首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
We investigate the performance of the IEEE 802.11ac MAC layer Aggregation schemes in light of QoS guarantee with the use of an ARQ protocol, and in very high PHY rates. The investigation is done in different models of mapping Application flows into Traffic Streams and Access Categories. We show that when the IEEE 802.11ac ARQ protocol is used with relatively high bit error rates, it is not effective to use the full aggregation capability. Second, we show that there is not one best model of mapping Application flows into Traffic Streams and Access Categories. In particular, using two Access Categories is sometimes less efficient than using one.  相似文献   

2.
We address several issues related to the efficient use of Bursts in WiMAX/IEEE 802.16e systems. We look on the relation between the PHY layer budding blocks (FEC blocks) and the allocation of MAC level frames (PDUs) over these FEC blocks. In particular, we show how to transmit a given amount of MAC level data bits over a given Burst in order to maximize the number of successfully transmitted data bits in the Burst. We also compute, given an amount of data bits to transmit, what is the Burst size that maximizes each of the following three performance criterion: the number of successfully transmitted data bits in the Burst, the maximum ratio between the number of successfully transmitted data bits to the Burst size, and the number of successfully transmitted data bits per PHY slot. For the first problem the paper shows how to optimally divide the Burst into PDUs and shows that sometimes it is more efficient to use less reliable Modulation/Coding schemes. For the second problem the paper shows that using the PHY slots efficiently is the best criterion to consider.  相似文献   

3.
Visible light communication (VLC) has emerged as a viable complement to traditional radio frequency (RF) based systems and as an enabler for high data rate communications for beyond-5G (B5G) indoor communication systems. In particular, the emergence of new B5G-based applications with quality of service (QoS) requirements and massive connectivity has recently led to research on the required service-levels and the development of improved physical (PHY) layer methods. As part of recent VLC standards development activities, the IEEE has formed the 802.11bb “Light Communications (LC) for Wireless Local Area Networking” standardization group. This paper investigates the network requirements of 5G indoor services such as virtual reality (VR) and high-definition (HD) video for residential environments using VLC. In this paper, we consider such typical VLC scenarios with additional impairments such as light-emitting diode (LED) nonlinearity and imperfect channel feedback, and propose hyperparameter-free mitigation techniques using Reproducing Kernel Hilbert Space (RKHS) methods. In this context, we also propose using a direct current biased optical orthogonal frequency division multiplexing (DCO-OFDM)-based adaptive VLC transmission method that uses precomputed bit error rate (BER) expressions for these RKHS-based detection methods and performs adaptive BER-based modulation-order switching. Simulations of channel impulse responses (CIRs) show that the adaptive transmission method provides significantly improved error rate performance, which makes it promising for high data rate VLC-based 5G indoor services.  相似文献   

4.
In this paper we address an aspect of the mutual influence between the PHY layer budding blocks (FEC Blocks) and the MAC level allocations in the Uplink and Downlink of IEEE 802.16e/WiMAX networks. In these networks it is possible to transmit MAC level frames, denoted MAC PDUs, such that a PDU contains an integral number of fixed size Data Blocks. PDUs are transmitted over PHY Bursts, which are divided into FEC Blocks. We suggest several algorithms to compute the best way to define PDUs in a Burst in order to maximize several performance criteria. We also give guidelines on how to choose the best Modulation/Coding Scheme (MCS) to use in the Burst, given the SNR of the channel and the performance criteria.  相似文献   

5.
We consider the use of random linear network coding in lossy packet networks. In particular, we consider the following simple strategy: nodes store the packets that they receive and, whenever they have a transmission opportunity, they send out coded packets formed from random linear combinations of stored packets. In such a strategy, intermediate nodes perform additional coding yet do not decode nor wait for a block of packets before sending out coded packets. Moreover, all coding and decoding operations have polynomial complexity.We show that, provided packet headers can be used to carry an amount of side-information that grows arbitrarily large (but independently of payload size), random linear network coding achieves packet-level capacity for both single unicast and single multicast connections and for both wireline and wireless networks. This result holds as long as packets received on links arrive according to processes that have average rates. Thus packet losses on links may exhibit correlations in time or with losses on other links. In the special case of Poisson traffic with i.i.d. losses, we give error exponents that quantify the rate of decay of the probability of error with coding delay. Our analysis of random linear network coding shows not only that it achieves packet-level capacity, but also that the propagation of packets carrying “innovative” information follows the propagation of jobs through a queueing network, thus implying that fluid flow models yield good approximations.  相似文献   

