ) P{ MPDU mp mp = is correct / RTS, CTS were correct}; S ( N rts + N + N mp,γ, pmp ) Smp ( pmp ) = ; (63) (62) Srts S ( pack) P{ ACKiscorrect/ RTS, CTS,MPDUwerecorrect} S( Nrts + N + Nmp + Nack, γ, pack) Sack( pack) =. (65) (64) SrtsSSmp ack = 7.2 PHY Mode 2 (BPSK@9Mps) When the MPDU is transmitted using the PHY mode 2, then all control frames are transmitted using the PHY mode. Thus, the S rts and S are still given y (59) and (6) with p=. The union ound on the decoding error can e estimated using (3) and (5), where ρ m is given y (58) with R c =3/4. The S md can e stated as S( N mp, γ, 2 ) S( N mp, γ, 2 ) Smp ( 2 ) = (66) Srts ( )S ( ) S( N rts + N, γ, ) Notice that the 3 octets of the preamle were not taken into account in (66) since they are transmitted using the PHY mode (i.e. a more roust modulation scheme). We also have used the following approximation: P{ MPDU P{ MPDU,RTS,CTS } P{ MPDU } is ack / RTS and CTS were ack} = (67) P{ RTS, CTS } P{ RTS, CTS} since N mp >>(N rts +N ), and the MPDU is transmitted using the PHY mode 2 (i.e. a signaling scheme with lesser immunity to noise and interference than the signaling scheme used to transmit the control frames). The ACK control frame is transmitted using the PHY mode, while the MPDU is transmitted using the PHY mode 2 (i.e. a signaling scheme more suitale to the decoding errors). Thus, the ACK control frame success proaility can e approximated y (68) for lock fading channels. S ack ( m ) = P{ ACK is ack / RTS,CTS and MPDU were ack) (68) 7.3 PHY Mode 3(QPSK@2Mps) In this case all control and data frames are transmitted using the PHY mode 3. Therefore, S rts and S are given y (59) and (6), respectively, with p=3. Correspondingly, S md and S ack are given y (63) and (65) with p=3. The union ound on the decoding error can e estimated using () and (4), where ρ p given y (58) with R c =/2 for coherent demodulation [Proakis 2000]. 7.4 PHY Mode 4 (QPSK@8Mps) Here, all the control frames are transmitted using the PHY mode 3 and the MPDU is transmitted using the PHY mode 4. Consequently, S rts and S are given y (59) and (6), respectively, with p=3. Using similar reasoning developed for PHY mode 2, then S md is given y (69) and S ack is given y (68). The union ound on the decoding error can e estimated using (3) and (5), where ρ p given y (58) with R c =3/4 for coherent demodulation [Proakis 2000]. S( Nmpd, γ, 4 ) S( Nmpd, γ, 4 ) Smpd ( 4 ) =. (69) Srts( 3 )S( 3 ) S( Nrts + N, γ, 3 ) 7.5 PHY Mode 5 (6QAM@24Mps)

11 In this case all control and data frames are transmitted using the PHY mode 5. Therefore, S rts and S are given y (59) and (6), respectively, with p=5. Correspondingly, S md and S ack are given y (63) and (65) with p=5. The union ound on the decoding error can e estimated using () and (4), where ρ p for QAM signaling is given y (55) with M=6 and R c =/ PHY Mode 6 (6QAM@36Mps), PHY Mode 7 (64QAM@48Mps) and PHY Mode 8(64QAM@64Mps) For all these PHY modes the control frames are transmitted using the PHY mode 5 and the MPDU is transmitted using the PHY modes 6, 7, or 8. Thus, the S rts and S are still given y (59) and (6) with p=5. The S md is given y S( N mpd, γ, p ) S( N mpd, γ, p ) S mpd ( p ) = (70) S rts ( 5 )S ( 5 ) S( N rts + N, γ, 5 ) where p=6, 7 and 8. The S ack can e estimated y (68) since the control frames are transmitted using 6QAM with R c =/2 while the MPDU is transmitted using 6QAM with R c =3/4 (PHY 6), 64QAM with R c =2/3 (PHY 7) or 64QAM with R c =3/4 (PHY 8). 8. Joint Link and Physical Layer IEEE 802. Simulator The C a joint MAC and PHY layer has the following main characteristics: It implements the MAC state machine that fulfills the DCF BA and RTS/CTS MAC schemes (Fig. ). The OFDM PHY layer is implemented assuming perfect synchronism. The PHY layer signal processing algorithms implements the maximum-likelihood hard decision detection for the PHY mode to PHY mode 8. The convolutional hard-decision decoding is implemented using a semi-analytic approach as follows. The average BER is estimated at a frame asis using on-line statistics collected at the demodulator output. Then the average BER is used in (4-5) to estimate the proaility of the successful MPDU transmission. It is assumed the following parameters: slot time σ=9µs, SIFS=6 µs, DIFS=EIFS=34 µs, CW min =6, CW max =023, m=6, a=µ.s, N pl =023 octets. It is used a confidence interval of 98% [Hoefel 2005] 9. Analytical and Simulation Results: a Comparative Approach In this section, assuming correlated and uncorrelated flat fading Rayleigh channels, we shall show results for the following system configurations: () IEEE 802.a networks operating under the RTS/CTS access scheme (P a =0 and P rts = in (3) and susequent equations); (2) IEEE 802.a networks operating under the asic access mode (P a = and P rts =0 in (3) and in the following); (3) joint operation of asic and RTS/CTS schemes with P a = P rts =0.5 in (3) and in the following. Unless otherwise noticed, l pl is set to 023 octets. 9. Single Operation of Basic Mode Scheme and RTS/CTS Access Schemes Over Uncorrelated Fading Channel Some results on the joint link and physical layer performance of IEEE 802.a networks over uncorrelated mulitpath fading channel can e found in [Hoefel 2005], where we investigated the system performance assuming that only the RTS/CTS mechanism is

