Introduction. Communication Systems Simulation - I. Monte Carlo method. Simulation methods
|
|
- June Webb
- 6 years ago
- Views:
Transcription
1 Introduction Communication Systems Simulation - I Harri Saarnisaari Part of Simulations and Tools for Telecommunication Course First we study what simulation methods are available Use of the Monte Carlo method is investigated more thoroughly Then we study the structure of communication systems and discuss their simulations What parts can be found in communication systems? What is simulated in different parts? 2 Simulation methods Monte Carlo (MC) method Repeated random trials Quasianalytical (QA) method (or semianalytical) Average signal (e.g., bit/symbol decisions) is obtained by passing a noiseless signal through the system Simulation part of QA Average is then used to obtain the result via analytical tools Assumed noise statistics is used Analytical part of QA May be also mixed with the MC method Also other less used techniques exits Only the MC method will be discussed hereafter Although QA is also useful Monte Carlo method Communication signals are random, Random data, random channel coefficient, random noise (thermal noise, environmental noise), random delay, random carrier frequency error, Therefore, a single realization does not explain the whole story It may even yield to misleading conclusions E.g., you send (in a simulator) a bit through a bad channel and receive it correctly and then claim that BER is 0 although it really is 0.4 after serious simulations Several realizations are needed to see the average behavior In the MC method the same experimental is repeated several times such that random phenomena in the process are modeled as random variables and generated again and again using random number generators (RNGs) 3 4 1
2 Monte Carlo method Basically, one measures how many times the trial succeeds and how many times not i.e., the probability of success is calculated One is also interested to know how reliable the obtained results are Confidence interval Simulations should be made in such a fashion that the results have a desired error margin or result can be expressed as result = value ± desired conf. interval Monte Carlo methods How many trials are needed for reliable results? In order that statistical measures are reliable, a certain amount of experiments have to be made The larger the number of trials N is, the reliable the results are since Average often converges to the actual value Confidence intervals tend to zero at rate (1/N) 1/2 i.e., as N increases The average of trials becomes closer the actual value Interval at which the actual value is within certain limits of the average becomes smaller 5 6 Monte Carlo methods, BER case Monte Carlo methods, BER case Number of simulated symbols From the previous fig one can draw the following results If we consider 95 % conf. limit And have 10 expected errors the conf. limit is (v-1) 2,8 10 -v And have 100 expected error the conf. limit is (v+1) 1,8 10 -v 10 expected errors 100 expected errors 7 8 2
3 Monte Carlo methods BER analysis successful experiments (i.e., bit errors) have to be made in order that BER analyses are reliable The larger value is better This means that if we want to reliably simulate results down to BER 10-5 we have to send at least 10 6 bits or (preferably) 10 7 bits, both very large numbers At very low BER simulation time may become very long Desired BER level depends on application For uncoded BER > 10-5 is usually sufficient For coded BER 10-6 is usually required For voice is often sufficient whereas data requires 10-6 Simulations may be arranged such that you have a maximum number of iterations N max and a minimum number of errors N err Simulation is stopped whichever limit is first reached This fastens simulations at low SNR/SINR since N err is usually Communication signals have to be synchronized before data communication is possible Time, frequency, phase, amplitude are possible synchronization/channel estimation targets The receiver has estimators for this purpose The performance of these estimators has to be simulated (or analyzed if possible) The MC method is used also herein The random phenomena are modelled by RNGs as in BER analysis achieved much faster than N max 9 10 In estimation algorithm studies simulations may concern the mean and variance of the estimator and/or the probability that the estimator finds and/or does not find the correct value For the latter case previous BER rules can be used, i.e., successful measurements Estimator is unbiased if its average value is equal to the actual value Otherwise it is biased, i.e., there is a bias between estimated and actual value The estimator is said to be efficient if the variance attains the theoretical lower bound known as the Cramer-Rao bound Estimator analysis usually contain comparison of simulated results to this bound Often as a function of SNR