6.
7.
伍春  江虹  尤晓建 《物理学报》2014,63(8):88801-088801
针对多跳认知无线电网络的多层资源分配问题,提出了协作去耦合方法和跨层联合方法,协作去耦合方法首先单独完成路径选择任务,随后进行信道与功率的博弈分配;跨层联合方法则通过博弈直接对路径、信道、功率三层资源进行同时分配,两种方法都综合考虑网络层、介质访问控制层、物理层的启发原则,引入了节点被干扰度信息和节点主动干扰度信息来辅助路径选择,设计了基于功率允许宽度信息的Boltzmann探索来完成信道与功率选择,设计了长链路和瓶颈链路替换消除机制以进一步提高网络性能,从促进收敛角度,选择序贯博弈并设计了具体的博弈过程,此外还分析了博弈的纳什均衡,讨论了两种算法的复杂度,仿真结果表明,协作去耦合方法和跨层联合方法在成功流数量、流可达速率、发射功耗性能指标上均优于简单去耦合的链路博弈、流博弈方法。  相似文献   

8.
Multicasting in wireless systems is a natural way to exploit the redundancy in user requests in a content centric network. Power control and optimal scheduling can significantly improve the wireless multicast network’s performance under fading. However, the model-based approaches for power control and scheduling studied earlier are not scalable to large state spaces or changing system dynamics. In this paper, we use deep reinforcement learning, where we use function approximation of the Q-function via a deep neural network to obtain a power control policy that matches the optimal policy for a small network. We show that power control policy can be learned for reasonably large systems via this approach. Further, we use multi-timescale stochastic optimization to maintain the average power constraint. We demonstrate that a slight modification of the learning algorithm allows tracking of time varying system statistics. Finally, we extend the multi-time scale approach to simultaneously learn the optimal queuing strategy along with power control. We demonstrate the scalability, tracking and cross-layer optimization capabilities of our algorithms via simulations. The proposed multi-time scale approach can be used in general large state-space dynamical systems with multiple objectives and constraints, and may be of independent interest.  相似文献   

9.
Multicast hybrid precoding reaches a compromise among hardware complexity, transmission performance and wireless resource efficiency in massive MIMO systems. However, system security is extremely challenging with the appearance of eavesdroppers. Physical layer security (PLS) is a relatively effective approach to improve transmission and security performance for multicast massive MIMO wiretap systems. In this paper, we consider a transmitter with massive antennas transmits the secret signal to many legitimate users with multiple-antenna, while eavesdroppers attempt to eavesdrop the information. A fractional problem aims at maximizing sum secrecy rate is proposed to optimize secure hybrid precoding in multicast massive MIMO wiretap system. Because the proposed optimized model is an intractable non-convex problem, we equivalently transform the original problem into two suboptimal problems to separately optimize the secure analog precoding and secure digital precoding. Secure analog precoding is achieved by applying singular value decomposition (SVD) of secure channel. Then, employing semidefinite program (SDP), secure digital precoding with fixed secure analog precoding is obtained to ensure quality of service (QoS) of legitimate users and limit QoS of eavesdroppers. Complexity of the proposed SVD-SDP algorithm related to the number of transmitting antennas squared is lower compared with that of constant modulus precoding algorithm (CMPA) which is in connection with that number cubed. Simulation results illustrate that SVD-SDP algorithm brings higher sum secrecy rate than those of CMPA and SVD-SVD algorithm.  相似文献   

