Basics of Cognitive Radio Networks with examples of CR-oriented protocol design
|
|
- Samson Porter
- 8 years ago
- Views:
Transcription
1 Basics of Cognitive Radio Networks with examples of CR-oriented protocol design Loreto Pescosolido Corso di Reti Avanzate a.a
2 Spectrum occupancy with current technologies Current wireless networks, operating in eir licensed or unlicensed bands, almost occupy entire available spectrum for nowadays commercial communication technologies. Yet demand for spectrum is constantly increasing, pushed by availability of new services, eir entirely new, or formerly thought for wired networks. It is a fact, however, that in most licensed bands, actual percentage of spectrum usage is under 5%, or in some cases, in order of % Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 2/38
3 Spectrum occupancy with current technologies Fixed Spectrum Assignment: Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 3/38
4 Spectrum occupancy with current technologies Effective bandwidth usage: PSD (Power Spectrum Density GHz Freq (GHz ~ ~2 2~3 Utilization(% ~4 4~5 5~ Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 4/38
5 Cognitive Radio Networks Question: Is re a way to improve spectrum usage, both in licensed and unlicensed bands (irrespective of different networks and technologies that already operate in those bands? A possible answer is given by Cognitive Radio ( A radio or system that senses and is aware of its operational environment and can dynamically and autonomously adjust its radio operating parameters accordingly. [ITU (Wp8A working document 5], and Cognitive Radio Networks. One flavor of Cognitive Radio Networks is represented by Dynamic and Opportunistic Spectrum Access networks. Such networks have capability to use or share spectrum in an opportunistic manner. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 5/38
6 Cognitive Radio Networks Spectrum Band Unlicensed Band Primary Network Access CR User Licensed Band I CR Ad Hoc Access Spectrum Broker Primary User Primary Base-station CR Network Access CR Base-station Licensed Band II Or Cognitive Radio Networks Primary Networks Cognitive Radio Network (Without Infrastructure Cognitive Radio Network (With Infrastructure Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 6/38
7 Sketch of main functionalities What are main functionalities that a cognitive network should implement and that are not implemented by conventional networks/ users? Identify current opportunities for spectrum (or channels utilization! Spectrum Sensing! Spectrum Decision! Spectrum Sharing Be able to vacate that spectrum (or channel if a licensed user wants to use that resource.! Spectrum mobility Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 7/38
8 Sketch of main functionalities Identification of opportunities, also termed spectrum holes, for channel use from cognitive network.! Spectrum sensing The capability of a cognitive terminal (or of a set of cognitive terminals to monitor spectrum bands and distinct channels in which cognitive network is supposed to operate, to detect presence of primary users in each channel, and overall primary users activity in each ub-band. Spectrum sensing can be, depending on scenario, distributed or centralized, cooperative or non-cooperative.! Spectrum decision Given set of candidate available bands, obtained through sensing and long term statistics, cognitive users determine best spectrum band to use. The choice can be driven not only from channel quality, but also from internal or external policies.! Spectrum sharing - ultiple CR users try to access spectrum CR network access should be coordinated in order to prevent multiple users colliding in overlapping portions of spectrum. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 8/38
9 Sketch of main functionalities Capability to vacate a spectrum (or channel currently used by a cognitive terminal if a licensed user wants to use that resource.! Spectrum mobility When a channel, or an entire band, that is being currently used from cognitive radio network is accessed by a licensed (or high priority user, that resource must be vacated from CRs on fly and in shortest possible time. This should be done preserving connectivity of cognitive users " spectrum handoff.! Different levels of granularity - The above procedure could be implemented at channel level within same band, or at band level, i.e. between entire portions of spectrum " same as spectrum decision spectrum sharing. Idle spectrum band Occupied by primary users Frequency(Hz Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 9/38
10 Cognitive cycle Transmitted Signal Spectrum obility Spectrum Sharing Radio Environment Decision Request Primary User Detection Spectrum Hole Channel Capacity RF Stimuli Spectrum Sensing Spectrum Decision Spectrum Characterization Primary User Detection Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 /38