12 active. In this susection, we complement the results shown in the [Hoefel 2005] comparing the goodput and delay performance of oth access methods in relation to the PHY mode and payload length. Ta. 2 shows the maximum goodput and the minimum delay for the asic access and RTS/CTS schemes. For a payload of 023 octets, we have noticed that when a modulation with low cardinality is used to transmit a MPDU, then a superior performance is attainale with the MAC RTS/CTS scheme since the minor time spent with collisions counteralances the greater overhead due to the control frames. However, for a payload of 255 octets the maximum system performance is always otained with the asic access scheme due to the lesser MAC overhead. Ta. 2. Maximum goodput and minimum delay for the asic access and RTS/CTS schemes: N pl =023 and 255 octets. Mode p Max. Goodput ( Mps) Min. Delay (ms) 255 octe 023 octe 255 octe 023 octe BA RTS/CTS BA RTS/CTS BA RTS/CTS BA RTS/CTS ) Comparison of the Performance of RTS/CTS Scheme Over Correlated Fading and Uncorrelated Fading Channel Fig 3 shows that for temporally uncorrelated fading channel there is a well-defined short range of SINR per it where the system performance is acceptale. On the other hand, when the fading is strongly correlated there is a wide and smooth variation of the goodput with the average SINR per it. Fig. 3 also shows that the spatial diversity (assumed uncorrelated) provides greater gain in the required γ on environments where the fading is uncorrelated. However, the diversity gain is also sustantial on temporally correlated fading environments. 24.0M 20.0M Flat Rayleigh Channel RTS+CTS+Data+ACK 0 STS Saturation Goodput in ps 6.0M 2.0M 8.0M 4.0M 0.0 PHY 3 Uncorrelated Fading L= L=3 Correlated Fading L= L=3 PHY 8 Uncorrelated Fading L= L=3 Correlated Fading L= L= Average γ per Antenna in db Figure 3. Comparison etween analytical (straight lines) and simulation (marks) results for the goodput in ps over a Jakes correlated fading channel and a Rayleigh temporally uncorrelated fading channel. RTS/CTS Scheme.

13 9.3 Comparison of the Performance of Basic Access Scheme Over Correlated Fading and Uncorrelated Fading Channel Fig. 4 shows results similar to those ones depicted in Fig. 3, except that now it is assumed the asic access scheme instead of the RTS/CTS mechanism. We again point out a good agreement etween numerical and simulation results. Notice that the minimum attainale average delay does not depend on the fading e correlated or uncorrelated. The minimum delay for the PHY mode 3 is otained with the RTS/CTS scheme and with the asic access scheme for the PHY mode 8, consistently with the remarks carried out on the results shown in Ta. 2. For uncorrelated fading, we can determine a threshold for the average SINR where the delay increases significantly when the average SINR is elow of this threshold. For correlated fading, consistent with the goodput performance, this threshold is also oserved, ut for minor values of the average SINR. 28.0M 24.0M Flat Rayleigh Channel Data+ACK 0 STS Saturation Goodput in ps 20.0M 6.0M 2.0M 8.0M 4.0M 0.0 PHY 3 Uncorrelated Fading L= L=3 Correlated Fading L= L=3 PHY 8 Uncorrelated Fading L= L=3 Correlated Fading L= L= Average γ per Antenna in db Figure 4a. Goodput in ps versus the average SINR per it. Average Delay [s] 00m 0m Flat Rayleigh Channel 0 STS; L= (no spatial diversity) PHY 3 Correlated Fading RTS/CTS Data+ACK Uncorrelated Fading RTS/CTS Data+Ack PHY 8 Correlated Fading RTS/CTS Data+Ack Uncorrelated Fading RTS/CTS Data+Ack Average γ per Antenna in db Figure 4. Average delay in seconds versus the average SINR per it. Figure 4. Comparison etween analytical (straight lines) and simulation (marks) results for the goodput in ps over a Jakes correlated fading channel and a Rayleigh temporally uncorrelated fading channel. Basic Mode Scheme.

14 Hereafter, we shall present results for IEEE 802.a networks operating simultaneously under the asic access and RTS/CTS access schemes. It is generated MAC data payloads of 255 and 023 octets with equal proaility (i.e. P a =P rts =0.5). The RTSThreshold is set to 256 octets. 9.4 Joint Operation of Basic Mode Scheme and RTS/CTS Access Scheme Over Correlated Fading Channel In despite of the complexity of the MAC and PHY layers, we can verify a good agreement etween analytical and simulation results for the goodput (Fig. 5a) and delay (Fig. 5) for the joint operation of BA and RTS/CTS schemes. We can also draw the following remarks. First, we can verify that the PHY mode 3 (QPSK with R c =/2) allows a superior performance in relation to that one otained with the PHY mode (BPSK with R c =/2) since the QPSK signalling has a etter spectral efficiency when it is implemented coherent demodulation. Notice that this also explains the etter performance of PHY mode 4 (QPSK with R c =3/4) in relation to the PHY mode 2 (BPSK with R c =3/4) signalling scheme. Second, PHY mode 5 (6QAM with R c =/2) has a etter performance than the PHY mode 2 (BPSK with R c =3/4) and PHY mode M Saturation Goodput in ps 8.0M 6.0M 4.0M 2.0M 0.0M 8.0M 6.0M 4.0M PHY PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY 8 Flat Rayleigh Channel 0 STS; L= (no spatial diversity) 2.0M Average γ per Antenna in db Figure 5a. Goodput in ps versus the average SINR per it. Flat Rayleigh Channel 0 STS; L= (no spatial diversity) Average Delay [s] 00m 0m PHY PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY 8 m Average γ per Antenna in db Figure 5. Average delay in seconds versus the average SINR per it. Figure 5. Comparison etween analytical (straight lines) and simulation (marks) results for the joint operation of asic and RTS/CTS access schemes. Correlated Rayleigh Channel.