10.
In this work, the performance of IEEE 802.11 WLAN scenarios is computed by evaluating Quality of Service (QoS) parameters such as medium access delay, end to end delay, retransmission attempts and throughput at data rate of 54 Mbps by means of different mechanisms used in PHY- and MAC-layers. The Point Coordination Function (PCF) and Distribution Coordination Function (DCF) of MAC layer in conjunction with IEEE 802.11a (Orthogonal Frequency Division Multiplexing at 5 GHz Bandwidth) and IEEE 802.11 g (Extended data rate DSSS at 2.4 GHz Bandwidth) used in physical layer are evaluated and compared to offer a better mechanism that can provide better QoS at high data rates of 54 Mbps using OPNET MODELER 14.5 simulator.  相似文献   

11.
《Physical Communication》2008,1(4):277-287
An interesting feature of the third generation (3G) cellular networks is their ability to support multiple data rates for data services. Thus, it is important to understand the end-to-end delay and throughput performance over these multi-rate cellular systems. In this work, we consider a multi-rate system such as High Data Rate (HDR) and represent the possible data rates using a Markov chain. Using a M/G/1 queuing model, we calculate the expected data rate and the corresponding link layer delay for each of the initial states. We study the effects of various link layer scheduling techniques for the radio link protocol (RLP) frames destined for multiple user. Though the commonly used link layer scheduling techniques work well, they do not provide the best performance for when end-to-end semantics need to be maintained. In this regard, we propose a scheduling algorithm that aids the transport protocol, for example TCP. Our research shows that the proposed remaining frames first scheduler enhances the transport layer performance compared to the commonly used “best channel scheduler”. Comparative results, based on simulations, are shown with respect to radius of cell, distance of user, number of users, and varying bit error rate.  相似文献   

12.
K. Cui  M.S. Leeson  E.L. Hines   《Optics Communications》2008,281(12):3245-3253
This paper introduces an incorporated spectral-amplitude coding (SAC) optical code-division multiple-access (OCDMA) scheme. One novel class of optical signature codes based on combinatorial designs is employed with M-ary pulse-position modulation (PPM) signaling to improve the system performance beyond the interference limit. A union upper bound on the bit error rate (BER) is derived and the performance characteristics are then discussed with a variety of system parameters. Furthermore, fuzzy logic (FL) control is proposed to provide tolerance of different degrees of reliability in multirate transmission and to achieve distinct service differentiation for multimedia applications. It is shown that the proposed system can effectively suppress noise effects and offer improved adaptation capabilities for multi-quality network requirements in comparison with systems without optimization.  相似文献   

13.
The aim of this paper is to consider trellis coded modulation (TCM) in the presence of phase noise. The starting point is a two-dimensional 32 point cross (32-CR) signal set that has served as a benchmark for other power and bandwidth efficient modulation schemes. Per-survivor processing (PSP) is used for carrier phase estimation, and both the phase acquisition (transient state) and phase tracking (steady state) performances are considered in an additive white Gaussian noise (AWGN) channel, in which phase offset or time varying phase noise is introduced. Based on the theoretical and simulation results it can be said that the 32-CR constellation is itself more sensitive to a phase error rather than the PSP algorithm. Due to the phase error the TCM scheme becomes a catastrophic code. Possible solutions include stringent phase noise requirements for oscillators, multiple trellis-coded modulation (MTCM) and concatenated TCM and Reed–Solomon (RS) coding. Our simulation results show that a simple combined MTCM, PSP and RS scheme has around 3 dB advantage compared to the pure TCM and PSP in the presence of phase noise. A semianalytical approach is used for performance evaluation, and the method is a particularly convenient tool to determine the rate of RS coding in detail.  相似文献   

14.
When a network has relay nodes, there is a risk that a part of the information is leaked to an untrusted relay. Secure network coding (secure NC) is known as a method to resolve this problem, which enables the secrecy of the message when the message is transmitted over a noiseless network and a part of the edges or a part of the intermediate (untrusted) nodes are eavesdropped. If the channels on the network are noisy, the error correction is applied to noisy channels before the application of secure NC on an upper layer. In contrast, secure physical layer network coding (secure PLNC) is a method to securely transmit a message by a combination of coding operation on nodes when the network is composed of set of noisy channels. Since secure NC is a protocol on an upper layer, secure PLNC can be considered as a cross-layer protocol. In this paper, we compare secure PLNC with a simple combination of secure NC and error correction over several typical network models studied in secure NC.  相似文献   