11 Impact on protocol stack Application Control Application QoS Requirements Handoff Delay, Loss Transport Reconfiguration Spectrum obility Function Routing Information Link Layer Delay Spectrum Sharing Network Layer Link Layer Routing Information/ Reconfiguration Scheduling Information/ Reconfiguration Spectrum Decision Function Sensing Information Physical Layer Spectrum Sensing Sensing Information / Reconfiguration Handoff Decision, Current and Candidate Spectrum Information Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 /38
12 Reconfigurability Spectrum decision, sharing, and mobility, require a high level of reconfigurability of radio interface of cognitive users. They should be able to co-exist with different wireless communication technology. It is advisable for cognitive network transmission technology to have a high degree of self-reconfiguration. Reconfigurable parameters:! Operating Frequency! odulation! Transmission Power! Communication Technology Air interfaces developed following a unified framework, e.g., for different access schemes (TDA, CDA, OFDA, have potential to obtain a high degree of self-reconfigurability at a lower cost with respect to a system that implements, in parallel, different radio interfaces designed for used with a single transmission technology. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 2/38
13 Spectrum Sensing The operational band of a cognitive network is composed by several system bands of traditional wireless networks, each band is composed of many channels Spectrum sensing characterizes, in real time, spectrum usage from licensed or high priority networks/users both at channel level and at band level. Its outcomes serve as an input to spectrum decision and sharing modules. Different techniques involving different knowledge of primary technology, known or estimated. If band of interest is too wide, monitoring whole set of channels with a battery powered device could be impossible: solutions for observing different subsets of channels at different nodes could be necessary also related to primary users activity. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 3/38
14 Different approaches: Spectrum Sensing Centralized vs decentralized: with a decentralized approach sensing and sharing are performed at a local level: in principle it is simpler, but not always applicable, e.g. for spectrum decision it is better to collect and process information at a sink node. Cooperative or non-cooperative: Cooperative sensing and decision on channel occupancy yield best performance in terms of accuracy, but y demand for exchange of measured data, or local decision, among nodes, which is band-, and time-consuming, hence it could be impractical if scenario demands for a quick system response. Reactive or proactive: With a cooperative approach, depending on cognitive network traffic load, sensing functions eir can be activated only when a users requests for a transmission, or can be performed independently, in such a way that system gives a quicker respons when a user makes a request to transmit. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 4/38
15 Spectrum decision The entire spectrum where cognitive users operate can be very wide, and involving different system bands with different technologies. Depending on selected scenario, it could be impractical, or even impossible, for a single user to handle spectrum access and mobility over entire available spectrum An external controller could be demanded to choose band for CRs to operate, n inside that band, access and mobility are performed at a local level. This choice is usually performed on basis of long-term statistics, where available capacity is most important, but not only one, aspect to take into account. In particular, or factors, such as QoS requirements of cognitive network, or economical considerations, come into play in this step. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 5/38
16 Spectrum decision with different CR networks If multiple CR networks, with possibly different kind of services, operate in same area and in same spectrum, problem of coexistence among m, and with licensed networks, arises. One way to face this problem is presence of a spectrum broker, i.e., a central network entity that plays a role in sharing spectrum resources among different CR networks. It can be connected to each network and can serve as a spectrum information manager to enable co-existence of multiple CR networks. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 6/38
17 Spectrum sharing Deals with on--fly channel assignment to different CR users. The primary function is to take into account presence of licensed or high priority users operating on same set of channels. A channel for a CR users has not necessarily same badwidth of a channel for primary users Based on sensing results performed at channel level, it identifies an appropriate subset of channels to use. Contention among different CR users can be solved eir in a coordinated manner, or with a random access protocol. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 7/38
