In order to cope with the exponential growth of
mobile traffic, mobile operators need to access more spectrum
resources. LTE in unlicensed spectrum (LTE-U) has been proposed
to extend the usual operation of LTE in licensed spectrum
to cover also unlicensed spectrum. However, this extension
poses significant challenges especially regarding the coexistence
between LTE-U and legacy systems like Wi-Fi. In case of LTE-U
adopts Time-Division Multiplexing (TDM) schemes to share the
spectrum with Wi-Fi, we expect performance degradations of
Wi-Fi networks. In this paper, we quantify the impact of TDM
schemes on Wi-Fi performance in a coexistence scenario. We
provide detailed analytical models using two different random
walk approaches to compute the probability of collision faced by
Wi-Fi stations and their throughput performance. Besides, we
derive the performance results using an exponential approximation
which shows its insufficiency to capture the exact behavior.
We implement the coexistence in the NS3 simulator and we show
that the models estimate accurately the collision probability and
the throughput experienced by Wi-Fi. The models are then used
to study and compare different coexistence schemes showing for
instance that the Wi-Fi frame size has a non-negligible impact
on the performance of Wi-Fi users.
Studying the Impact of LTE-U on Wi-Fi Downlink performanceAmr ABDELFATTAH
To address the mobile data growth challenges,
mobile operators need to access more spectrum resources. LTE
in unlicensed spectrum (LTE-U) has been proposed to extend
the usual operation of LTE in licensed spectrum to cover also
unlicensed spectrum, mainly at 5 GHz band due to its wide
spectrum availability. However, this extension poses significant
challenges especially regarding the coexistence between LTE-U
and legacy systems like Wi-Fi. In case of LTE-U adopts Time-
Division Multiplexing (TDM) schemes to share the spectrum with
Wi-Fi, we expect performance degradations of Wi-Fi networks.
In this paper, we quantify the impact of TDM schemes on Wi-Fi
performance in a coexistence scenario. We provide an analytical
model to compute the probability of collision faced by Wi-Fi and
its downlink throughput performance. This model provides an
upper bound of the probability of collision that could be faced
by a finite number of Wi-Fi stations. NS3 simulations show
that the model estimates accurately the collision probability and
the throughput experienced by Wi-Fi. The model is then used
to study and compare different coexistence schemes showing
for instance that the Wi-Fi frame size impacts globally the
performance of Wi-Fi users.
The presentation is about Adaptive Beamforming for high data-rate applications. Analog beamforming, which is considered a cost effective solution for consumer devices are investigated. Two adaptive analog beamforming algorithms, i.e., a well-known perturbation-based and dmr-based which overcomes the drawbacks of perturbation-based algorithm are discussed in-detail and their performance comparisons are made with the help of computer simulations. Also variation of single-port structure is considered and it's benefits are exploited with the help of modified analog beamforming algorithms.
Studying the Impact of LTE-U on Wi-Fi Downlink performanceAmr ABDELFATTAH
To address the mobile data growth challenges,
mobile operators need to access more spectrum resources. LTE
in unlicensed spectrum (LTE-U) has been proposed to extend
the usual operation of LTE in licensed spectrum to cover also
unlicensed spectrum, mainly at 5 GHz band due to its wide
spectrum availability. However, this extension poses significant
challenges especially regarding the coexistence between LTE-U
and legacy systems like Wi-Fi. In case of LTE-U adopts Time-
Division Multiplexing (TDM) schemes to share the spectrum with
Wi-Fi, we expect performance degradations of Wi-Fi networks.
In this paper, we quantify the impact of TDM schemes on Wi-Fi
performance in a coexistence scenario. We provide an analytical
model to compute the probability of collision faced by Wi-Fi and
its downlink throughput performance. This model provides an
upper bound of the probability of collision that could be faced
by a finite number of Wi-Fi stations. NS3 simulations show
that the model estimates accurately the collision probability and
the throughput experienced by Wi-Fi. The model is then used
to study and compare different coexistence schemes showing
for instance that the Wi-Fi frame size impacts globally the
performance of Wi-Fi users.
