-
Recent developments of selective laser processes for wearable devices
Authors:
Youngchan Kim,
Eunseung Hwang,
Chang Kai,
Kaichen Xu,
Heng Pan,
Sukjoon Hong
Abstract:
Recently, the growing interest in wearable technology for personal healthcare and smart VR/AR applications newly imposed a need for development of facile fabrication method. Regarding the issue, laser has long been proposing original answers to such challenging technological demands with its remote, sterile, rapid, and site-selective processing characteristics for arbitrary materials. In this revi…
▽ More
Recently, the growing interest in wearable technology for personal healthcare and smart VR/AR applications newly imposed a need for development of facile fabrication method. Regarding the issue, laser has long been proposing original answers to such challenging technological demands with its remote, sterile, rapid, and site-selective processing characteristics for arbitrary materials. In this review, recent developments in relevant laser processes are summarized in two separate categories. Firstly, transformative approaches represented by laser-induced graphene (LIG) are introduced. Apart from design optimization and alteration of native substrate, latest advancements in the transformative approach now enable not only more complex material compositions but also multilayer device configurations by simultaneous transformation of heterogeneous precursor or sequential addition of functional layers coupled with other electronic elements. Besides, more conventional laser techniques such as ablation, sintering and synthesis are still accessible for enhancing the functionality of the entire system through expansion of applicable materials and adoption of new mechanisms. Various wearable device components developed through the corresponding laser processes are then organized with emphasis on chemical/physical sensors and energy devices. At the same time, special attention is given to the applications utilizing multiple laser sources or multiple laser processes, which pave the way towards all-laser fabrication of wearable devices.
△ Less
Submitted 28 November, 2023;
originally announced January 2024.
-
Fluctuation, insulation and superconductivity: the pressure-dependent phase-diagram of Rb$_2$Mo$_6$Se$_6$
Authors:
Yongsheng Zhao,
Alexander P. Petrović,
Patrick Gougeon,
Philippe Gall,
Chen Kai,
Wenge Yang,
Moritz Hoesch
Abstract:
The quasi-one-dimensional (q1D) material Rb$_2$Mo$_6$Se$_6$ has been proposed to display a nontrivial combination of low-dimensional fluctuations and a dynamical charge density wave (CDW) at ambient pressure. This may lead to a progressive metal to insulator cross over at low temperature. To explore the link between the crystal dimensionality and this insulating instability, we have performed hydr…
▽ More
The quasi-one-dimensional (q1D) material Rb$_2$Mo$_6$Se$_6$ has been proposed to display a nontrivial combination of low-dimensional fluctuations and a dynamical charge density wave (CDW) at ambient pressure. This may lead to a progressive metal to insulator cross over at low temperature. To explore the link between the crystal dimensionality and this insulating instability, we have performed hydrostatic pressure-dependent electrical transport measurements on single crystals of Rb$_2$Mo$_6$Se$_6$. At low pressure, we observe thermally-activated behaviour consistent with a temperature-dependent gap $E_g(T)$ opening below a characteristic temperature $T_{Rmin}$. Upon increasing the pressure $T_{Rmin}$ initially rises, indicating a reinforcement of the low temperature insulating state despite a continuous reduction in $E_g(P)$. We interpret this as a signature of suppressed fluctuations as the dimensionality of the electronic structure rises. However, $T_{Rmin}$ drops above 8.8 GPa and superconductivity emerges at 12 GPa. Between 12-24.2 GPa the superconducting and insulating instabilities coexist, with superconductivity surviving up to the maximum attained pressure (52.8 GPa). Analysis of the magneto-transport reveals two distinct regions: at high pressures the anisotropy gradually falls and the superconducting state appears unremarkable. In contrast, coexistence with the gapped insulating phase creates a superconducting dome. The emergence of a peak in the critical temperature Tc despite the depleted density of states is indicative of enhanced coupling. Our journey from the extreme 1D to 3D limits in this prototypical q1D metal reveals an intriguing relationship between superconducting and insulating ground states which is simultaneously competitive and symbiotic.
△ Less
Submitted 25 June, 2023;
originally announced June 2023.