18 Spectrum sharing At this level, degree of self-reconfigurability of air interfaces plays a major role. Existing solution in literature provide means for reducing interference caused to primary users, and among CR users, in a completely decentralized way. Decentralized design often use Game Theory as a basic tool. Accurate modeling of licensed users activity is a key point in design of efficient spectrum sharing protocols. Jointly optimized spectrum sensing-sharing are a possible solution when a single node can monitor and/or access only a subset of available channels Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 8/38
19 Spectrum mobility and handoff Spectrum handoff is a multi-step process, including: PU Detection (Sensing issue PU Notification Power Spectrum Handoff Frequency Spectrum holes Channel Switching (Hardware issue Resuming communication (Sharing issue Sensing issue Sharing issue Spectrum occupied by Licensed users Time Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 9/38
20 otivation Decoupling sensing and actuation: otivation Power consumption, observable bandwidth Given a sensing technology, time and power required for sensing a channel, or a set of channels, is proportional to overall channel bandwidth It could be impractical, due to strict time constraints and excessive power consumption, to let a cognitive users sense whole spectrum. On or hand, sensing a larger amount of spectrum clearly allows for a larger number of transmission opportunities, or spectrum holes. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 2/38
21 Decoupling sensing and actuation: otivation otivation Geographic related problems we must make a distinction between two possible scenarios: a The coverage radius of cognitive terminals is comparable with coverage radius of primary users, and service area of primary network. E.g.: an indoor wireless LAN with a single AP cohexisting with bluetooth devices. " With this scenario, hidden terminals and radio footprint are not an issues. Primary Base Station CR User CR User CR User CR User Cognitive Radio (CR Base Station CR User Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 2/38
22 Decoupling sensing and actuation: otivation otivation Geographic related problems we must make a distinction between two possible scenarios: b The service area of primary network is much larger than coverage radii, e.g., a cellular network as a licensed network and a WLAN as a cognitive network. Primary Network Primary Base-Station CR Base-station Dynamic Spectrum Access Primary User CR User Primary User CR User Cognitive Radio Network Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 22/38
23 Decoupling sensing and actuation: how to do it Proposed solution: Given problem of monitoring a large spectrum, and in particular in scenario b, a separate sensor network dedicated to spectrum sensing can be deployed in parallel with primary and cognitive networks. The problems of hidden terminals, especially in case of unknown positioned primary receivers, would be solved, since sensor network could provide information on spectrum occupancy to CR network not only at a given spot, but on entire radio footprint of transmitter, thus allowing for minimal interference with licensed users. Furrmore, sensors would provide a finer spatial resolution on spectrum occupancy, and, most important, can be grid-powered, i.e. with capability to employ more sophisticated sensing algorithms and to monitor larger bands. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 23/38
24 Sensor network for spectrum sensing Furrmore: sensor network can serve different cognitive networks, with different requirements, thus optimizing efforts dedicated to spectrum sensing. It could be part of infrastructure of a spectrum broker Challenges: Sensor network dimensioning Sensor network architecture design Decentralized-vs-centralized Cooperative or non-cooperative algorithms Proactive or reactive Protocol design for inter-sensor communication interface with CR networks Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 24/38
25 Conclusion (Part Cognitive radio can be an effective way to improve efficiency in spectrum usage with respect to nowadays standards. Architecture and protocol stack design are affected at different layer by presence of additional network functionalities to manage dynamic and opportunistic spectrum access and spectrum mobility. There is a variety of possible scenarios, that may lead to a variety of solutions. The presence of a third part entity, called spectrum broker, is an option when considering coexistence of more than one CR network Furrmore, presence of a separate sensor network for spectrum sensing functions Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 25/38
26 Joint AC and Routing Protocol Designs in Cognitive Radio Ad Hoc Networks (CRAHNs Based on Interference aps Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 26/38
