首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Closed form expressions for the average probability of packet error (PPE) are presented for no diversity, maximum ratio combining (MRC), selection combining (SC) and switch and stay combining (SSC) diversity schemes. The average PPE for the no diversity case is obtained in two alternative expressions assuming arbitrarily correlated Nakagami and Rician fading channels. For the MRC case, L diversity branches are considered and the channel samples are assumed to follow Nakagami distribution and to be arbitrarily correlated in both time and space. For the SC diversity scheme with L diversity branches, two bounds on the average PPE are derived for both slow and fast fading channels. The average PPE in this case is obtained in an infinite integral form for Nakagami channels while it is reduced to a closed form expression for the Rayleigh case. The average PPE is also derived in the case of SSC diversity with dual branches for both slow and fast Rayleigh fading channels. The new formulas are applicable for all modulation schemes where the conditional probability of error has an exponential dependence on the signal‐to‐noise ratio. The average PPE is then used to obtain a modified expression for the throughput for network protocols. In general, the diversity gain exhibits a little diminishing effect as the number of diversity branches increases. In addition, the system is found to be more sensitive to the space correlation than to the time correlation. The effects of different system parameters and diversity schemes are studied and discussed. Specific figures about the system performance are also provided. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   

2.
In this paper, multiple-phase deterministic protocols for packet radio networks are introduced and analysed. Two modes of information transfer are considered, namely (a) broadcasting and (b) point-to-point transmission. We explore systematic ways of designing multiple-phase protocols and apply them on Manhattan networks. The proposed protocols are studied primarily from the point of view of throughput efficiency. Delay analysis is also presented.  相似文献   

3.
Reliable data distribution within multiple-hop spread-spectrum packet radio networks requires high performance from the network protocols. The high variability in quality among the links and the unique characteristics of frequency-hop spread-spectrum signaling impose special requirements for network protocols that are to be employed in frequency-hop packet radio networks. These features can be exploited in the forwarding protocols by allowing multiple packets to be included in each forwarding attempt. The use of multiple-packet transmissions exploits the capture property of frequency-hop signaling, and it reduces the overhead required for acknowledgments. A potential trade-off arises because the use of multiple-packet transmissions increases the throughput, but in some situations it can also increase the delay. Two new transmission protocols that employ multiple-packet transmissions are described, and their performance is evaluated.  相似文献   

4.
无线移动信道中Rake接收机的多径分辨系数   总被引:2,自引:0,他引:2  
本文研究了码分多址移动通信系统中RAKE接收机的特性在无线移动信道中一种新的衡量方式。目前已有的无线移动信道的衡量方式,只侧重于对无线电波传播过程的研究。如大尺寸环境路径损失,小尺寸环境多径衰落等;已有的RAKE接收机特性的衡量方式。即分辨多径个数和,只强调RAKE接收机能处理的多径对其性能的影响。这两种衡量方式已不能很好地衡量信道的特性对目前新型RAKE接收机的影响。本文提出了一种新的联合衡量无线信道及RAKE接收机特性的方式-多径分辨系数,它能很好地衡量无线移动信道对新型RAKE接收机的影响以及新型RAKE接收机算法的先进性。  相似文献   

5.
A distributed algorithm for the conflict-free channel allocation in CDMA (code division multiple access) networks is presented. Dynamic adjustment to topological changes is also considered. Though the schedules produced by our algorithm are not optimal with respect to link schedule length, the algorithm is simple and practical. The link schedule length minimization problem is NP-complete. Here the length of a link schedule is the number of time slots it uses. The algorithm guarantees a bound 2 — 1 time slots on the TDMA cycle length, where is the maximum degree of a station (i.e., maximum number of stations that a station can reach by radio links) in the network. The message complexity of a station isO().  相似文献   

6.
In this paper, a new channel allocation and re‐location scheme is proposed for cognitive radio users to efficiently utilize available spectrums. We also present a multiple‐dimension Markov analytical chain to evaluate the performance of this scheme. Both analytical results and simulation results demonstrate that the new scheme can enhance the radio system performance significantly in terms of blocking probability, dropping probability, and throughput of second users. The proposed scheme can work as a non‐server‐based channel allocation, which has practical values in real engineering design. Copyright ©2011 John Wiley & Sons, Ltd.  相似文献   