15 Fig. 6 shows a comparison etween analytical (straight lines) and simulation (marks) results for the following system configurations: () asic access (BA) scheme; (2) RTS/CTS scheme; (3) joint operation of BA and RTS/CTS access schemes. When it is assumed the PHY mode 3, then the etter performance is otained with the joint operation of the BA and RTS/CTS protocols. However, for the PHY mode 8, the maximum goodput is otained with the BM scheme since the overhead of the RTS, CTS and ACK control frames is sustantial in relation to the MPDU payload. Notice that in this case the greater waste of time due to collisions of MPDU frames in the asic access scheme does not counteralance the control frames overhead. Saturation Goodput in ps 22.0M 20.0M 8.0M 6.0M 4.0M 2.0M 0.0M 8.0M 6.0M 4.0M 2.0M M Flat Rayleigh Channel 0 STS; L= (no spatial diversity) PHY 3 PHY 8 BM RTS/CTS BM+RTS/CTS BM RTS/CTS BM+RTS/CTS Average γ per Antenna in db Figure 6. Comparison etween analytical (straight lines) and simulation (marks) results for the goodput. Correlated fading channel. 9.5 Joint Operation of Basic Mode Scheme and RTS/CTS Access Scheme Over Uncorrelated Fading Channel Finally, Fig. 7 is similar to Fig.5a, except that it is assumed an uncorrelated Rayleigh fading channel. Notice that the interrelations etween the system performance and the different PHY modes are conceptually similar to those ones pointed out at Fig. 5a. 0. Conclusions In this paper we have derived and validated a joint MAC and PHY cross-layer goodput saturation model that can e confidentially used to estimate first order results for the goodput and the delay of IEEE 802.a ad hoc networks operating simultaneously under the asic access and RTS/CTS operational modes. We have considered the following: () a flat fading Rayleigh channel that is uncorrelated at symol level and independent across the OFDM carriers; (2) a flat fading Rayleigh channel that is correlated at symol level and dependent across the OFDM carriers. To sum up we strongly elieve that the unified methodological approach developed here can e helpful for a widely audience of researchers, from Computer Science to Telecommunications Engineering arenas, since the results that we have developed permit a thorough understanding of a multitude of aspe involved in the challenging interrelations etween complex MAC protocols and advanced PHY techniques.

16 Saturation Goodput in ps 20.0M Flat Rayleigh Channel Uncorrelated Fading 0 STS; L= (no spatial diversity) 5.0M 0.0M 5.0M 0.0 PHY PHY 2 PHY 3 PHY 4 PHY 5 PHY 6 PHY 7 PHY Average γ per Antenna in db Figure 7. Comparison etween analytical (straight lines) and simulation (marks) results for the joint operation of asic and RTS/CTS access schemes. Uncorrelated Rayleigh Channel.. References Bianchi, G. (2000) Performance Analysis of the IEEE 802. Distriuted coordination function, In: IEEE Journal on Selected Areas of Communication, v.8, no. 3, pp , March Conan, J. (984) The weight spectra of some short low-rate convolutional codes, In: IEEE Trans. Communications, vol. 32, pp , Sept B. P. Crow et al (997) IEEE 802. wireless local area networks, In: IEEE Communications Magazine, vol. 35, no. 9, pp. 6-26, Sept Gast, M. S Wireless Networks, New York: O Reilly, Haccoun, D. and Bégin, G (989) High-rate punctured convolutional codes for Viteri and Sequential decoding, In: In: IEEE Trans. Communications, vol. 37, n., p. 3-20, Nov Hoefel, R. P. F. (2005) A Joint MAC and Physical Layer Analytical Model for IEEE 802.a Networks Operating under RTS/CTS Access Scheme, In: 22 0 Simpósio Brasileiro de Redes de Computadores, May Hoefel, R. P. F. (2006) Goodput and Delay Cross-Layer Analysis of IEEE 802.a Networks over Block Fading Channels, In: IEEE Consumer Communication and Network Conference, Jan IEEE 802.a (999) Part : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification Amendment : High-speed Physical Layer in the 5 GHz and, supplemented to IEEE 802. standard, Sept Proakis, J. G. (200) Digital Communications, New York, 200. Puersley, M. B and Taipale, D. J. (987) Error Proailities for Spread-Spectrum Packet Radio with Convolutional Codes and Viteri Decoding, In: IEEE Trans. Communications, vol. 35, n., p. -2, Jan Roinson, J. W. and Randhawa, T. S. (2004) Saturation throughput analysis of IEEE 802.e enhanced distriuted coordination function, In: IEEE J. on Select. Areas on Comm., vol. 22, no. 5, p , June Qiao, S. D., S. Choi and Shin, K. G. (2002) Goodput analyzes and link adaptation for the IEEE 802.a wireless LANs, In: IEEE Trans. Moile Comp., pp , Yang, L. and Hanzo, L. (2000) A recursive algorithm for the error proaility evaluation of M- QAM, In: IEEE Comm. Letters, vol. 4, pp , Oct