4 The estimated variance σ 2 is often used to set the confidence limit as follows It is assumed that the estimator has Gaussian distribution this is often valid, at least approximately due to the central limit theorem It is well known that in Gaussian case 65% of samples are within ±σ of the mean and 95% of samples are within ±2σ of the mean 95 % accuracy or 2σ (2sigma) accuracy are often used terms in system design How many MC iterations are needed? The book explains that this is a difficult question The rule of thumb is that the larger the SNR the easier the estimation and the less iterations are needed for reliable results If scientific papers are considered 100 even 1000 iterations are often used, but values outside this interval are also common Accuracy usually increases at rate (1/N) 1/2 As a rule of thumb, the result curves should be smooth, not fluctuating no 13 yes 14 One way to solve the problem of number of iterations is as follow Let a successful trial be such that the estimator gives a result B that is within certain interval around ±δ the true value A, i.e., A-δ < B < A+δ If the number of successful trials is , the iterations can be stopped (large value is better, even larger than 100) Some even use conditioned estimation results they take into account for the mean and variance calculation only the successful trials Depending on application this may be a valid way to do Use of limits is often sensible since In order that data system works at all, the synchronization errors should be inside certain margins Synchronizers often have a coarse phase (acquisition) and a fine tuning phase (tracking) and the latter usually assumes that errors are within its pull in range NOTE Sometimes also maximum errors, maximum and minimum BER, etc are recorded and these are reported together with means, Or, 95% (or X %) results are calculated in simulations instead assumed to be approximated from theory (look it the figure) 4
5 Communication simulations A communication system designer has requirements the system has to satisfy and also limitations that have to be taken in the account These may be given in a requirements definition document by the customer Simulations (in addition to analysis and prototyping) are used to verify are the requirements and limitations possible to satisfy with the selected elements or to find which elements satisfy the requirements and limitations Communication simulations A communication network consist of set of nodes The target of a node is to send information to some other node or nodes and of a network is to allow these connections The nodes are devices that consist of Hardware Software The totality therefore consists of different (sub)systems Communication simulations Thus, we have System level requirements The overall system has to satisfy the requirements Subsystem level requirements The subsystems have to satisfy their requirements 19 Some possible requirements Bit rates the system has to support May be different for different services voice, data, video, BER targets May be different for different services: voice, data, video, Also frame or packet error rate may be of interest Number of nodes the (sub)system has to support Nodes should be networked possibly in different ways Level and type of interference the system has to tolerate Interference from other systems at nearby frequency bands Intentional interference in military systems The system possibly has to operate in different environments The system has to have connections to other systems 20 5
6 Some possible requirements/limitations Costs Size and weight of equipments Power consumption E.g., effect to operation time without battery recharge Interference to other systems E.g., adjacent band interference Communication simulations Communication systems can be considered at different levels Higher and lower levels contain different parts of the systems Nodes jointly form (communication) networks (higher level) Different (kind of) networks jointly form larger networks Nodes are connected through (communication) links (lower level) Links consists of Transmitter Propagation medium (optic, wired, wireless) Receiver At different levels the simulations concern different things Communication simulations Networks are usually linked somehow since the goal in communications is to send information from a place to another (not just inside a network) Networks and links are just means to attain the goal Transmitters and receivers (transceivers) are indented to execute some functions such that data can be communicated Transceivers consist of different elementary parts Hardware (HW) Software (SW) Both parts do some functions and consist of several building blocks Each block and their entity has to satisfy given requirements The overall transceiver (HW+SW) has to satisfy the requirements
7 Communication simulations Communication simulations can be divided into several parts Network level simulations Link level simulations Algorithm level simulations Performance of algorithms in a link are investigated separately Platform level SW simulations Platform level HW simulations 25 Network level simulations Network level simulations are used to see How information flows inside a network and/or between networks How applications and devices are able to send and receive information How networking functions (algorithms) affect to this capability Which networking algorithms satisfy requirements Where, in which situations, certain networking algorithm is useful Networking Routing (NET) Medium access control (MAC) often MAC and NET investigated separately Link control 26 Network level simulations Possible variables Number of nodes Density of nodes in certain area Propagation loss and range between nodes Mobility of nodes Interference, e.g., co-channel interference effects Information packet size and birth rate E.g., follow certain statistical distributions (that are obtained as approximation based on real measurements) It is obvious that voice and data (e.g. video) packet sizes are different Possible communications data rates for a link (models modulation level, channel coding, etc) 27 Network level simulations What is simulated Data throughput as a function of the number of nodes or some other variable Maximum (capacity of the network), average Latency (end-to-end delay) and jitter (change of delay) of messages Important e.g. for voice and other (near) real time services Usability and effects of Routing protocols, Proactive, reactive Access protocols, MAC Carrier Sensing (CSMA), TDMA, FDMA, CDMA, ALOHA Packet addressing protocols (like IPv6), QoS (quality of service) protocols (like packet priority),. voice (low latency), real time video vs non-real time, etc How much capacity networking commands require? What is networking overhead? 28 7