7.
In this work a general exact methodology for capture effect and performance evaluation of packet radio networks is presented. Both narrow-band and spread-spectrum systems are investigated and compared. Several network performance quality indexes are considered: throughput, outage probability, packet error probability, average delay time. Two particular capture effect models are investigated. It can be seen that one of the two models can be considered as a good approximation of the other if a appropriate parameter definition is made. By using this methodology various operating conditions given by fading (Rice, Rayleigh, Nakagami), shadowing, different traffic models, different modulation, and coding schemes are investigated. Comparison is performed by means of spectral efficiency parity.  相似文献   

8.
In sparse mobile wireless networks, normally, the mobile nodes are carried by people, and the moving activity of nodes always happens in a specific area, which corresponds to some specific community. Between the isolated communities, there is no stable communication link. Therefore, it is difficult to ensure the effective packet transmission among communities, which leads to the higher packet delivery delay and lower successful delivery ratio. Recently, an additional ferry node was introduced to forward packets between the isolated communities. However, most of the existing algorithms are working on how to control the trajectory of only one ferry work in the network. In this paper, we consider multiple ferries working in the network scenario and put our main focus on the optimal packet selection strategy, under the condition of mutual influence between the ferries and the buffer limitation. We introduce a non‐cooperative Bayesian game to achieve the optimal packet selection strategy. By maximizing the individual income of a ferry, we optimize the network performance on packet delivery delay and successful delivery ratio. Simulation results show that our proposed packet selection strategy improves the network performance on packet delivery delay and successful delivery ratio. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

9.
Although more than a decade has passed from the proposal of the Cognitive Radio paradigm, in these years the research has mainly focused on physical and medium access issues, and few recent works focused on the problem of routing in cognitive networks. This paper addresses such a problem by evaluating the feasibility of reactive routing for mobile cognitive radio ad hoc networks. More specifically, we design a reactive routing protocol for the considered scenario able to achieve three goals: (i) to avoid interferences to primary users during both route formation and data forwarding; (ii) to perform a joint path and channel selection at each forwarder; (iii) to take advantage of the availability of multiple channels to improve the overall performance. Two different versions of the same protocol, referred to as Cognitive Ad-hoc On-demand Distance Vector (CAODV), are presented. The first version exploits inter-route spectrum diversity, while the second one exploits intra-route spectrum diversity. An exhaustive performance analysis of both the versions of the proposed protocol in different environments and network conditions has been carried out via numerical simulations. The results state the suitability of the proposed protocol for small mobile cognitive radio ad hoc networks.  相似文献   

10.
Herein, we consider an underlay cognitive radio network (CRN) where mobile secondary user wishes to transmit a confidential information to the secondary destination in the presence of an illegitimate eavesdropper which is trying to steal the classified message signal. The proposed scenario can be viable for a secondary safety task force working with a primary regiment, which wishes to transmit the confidential information to the commander while an eavesdropper is trying to intercept the classified information. In the analysis, two novel power allocation methods are considered by assuming perfect and limited feedback channels of the primary network, and for both methods, exact and asymptotic expressions of secrecy outage probability (SOP) are derived for N*Nakagami‐m fading channels which are used to model fading channels such as mobile‐to‐mobile/vehicle‐to‐vehicle communication systems where the nodes are moving into a rich scattering environment. We further verified our analytic results through Monte‐Carlo simulations. It is shown from the numerical results that the cascading degree of the channels has a worsening effect on the secrecy outage performance of the CRN systems.  相似文献   

11.
In this paper the performance of a packet mobile radio network is studied inthe presence of shadow fading outage intervals.Under quite general assumptions for the medium access protocol,the probability mass function of the sequence of packets that may be lostdue to an outage interval is derived. It is seen that long sequences of lostpackets are likely to occur for typical values of the mobile speed andshadowing correlation parameters.For delay constrained sources, e.g., voice, the analysis is mainly focused atderiving the probability function of the sequence of dropped packetsand the probability of dropping. For data sources, the delay statistic isalso derived. In the latter case, the effect of finite buffer length isaddressed. Simulation is used to verify the accuracy of approximations introduced in the analysis.  相似文献   

12.
本文提出了无冲突话音/数据综合业务的PRMA协议:CF-IPRMA协议,并利用马尔可夫链模型法,对CF-IPRMA协议中的数据通信性能进行了分析;分析结果表明,该协议在保证话音通信质量的前提下,具有较高的数据业务通过率。  相似文献   

13.
An analytical solution is presented showing the average bit error probability for the land mobile satellite channel. The channel is modelled as Rice and Rayleigh—lognormal fading. Modulation schemes under consideration include differentially detected PSK and non-coherently detected FSK. Results indicate that the receiver performance is highly dominated by the time share of shadowing. The ratio of the BERs in shadowed and unshadowed areas of typical measured channels and an operating point assumed to be at Es/No = 10 dB is of the order of 10?2.  相似文献   