15.
A minimal interrupted communication link setup is the primary objective of the MAC layer. The MAC layer is responsible for accessing the communication channel. At MAC, a control channel is used in the selection of collision free paths for data transfer. Therefore, the design of the control channel plays a pivotal role in achieving desired QoS in cognitive radio (CR) technology. Various schemes of control channel design help the CR network (CRN) to obtain better performance. The reported work focuses on a hybrid MAC protocol. The novelty of the scheme lies in the process of hybridization. A cross-layer framework is proposed for hybridization. The cross-layering has been done between network and MAC layer to achieve hybridization between different control channel design approaches. The broad categorization of control channel designs is between licensed in-band and dedicated unlicensed out-band approaches. In the in-band control channel design approach, the opportunistic use of data channel as control channel fulfills the decorum of CR technology. As soon as the primary user activity rises in the data channels, the in-band approach suffers from poor performance. On the other hand, the dedicated unlicensed out-band control channel design approach provides global coverage and all-time availability but suffers from channel saturation and intruder attacks. Interference in the control channel limits the use of out-band design. This motivates authors to develop a hybrid MAC protocol that can float between licensed in-band design and unlicensed out-band design to access the control channel. The hybridization is possible by sharing a primary user free channel list (PCL) among CR nodes. In conventional hybrid MAC protocols, the PCL is shared as a control beacon in the channel. Extra packet requirement as control beacon affects the performance of CR scenario. The proposed cross-layer design based hybrid MAC protocol avoids the need of an extra control beacon for PCL transmission. Further, the hybridization helps in achieving advantages of both in-band and out-band control channel design approaches. The simulation results show that the proposed hybrid MAC protocol performs satisfactorily in terms of packet delivery ratio, average throughput, average delay and control overhead. The performances are also tested in the worst scenarios.  相似文献   

16.
潘兴博  陈秀波  徐刚  窦钊  李宗鹏  杨义先 《中国物理 B》2022,31(1):10305-010305
We propose a scheme where one can exploit auxiliary resources to achieve quantum multicast communication with network coding over the butterfly network.In this paper,we propose the quantum 2-pair multicast communication scheme,and extend it to k-pair multicast communication over the extended butterfly network.Firstly,an EPR pair is shared between each adjacent node on the butterfly network,and make use of local operation and classical communication to generate entangled relationship between non-adjacent nodes.Secondly,each sender adds auxiliary particles according to the multicast number k,in which the CNOT operations are applied to form the multi-particle entangled state.Finally,combined with network coding and free classical communication,quantum multicast communication based on quantum measurements is completed over the extended butterfly network.Not only the bottleneck problem is solved,but also quantum multicast communication can be completed in our scheme.At the same time,regardless of multicast number k,the maximum capacity of classical channel is 2 bits,and quantum channel is used only once.  相似文献   