27 A Decentralized routing, AC, and scheduling protocol for CRAHNs Problem setup: A CRAHN coexists with a Primary Network which operates on a set of N parallel frequency channels The Pnet gerates random traffic on licensed channels In CRAHN, re is a set of end-to-end multihop flows. Each node can realy traffic for multiple flows, besides those originating at it. Time is organized in periods. In each period, secondary nodes pick one of ir outgoing links a (also specifying a channel and transmit data on that link. Channel access is regulated through a CSA algorithm. The selection is performed relying on a set of link availability parameters that are fed periodically to seconday nodes Flows always have data to transmit aturation regime. Goal: to maximize secondary throughput under constraint that outgoing link selection is performed in a decentralized manner, exchanging only local information. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 27/38
28 A Decentralized routing, AC, and scheduling protocol for CRAHNs We assume that network connectivity graph is given, i.e., we are not pursuing topology optimization, power control issues, etc For simplicity, we assume that each channel has same capacity. The protocol should select channels not in use, or less used, by Pnet. How to do it? Provide a means for each node to obtain channel availability parameters on each outgoing link Seek optimal rule for Snet nodes to decide which link to schedule for transmission, and on which channel, in each period. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 28/38
29 We find it convenient to define a normalized queue length A Decentralized routing, AC, and scheduling protocol for CRAHNs positive system-wide constant. Network Utility aximization Problem (NU B. Secondary Nodes Protocols Stack A utility function is defined which assigns a utility to each value of data rate which network grants to each flow The SNet operates on basis of channel availability inf and on network flow queues. We assume availability o The global utility is sum of utilities for each flow Channel (CCC outside band of cognitive operation, i.e., fr A NU problem represents search of optimal system parameter settings (basically, selection of links on which to transmit to achieve maximum utility for a given set of assumptions. Our proposed protocols can be regarded as a distributed sol ciated to Network Utility aximization (NU problem traffic utility U(x = P f2f U f(x f as objective function. Th well-known backpressure scheduler [7] with a modified ve Where f idicates a flow and x f its rate Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 ay 3, 23 29/38
30 ink (n, m exponential backoff rate link (n, m exponential backoff rate robability of transmitting on link (n, m channel c probability of transmitting on link (n, m network. channel cwe obtain x (j f =[U f (q (j s(ff A Decentralized routing, AC, and scheduling protocol ]x. For instance, c for U(x 9]. Such protocols are described below, f =log(+x whereas CRAHNs ir f, which ensures proportional fairness, we d in [39]. Such protocols are described below, whereas ir formal formal 8 n IV. Protocol description Section IV. x q s(ff apple x >< + tgoing traffic traffic from each fromtraffic each traffic source source node node is constant is constant during during each each At beginning of epoch j, for each flow f, x f = source q s(ff node s(f <q x + s(ff hf epoch j, for j, each for recomputes flow each f, flowf, source outgoing source node node s(f traffic s(f rate recomputes x f as >: maximizer of imizer maximizer of of function function U f (x f U f (xq f s(ff qx s(ff f in in x f ininterval interval [,x [,x ], ], where q q s( f f is s(ff > lized normalized queue length of flow f at its origin. eue length queue length of flowoffflow at its f at source its source node, b node, Scheduling: i.e., it i.e., represents it represents Scheduling is based on well known application layer on node s(f for flow f but not yet injected into ation layer on node s(f for flow[7]: f but scheduling not yet injected decisions into are taken based on flow differ Each node schedules for each of its links (n,m transmission (q (j s(ff ]x f (q (j s(ff. For ]x link instance,. For instance, belonging considering considering to log utility log utility flow function function ore precisely, at with beginning maximal of epoch differential j, each node n 2 ch res ensures proportional proportional backpressure fairness, fairness, weon readily we readily link. obtain: obtain: 8 schedules for transmission flow fnm with maximal differen 8 x x q >< q s(ff apple s(ff apple x +fnm = argmax f2f q (j nf q (j mf. The packets of flow fnm ar x >< + x f = q s(ff q s(ff <q <q x + s(ffduration apple. of epoch (unless(2 queue empties first, in which x + s(ff apple. (2 >: >: q s(ff > q s(ff > j =[U f ay 3, 23 duling is Seminario based presso on il Dipartimento well known di Informatica, backpressure Sapienza Università scheduler di Roma, 23/5/23 paradigm is based on well known backpressure scheduler paradigm are taken based on flow differential queue length across links. 3/38