14.
In this paper, we propose a method for evaluation of the bit error rate (BER) for packet combining based on constellation rearrangement (CoRe). Such mapping diversity scheme, adopted in the high speed downlink packet access (HSDPA), uses Gray‐mapped constellations and is based on suboptimal accumulation of the reliability metrics generated in each of the transmissions. We present an exact model for the logarithmic likelihood ratios (LLR) obtained by means of the so‐called max‐log approximation, and we show that their conditional probability density functions (pdf) are piecewise Gaussian. We then present the derivation of the uncoded BER and illustrate it with simulation results that confirm our formulation. Finally, we propose simplifications which significantly reduce the complexity of the evaluation method and provide results with a very good accuracy; an extension to transmissions over faded channel is also presented. Copyright © 2007 John Wiley & Sons, Ltd.  相似文献   

15.
Future mobile ad hoc networks are expected to support voice traffic. The requirement for small delay and jitter of voice traffic poses a significant challenge for medium access control (MAC) in such networks. User mobility presents unique difficulties in this context due to the associated dynamic path attenuation. In this paper, a MAC scheme for mobile ad hoc networks supporting voice traffic is proposed. With the aid of a low‐power probe prior to DATA transmissions, resource reservation is achieved in a distributed manner, thus leading to small packet transmission delay and jitter. The proposed scheme can automatically adapt to dynamic path attenuation in a mobile environment. Statistical multiplexing of on/off voice traffic can also be achieved by partial resource reservation for off voice flows. Simulation results demonstrate the effectiveness of the proposed scheme. Copyright © 2009 John Wiley & Sons, Ltd.  相似文献   

16.
This paper describes the mobility management mechanisms for mobile telecommunications networks. There are two major types of mobility: radio network mobility and core network mobility. Radio network mobility supports radio link switching of a mobile user during conversation, and core network mobility provides roaming and tunnel‐related management for packet re‐routing due to user movement. Impact of mobility on both the radio and the core networks is addressed in this paper. Also, potential research issues on these topics are discussed. Copyright © 2005 John Wiley & Sons, Ltd.  相似文献   

17.
The bit error rate performance of broadband wireless fixed access (FWA) systems over multipath fading channels is investigated in this paper. Linear MMSE equalization is examined theoretically for 16‐QAM and QPSK modulated FWA systems and shown to yield unsatisfactory performance. The theoretical analysis is validated by Monte‐Carlo simulations and proved to be reasonably accurate. It provides us an insight into the physical limitations imposed by the FWA channels and suggest solutions to improve the capacity and performance of future FWA systems. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   

18.
In this paper, we propose and analyse parallel CCI multistage cancellation by combining RAKE and selection diversity. In order to account for channel variations, adaptive implementation of decision thresholds at the RAKE output is suggested. It is shown to provide significant improvement over either hard or soft decision techniques especially in the near‐far situation. Investigation of the system robustness to imperfect channel parameter estimation is also presented. The communication channel is modelled as slowly varying Rayleigh fading discrete multipath channel. Copyright © 2002 John Wiley & Sons, Ltd.  相似文献   

19.
This paper considers a satellite network with data messages being transmitted by land mobile users according to slotted Aloha multiple access. The mobile communication links suffering from multipath fading and signal shadowing are modelled as Gilbert-Elliott channels. FEC block coding is used to correct transmission errors. The maximum achievable information throughput and the mean packet delay are derived from a combined analysis of the multiple access and FEC/ARQ protocol. The results show that the additional overhead necessary for FEC is outweighed by the benefit in throughput and delay. Finally, the capture effect and its consequences are discussed.  相似文献   

20.
Wireless ad hoc networks are growing important because of their mobility, versatility, and ability to work with fewer infrastructures. The mobile ad hoc network is an autonomous system consisting of mobile nodes connected with wireless links. Establishing a path between two nodes is a complex task in wireless networks. It is still more complex in the wireless mobile ad hoc network because every node is no longer as an end node and an intermediate node. In this paper, it focuses on design of connectionless routing protocol for the wireless ad hoc networks based on the mobile agent concept. The proposed model tries to discover the best path taking into consideration some concerns like bandwidth, reliability, and congestion of the link. The proposed model has been simulated and tested under various wireless ad hoc network environments with the help of a different number of nodes. The results demonstrate that the proposed model is more feasible for providing reliable paths between the source and destination with the minimum control message packets over the network. It has delivered more number of packets to the destination over the network. Copyright © 2012 John Wiley & Sons, Ltd.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号