A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE a Networks Operating Under Basic Access and RTS/CTS DCF Schemes

A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE a Networks Operating Under Basic Access and RTS/CTS DCF Schemes JOURNAL OF COMMUNICATIONS, VOL, NO 6, SEPTEMBER 2006 A MAC and PHY Cross-Layer Analytical Model for the Goodput and Delay of IEEE 802a Networks Operating Under Basic Access and RTS/CTS DCF Schees Roger

More information

A Joint MAC and Physical Layer Analytical Model for IEEE a Networks Operating under RTS/CTS Access Scheme

A Joint MAC and Physical Layer Analytical Model for IEEE a Networks Operating under RTS/CTS Access Scheme A Joint MAC and Physical Layer Analytical Model for IEEE 80211a Networks Operating under RTS/CTS Access Schee Roger Pierre Fabris Hoefel Departent of Telecounications Engineering - University La Salle

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop

More information

Giuseppe Bianchi, Ilenia Tinnirello

Giuseppe Bianchi, Ilenia Tinnirello Capacity of WLAN Networs Summary Ł Ł Ł Ł Arbitrary networ capacity [Gupta & Kumar The Capacity of Wireless Networs ] Ł! Ł "! Receiver Model Ł Ł # Ł $%&% Ł $% '( * &%* r (1+ r Ł + 1 / n 1 / n log n Area

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Mathematical Analysis of IEEE Energy Efficiency

Mathematical Analysis of IEEE Energy Efficiency Information Engineering Department University of Padova Mathematical Analysis of IEEE 802.11 Energy Efficiency A. Zanella and F. De Pellegrini IEEE WPMC 2004 Padova, Sept. 12 15, 2004 A. Zanella and F.

More information

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel

Performance Analysis of the IEEE e Block ACK Scheme in a Noisy Channel Performance Analysis of the IEEE 802.11e Block ACK Scheme in a Noisy Channel Tianji Li, Qiang Ni, Hamilton Institute, NUIM, Ireland. Thierry Turletti, Planete Group, INRIA, France. Yang Xiao, University

More information

WiFi MAC Models David Malone

WiFi MAC Models David Malone WiFi MAC Models David Malone November 26, MACSI Hamilton Institute, NUIM, Ireland Talk outline Introducing the 82.11 CSMA/CA MAC. Finite load 82.11 model and its predictions. Issues with standard 82.11,

More information

Example: Bipolar NRZ (non-return-to-zero) signaling

Example: Bipolar NRZ (non-return-to-zero) signaling Baseand Data Transmission Data are sent without using a carrier signal Example: Bipolar NRZ (non-return-to-zero signaling is represented y is represented y T A -A T : it duration is represented y BT. Passand

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

Communications and Signal Processing Spring 2017 MSE Exam

Communications and Signal Processing Spring 2017 MSE Exam Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing

More information

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT

ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT ANALYSIS OF THE RTS/CTS MULTIPLE ACCESS SCHEME WITH CAPTURE EFFECT Chin Keong Ho Eindhoven University of Technology Eindhoven, The Netherlands Jean-Paul M. G. Linnartz Philips Research Laboratories Eindhoven,

More information

Modeling and Simulation NETW 707

Modeling and Simulation NETW 707 Modeling and Simulation NETW 707 Lecture 6 ARQ Modeling: Modeling Error/Flow Control Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Data Link Layer Data Link Layer provides

More information

Performance Evaluation of Deadline Monotonic Policy over protocol

Performance Evaluation of Deadline Monotonic Policy over protocol Performance Evaluation of Deadline Monotonic Policy over 80. protocol Ines El Korbi and Leila Azouz Saidane National School of Computer Science University of Manouba, 00 Tunisia Emails: ines.korbi@gmail.com

More information

Exact Distribution of Access Delay in IEEE DCF MAC

Exact Distribution of Access Delay in IEEE DCF MAC Exact Distribution of Access Delay in IEEE 8.11 DCF MAC Teerawat Issariyakul, Dusit Niyato, Ekram Hossain, and Attahiru Sule Alfa University of Manitoba and TRLabs Winnipeg, MB, Canada. Email: teerawat,

More information

New EPoC Burst Markers with Data Field

New EPoC Burst Markers with Data Field New EPoC Burst Markers with Data Field Leo Montreuil Rich Prodan Tom Kolze January 2015 www.broadcom.com Burst Markers Update Modifications in Burst Marker Motivation Updated BM Sequences and Modulated

More information

X b s t w t t dt b E ( ) t dt

X b s t w t t dt b E ( ) t dt Consider the following correlator receiver architecture: T dt X si () t S xt () * () t Wt () T dt X Suppose s (t) is sent, then * () t t T T T X s t w t t dt E t t dt w t dt E W t t T T T X s t w t t dt

More information

Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels

Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Adaptive Bit-Interleaved Coded OFDM over Time-Varying Channels Jin Soo Choi, Chang Kyung Sung, Sung Hyun Moon, and Inkyu Lee School of Electrical Engineering Korea University Seoul, Korea Email:jinsoo@wireless.korea.ac.kr,

More information

Reliability of Radio-mobile systems considering fading and shadowing channels

Reliability of Radio-mobile systems considering fading and shadowing channels Reliability of Radio-mobile systems considering fading and shadowing channels Philippe Mary ETIS UMR 8051 CNRS, ENSEA, Univ. Cergy-Pontoise, 6 avenue du Ponceau, 95014 Cergy, France Philippe Mary 1 / 32

More information

Characterization of the Burst Aggregation Process in Optical Burst Switching.