31 A Decentralized routing, AC, and scheduling protocol for CRAHNs Protocol description continued AC: packets of different links are transmitted by each node through a CSA protocol: channel to use for each packet is selected randomly using a probability vector (p n,m,,,p n,m,n. backoff intervals are inverse of quantities R nm Both (p n,m,,,p n,m,n and R nm are computed for each epoch taking into account differential queue length and channel availability, which is acquired through spectrum monitoring. Finally, an RTS-CTS mechanism is implemented to avoid collisions due to hidden terminal problems or propagation delays. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 3/38
32 A Decentralized routing, AC, and scheduling protocol for CRAHNs Primary protection: it is obtained through CSA mechanism and through selection of less used channels Secondary flows throughput: proposed protocol has been proved to achieve maximum throughput under assumptions of negligible propagation delays and absence of collisions Practical considerations: neverrless, after a careful parameter selection and implementation of RTS-CTS mechanism, it achives very good performance. Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 32/38
33 A Decentralized routing, AC, and scheduling protocol for CRAHNs How to obtain channel availability information for each link: This is achieved through spectrum monitoring, i.e., collection of short-term channel occupancy statistics. Spectrum sensing can be done Locally by Snet nodes Cooperatively by Snet nodes Cooperatively by a dedicated network of nodes which provides and updates an interference map, and feeds it to Snet nodes -> tradeoff between spatial accuracy and time resolution of statistics Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 33/38
34 A Decentralized routing, AC, and scheduling protocol for CRAHNs Simulation environment Built using ns2-iracle framework Includes Pnet (as a cellular network, CRAHN Snet, and a network for spectrum monitoring. Includes both communication and control aspects BS S Sensor SU Cell Cell 2 4 Flow Flow Cell 3 7 Cell Flow 3 Flow 4 Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 34/38
35 A Decentralized routing, AC, and scheduling protocol for CRAHNs Performance evaluation (comparison with a predefined routing scheme with random channel selection Interference caused at primary receivers under different Pnet traffic load (3% and 5% of total capacity, respectively Percentage of total realizations Percentage of total realizations Interference power [dbw] - PU traffic load 5% Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/ Conventional solution Optimal solution Interference power [dbw] - PU traffic load 3% Conventional solution Optimal solution /38
36 A Decentralized routing, AC, and scheduling protocol for CRAHNs Performance evaluation (comparison with a predefined routing scheme with random channel selection Number of corrupted bits (for primary packet of Percentage of total realizations Percentage of total realizations... Number of corrupted bits - PU traffic load 5% Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 36/38 Conventional solution Optimal solution Number of corrupted bits - PU traffic load 3% Conventional solution Optimal solution
37 A Decentralized routing, AC, and scheduling protocol for CRAHNs Performance evaluation: CRAHN flow rates 29 Flow Rates Flow Rates Rate (bytes/s Flow Flow 2 Flow 3 Flow 4 Flow 5 Flow Rate (bytes/s Flow Flow 2 Flow 3 Flow 4 Flow 5 Flow Time Time (a No Pnet traffic (b 5% Pnet traffic Rate (bytes/s Flow Flow 2 Flow Rates Flow 3 Flow Time Flow 5 Flow 6 (c 3% Pnet traffic Seminario Figure 6. presso Flowil Dipartimento Rates. (a Without di Informatica, PNet - (b Sapienza 5% traffic Università load - (c di Roma, 3% traffic 23/5/23 load. 37/38
38 A Decentralized routing, AC, and scheduling protocol for CRAHNs Performance evaluation: impact on Pnet packet error rate PNet Packet Error Rate (%.. PNet + Optimal SNet PNet Alone PNet + Conventional SNet Primary Traffic Load - ean Channel Occupation (% Seminario presso il Dipartimento di Informatica, Sapienza Università di Roma, 23/5/23 38/38
39 Goodput aximization in Opportunistic Spectrum Access Radio Links with Imperfect Spectrum Sensing and FEC-based Packet Protection aurizio A. Bonuccelli! Donatella Ermini Loreto Pescosolido Chiara Petrioli
40 Overview! otivation: AC and Link-level adaptation in opportunistic channel access (OSA networks! Goodput maximization " Perceived PU activity " SU packet transmission rate " SU Packet Error Rate! Results! Conclusion IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 2/8!
41 AC and Link Level adaptation in OSA networks In conventional Wireless Networks: # Channel variations due to fading/mobility # ulti User Interference: may be combated with CA, orthogonal channel access emphasis on maximizing own performance # Service type In OSA networks: # Channel availability due to Primary Users (PU channel use " Need to limit interference towards PU, preserving its performance " PU channel use modeled as a stochastic process with its own characteristics and time scales " SUs rely on spectrum sensing to detect PUs IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 3/8!