8 Network level simulations What is simulated Scalability of protocols Does them work with different number of nodes? E.g., with 10 nodes and also with 200 nodes Mobility of nodes How this affects the performance? How interference or for some other reason lost connections (links) affect to the system Robustness of the network How packets are distributed inside network How network recovers from problematic situations E.g., lost connections (auto-recover, self-fixing) Rush hours What is the utilization rate of the network Network level simulations One has to think what are relevant features the network simulator has to have Usually links are modeled using a high level model Link budget is calculated for the desired and interfering signals Gives SINR (signal-to-interference-plus-noise ratio) BER is calculated analytically based on SINR like BER=f(SINR) In AWGN f() is well known Q-function i.e., transceivers are not actually simulated This saves efforts, time and costs This is a QA method Network level simulations Link level simulations Sensor networks Cheap simple sensors are deployed in an area. Collected information is used to make decisions. Hundreds or thousands of nodes Simulation only meaningful way to test Must be energy efficient Stand-alone nodes must be operable as long as possible Energy efficient simple routing protocols are needed Obtained BER at different channels using different modulations and receiver algorithms Supported bit rates at different channels (BER goals in mind) RF and antenna effects Effects of uncertainties in synchronization/channel estimation to BER Performance of different synchronization and channel estimators (algorithms) in different environments Performance of different detection and demodulation algorithms, channel coding schemes, We consider the link level hereafter (since the book does it too)
9 Link simulations Random elements are Data symbols (bits) Additive (thermal) noise Amplitude and phase of multipath components (in fading channels) Number of multipath components Frequency error in some channels Delay (time-of-arrival) Delay and frequency spread Direction-of-arrival (in cases the direction matters like multiantenna, directional antenna) External interference usually contains random features 33 Coding part Typical elements of a link Decoding part Digital signal formation Digital signal processing for demodulation/synchronization/ channel estimation To RF frequency, power amplification Effects of RF/DA Other signals Effects of Thermal RF/AD noise 34 R a d i o c h a n n e l From RF to IF/baseband RF Simulations RF simulations and corresponding tools are used for RF design These are used to design, e.g., Antennae and antenna groups (e.g., mutual coupling) RF filters Power amplifiers Mixers (up and downconversion) Combinations of these RF Simulations Different RF building blocks may have existing models (e.g., from manufacturers) Blocks are combined to form a complete RF block Simulation shows does the RF part perform as it should or are changes needed Note: RF simulations give also the transfer function of the RF part Can be used in link level simulations to model the RF part
10 Platform Simulations Platform is a device or set of devices on which the transceiver is implemented There are several topics that have to be considered AD/DA conversion Sufficient word length Effects of limiting in reception (insufficient AGC) Finite word length effects Fixed point vs floating point How algorithms perform with these How many bits are needed for satisfactory performance» Input word length, internal word length» E.g., how many internal bits are needed for sufficient performance for given input word length How to scale signal to prevent overflow? How overflow affects? Platform Simulations How signal flows between different blocks Simulation of different finite word length algorithms Filters Matrix inversions (I)FFT... Etc Other Simulation Examples Simulations are also used to design base station locations Propagation models in addition with map and geographical information (hills, vegetation, streets, buildings) are used to estimate base station coverage areas Network time synchronization How clocks are kept to show equal time Needed, e.g., in time stamping of events 39 10
CHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationCommunication Network Simulations Using OPNET
521365S Tietoliikenteen simuloinnit ja työkalut Communication Network Simulations Using OPNET 20.4.2010 klo 12.15 TS407 Juha-Pekka Mäkelä juha.makela AT ee.oulu.fi 1 Network simulations Simulations are
More informationCHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL
WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.