The presentation is about Adaptive Beamforming for high data-rate applications. Analog beamforming, which is considered a cost effective solution for consumer devices are investigated. Two adaptive analog beamforming algorithms, i.e., a well-known perturbation-based and dmr-based which overcomes the drawbacks of perturbation-based algorithm are discussed in-detail and their performance comparisons are made with the help of computer simulations. Also variation of single-port structure is considered and it's benefits are exploited with the help of modified analog beamforming algorithms.
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
To achieve a high speed data rate, higher spectral efficiency, improved services and low latency the 3rd
generation partnership project designed LTE standard (Long Term Evolution).the LTE system employs
specific technical as well the technical HARQ, MIMO transmission, OFDM Access or estimation technical.
In this paper we focus our study on downlink LTE channel estimation and specially the interpolation which
is the basis of the estimation of the channel coefficients. Thus, we propose an adaptive method for polynomial interpolation based on Lagrange polynomial. We perform the Downlink LTE system MIMO transmission then compare the obtained results with linear, Sinus Cardinal and polynomial Newton Interpolations. The simulation results show that the Lagrange method outperforms system performance in term of Block Error Rate (BLER) , throughput and EVN(%)vs. Signal to Noise Ratio (SNR).
Parallel Interference Cancellation in beyond 3G multi-user and multi-antenna ...David Sabater Dinter
In the present thesis, the concept for beyond 3G mobile radio systems is described. A service area concept is introduced in order to combat the performance limiting interferences present in the cellular mobile communication systems, with each service area consisting of a various simultaneously active mobile terminals, a number of fixed access points and a central unit per- forming signal processing. About uplink transmission, the main characteristic of this service area system is that with the aid of joint detection of the transmit signals from the mobile ter- minals performed at uplink transmission, all interferences between the simultaneously active mobile terminals using the same bandwidth is drastically reduced. Moreover the use of OFDM subcarrierwise in the described service area based system allows for intersymbol interference free communication and for simple equalization in the frequency domain.
Through this subcarrierwise equalization the service area based system is equivalent with a number of smaller parallel systems, a fact that affects in a reduced computational complexity in the case of optimum multiuser operating with the maximum likehood principle and subop- timum linear detector zero-forcing. In this thesis the parallel interference cancellation detector is introduced, according to which the multi access interference is iteratively reconstructed and subtracted from the received signal. Parallel interference cancellation detector is compared in terms of performance with suboptimum linear detector, due to the reduced computational com- plexity.
Using standardized COST 207 channel models, the performance of parallel interference can- cellation detector compared with suboptimum linear detector has been investigated for a frozen channel, with the same snapshot using the same parameters of the channel, as well as for a number of system loads. A fact that can be observed in simulations results is that parallel in- terference cancellation detectors could achieve the same performance with a reduction of the complexity as suboptimum linear detector zero-forcing in the case of no estimate refinement and with estimate refinement by hard quantization depending on the load system. With esti- mate refinement by soft quantization the performance of the parallel interference cancellation detector is improved, having better performance than zero-forcing detector in cases with nor- mal load. Moreover with the improvement raised in this thesis, in this normal system load, the performance is more improved. On the other hand in the case of full load system, the PIC detector can not substract all the multi access interference producing error flow, this thing is not too important taking in account that the fully loaded system case should not be never present.
Overview about MIMO
Contents:
Diversity Definition
Why Diversity
Types of Diversity
Types of combining
MIMO Definition
Why MIMO ?
MIMO Advantages and disadvantages
Applications of MIMO
The Presentation Video
https://www.youtube.com/watch?v=5GiiIppb2o4&feature=youtu.be
*Contents
1-Challenges in Wireless Communication
2-Multipath andFading
3-MIMO and Diversity
4-Receive Diversity /Maximum ratio combining (MRC)
5-MIMO Evolution
6- Coordinated Multi point (CoMP)
7-Level of Cooperation and Architecture
8-CoMP System Model
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system.
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
To achieve a high speed data rate, higher spectral efficiency, improved services and low latency the 3rd
generation partnership project designed LTE standard (Long Term Evolution).the LTE system employs
specific technical as well the technical HARQ, MIMO transmission, OFDM Access or estimation technical.