Characterization of the Burst Aggregation Process in Optical Burst Switching. See discussions, stats, and author profiles for this pulication at: http://www.researchgate.net/pulication/221198381 Characterization of the Burst Aggregation Process in Optical Burst Switching. CONFERENCE

More information

Performance Analysis of Spread Spectrum CDMA systems

Performance Analysis of Spread Spectrum CDMA systems 1 Performance Analysis of Spread Spectrum CDMA systems 16:33:546 Wireless Communication Technologies Spring 5 Instructor: Dr. Narayan Mandayam Summary by Liang Xiao lxiao@winlab.rutgers.edu WINLAB, Department

More information

Expectation propagation for signal detection in flat-fading channels

Expectation propagation for signal detection in flat-fading channels Expectation propagation for signal detection in flat-fading channels Yuan Qi MIT Media Lab Cambridge, MA, 02139 USA yuanqi@media.mit.edu Thomas Minka CMU Statistics Department Pittsburgh, PA 15213 USA

More information

Performance Analysis for Transmission of Correlated Sources over Non-Orthogonal MARCs

Performance Analysis for Transmission of Correlated Sources over Non-Orthogonal MARCs 1 Performance Analysis for Transmission of Correlated Sources over Non-Orthogonal MARCs Jiguang He, Iqal Hussain, Valtteri Tervo, Markku Juntti, Tad Matsumoto Centre for Wireless Communications, FI-914,

More information

Direct-Sequence Spread-Spectrum

Direct-Sequence Spread-Spectrum Chapter 3 Direct-Sequence Spread-Spectrum In this chapter we consider direct-sequence spread-spectrum systems. Unlike frequency-hopping, a direct-sequence signal occupies the entire bandwidth continuously.

More information

Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems

Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems ACSTSK Adaptive Space-Time Shift Keying Based Multiple-Input Multiple-Output Systems Professor Sheng Chen Electronics and Computer Science University of Southampton Southampton SO7 BJ, UK E-mail: sqc@ecs.soton.ac.uk

More information

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks

Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks VANET Analysis Integrity-Oriented Content Transmission in Highway Vehicular Ad Hoc Networks Tom Hao Luan, Xuemin (Sherman) Shen, and Fan Bai BBCR, ECE, University of Waterloo, Waterloo, Ontario, N2L 3G1,

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources Performance analysis of IEEE 82.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Hai L. Vu, Lachlan L. H. Andrew Centre for Advanced Internet Architectures, Technical Report 11811A Swinburne

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems

Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Computation of Bit-Error Rate of Coherent and Non-Coherent Detection M-Ary PSK With Gray Code in BFWA Systems Department of Electrical Engineering, College of Engineering, Basrah University Basrah Iraq,

More information

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10

Digital Band-pass Modulation PROF. MICHAEL TSAI 2011/11/10 Digital Band-pass Modulation PROF. MICHAEL TSAI 211/11/1 Band-pass Signal Representation a t g t General form: 2πf c t + φ t g t = a t cos 2πf c t + φ t Envelope Phase Envelope is always non-negative,

More information

Power Control for Discrete-Input Block-Fading Channels. K. D. Nguyen, A. Guillén i Fàbregas and L. K. Rasmussen

Power Control for Discrete-Input Block-Fading Channels. K. D. Nguyen, A. Guillén i Fàbregas and L. K. Rasmussen Power Control for Discrete-Input Block-Fading Channels K. D. Nguyen, A. Guillén i Fàregas and L. K. Rasmussen CUED / F-INFENG / TR 582 August 2007 Power Control for Discrete-Input Block-Fading Channels

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Research Article BitErrorRatePerformanceofaMIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading

Research Article BitErrorRatePerformanceofaMIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading Antennas and Propagation Volume 0, Article ID 5699, pages doi:055/0/5699 Research Article BitErrorRatePerformanceofaMIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh

More information

BER Performance Analysis of Cooperative DaF Relay Networks and a New Optimal DaF Strategy

BER Performance Analysis of Cooperative DaF Relay Networks and a New Optimal DaF Strategy 144 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1, NO. 4, APRIL 11 BER Performance Analysis of Cooperative DaF Relay Networks and a New Optimal DaF Strategy George A. Ropokis, Athanasios A. Rontogiannis,

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Received Signal, Interference and Noise

Received Signal, Interference and Noise Optimum Combining Maximum ratio combining (MRC) maximizes the output signal-to-noise ratio (SNR) and is the optimal combining method in a maximum likelihood sense for channels where the additive impairment

More information

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques

EE6604 Personal & Mobile Communications. Week 13. Multi-antenna Techniques EE6604 Personal & Mobile Communications Week 13 Multi-antenna Techniques 1 Diversity Methods Diversity combats fading by providing the receiver with multiple uncorrelated replicas of the same information