-
Model Stealing Attack against Multi-Exit Networks
Authors:
Li Pan,
Lv Peizhuo,
Chen Kai,
Cai Yuling,
Xiang Fan,
Zhang Shengzhi
Abstract:
Compared to traditional neural networks with a single exit, a multi-exit network has multiple exits that allow for early output from intermediate layers of the model, thus bringing significant improvement in computational efficiency while maintaining similar recognition accuracy. When attempting to steal such valuable models using traditional model stealing attacks, we found that conventional meth…
▽ More
Compared to traditional neural networks with a single exit, a multi-exit network has multiple exits that allow for early output from intermediate layers of the model, thus bringing significant improvement in computational efficiency while maintaining similar recognition accuracy. When attempting to steal such valuable models using traditional model stealing attacks, we found that conventional methods can only steal the model's classification function while failing to capture its output strategy. This results in a significant decrease in computational efficiency for the stolen substitute model, thereby losing the advantages of multi-exit networks.In this paper, we propose the first model stealing attack to extract both the model function and output strategy. We employ bayesian changepoint detection to analyze the target model's output strategy and use performance loss and strategy loss to guide the training of the substitute model. Furthermore, we designed a novel output strategy search algorithm that can find the optimal output strategy to maximize the consistency between the victim model and the substitute model's outputs. Through experiments on multiple mainstream multi-exit networks and benchmark datasets, we thoroughly demonstrates the effectiveness of our method.
△ Less
Submitted 22 May, 2023;
originally announced May 2023.
-
Active Reconfigurable Intelligent Surface Aided Surveillance Scheme
Authors:
Xinyue Hu,
Yibo Yi,
Kun Li,
Hongwei Zhang,
Caihong Kai
Abstract:
This letter attempts to design a surveillance scheme by adopting an active reconfigurable intelligent surface (RIS). Different from the conventional passive RIS, the active RIS could not only adjust the phase shift but also amplify the amplitude of the reflected signal. With such reflecting, the reflected signal of active RIS could jointly adjust the signal to interference plus noise ratio (SINR)…
▽ More
This letter attempts to design a surveillance scheme by adopting an active reconfigurable intelligent surface (RIS). Different from the conventional passive RIS, the active RIS could not only adjust the phase shift but also amplify the amplitude of the reflected signal. With such reflecting, the reflected signal of active RIS could jointly adjust the signal to interference plus noise ratio (SINR) of the suspicious receiver and the legitimate monitor, hence the proactive eavesdrop** at the physical layer could be effectively realized. We formulate the optimization problem with the target of maximizing the eavesdrop** rate to obtain the optimal reflecting coefficient matrix of the active RIS. The formulated optimization problem is nonconvex fractional programming and challenging to deal with. We then solve the problem by approximating it as a series of convex constraints. Simulation results validate the effectiveness of our designed surveillance scheme and show that the proposed active RIS aided surveillance scheme has good performance in terms of eavesdrop** rate compared with the scheme with passive RIS.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Secure Transmission Design for Virtual Antenna Array-aided Device-to-device Multicast Communications
Authors:
Xinyue Hu,
Yibo Yi,
Kun Li,
Hongwei Zhang,
Caihong Kai
Abstract:
This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device- to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and cooperatively multicast the content to UEs who desire it. Specifically, with the target of securing the VAA-aided D2DM communication under the threat of multiple ea…
▽ More
This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device- to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and cooperatively multicast the content to UEs who desire it. Specifically, with the target of securing the VAA-aided D2DM communication under the threat of multiple eavesdroppers, we propose a secure beamforming scheme by jointly considering the formed VAA and the Base Station (BS). For obtaining the optimal beamforing vectors, a nonsmooth and nonconvex Weight Sum Rate Maximization Problem (WRMP) is formulated and solved using Successive Convex Approximation (SCA) approach. Furthermore, we consider the worst case that eavesdroppers cooperatively form a eavesdrop VAA to enhance the overhearing capacity. In this case, we modify the securing beamforming scheme, formulate the corresponding WRMP and solve it using a two-level optimization. Simulation results validate the improvements of the VAA-aided D2DM scheme in terms of communication security compared with conventional D2DM schemes.
△ Less
Submitted 14 August, 2022;
originally announced August 2022.
-
Optimizing Tail Latency in Commodity Datacenters using Forward Error Correction
Authors:
Zeng Gaoxiong,
Chen Li,
Yi Bairen,
Chen Kai
Abstract:
Long tail latency of short flows (or messages) greatly affects user-facing applications in datacenters. Prior solutions to the problem introduce significant implementation complexities, such as global state monitoring, complex network control, or non-trivial switch modifications. While promising superior performance, they are hard to implement in practice. This paper presents CloudBurst, a simple,…
▽ More
Long tail latency of short flows (or messages) greatly affects user-facing applications in datacenters. Prior solutions to the problem introduce significant implementation complexities, such as global state monitoring, complex network control, or non-trivial switch modifications. While promising superior performance, they are hard to implement in practice. This paper presents CloudBurst, a simple, effective yet readily deployable solution achieving similar or even better results without introducing the above complexities. At its core, CloudBurst explores forward error correction (FEC) over multipath - it proactively spreads FEC-coded packets generated from messages over multipath in parallel, and recovers them with the first few arriving ones. As a result, CloudBurst is able to obliviously exploit underutilized paths, thus achieving low tail latency. We have implemented CloudBurst as a user-space library, and deployed it on a testbed with commodity switches. Our testbed and simulation experiments show the superior performance of CloudBurst. For example, CloudBurst achieves 63.69% and 60.06% reduction in 99th percentile message/flow completion time (FCT) compared to DCTCP and PIAS, respectively.