In this paper we focus our study on downlink LTE channel estimation and specially the interpolation which
is the basis of the estimation of the channel coefficients. Thus, we propose an adaptive method for polynomial interpolation based on Lagrange polynomial. We perform the Downlink LTE system MIMO transmission then compare the obtained results with linear, Sinus Cardinal and polynomial Newton Interpolations. The simulation results show that the Lagrange method outperforms system performance in term of Block Error Rate (BLER) , throughput and EVN(%)vs. Signal to Noise Ratio (SNR).
Parallel Interference Cancellation in beyond 3G multi-user and multi-antenna ...David Sabater Dinter
In the present thesis, the concept for beyond 3G mobile radio systems is described. A service area concept is introduced in order to combat the performance limiting interferences present in the cellular mobile communication systems, with each service area consisting of a various simultaneously active mobile terminals, a number of fixed access points and a central unit per- forming signal processing. About uplink transmission, the main characteristic of this service area system is that with the aid of joint detection of the transmit signals from the mobile ter- minals performed at uplink transmission, all interferences between the simultaneously active mobile terminals using the same bandwidth is drastically reduced. Moreover the use of OFDM subcarrierwise in the described service area based system allows for intersymbol interference free communication and for simple equalization in the frequency domain.
Through this subcarrierwise equalization the service area based system is equivalent with a number of smaller parallel systems, a fact that affects in a reduced computational complexity in the case of optimum multiuser operating with the maximum likehood principle and subop- timum linear detector zero-forcing. In this thesis the parallel interference cancellation detector is introduced, according to which the multi access interference is iteratively reconstructed and subtracted from the received signal. Parallel interference cancellation detector is compared in terms of performance with suboptimum linear detector, due to the reduced computational com- plexity.
Using standardized COST 207 channel models, the performance of parallel interference can- cellation detector compared with suboptimum linear detector has been investigated for a frozen channel, with the same snapshot using the same parameters of the channel, as well as for a number of system loads. A fact that can be observed in simulations results is that parallel in- terference cancellation detectors could achieve the same performance with a reduction of the complexity as suboptimum linear detector zero-forcing in the case of no estimate refinement and with estimate refinement by hard quantization depending on the load system. With esti- mate refinement by soft quantization the performance of the parallel interference cancellation detector is improved, having better performance than zero-forcing detector in cases with nor- mal load. Moreover with the improvement raised in this thesis, in this normal system load, the performance is more improved. On the other hand in the case of full load system, the PIC detector can not substract all the multi access interference producing error flow, this thing is not too important taking in account that the fully loaded system case should not be never present.
Overview about MIMO
Contents:
Diversity Definition
Why Diversity
Types of Diversity
Types of combining
MIMO Definition
Why MIMO ?
MIMO Advantages and disadvantages
Applications of MIMO
The Presentation Video
https://www.youtube.com/watch?v=5GiiIppb2o4&feature=youtu.be
*Contents
1-Challenges in Wireless Communication
2-Multipath andFading
3-MIMO and Diversity
4-Receive Diversity /Maximum ratio combining (MRC)
5-MIMO Evolution
6- Coordinated Multi point (CoMP)
7-Level of Cooperation and Architecture
8-CoMP System Model
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system.
LTE Physical Layer Transmission Mode Selection Over MIMO Scattering ChannelsIllaKolani1
Although LTE networks systems profits from recent advanced transmission techniques as MIMO systems, it encounters particularly two mains challenges:
MIMO channel Modeling or MIMO channel estimation .
An Optimal Dynamic MIMO transmission modes switching following the variation of MIMO Channel.