More information

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals

Modeling Approximations for an IEEE WLAN under Poisson MAC-Level Arrivals Modeling Approximations for an IEEE 802.11 WLAN under Poisson MAC-Level Arrivals Ioannis Koukoutsidis 1 and Vasilios A. Siris 1,2 1 FORTH-ICS, P.O. Box 1385, 71110 Heraklion, Crete, Greece 2 Computer Science

More information

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks

A new analytic approach to evaluation of Packet Error Rate in Wireless Networks A new analytic approach to evaluation of Packet Error Rate in Wireless Networks Ramin Khalili Université Pierre et Marie Curie LIP6-CNRS, Paris, France ramin.khalili@lip6.fr Kavé Salamatian Université

More information

Random Access Protocols for Massive MIMO

Random Access Protocols for Massive MIMO Random Access Protocols for Massive MIMO Elisabeth de Carvalho Jesper H. Sørensen Petar Popovski Aalborg University Denmark Emil Björnson Erik G. Larsson Linköping University Sweden 2016 Tyrrhenian International

More information

Optimal Receiver for MPSK Signaling with Imperfect Channel Estimation

Optimal Receiver for MPSK Signaling with Imperfect Channel Estimation This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 27 proceedings. Optimal Receiver for PSK Signaling with Imperfect

More information

Improved MU-MIMO Performance for Future Systems Using Differential Feedback

Improved MU-MIMO Performance for Future Systems Using Differential Feedback Improved MU-MIMO Performance for Future 80. Systems Using Differential Feedback Ron Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg Broadcom Corp. {rporat, eo, njindal, mfischer, verceg}@broadcom.com

More information

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved. Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information

More information

IEEE abc-01/22r1

IEEE abc-01/22r1 Project IEEE 802.16 Broadband Wireless Access Working Group Title An ARQ proposal for consideration by TG3/4 MAC group Date Submitted 2001-08 -31 Source(s) Yigal Leiba Itzik Kitroser

More information

Blind Equalization via Particle Filtering

Blind Equalization via Particle Filtering Blind Equalization via Particle Filtering Yuki Yoshida, Kazunori Hayashi, Hideaki Sakai Department of System Science, Graduate School of Informatics, Kyoto University Historical Remarks A sequential Monte

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz.

CHAPTER 14. Based on the info about the scattering function we know that the multipath spread is T m =1ms, and the Doppler spread is B d =0.2 Hz. CHAPTER 4 Problem 4. : Based on the info about the scattering function we know that the multipath spread is T m =ms, and the Doppler spread is B d =. Hz. (a) (i) T m = 3 sec (ii) B d =. Hz (iii) ( t) c

More information

A First Course in Digital Communications

A First Course in Digital Communications A First Course in Digital Communications Ha H. Nguyen and E. Shwedyk February 9 A First Course in Digital Communications 1/46 Introduction There are benefits to be gained when M-ary (M = 4 signaling methods

More information

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals

The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Clemson University TigerPrints All Theses Theses 1-015 The Performance of Quaternary Amplitude Modulation with Quaternary Spreading in the Presence of Interfering Signals Allison Manhard Clemson University,

More information

A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network

A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network A Sufficient Condition for Optimality of Digital versus Analog Relaying in a Sensor Network Chandrashekhar Thejaswi PS Douglas Cochran and Junshan Zhang Department of Electrical Engineering Arizona State

More information

Performance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels

Performance of Multi Binary Turbo-Codes on Nakagami Flat Fading Channels Buletinul Ştiinţific al Universităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 5(65), Fascicola -2, 26 Performance of Multi Binary

More information

A Computationally Efficient Block Transmission Scheme Based on Approximated Cholesky Factors

A Computationally Efficient Block Transmission Scheme Based on Approximated Cholesky Factors A Computationally Efficient Block Transmission Scheme Based on Approximated Cholesky Factors C. Vincent Sinn Telecommunications Laboratory University of Sydney, Australia cvsinn@ee.usyd.edu.au Daniel Bielefeld

More information

Mapper & De-Mapper System Document

Mapper & De-Mapper System Document Mapper & De-Mapper System Document Mapper / De-Mapper Table of Contents. High Level System and Function Block. Mapper description 2. Demodulator Function block 2. Decoder block 2.. De-Mapper 2..2 Implementation

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

ELEC546 Review of Information Theory

ELEC546 Review of Information Theory ELEC546 Review of Information Theory Vincent Lau 1/1/004 1 Review of Information Theory Entropy: Measure of uncertainty of a random variable X. The entropy of X, H(X), is given by: If X is a discrete random

More information

R. Garello. Tutorial on digital modulations - Part 9b m-pam [ ] 2

R. Garello. Tutorial on digital modulations - Part 9b m-pam [ ] 2 TUTORIAL ON DIGITAL MODULATIONS Part 9: m-pam [2010-1-26] 26] Roerto Garello, Politecnico di Torino Free download at: www.tlc.polito.it/garello (personal use only) 1 m-pam constellations: characteristics

More information

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model

Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Weibull-Gamma composite distribution: An alternative multipath/shadowing fading model Petros S. Bithas Institute for Space Applications and Remote Sensing, National Observatory of Athens, Metaxa & Vas.

More information

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION

TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION TIGHT BOUNDS FOR THE FIRST ORDER MARCUM Q-FUNCTION Jiangping Wang and Dapeng Wu Department of Electrical and Computer Engineering University of Florida, Gainesville, FL 3611 Correspondence author: Prof.

More information

Chapter 7: Channel coding:convolutional codes

Chapter 7: Channel coding:convolutional codes Chapter 7: : Convolutional codes University of Limoges meghdadi@ensil.unilim.fr Reference : Digital communications by John Proakis; Wireless communication by Andreas Goldsmith Encoder representation Communication

More information

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou.