△ Less
Submitted 28 October, 2021;
originally announced October 2021.
-
Semi-Supervised NMF-CNN For Sound Event Detection
Authors:
Chan Teck Kai,
Chin Cheng Siong,
Li Ye
Abstract:
In this paper, a combinative approach using Nonnegative Matrix Factorization (NMF) and Convolutional Neural Network (CNN) is proposed for audio clip Sound Event Detection (SED). The main idea begins with the use of NMF to approximate strong labels for the weakly labeled data. Subsequently, using the approximated strongly labeled data, two different CNNs are trained in a semi-supervised framework w…
▽ More
In this paper, a combinative approach using Nonnegative Matrix Factorization (NMF) and Convolutional Neural Network (CNN) is proposed for audio clip Sound Event Detection (SED). The main idea begins with the use of NMF to approximate strong labels for the weakly labeled data. Subsequently, using the approximated strongly labeled data, two different CNNs are trained in a semi-supervised framework where one CNN is used for clip-level prediction and the other for frame-level prediction. Based on this idea, our model can achieve an event-based F1-score of 45.7% on the Detection and Classification of Acoustic Scenes and Events (DCASE) 2020 Challenge Task 4 validation dataset. By ensembling models through averaging the posterior outputs, event-based F1-score can be increased to 48.6%. By comparing with the baseline model, our proposed models outperform the baseline model by over 8%. By testing our models on the DCASE 2020 Challenge Task 4 test set, our models can achieve an event-based F1-score of 44.4% while our ensembled system can achieve an event-based F1-score of 46.3%. Such results have a minimum margin of 7% over the baseline system which demonstrates the robustness of our proposed method on different datasets.
△ Less
Submitted 21 September, 2020; v1 submitted 2 July, 2020;
originally announced July 2020.
-
Multi-energy CT reconstruction using nonlocal total nuclear generalized variation
Authors:
Cheng Kai,
Jiang Min,
Jianqiao Yu,
Sun Yi
Abstract:
Multi-energy CT based on compression sensing theory with sparse-view sampling can effectively reduce radiation dose and maintain the quality of the reconstructed image. However,when the projection data are noisy, the reconstructed image can be still seriously degraded. In order to address this problem, we extend the total nuclear variation (TNV) regularization and propose the nonlocal total nuclea…
▽ More
Multi-energy CT based on compression sensing theory with sparse-view sampling can effectively reduce radiation dose and maintain the quality of the reconstructed image. However,when the projection data are noisy, the reconstructed image can be still seriously degraded. In order to address this problem, we extend the total nuclear variation (TNV) regularization and propose the nonlocal total nuclear generalized variation (NLTNGV) regularization term. NLTNGV is constructed by using the low rank property of both the nonlocal Jacobian matrix and the local second derivative of the image at different energy spectrum, which can be seen as a more robust structure similarity measure. By employing NLTNGV,the proposed reconstruction method can effectively utilize the sparsity of nonlocal gradients and local second order derivatives and structural similarity of multi-energy CT images to effectively recover the image structure features in noisy case. The experimental results show that the proposed method can enhance the noise-resistant performance and preserve the fine details of the reconstructed images in comparison with TNV-based method.
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Artificial-Noise-Aided Secure Channel with a Full-duplex Source
Authors:
Xinyue Hu,
Caihong Kai,
Shengli Zhang,
Zhongyi Guo,
Jun Gao
Abstract:
This paper consider a new secure communication scene where a full-duplex transmitter (Alan) need to transmit confidential information to a half-duplex receiver (Bob), with a silent eavesdropper (Eve) that tries to eavesdrop the confidential information. For realizing secure communication between Alan and Bob, a novel two phases communication scheme is proposed: in Phase 1, Alan and Bob send artifi…
▽ More
This paper consider a new secure communication scene where a full-duplex transmitter (Alan) need to transmit confidential information to a half-duplex receiver (Bob), with a silent eavesdropper (Eve) that tries to eavesdrop the confidential information. For realizing secure communication between Alan and Bob, a novel two phases communication scheme is proposed: in Phase 1, Alan and Bob send artificial noises (AN) simultaneously, while in Phase 2, Alan superimposes the AN received in Phase 1 with its confidential signal and sends the mixed signalto Bob. Since the mixed AN could degrade the SINR (Signal to Interference and Noise Ratio) of Eve, but does not affect the SINR of Bob, a secrecy capacity can be achieved. We also derive the conditions that the secrecy capacity of the proposed scheme exists, and analyze the secrecy outage probability under Rayleigh fading channel. Numerical results show that the secrecy capacity is about two times higher than without AN, even though in the proposed scheme half of the time is used to transmit ANs, and the outage probability is about five times lower than that without AN.