This Thesis proposes a channel model taking into account the motion of the UE first and after use this model to design an optimal transmission mode selection for 4G networks
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
Abstract: The performance of WCDMA system deteriorates in the presence of multipath fading environment. Fading destroys the orthogonality and is responsible for multiple access interference (MAI). Though conventional rake receiver provides reasonable performance in the WCDMA downlink system due to path diversity, but it does not restores the orthogonality. Linear equalizer restores orthogonality and suppresses MAI, but it is not efficient, since its performance depends on the spectral characteristics of the channel. To overcome this, Minimum Mean Square Error- Decision Feedback Equalizer (MMSE-DFE) with a linear, anticausal feedforward filter, causal feedback filter and simple detector is proposed in this paper. The filter taps of finite length DFE is derived using the cholesky factorization theory, capable of suppressing noise, Intersymbol Interference (ISI) and MAI. This paper describes the WCDMA downlink system using finite length MMSE-DFE and takes into consideration the effects of interference which includes additive white gaussian noise, multipath fading, ISI and MAI. Furthermore, the performance is compared with conventional rake receiver and MMSE and the simulation results are shown. Keywords – MMSE, MMSE-DFE, rake receiver, WCDMA
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
The performance of WCDMA system deteriorates in the presence of multipath fading environment.
Fading destroys the orthogonality and is responsible for multiple access interference (MAI). Though
conventional rake receiver provides reasonable performance in the WCDMA downlink system due to path
diversity, but it does not restores the orthogonality. Linear equalizer restores orthogonality and suppresses
MAI, but it is not efficient, since its performance depends on the spectral characteristics of the channel. To
overcome this, Minimum Mean Square Error- Decision Feedback Equalizer (MMSE-DFE) with a linear,
anticausal feedforward filter, causal feedback filter and simple detector is proposed in this paper. The filter taps
of finite length DFE is derived using the cholesky factorization theory, capable of suppressing noise,
Intersymbol Interference (ISI) and MAI. This paper describes the WCDMA downlink system using finite length
MMSE-DFE and takes into consideration the effects of interference which includes additive white gaussian
noise, multipath fading, ISI and MAI. Furthermore, the performance is compared with conventional rake
receiver and MMSE and the simulation results are shown.
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
The technical challenges for communication engineers is the development of best performance wireless
networks with negligible amount of distortions. We have to consider multipath propagation attenuation and
radio spectrum inefficiency. Now a days, In MIMO (Multi Input Multi Output) systems there is a huge demand
for the networks with the high transmission rates and better quality of service which are having low PAPR ratio.
Instead of OFDMA, filter banks are used in massive MIMO to reduce the complexity. But they are error prone
to noise. This base paper discusses about PAPR reduction in MIMO systems using different precoding based
OFDM systems. Mainly, minimization of multi-antenna systems by controlling the transmission power and
reduction of PAPR using ZC (Zadoff-Chu) matrix transform.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
I am Bernard. I am a Computer Networking Assignment Expert at computernetworkassignmenthelp.com. I hold a Master's in Computer Science from, University of Leeds, UK. I have been helping students with their assignments for the past 12 years. I solve assignments related to Computer Networking.
Visit computernetworkassignmenthelp.com or email support@computernetworkassignmenthelp.com.
You can also call on +1 678 648 4277 for any assistance with Computer Networking Assignment.
Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015)Thoma Itoh
I summarized work in the Friedlander et al. Evolution of Bow-Tie Architectures in Biology (2015) for those who do not have a background in system biology.
Employing non-orthogonal multiple access scheme in UAV-based wireless networksjournalBEEI
This paper studies the two-hop transmission relying unmanned aerial vehicle (UAV) relays which is suitable to implement in the internet of things (IoT) systems. To enhance system performance in order to overcome the large scale fading between the base station (BS) and destination as well as achieve the higher spectrum efficiency, where non-orthogonal multiple access (NOMA) strategies were typically applied for UAV relays to implement massive connections transmission. In particular, outage probability is evaluated via signal to noise ratio (SNR) criterion so that the terminal node can obtain reasonable performance. The derivations and analysis results showed that the considered fixed power allocation scheme provides performance gap among two signals at destination.The numerical simulation confirmed the exactness of derived expressions in the UAV assisted system.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
3. Introduction ConclusionPreliminaries Proposal
What is LTE-U?
Extend LTE operation in unlicensed spectrum, i.e. 300 MHz
Aggregate licensed and unlicensed spectrum into unified network
What are LTE-U requirements?
Share fairly the spectrum with Wi-Fi “ Behave like Wi-Fi ”
Not impact Wi-Fi services more than another coexisting Wi-Fi
3
4. Introduction ConclusionPreliminaries Proposal
What are the deficiencies of TDM protocol ?