A Comprehensive Study of the IEEE e Enhanced Distributed Control Access (EDCA) Function. Chunyu Hu and Jennifer C. Hou. Report No. UIUCDCS-R-26-27 UILU-ENG-26-743 A Comprehensive Study of the IEEE 82.e Enhanced Distributed Control Access EDCA) Function by Chunyu Hu and Jennifer C. Hou April 26 A Comprehensive Study of the

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

On BCJR State Metric Quantization for Turbo Equalization

On BCJR State Metric Quantization for Turbo Equalization On BCJR State Metric Quantization for Turo Equalization Brian M. Kurkoski, Kazuhiko Yamaguchi and Kingo Koayashi Dept. of Information and Computer Engineering University of Electro-Communications Chofu,

More information

Residual Versus Suppressed-Carrier Coherent Communications

Residual Versus Suppressed-Carrier Coherent Communications TDA Progress Report -7 November 5, 996 Residual Versus Suppressed-Carrier Coherent Communications M. K. Simon and S. Million Communications and Systems Research Section This article addresses the issue

More information

Impact of channel-state information on coded transmission over fading channels with diversity reception

Impact of channel-state information on coded transmission over fading channels with diversity reception Impact of channel-state information on coded transmission over fading channels with diversity reception Giorgio Taricco Ezio Biglieri Giuseppe Caire September 4, 1998 Abstract We study the synergy between

More information

EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels

EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels EM Channel Estimation and Data Detection for MIMO-CDMA Systems over Slow-Fading Channels Ayman Assra 1, Walaa Hamouda 1, and Amr Youssef 1 Department of Electrical and Computer Engineering Concordia Institute

More information

Performance analysis of IEEE WLANs with saturated and unsaturated sources

Performance analysis of IEEE WLANs with saturated and unsaturated sources 1 Performance analysis of IEEE 8.11 WLANs with saturated and unsaturated sources Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Differential Amplify-and-Forward Relaying Using Linear Combining in Time-Varying Channels

Differential Amplify-and-Forward Relaying Using Linear Combining in Time-Varying Channels Differential Amplify-and-Forward Relaying Using Linear Comining in Time-Varying Channels M. R. Avendi, Ha H. Nguyen and Dac-Binh Ha University of California, Irvine, USA University of Saskatchewan, Saskatoon,

More information

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong

Interleave Division Multiple Access. Li Ping, Department of Electronic Engineering City University of Hong Kong Interleave Division Multiple Access Li Ping, Department of Electronic Engineering City University of Hong Kong 1 Outline! Introduction! IDMA! Chip-by-chip multiuser detection! Analysis and optimization!

More information

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS

STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS The 8th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 7) STABILITY OF FINITE-USER SLOTTED ALOHA UNDER PARTIAL INTERFERENCE IN WIRELESS MESH NETWORKS Ka-Hung

More information

Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation

Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary. Spatial Correlation Maximum Achievable Diversity for MIMO-OFDM Systems with Arbitrary Spatial Correlation Ahmed K Sadek, Weifeng Su, and K J Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems

More information

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS

EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS EVALUATION OF PACKET ERROR RATE IN WIRELESS NETWORKS Ramin Khalili, Kavé Salamatian LIP6-CNRS, Université Pierre et Marie Curie. Paris, France. Ramin.khalili, kave.salamatian@lip6.fr Abstract Bit Error

More information

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process

ECE6604 PERSONAL & MOBILE COMMUNICATIONS. Week 3. Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 1 ECE6604 PERSONAL & MOBILE COMMUNICATIONS Week 3 Flat Fading Channels Envelope Distribution Autocorrelation of a Random Process 2 Multipath-Fading Mechanism local scatterers mobile subscriber base station

More information

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS

AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS 1 AN EXACT SOLUTION FOR OUTAGE PROBABILITY IN CELLULAR NETWORKS Shensheng Tang, Brian L. Mark, and Alexe E. Leu Dept. of Electrical and Computer Engineering George Mason University Abstract We apply a

More information

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design

EE4512 Analog and Digital Communications Chapter 4. Chapter 4 Receiver Design Chapter 4 Receiver Design Chapter 4 Receiver Design Probability of Bit Error Pages 124-149 149 Probability of Bit Error The low pass filtered and sampled PAM signal results in an expression for the probability

More information

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version)

Cross-layer Theoretical Analysis of NC-aided. Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Cross-layer Theoretical Analysis of NC-aided Cooperative ARQ Protocols in Correlated Shadowed Environments (Extended Version) Angelos Antonopoulos, Member, IEEE, Aris S. Lalos, Member, IEEE, arxiv:408.609v

More information

On Improving the BER Performance of Rate-Adaptive Block Transceivers, with Applications to DMT

On Improving the BER Performance of Rate-Adaptive Block Transceivers, with Applications to DMT On Improving the BER Performance of Rate-Adaptive Block Transceivers, with Applications to DMT Yanwu Ding, Timothy N. Davidson and K. Max Wong Department of Electrical and Computer Engineering, McMaster

More information

Digital Transmission Methods S

Digital Transmission Methods S Digital ransmission ethods S-7.5 Second Exercise Session Hypothesis esting Decision aking Gram-Schmidt method Detection.K.K. Communication Laboratory 5//6 Konstantinos.koufos@tkk.fi Exercise We assume