More informationRT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar
RT-Link: A global time-synchronized link protocol for sensor networks Anthony Rowe, Rahul Mangharam, Raj Rajkumar Papa Alioune Ly, Joel Alloh, Carl Hedari, Tom Reynaert Outline Introduction Design of the
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationDesign and Simulation of an Underwater Acoustic Local Area Network
Design and Simulation of an Underwater Acoustic Local Area Network Ethem M. Sozer, Milica Stojanovic, and John G. Proakis Northeastern University, Communications and Digital Signal Processing Center 409
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationCourse Outcome of M.E (ECE)
Course Outcome of M.E (ECE) PEC108/109: EMBEDDED SYSTEMS DESIGN 1. Recognize the Embedded system and its programming, Embedded Systems on a Chip (SoC) and the use of VLSI designed circuits. 2. Identify
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationImplementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering
Implementation and use of Software Defined Radio (SDR) technology for Public Safety, Traffic applications, and Highway Engineering Topics of discussion * Section 1. Wireless vs. Wired. Advantages and disadvantages
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationWireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization
Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi
More informationA cluster based interference mitigation scheme for performance enhancement in IEEE
756 Journal of Scientific & Industrial Research J SCI IND RES VOL 7 SEPTEMBER 2 Vol. 7, September 2, pp. 756-76 A cluster based interference mitigation scheme for performance enhancement in IEEE 82.5.4
More informationMAC Essentials for Wireless Sensor Networks
MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer
More informationUNIT 1 Questions & Solutions
UNIT 1 Questions & Solutions 1. Give any 5 differences between cellular wireless networks and ADHOC wireless network. Ans: The following table shows the difference between cellular networks and Adhoc wireless
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationPhysics 736. Experimental Methods in Nuclear-, Particle-, and Astrophysics. - Statistical Methods -
Physics 736 Experimental Methods in Nuclear-, Particle-, and Astrophysics - Statistical Methods - Karsten Heeger heeger@wisc.edu Course Schedule and Reading course website http://neutrino.physics.wisc.edu/teaching/phys736/
More informationReview on an Underwater Acoustic Networks
Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement
More information6.9 Summary. 11/20/2013 Wireless and Mobile Networks (SSL) 6-1. Characteristics of selected wireless link standards a, g point-to-point
Chapter 6 outline 6.1 Introduction Wireless 6.2 Wireless links, characteristics CDMA 6.3 IEEE 802.11 wireless LANs ( wi-fi ) 6.4 Cellular Internet Access architecture standards (e.g., GSM) Mobility 6.5
More informationLAB PROJECT Nº1 1 INTRODUCTION REDES MÓVEIS E SEM FIOS , MEEC PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS
LAB PROJECT Nº1 REDES MÓVEIS E SEM PERFORMANCE OF WIRELESS PERSONAL AREA NETWORKS 1 INTRODUCTION The performance of wireless networks is highly dependent of physical phenomena, such as path loss, shadowing,
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationLecture 8 Wireless Sensor Networks: Overview
Lecture 8 Wireless Sensor Networks: Overview Reading: Wireless Sensor Networks, in Ad Hoc Wireless Networks: Architectures and Protocols, Chapter 12, sections 12.1-12.2. I. Akyildiz, W. Su, Y. Sankarasubramaniam
More informationWireless Sensor Networks
Wireless Sensor Networks c.buratti@unibo.it +39 051 20 93147 Office Hours: Tuesday 3 5 pm @ Main Building, second floor Credits: 6 Ouline 1. WS(A)Ns Introduction 2. Applications 3. Energy Efficiency Section
More informationLinks. CS125 - mylinks 1 1/22/14
Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationEvaluating the Impact of Signal to Noise Ratio on IEEE PHY-Level Packet Loss Rate
21 13th International Conference on Network-Based Information Systems Evaluating the Impact of Signal to Noise Ratio on IEEE 82.15.4 PHY-Level Packet Loss Rate MGoyal, S Prakash,WXie,YBashir, H Hosseini
More informationConfigure n on the WLC
Configure 802.11n on the WLC Document ID: 108184 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions 802.11n An Overview How Does 802.11n Provide Greater Throughput
More informationSAPHYRE. Contract No. FP7-ICT Network protocol design for resource sharing D4.2