LTE-U does not perform a clear channel assessment
LTE-U has a negative impact on Wi-Fi due to Collision
LTE-U behaves like a master on the channel access
LTE-U is not fair with Wi-Fi
How does LTE-U share the spectrum?
Aggressive
TDM Protocol
LBT Protocol
CSMA/CA
Frame Based Equipment
Load Based Equipment
Duty Cycled LTE
CSAT-LTE
LTE-U
4
5. Introduction ConclusionPreliminaries Proposal
How does LTE-U Work?
LTE-U transmission occurs during on-periods
LTE-U offers off-periods to Wi-Fi channel access
Off-periods = 𝑇1, 𝑇2, … , 𝑇 𝐾
LTE-U ON/OFF pattern
What are LTE-U configuration parameters?
1) Duty cycle period = 𝐓𝐝𝐜
2) Duty cycle percentage =
𝐓 𝐝𝐜 − 𝐤=𝟏
𝐊
𝐓 𝐤
𝐓 𝐝𝐜
3) Number of off-periods = 𝐊
What is our objective?
Measuring the negative impact of LTE-U on Wi-Fi
Compensation through controlling the above parameters
5
6. Introduction ConclusionPreliminaries Proposal
Slot-by-Slot Random Walk
Z: random variable represents the slot duration
How does Wi-Fi work?
CSMA/CA = Sensing + Back off + Frame transmission
Wi-Fi communication is divided into time slots
𝑃 𝑍 = 𝑇 =
𝑃𝑏 𝑓𝑜𝑟 𝑇 = 𝑇𝑏
𝑃𝑖𝑑 𝑓𝑜𝑟 𝑇 = 𝑇𝑖𝑑
𝑃 𝐵𝐹 = 𝑗 =
1
η𝑊0
𝑓𝑜𝑟 𝑗 = 0
1
η
𝑃𝑖𝑑
𝑗
𝑃𝑏 𝑓𝑜𝑟 1 ≤ 𝑗 ≤ 𝑊 𝑚−1
Frame-by-Frame Random Walk
X: random variable represents the frame transmission duration
𝑿 = 𝜹 ∗ 𝐁𝐅 + 𝑻 𝒇 + 𝑫𝑰𝑭𝑺
6
7. Introduction ConclusionPreliminaries Proposal
How to find the pdf of Z and X?
How to calculate Wi-Fi throughput ?
Markov chain model for Wi-Fi station
τ =
2(1−𝑝 𝑚+1)
𝑊0 1− 2𝑝 𝑚′+1 1−𝑝
1−2𝑝
+ 1−𝑝 𝑚′+1 +𝑊02 𝑚′
𝑝 𝑚′+1(1−𝑝 𝑚−𝑚′)
(1)
𝑝 = 1 − (1 − τ) 𝑛−1
(2)
Now you can find
Using Z : Γ =
Ps Tpl
E Z
(3)
𝑤ℎ𝑒𝑟𝑒 𝑇𝑝𝑙 𝑖𝑠packet payload duration
Using X : Γ =
Ps Tpl
E X /(𝐸 𝐵𝐹 +1)
(3)
Bianchi’s fixed point formulation
𝑃𝑖𝑑 = (1 − τ) 𝑛
, 𝑃𝑏 = 1 − (1 − τ) 𝑛
, 𝑃𝑠 = 𝑛 τ (1 − τ) 𝑛−1
, 𝑃𝑐 = 𝑃𝑏 − 𝑃𝑠
7
8. Introduction ConclusionPreliminaries Proposal
What does it change?
And Wi-Fi throughput ?