More information

Markovian Decision Process (MDP): theory and applications to wireless networks

Markovian Decision Process (MDP): theory and applications to wireless networks Markovian Decision Process (MDP): theory and applications to wireless networks Philippe Ciblat Joint work with I. Fawaz, N. Ksairi, C. Le Martret, M. Sarkiss Outline Examples MDP Applications A few examples

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.2: Error Detection & Correction Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Service differentiation without prioritization in IEEE WLANs

Service differentiation without prioritization in IEEE WLANs Service differentiation without prioritization in IEEE 8. WLANs Suong H. Nguyen, Student Member, IEEE, Hai L. Vu, Senior Member, IEEE, and Lachlan L. H. Andrew, Senior Member, IEEE Abstract Wireless LANs

More information

A SEMI-BLIND TECHNIQUE FOR MIMO CHANNEL MATRIX ESTIMATION. AdityaKiran Jagannatham and Bhaskar D. Rao

A SEMI-BLIND TECHNIQUE FOR MIMO CHANNEL MATRIX ESTIMATION. AdityaKiran Jagannatham and Bhaskar D. Rao A SEMI-BLIND TECHNIQUE FOR MIMO CHANNEL MATRIX ESTIMATION AdityaKiran Jagannatham and Bhaskar D. Rao Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA 9093-0407

More information

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Coding theory: Applications

Coding theory: Applications INF 244 a) Textbook: Lin and Costello b) Lectures (Tu+Th 12.15-14) covering roughly Chapters 1,9-12, and 14-18 c) Weekly exercises: For your convenience d) Mandatory problem: Programming project (counts

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

SAGE-based Estimation Algorithms for Time-varying Channels in Amplify-and-Forward Cooperative Networks

SAGE-based Estimation Algorithms for Time-varying Channels in Amplify-and-Forward Cooperative Networks SAGE-based Estimation Algorithms for Time-varying Channels in Amplify-and-Forward Cooperative Networks Nico Aerts and Marc Moeneclaey Department of Telecommunications and Information Processing Ghent University

More information

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks

Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Optimal Physical Carrier Sense for Maximizing Network Capacity in Multi-hop Wireless Networks Kyung-Joon Park, Jihyuk Choi, and Jennifer C. Hou Department of Computer Science University of Illinois at

More information

Chapter 5. Elementary Performance Analysis

Chapter 5. Elementary Performance Analysis Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7

More information

On the Validity of IEEE MAC Modeling Hypotheses

On the Validity of IEEE MAC Modeling Hypotheses On the Validity of IEEE 82.11 MAC Modeling Hypotheses K. D. Huang, K. R. Duffy and D. Malone Hamilton Institute, National University of Ireland, Maynooth, Ireland. Corresponding author: ken.duffy@nuim.ie

More information

Diversity Combining Techniques

Diversity Combining Techniques Diversity Combining Techniques When the required signal is a combination of several plane waves (multipath), the total signal amplitude may experience deep fades (Rayleigh fading), over time or space.

More information

Communication Theory Summary of Important Definitions and Results

Communication Theory Summary of Important Definitions and Results Signal and system theory Convolution of signals x(t) h(t) = y(t): Fourier Transform: Communication Theory Summary of Important Definitions and Results X(ω) = X(ω) = y(t) = X(ω) = j x(t) e jωt dt, 0 Properties

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information

1. Band-pass modulations. 2. 2D signal set. 3. Basis signals p(t)cos(2πf 0 t) e p(t)sin(2πf 0 t) 4. Costellation = m signals, equidistant on a circle

1. Band-pass modulations. 2. 2D signal set. 3. Basis signals p(t)cos(2πf 0 t) e p(t)sin(2πf 0 t) 4. Costellation = m signals, equidistant on a circle TUTORIAL ON DIGITAL MODULATIONS Part 14: m-psk [last modified: 2010-11-25] Roerto Garello, Politecnico di Torino Free download at: www.tlc.polito.it/garello (personal use only) 1 m-psk modulations 1. Band-pass

More information

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY

WIRELESS COMMUNICATIONS AND COGNITIVE RADIO TRANSMISSIONS UNDER QUALITY OF SERVICE CONSTRAINTS AND CHANNEL UNCERTAINTY University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Theses, Dissertations, and Student Research from Electrical & Computer Engineering Electrical & Computer Engineering, Department

More information

where L(y) = P Y X (y 0) C PPM = log 2 (M) ( For n b 0 the expression reduces to D. Polar Coding (2)

where L(y) = P Y X (y 0) C PPM = log 2 (M) ( For n b 0 the expression reduces to D. Polar Coding (2) Polar-Coded Pulse Position odulation for the Poisson Channel Delcho Donev Institute for Communications Engineering Technical University of unich Email: delchodonev@tumde Georg Böcherer athematical and

More information

Electrical Engineering Written PhD Qualifier Exam Spring 2014

Electrical Engineering Written PhD Qualifier Exam Spring 2014 Electrical Engineering Written PhD Qualifier Exam Spring 2014 Friday, February 7 th 2014 Please do not write your name on this page or any other page you submit with your work. Instead use the student

More information

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1

Lecture 7: Wireless Channels and Diversity Advanced Digital Communications (EQ2410) 1 Wireless : Wireless Advanced Digital Communications (EQ2410) 1 Thursday, Feb. 11, 2016 10:00-12:00, B24 1 Textbook: U. Madhow, Fundamentals of Digital Communications, 2008 1 / 15 Wireless Lecture 1-6 Equalization

More information