42 AC and Link Level adaptation in OSA networks PUs leaves unused resources to SUs in an unpredictable way (at least deterministically SU should use resources in a way that maximizes its throughput while avoidig using same resources as Pus Packet: an atomic unit that can be decoded if and only if received entirely. Overhead + Payload PU! SU! In conventional networks: packet size is limited by coding delay, link stability, and U considerations In OSA: presence of PU has to be taken into account IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 4/8!
43 AC and Link Level adaptation in OSA networks SU packet overhead:. Headers: non-application SDU data (IP addresses, AC, ecc 2. FEC redundancy 3. Spectrum sensing " Items 2 and 3 involve a tradeoff: # Reduction of payload, but # Decrease of packet error probability 2. -> more bit errors are corrected 3. -> less miss detections/false alarms in sensing phase " FEC and PS may require to be jointly optimized for goodput maximization " PU channel use statistics play a role IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 5/8!
44 AC and Link Level adaptation in OSA networks Our assumptions: SU slots: sensig + data transmission If during sensing PU activity is detected, packet trasmission is aborted Slotted channel access even for PU SU packets formed by time-slots IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 6/8!
45 that packet error probability (25 is lower bounded by P e, since it corresponds performance in absence of PU signal in all time-slots. Goodput maximization n or hand, an upper bound on PER can be obtained by bounding probabilit i, i =,...,2, with value, i.e. P e i <. The expression for up GOODPUT = R TX * (-PER * (-OH lower bound R TX : is hence SU packet transmission rate: how often SU manages P e to 6transmit P e (K, in =P consecutive e p + slots X 2 i= P e i p i It depends on perceived PU traffic <P OH: overhead: includes e headers, p + X 2 i= p spectrum sensing i resource reservation, =P FEC redundancy e p +( p. ( PER: Packet error rate. Depends on FEC and on an be seen that posterior upper bound probability depends on that posterior sequence conditional of probability of transmission interval channel was indeed not uence s, which is used given by PU p = p (x = s, y = s, ( p (y = s ere p (y = s is overall probability that a sequence of steps in chain y IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 7/8! responds to consecutive zero states, and p (x = s, y = s is joint probabi
46 Goodput maximization GOODPUT = R TX * (-PER * (-OH Goal: find out best FEC code and packet size in given channel conditions (SNR and PU traffic statistics (with given spectrum sensing performance IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 8/8!
47 Goodput maximization GOODPUT = R TX * (-PER * (-OH " Computation of transmission rate R TX # SUs observe channel through imperfect spectrum sensing PU!traffic! Sensing!performance:! iss!detec?on!prob.!p md! False!alarm!prob.!p fa! Example:!arkov!chain! perceived!pu!traffic! q ij! =!f(p ij,!p fa,!p md! Transi?on!probaili?es!of!!observed!states! Transi?on!probaili?es!of!!actual!states! IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# 9/8!
48 Goodput maximization GOODPUT = R TX * (-PER * (-OH " Computation of transmission rate R TX # How much often does SUs observes a sequence of consecutive idle slots? R Tx = q q ( q ( q q + q # Remember that this result embeds both PU traffic statistics and sensing performance q ij = f(p ij, p fa, p md IEEE#ASS#22,#Las#Vegas,#NV,#USA,#Oct.#882,#22# /8!