τ =
2(1−𝑝 𝑚+1)
𝑊0 1− 2𝑝 𝑚′+1 1−𝑝
1−2𝑝
+ 1−𝑝 𝑚′+1 +𝑊02 𝑚′
𝑝 𝑚′+1(1−𝑝 𝑚−𝑚′)
(1)
Using Z : Γ =
Ps Tpl
E Z
(3)
𝑤ℎ𝑒𝑟𝑒 𝑇𝑝𝑙 𝑖𝑠packet payload duration
Using X : Γ =
Ps Tpl
E X /(𝐸 𝐵𝐹 +1)
(3)
𝑝 = 1 − 1 − 𝜏 𝑛−1
+ 𝟏 − 𝝉 𝒏−𝟏
𝒑𝒍𝒕𝒆 (2)
𝑝 = 1 − (1 − τ) 𝑛−1
(2)
𝒑𝒍𝒕𝒆
8
9. Introduction ConclusionPreliminaries Proposal
Slot-by-Slot Random Walk
Pr 𝑁𝑘 = 𝑛 = 𝑃𝑟
𝑗=1
𝑛−1
𝑧𝑗 < 𝑇𝑘 − 𝐷𝐼𝐹𝑆 − δ − 𝑃𝑟
𝑗=1
𝑛−1
𝑧𝑗 < 𝑇𝑘 − 𝐷𝐼𝐹𝑆 − δ
Counting only the busy slots
𝐸 𝑁𝑘
𝑏
= 𝑃𝑏 𝐸 𝑁𝑘
Assume that On-period always starts over a busy slot
Wi-Fi random walk will be stopped at the end of each 𝑇𝑘
𝑝𝑙𝑡𝑒 =
K
k=1
K
E Nk
b
Calculating the new Wi-Fi throughput
Γ1 = Γ (1 − 𝑝𝑙𝑡𝑒)
k=1
K
(Tk − DIFS − δ + E Rk )
Tdc
Approximate expression
9
10. Introduction ConclusionPreliminaries Proposal
Powerful model: Can be used to compute
Capture effect
Exponential Model for LTE-U
𝑝𝑐𝑎𝑝 =
𝑘
𝐾
(1 − 𝐵𝐸𝑅) 𝐶𝐵𝑅∗𝐸 𝑅 𝑘
𝐾
𝑝𝑙𝑡𝑒 = 1 − 𝑒ℜ𝑇 𝑓
𝐸 𝑅 𝑘 = 𝑃𝑏 𝑇𝑏 − 𝐸 𝑇𝑇𝑏 + 𝑃𝑖𝑑 δ − 𝐸 𝑇δ
Where ℜ =
𝐾
𝑘=1
𝐾 𝑇 𝑘
𝑝𝑙𝑡𝑒
′
= 𝑝𝑙𝑡𝑒 1 − 𝑝𝑐𝑎𝑝
10
11. Introduction ConclusionPreliminaries Proposal
Frame-by-Frame Random Walk
Pr 𝑀 𝑘 = 𝑚 = 𝑃𝑟
𝑗=1
𝑚−1
𝑥𝑗 < 𝑇𝑘 − 𝐷𝐼𝐹𝑆 − δ − 𝑃𝑟
𝑗=1
𝑚−1
𝑥𝑗 < 𝑇𝑘 − 𝐷𝐼𝐹𝑆 − δ
Probability of each case
Counting the collided and sended frames
Wi-Fi random walk will be stopped at the end of each 𝑇𝑘
Calculating the new Wi-Fi throughput
Pr 𝑐 𝑘, 𝑚 = Pr
𝑗=1
𝑚
𝑥𝑗 − 𝑇𝑓 ≤ 𝑇𝑘 ≤
𝑗=1
𝑚
𝑥𝑗 Similarily, Pr 𝑓𝑘, 𝑚 𝑎𝑛𝑑 Pr 𝑠 𝑘, 𝑚
𝑝𝑙𝑡𝑒 =
𝑘=1
𝐾
𝑃𝑟 𝑐 𝑘
k=1
K
E 𝑀 𝑘 − Pr 𝑓𝑘
Exact expression
Γ2 =
(𝑃𝑠/𝑃𝑏) 𝑘=1
𝐾
(𝐸 𝑀 𝑘 − 1 + 𝑃𝑟 𝑠 𝑘 )
𝑇𝑑𝑐 11
17. Introduction ConclusionPreliminaries Proposal
Introducing the notion of random walk in studying Wi-Fi network
17
Quantifying the negative impact of LTE-U on Wi-Fi performance
Tying up between LTE-U configuration parameters and Wi-Fi performance
Providing several solutions for making LTE-U to be Wi-Fi friendly
The duty cycled LTE-U cannot be approximated by an exponential approximation as the PASTA property does not hold
As an introduction to our paper, i will answer some questions to clarify our subject such as what is lte-U? what are the challenges could be faced in such context?