SAPHYRE SAPHYRE Contract No. FP7-ICT-248001 Network protocol design for resource sharing D4.2 Contractual date: M30 Actual date: M30 Authors: Federico Librino, Leonardo Badia, Participants: CFR Work package:
More informationA Non-Iterative Approach to Frequency Estimation of a Complex Exponential in Noise by Interpolation of Fourier Coefficients
A on-iterative Approach to Frequency Estimation of a Complex Exponential in oise by Interpolation of Fourier Coefficients Shahab Faiz Minhas* School of Electrical and Electronics Engineering University
More informationAdvanced Modulation and Coding Challenges
WHITE PAPER Accelerating from 100GE to 400GE in the Data Center Advanced Modulation and Coding Challenges Ever increasing demands for a connected world with instant data access continues to drive data
More informationWP-PD Wirepas Mesh Overview
WP-PD-123 - Wirepas Mesh Overview Product Description Version: v1.0a Wirepas Mesh is a de-centralized radio communications protocol for devices. The Wirepas Mesh protocol software can be used in any device,
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationWireless and Mobile Networks
Monash University Department of Electrical and Computer Systems Engineering Wireless and Mobile Networks Present and Future Y. Ahmet Şekercioğlu August 2007wireless-nets.tex,v1.5 Y. Ahmet Şekercioğlu:
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationB.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC WIRELESS COMMUNICATION
B.E. ELECTRONICS & COMMUNICATION ENGINEERING SEMESTER - VII EC2401 - WIRELESS COMMUNICATION Question Bank (ALL UNITS) UNIT-I: SERVICES & TECHNICAL CHALLENGES PART A 1. What are the types of Services? (Nov.
More informationThroughput Considerations for Wireless Networks
Wi4Net White Paper: Throughput Considerations for Wireless Networks About us CelPlan Technologies has been a worldwide leading provider of wireless network design, optimization and performance evaluation
More informationResource management issues in mobile ad hoc networks (MANET)
Autonomic Communication and Knowledge Plane Resource management in autonomic communication Resource management issues in mobile ad hoc networks (MANET) S-38.4030 The aim of this presentation is to give
More informationCENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.
CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,
More informationPassive Differential Matched-field Depth Estimation of Moving Acoustic Sources
Lincoln Laboratory ASAP-2001 Workshop Passive Differential Matched-field Depth Estimation of Moving Acoustic Sources Shawn Kraut and Jeffrey Krolik Duke University Department of Electrical and Computer
More informationPROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION
PROPOSAL OF MULTI-HOP WIRELESS LAN SYSTEM FOR QOS GUARANTEED TRANSMISSION Phuc Khanh KIEU, Shinichi MIYAMOTO Graduate School of Engineering, Osaka University 2-1 Yamada-oka, Suita, Osaka, 565-871 JAPAN
More informationChannel Decoding in Wireless Communication Systems using Deep Learning
Channel Decoding in Wireless Communication Systems using Deep Learning Gaurang Naik 12/11/2017 Deep Learning Course Project Acknowledgements: Navneet Agrawal, TU Berlin Error Control Coding Wireless Communication
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationHybrid Coax-Wireless Multimedia Home Networks Using Technology. Noam Geri, Strategic Marketing Manager
White Paper Hybrid Coax-Wireless Multimedia Home Networks Noam Geri, Strategic Marketing Manager Cable Broadband Communications Group, Texas Instruments Introduction Wireless home networking has emerged
More informationEnhanced Contention Resolution Aloha - ECRA
Enhanced Contention Resolution Aloha - ECRA Federico Clazzer and Christian Kissling German Aerospace Centre (DLR) Oberpfaffenhofen, D-82234, Wessling, Germany Email: {federico.clazzer, christian.kissling}@dlr.de
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationChapter 2 Installation and Configuration
Chapter 2 Installation and Configuration This chapter describes how to set up your NETGEAR Wireless-N Access Point WN802T v2 for wireless connectivity to your LAN. This basic configuration will enable
More informationAnnouncements: ECE/CS 372 introduction to computer networks. Assignment 4 due now. Chapter 7
ECE/CS 372 introduction to computer networks Announcements: Assignment 4 due now Chapter 7 Acknowledgement: slides drawn heavily from Kurose & Ross and Prof. Bechir Hamdaoui Chapter 7, slide 1 Wireless