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
More informationA survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationBluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationAn Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
More informationDynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
More informationThis article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
More informationSpectrum handoff reduction for cognitive radio ad hoc networks
Published Research in Conference: International Symposium on Wireless Communication Systems - ISWCS, pp. 1036-1040, 2010 Spectrum handoff reduction for cognitive radio ad hoc networks Mohamed A. Kalil,
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationIRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
More informationDetecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
More informationVOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
More information- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
More informationExpress Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh
Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationAN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationHIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
More informationMetrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationComparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationCHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
More informationWireless Technologies for the 450 MHz band
Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed
More informationcommunication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationWireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
More informationFrequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)
FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997
More informationCROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
More informationA Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
More informationPERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS. N. Golmie, D. Cypher, O. Rebala
PERFORMANCE ANALYSIS OF LOW RATE WIRELESS TECHNOLOGIES FOR MEDICAL APPLICATIONS N. Golmie, D. Cypher, O. Rebala National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, Maryland
More informationEE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
More informationImproving Bluetooth Network Performance Through A Time-Slot Leasing Approach
Improving Bluetooth Network Performance Through A Time-Slot Leasing Approach Wensheng Zhang, Hao Zhu, and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University University
More informationHow To Determine The Capacity Of An 802.11B Network
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford
More information10. Wireless Networks
Computernetzwerke und Sicherheit (CS221) 10. Wireless Networks 1. April 2011 omas Meyer Departement Mathematik und Informatik, Universität Basel Chapter 6 Wireless and Mobile Networks (with changes CS221
More informationMedium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1
1 Medium Access Control Protocols in Mobile Ad Hoc Networks: Problems and Solutions 1 Hongqiang Zhai and Yuguang Fang Department of Electrical and Computer Engineering University of Florida, Gainesville,
More informationSmartDiagnostics Application Note Wireless Interference
SmartDiagnostics Application Note Wireless Interference Publication Date: May 27, 2015 KCF Technologies, Inc. Background The SmartDiagnostics wireless network is an easy to install, end-to-end machine
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationLog-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationAnalysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile
More informationLoad Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
More informationLoad Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load
More informationEXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL
EXTENDING NETWORK KNOWLEDGE: MAKING OLSR A QUALITY OF SERVICE CONDUCIVE PROTOCOL by Pedro Eduardo Villanueva-Pena, Thomas Kunz Carleton University January, 2006 This report examines mechanisms to gradually
More informationVoice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
More informationSELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
More informationWIDE AREA ADAPTIVE SPECTRUM APPLICATIONS. Daniel J. Schaefer MITRE Corporation Reston, VA
WIDE AREA ADAPTIVE SPECTRUM APPLICATIONS Daniel J. Schaefer MITRE Corporation Reston, VA ABSTRACT This paper examines spectrum opportunistic systems in which the currently assigned spectrum is monitored
More informationRT-QoS for Wireless ad-hoc Networks of Embedded Systems
RT-QoS for Wireless ad-hoc Networks of Embedded Systems Marco accamo University of Illinois Urbana-hampaign 1 Outline Wireless RT-QoS: important MA attributes and faced challenges Some new ideas and results
More informationSeamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
More informationPacket Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
More informationa new sdn-based control plane architecture for 5G
a new sdn-based control plane architecture for 5G With a Case Study on Connectivity Management m. outline what is sdn? 5G proposed control plane connectivity control software-defined networking The needs
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationAlgorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
More informationOPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationA Statistical Estimation of Average IP Packet Delay in Cellular Data Networks
A Statistical Estimation of Average IP Packet Delay in Cellular Data Networks Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, Computer Science Department,University College
More informationPERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS
PERFORMANCE OF MOBILE AD HOC NETWORKING ROUTING PROTOCOLS IN REALISTIC SCENARIOS Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia, Scalable Network Technologies, Inc., Culver City, CA, and Michael
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More information802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
More informationLTE Evolution for Cellular IoT Ericsson & NSN
LTE Evolution for Cellular IoT Ericsson & NSN LTE Evolution for Cellular IoT Overview and introduction White Paper on M2M is geared towards low cost M2M applications Utility (electricity/gas/water) metering
More informationGTER 26 tudo o que você. quer saber sobre 802.11n
GTER 26 tudo o que você (não) quer saber sobre 802.11n Luiz Eduardo Dos Santos CISSP CWNE CEH GISP GCIH Sr. Systems & Security Engineer Americas hello agenda evolution of wi-fi what makes 11n what actually
More informationChristian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
More informationOptimal batch scheduling in DVB-S2 satellite networks
Optimal batch scheduling in DVB-S2 satellite networks G. T. Peeters B. Van Houdt and C. Blondia University of Antwerp Department of Mathematics and Computer Science Performance Analysis of Telecommunication
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More information8. Cellular Systems. 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992.