△ Less
Submitted 18 October, 2017;
originally announced October 2017.
-
To Bond or not to Bond: An Optimal Channel Allocation Algorithm For Flexible Dynamic Channel Bonding in WLANs
Authors:
Caihong Kai,
Yuting Liang,
Tianyu Huang,
Xu Chen
Abstract:
IEEE 802.11 has evolved from 802.11a/b/g/n to 802.11ac to meet rapidly increasing data rate requirements in WLANs. One important technique adopted in 802.11ac is the channel bonding (CB) scheme that combines multiple 20MHz channels for a single transmission in 5GHz band. In order to effectively access channel after a series of contention operations, 802.11ac specifies two different CB operations:…
▽ More
IEEE 802.11 has evolved from 802.11a/b/g/n to 802.11ac to meet rapidly increasing data rate requirements in WLANs. One important technique adopted in 802.11ac is the channel bonding (CB) scheme that combines multiple 20MHz channels for a single transmission in 5GHz band. In order to effectively access channel after a series of contention operations, 802.11ac specifies two different CB operations: Dynamic Channel Bonding (DCB) and Static Channel Bonding (SCB). This paper proposes an optimal channel allocation algorithm to achieve maximal throughputs in DCB WLANs. Specifically, we first adopt a continuous-time Markov Chain (CTMC) model to analyze the equilibrium throughputs. Based on the throughput analysis, we then construct an integer nonlinear programming (INLP) model with the target of maximizing system throughputs. By solving the INLP model, we then propose an optimal channel allocation algorithm based on the Branch-and-Bound Method (BBM). It turns out that the maximal throughput performance can be achieved under the channel allocation scheme with the least overlapped channels among WLANs. Simulations show that the proposed channel allocation algorithm can achieve the maximal system throughput under various network settings. Our analysis on the optimal channel allocation schemes brings new insights into the design and optimization of future WLANs, especially for those adopting channel bonding technique.
△ Less
Submitted 29 March, 2017; v1 submitted 10 March, 2017;
originally announced March 2017.
-
To Achieve Maximal Throughputs in CSMA Wireless Networks Through Offered_load Control
Authors:
Caihong Kai,
Qi Zhang,
Lusheng Wang
Abstract:
This paper studies how to achieve the maximal link throughputs in a CSMA wireless network through offered-load control. First, we propose an analytical model, contention-graph-combination (CGC), to describe the relationship between the offered-load and the output link throughputs of an unsaturated CSMA network. Based on CGC, we then formulate a linear optimization model to improve the aggregate li…
▽ More
This paper studies how to achieve the maximal link throughputs in a CSMA wireless network through offered-load control. First, we propose an analytical model, contention-graph-combination (CGC), to describe the relationship between the offered-load and the output link throughputs of an unsaturated CSMA network. Based on CGC, we then formulate a linear optimization model to improve the aggregate link throughput through properly setting the occurrence probabilities of each sub-network, based on which we can obtain the optimal offered-load of each link. Simulation results bore out the accuracy of our CGC analysis and the maximal link throughputs can be closely achieved. Different from prior work in which CSMA protocol parameters are adaptively adjusted to achieve better performance, in this paper we propose to achieve maximal link throughputs by adjusting the rates of the traffic pumped into the source nodes of links, which runs in a software manner and is more practical to implement in real networks.
△ Less
Submitted 28 April, 2014;
originally announced April 2014.