More informationApplication of Importance Sampling in Simulation of Buffer Policies in ATM networks
Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationBASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS
XIX IMEKO World Congress Fundamental and Applied Metrology September 6!11, 2009, Lisbon, Portugal BASIC CHARACTERISTICS OF ZIGBEE AND SIMPLICITI MODULES TO USE IN MEASUREMENT SYSTEMS L. Skrzypczak 1),
More informationSWAP and TCP performance
SWAP and TCP performance Jean Tourrilhes, HPLB 23 March 98 1 Introduction The SWAP protocol that we have proposed [4] the HRFWG is designed to carry TCP/IP traffic. Of course, we would never had proposed
More informationChapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS
Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful
More informationOptimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems
Optimising Bit Error Rate and Power Consumption Through Systematic Approach for OFDM Systems Ms.A.Vijayadev 1, Mr.T.Barath Kumar 1, Ms.A.Brinda Devi 1, Ms.P.S.Sivakami 1, Mrs.P.G.Padma Gowri 1 AP, Department
More informationECE 598HH: Advanced Wireless Networks and Sensing Systems. Lecture 8: MIMO Part 1 Haitham Hassanieh
ECE 598HH: Advanced Wireless Networks and Sensing Systems Lecture 8: MIMO Part 1 Haitham Hassanieh MIMO: Multiple Input Multiple Output So far: single input single output This lecture: multiple input multiple
More informationGNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY
GNSS SPOOFING DETECTION IN COVERED SPOOFING ATTACK USING ANTENNA ARRAY Ali Broumandan and James T. Curran PLAN group Schulich School of Engineering, University of Calgary PLAN.geomatics.ucalgary.ca International
More informationEmbracing Wireless Interference: Analog Network Coding
Embracing Wireless Interference: Analog Network Coding By Sachin Katti, Shyamnath Gollakota, and Dina Katabi Shyamala Villupuram Sundararaman University of Freiburg shyamala.villupuram.sundararaman@venus.uni-freiburg.de
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy
More informationROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols
ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationBasic Communication Concepts
Chapter 3 Basic Communication Concepts 3.1 Introduction This chapter introduces some of the basic concepts of signals and information communication. The following section, 3.2, looks at some of the ways
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationMHz TRANSCEIVER. Bi-Directional Send and Receive. Compatible with: Transmitter Receiver Transceiver. Part # Part #
433.92 MHz TRANSMITTER 433.92 MHz TRANSCEIVER 433.92 MHz RECEIVER Part # 27986 Part # 27988 Part # 27987 Single Direction Send Only Bi-Directional Send and Receive Single Direction Receive Only Compatible
More informationDesign and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing
Design and Evaluation of the Ultra- Reliable Low-Latency Wireless Protocol EchoRing BWRC, September 22 nd 2017 joint work with C. Dombrowski, M. Serror, Y. Hu, S. Junges Machine-Type Communications: Origins
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationGPS Vulnerability Report
GPS Vulnerability Report Prepared by Alliance of Telecommunications Industry Solutions Synchronization Committee March 19 th 2016 Table of Contents About ATIS Report Objective Timing Performance Requirements
More informationIT800SCP Power Line Communications (PLC) Processor - Infrastructure for the Connected Smart Home
IT800SCP Power Line Communications (PLC) Processor - Infrastructure for the Connected Smart Home Dr. Oren Kaufman*, Asaf Avidan** * Ph.D., M.B.A Regional Manager East Asia & Pacific ITRAN Communications
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationAERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET
AERONAUTICAL CHANNEL SIMULATION IN NETWORK SIMULATORS FOR INCORPORATION INTO OPNET Author: Tianyin Zhang and Nur Jaber Advisor: Dr. Richard Dean Morgan State University ABSTRACT This paper discusses channel
More informationWireless Communication
Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications
More informationDCN Questions CHAPTER 1:- NETWORKING FUNDAMENTALS
DCN Questions CHAPTER 1:- NETWORKING FUNDAMENTALS Q1. What are the four fundamental Characteristics of Data Communication? On which effectiveness of data communication is depended? Q2. Define data communication?
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationCOMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K.