8. Cellular Systems References 1. Bell System Technical Journal, Vol. 58, no. 1, Jan 1979. 2. R. Steele, Mobile Communications, Pentech House, 1992. 3. G. Calhoun, Digital Cellular Radio, Artech House,
More informationRouting in Cognitive Radio Ad-Hoc Networks
Routing in Cognitive Radio Ad-Hoc Networks Payel Bandyopadhyay University of Helsinki Helsinki, Finland Email: payel.bandyopadhyay@cs.helsinki.fi Abstract Cognitive Radio (CR) mitigates the problem of
More informationCourse Curriculum for Master Degree in Electrical Engineering/Wireless Communications
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies
More informationTechnology White Paper Capacity Constrained Smart Grid Design
Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless
More informationQuality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks
Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: vamsee@iitk.ac.in
More informationEfficient Network Marketing Strategies For Secondary Users
Determining the Transmission Strategy of Cognitive User in IEEE 82. based Networks Rukhsana Ruby, Victor C.M. Leung, John Sydor Department of Electrical and Computer Engineering, The University of British
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationWireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationAdministrivia. CSMA/CA: Recap. Mobility Management. Mobility Management. Channel Partitioning, Random Access and Scheduling
Administrivia No lecture on Thurs. Last work will be out this week (not due, covers wireless) Extra office hours for next week and the week after. Channel Partitioning, Random Access and Scheduling Channel
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
More informationHow performance metrics depend on the traffic demand in large cellular networks
How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented
More informationHSDPA Mobile Broadband Data A Smarter Approach to UMTS Downlink Data
HSDPA Mobile Broadband Data A Smarter Approach to UMTS Downlink Data UMTS mobile wireless systems have enjoyed widespread uptake of high-quality circuit-switched applications like voice and video telephony.
More informationRevision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationDefining the Smart Grid WAN
Defining the Smart Grid WAN WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform
More informationAn Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 802.11b Networks
An Experimental Study of Throughput for UDP and VoIP Traffic in IEEE 82.11b Networks Sachin Garg sgarg@avaya.com Avaya Labs Research Basking Ridge, NJ USA Martin Kappes mkappes@avaya.com Avaya Labs Research
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationQoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationR2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
More informationINTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA
COMM.ENG INTRODUCTION TO COMMUNICATION SYSTEMS AND TRANSMISSION MEDIA 9/6/2014 LECTURES 1 Objectives To give a background on Communication system components and channels (media) A distinction between analogue
More informationOmni Antenna vs. Directional Antenna
Omni Antenna vs. Directional Antenna Document ID: 82068 Contents Introduction Prerequisites Requirements Components Used Conventions Basic Definitions and Antenna Concepts Indoor Effects Omni Antenna Pros
More informationChapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
More informationPerformance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
More informationA TCP-like Adaptive Contention Window Scheme for WLAN
A TCP-like Adaptive Contention Window Scheme for WLAN Qixiang Pang, Soung Chang Liew, Jack Y. B. Lee, Department of Information Engineering The Chinese University of Hong Kong Hong Kong S.-H. Gary Chan
More informationThe Monitoring of Ad Hoc Networks Based on Routing
The Monitoring of Ad Hoc Networks Based on Routing Sana Ghannay, Sonia Mettali Gammar, Farouk Kamoun CRISTAL Laboratory ENSI, University of Manouba 21 Manouba - Tunisia {chnnysn,sonia.gammar}@ensi.rnu.tn,
More informationIEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.
More informationData Center Networks, Link Layer Wireless (802.11)
Internet-Technologien (CS262) Data Center Networks, Link Layer Wireless (802.11) 1.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6 Wiederholung Warum «multiple access»?
More informationA New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir
More informationCapacity of the Multiple Access Channel in Energy Harvesting Wireless Networks
Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks R.A. Raghuvir, Dinesh Rajan and M.D. Srinath Department of Electrical Engineering Southern Methodist University Dallas, TX
More informationCHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
More information