17.
This article investigates the performance of various sophisticated channel coding and transmission schemes for achieving reliable transmission of a highly compressed video stream. Novel error protection schemes including Non-Convergent Coding (NCC) scheme, Non-Convergent Coding assisted with Differential Space Time Spreading (DSTS) and Sphere Packing (SP) modulation (NCDSTS-SP) scheme and Convergent Coding assisted with DSTS and SP modulation (CDSTS-SP) are analyzed using Bit Error Ratio (BER) and Peak Signal to Noise Ratio (PSNR) performance metrics. Furthermore, error reduction is achieved using sophisticated transceiver comprising SP modulation technique assisted by Differential Space Time Spreading. The performance of the iterative Soft Bit Source Decoding (SBSD) in combination with channel codes is analyzed using various error protection setups by allocating consistent overall bit-rate budget. Additionally, the iterative behavior of SBSD assisted RSC decoder is analyzed with the aid of Extrinsic Information Transfer (EXIT) Chart in order to analyze the achievable turbo cliff of the iterative decoding process. The subjective and objective video quality performance of the proposed error protection schemes is analyzed while employing H.264 advanced video coding and H.265 high efficient video coding standards, while utilizing diverse video sequences having different resolution, motion and dynamism. It was observed that in the presence of noisy channel the low resolution videos outperforms its high resolution counterparts. Furthermore, it was observed that the performance of video sequence with low motion contents and dynamism outperforms relative to video sequence with high motion contents and dynamism. More specifically, it is observed that while utilizing H.265 video coding standard, the Non-Convergent Coding assisted with DSTS and SP modulation scheme with enhanced transmission mechanism results in Eb/N0 gain of 20 dB with reference to the Non-Convergent Coding and transmission mechanism at the objective PSNR value of 42 dB. It is important to mention that both the schemes have employed identical code rate. Furthermore, the Convergent Coding assisted with DSTS and SP modulation mechanism achieved superior performance with reference to the equivalent rate Non-Convergent Coding assisted with DSTS and SP modulation counterpart mechanism, with a performance gain of 16 dB at the objective PSNR grade of 42 dB. Moreover, it is observed that the maximum achievable PSNR gain through H.265 video coding standard is 45 dB, with a PSNR gain of 3 dB with reference to the identical code rate H.264 coding scheme.  相似文献   

18.
In this work, by incorporating different electrodes(Ta/Ti) onto TaOxdielectric layer, we studied both the conductance reading and conductance updating(long term potentiation and depression) linearities in the two RRAM devices. Owing to the composition modulation(CM) mechanism, the Ta-electrode device shows better conductance reading and updating linearities. The RRAM device linearities directly influence the performance of the neural network when the devices are used as synapses. System evaluation of a two-layer neural network considering the conductance reading and updating linearity factors further confirm that both the training and inference accuracies of Ta electrode device are better than those of the Ti electrode one. We believe that this work could serve as a powerful reference for engineering synaptic devices with good linearity for neuromorphic computing applications.  相似文献   

19.
We propose a novel wavelength-division multiplexed passive optical network (WDM-PON) to simultaneously transmit unicast data and multicast services with upstream data re-modulation in optical network units (ONUs). For each wavelength channel in the optical line terminal (OLT), the downstream unicast data are applied to one arm of a dual-parallel Mach-Zehnder modulator (DPMZM) to generate baseband unicast non-return-to-zero (NRZ) signal. A radio frequency (RF) control signal is applied to the other arm to present two un-modulated sidebands for multicast data modulation in a differential phase-shift keying (DPSK) format. The flexible and dynamic multicast services are realized by simply switching the RF control signal on or off. The proposed scheme is experimentally demonstrated with 1.25-Gb/s downstream unicast, multicast, and upstream data.  相似文献   

20.
In this paper we address some issues related to the mutual influence between the PHY layer building blocks (FEC blocks) and the MAC level allocations in IEEE 802.16e /WiMAX systems, in order to increase the overall PHY and MAC combined efficiency. In these systems transmissions are carried in physical Bursts, both on the Uplink and Downlink channels. Bursts are composed of slots, which are grouped into FEC blocks. The number of slots in a Burst determines the length and number of the FEC blocks. The FEC blocks have a direct influence on the probability that bits are received successfully, and thus on the Burst Goodput, which is defined as the ratio between the average number of bits in the Burst that arrive successfully at the receiver, to the Burst length. In this paper we address a new coupled PHY and MAC scheduling methodology by investigating the relationship between the Burst length and its Goodput in different Modulation/Coding schemes, and investigate, given a Burst, the most efficient such scheme. The outcomes of the paper are twofold: first we show that the Goodput of a Burst is almost not dependent on its length. Second, we show that in most cases, the most efficient Modulation/Coding scheme is the one that enables us to transmit the largest number of bits in a Burst. However, there are a few cases where this is not the case. We show these cases in the paper.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号