COMPARISON OF TIME-BASED AND SMAC PROTOCOLS IN FLAT GRID WIRELESS SENSOR NETWORKS VER VARYING TRAFFIC DENSITY Jobin Varghese 1 and K. Nisha Menon 2 1 Mar Baselios Christian College of Engineering and Technology,
More informationInitial PHY Layer System Proposal for Sub 11 GHz BWA
Initial PHY Layer System Proposal for Sub 11 GHz BWA Document Number: 802.16.3p-00/40 Date Submitted: 2000-11-08 Source: Anader Benyamin-Seeyar Voice: (514) 822-2014 Harris Corporation Inc. Fax: (514)
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationET4254 Communications and Networking 1
Topic 2 Aims:- Communications System Model and Concepts Protocols and Architecture Analog and Digital Signal Concepts Frequency Spectrum and Bandwidth 1 A Communications Model 2 Communications Tasks Transmission
More informationWireless Networks. CSE 3461: Introduction to Computer Networking Reading: , Kurose and Ross
Wireless Networks CSE 3461: Introduction to Computer Networking Reading: 6.1 6.3, Kurose and Ross 1 Wireless Networks Background: Number of wireless (mobile) phone subscribers now exceeds number of wired
More informationITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS
ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS An Undergraduate Research Scholars Thesis by KATHERINE CHRISTINE STUCKMAN Submitted to Honors and Undergraduate Research Texas A&M University in partial
More informationETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.
ETSN01 Exam August 22nd 2015 8am 1pm Instructions Clearly label each page you hand in with your name and the page number in the bottom right hand corner. Materials allowed: calculator, writing material.
More informationAMCP/4-WP/70. b) requirements and recommendations together with their rationale; and
Appendix A to the Report on Agenda Item 3 3A-1 APPENDIX A VHF DIGITAL LINK (VDL) DESIGN GUIDELINES 1. INTRODUCTION 1.1 In the absence of a comprehensive and detailed set of operational requirements, the
More informationTwo hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE. M.Sc. in Advanced Computer Science. Date: Monday 2 nd June 2008.
COMP60242 Two hours UNIVERSITY OF MANCHESTER SCHOOL OF COMPUTER SCIENCE M.Sc. in Advanced Computer Science Mobile Computing Date: Monday 2 nd June 2008 Time: 09:45 11:45 Please answer any THREE Questions
More informationIntroduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA
Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA
More informationIMAGE DE-NOISING IN WAVELET DOMAIN
IMAGE DE-NOISING IN WAVELET DOMAIN Aaditya Verma a, Shrey Agarwal a a Department of Civil Engineering, Indian Institute of Technology, Kanpur, India - (aaditya, ashrey)@iitk.ac.in KEY WORDS: Wavelets,
More informationImpact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11
More informationENSC 427: COMMUNICATION NETWORKS. Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks. Spring 2009 FINAL PROJECT
ENSC 427: COMMUNICATION NETWORKS Performance Evaluation of Voice Over IP on WiMAX and Wi-Fi Based Networks Spring 2009 FINAL PROJECT Group #1 Jeremy Yoo http://www.sfu.ca/~jty/ensc427/ jty@sfu.ca i Table
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationWZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018
White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com
More informationMedia Access Control in Ad Hoc Networks
Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and
More informationTelecommunications Engineering Course Descriptions
Telecommunications Engineering Course Descriptions Electrical Engineering Courses EE 5305 Radio Frequency Engineering (3 semester hours) Introduction to generation, transmission, and radiation of electromagnetic
More informationChapter 4: Implicit Error Detection
4. Chpter 5 Chapter 4: Implicit Error Detection Contents 4.1 Introduction... 4-2 4.2 Network error correction... 4-2 4.3 Implicit error detection... 4-3 4.4 Mathematical model... 4-6 4.5 Simulation setup
More informationComparison of medium access control protocols for ultra narrowband communication systems
Faculty of Electrical Engineering, Mathematics & Computer Science Comparison of medium access control protocols for ultra narrowband communication systems Leon Schenk M.Sc. Thesis August 2017 Supervisors:
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationAssignment 2 in Simulation of Telesystems Laboratory exercise: Introduction to Simulink and Communications Blockset
Mid Sweden University Revised: 2013-11-12 Magnus Eriksson Assignment 2 in Simulation of Telesystems Laboratory exercise: Introduction to Simulink and Communications Blockset You are expected to conclude
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationProbability Models.S4 Simulating Random Variables
Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard Probability Models.S4 Simulating Random Variables In the fashion of the last several sections, we will often create probability
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationWireless networks. Wireless Network Taxonomy
Wireless networks two components to be considered in deploying applications and protocols wireless links ; mobile computing they are NOT the same thing! wireless vs. wired links lower bandwidth; higher
More information