Before coexsiting the two technologies together wifi/lte-U, i will show how does each techology work alone. Afterwards in our proposal i will present two analytical models discribe the interaction between the two techologies when they are coexisting together. I validate also my analytical models through ns3 simulator .
Lte-U stands for extending lte operation in unlicensed spectrum to gain/add approximatly 300 MHz of channel bandwidth for cellular system, it represent a good step towards reaching 5G network , by using carrier aggregation techn. Which is allready used for 4G today, you can imagine our cell phone has a dual conncetion over licensed and unlicensed spectrum as shown here into unified network where unlicensed spectrum used into the small cell due to the power constraints in unlicensed spectrum.
As wifi networks use unlincensed spectrum, lte have to coexist with wifi. Accordianly,before permitting lte to use unlicensed spectrum, we have to ask lte to share the unlicensed spectrum fairly with wifi network. By another meaning lte have to behave like wifi that is mean also lte doesnt impact wifi services more than another coexisting wifi
Accordianly, the first and main question was how does lte-U share fairly the spectrum with wifi. That is mean that we are looking for a new MAC protocol for lte. First familly of such mac protocols called LBT protocols stands for listen before talk protocols Where, LTE has to listen to wi-fi transmission over the channel before accessing the channel, so if Wi-Fi transmission is ongoing over the channel, lte does not talk untile wi-fi transmission is finish. Here, lte perform a clear channel assessment before accessing the channel.
Another family of mac protcols called TDM protcol, which we study in our paper, this protocol also know as duty cycled lte, CSAT-LTE or simply called LTE-U. the main difference with the LBT PROTOCOL that lte doen’t pefrom any clear channel assesment before accessing the channel.
Let’s start showing how does each techology lte and wi-fi work alone afterwards in the proposal section we will coexist the two technologies togther. Here, lte adopt on/off pattern for its transmission which is repeted over a duty cycle period accordianly lte-u transmission occures during on-periods and lte-u offers some of off period over each duty cycles to wifi channel access, which i noted here as T1, T2, ….. Tk where K is the number of that off periods
Wifi uses csma/ca protocol to access the channel which mainly consists of performing three steps before transmitting any frame over the channel. We start by a Sesning period called DIFS period followed random backoff period based on a backoff counter whenever it reach zero the frame transmission starts. Accordianly, wifi communication is divided into time slots as shown here. A slot could be an idle slot with a delat duration which represents the backoff period or a busy slot include the sensing and frame transmission period. Moreover a busy slot could be a successful slot or collided slot all depends on the number of wifi station could transmit into this slot.
In my point of view, the main idea of our paper is how we model the activities of wifi over the channel as a random walk.
of idle slot refers as delta
Let us now coexisting the two techonolgy together. The first equation still valide since the csma/ca protocol used by wifi doent change due to lte. in contrast, the second equation is not anymore valide, we have to take into consideration the negative impact of lte on wifi due to collision, so that plte is the probability that lte transmission start when wifi transmission over the channel. But we have to condition this probability on the event that only one wifi station transmit otherwise lte
The challenege now how can we calculate plte, and the wifi throughput, as we will see based on slot by slot random walk and frame by frame random walk we can calculate plte. Accordianly we provide two different mathematical model
Let us see what is going on into any Tk period which represent again lte off period
Talk about the accuracy of each model
Why it is like that
Mention that exponential off period cannot approximate duty cycled lte
How to make lte fair with wifi
Introducing the notion of random walk in studing wifi network gives another vision to understand how does wifi network work, which could be useful for studying wifi network into another contexts
We quantify the negative impact of lteu on wifi performance due to the lack of clear channel assessment
We tie up between lteu configuration parameters and wifi performance to master the channel sharing between the two technologies
We prodive several solution for making lteu to behave like a wifi network so that could be cosidered as a wifi firendly
We prove that duty cycled lte