-
Throughput Analysis of CSMA Wireless Networks with Finite Offered-load
Authors:
Caihong Kai,
Shengli Zhang
Abstract:
This paper proposes an approximate method, equivalent access intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, we take into account in our analysis the impacts of empty transmit buffers on the inte…
▽ More
This paper proposes an approximate method, equivalent access intensity (EAI), for the throughput analysis of CSMA wireless networks in which links have finite offered-load and their MAC-layer transmit buffers may be empty from time to time. Different from prior works that mainly considered the saturated network, we take into account in our analysis the impacts of empty transmit buffers on the interactions and dependencies among links in the network that is more common in practice. It is known that the empty transmit buffer incurs extra waiting time for a link to compete for the channel airtime usage, since when it has no packet waiting for transmission, the link will not perform channel competition. The basic idea behind EAI is that this extra waiting time can be mapped to an equivalent "longer" backoff countdown time for the unsaturated link, yielding a lower link access intensity that is defined as the mean packet transmission time divided by the mean backoff countdown time. That is, we can compute the "equivalent access intensity" of an unsaturated link to incorporate the effects of the empty transmit buffer on its behavior of channel competition. Then, prior saturated ideal CSMA network (ICN) model can be adopted for link throughput computation. Specifically, we propose an iterative algorithm, "Compute-and-Compare", to identify which links are unsaturated under current offered-load and protocol settings, compute their "equivalent access intensities" and calculate link throughputs. Simulation shows that our algorithm has high accuracy under various offered-load and protocol settings. We believe the ability to identify unsaturated links and compute links throughputs as established in this paper will serve an important first step toward the design and optimization of general CSMA wireless networks with offered-load control.
△ Less
Submitted 19 February, 2013;
originally announced February 2013.
-
Throughput Computation in CSMA Wireless Networks with Collision Effects
Authors:
Cai Hong Kai,
Soung Chang Liew
Abstract:
It is known that link throughputs of CSMA wireless networks can be computed from a time-reversible Markov chain arising from an ideal CSMA network model (ICN). In particular, this model yields general closed-form equations of link throughputs. However, an idealized and important assumption made in ICN is that the backoff countdown process is in "contiuous-time" and carrier sensing is instantaneous…
▽ More
It is known that link throughputs of CSMA wireless networks can be computed from a time-reversible Markov chain arising from an ideal CSMA network model (ICN). In particular, this model yields general closed-form equations of link throughputs. However, an idealized and important assumption made in ICN is that the backoff countdown process is in "contiuous-time" and carrier sensing is instantaneous. As a result, there is no collision in ICN. In practical CSMA protocols such as IEEE 802.11, the stations count down in "mini-timeslot" and the process is therefore a "discrete-time" process. In particular, two stations may end their backoff process in the same mini-timeslot and then transmit simultaneously, resulting in a packet collision. This paper is an attempt to study how to compute link throughputs after taking such backoff collision effects into account. We propose a generalized ideal CSMA network model (GICN) to characterize the collision states as well as the interactions and dependency among links in the network. We show that link throughputs and collision probability can be computed from GICN. Simulation results validate GICN's accuracy. Interestingly, we also find that the original ICN model yields fairly accurate results despite the fact that collisions are not modeled.
△ Less
Submitted 8 July, 2011;
originally announced July 2011.
-
Temporal Starvation in CSMA Wireless Networks
Authors:
Cai Hong Kai,
Soung Chang Liew
Abstract:
It is well known that links in CSMA wireless networks are prone to starvation. Prior works focused almost exclusively on equilibrium starvation. In this paper, we show that links in CSMA wireless networks are also susceptible to temporal starvation. Specifically, although some links have good equilibrium throughputs and do not suffer from equilibrium starvation, they can still have no throughput f…
▽ More
It is well known that links in CSMA wireless networks are prone to starvation. Prior works focused almost exclusively on equilibrium starvation. In this paper, we show that links in CSMA wireless networks are also susceptible to temporal starvation. Specifically, although some links have good equilibrium throughputs and do not suffer from equilibrium starvation, they can still have no throughput for extended periods from time to time. Given its impact on quality of service, it is important to understand and characterize temporal starvation. To this end, we develop a "trap theory" to analyze temporal throughput fluctuation. The trap theory serves two functions. First, it allows us to derive new mathematical results that shed light on the transient behavior of CSMA networks. For example, we show that the duration of a trap, during which some links receive no throughput, is insensitive to the distributions of the backoff countdown and transmission time (packet duration) in the CSMA protocol. Second, we can develop analytical tools for computing the "degrees of starvation" for CSMA networks to aid network design. For example, given a CSMA network, we can determine whether it suffers from starvation, and if so, which links will starve. Furthermore, the likelihood and durations of temporal starvation can also be computed. We believe that the ability to identify and characterize temporal starvation as established in this paper will serve as an important first step toward the design of effective remedies for it.
△ Less
Submitted 17 September, 2010;
originally announced September 2010.
-
Applications of Belief Propagation in CSMA Wireless Networks
Authors:
Cai Hong Kai,
Soung Chang Liew
Abstract:
The belief propagation (BP) algorithm is an efficient way to solve "inference" problems in graphical models, such as Bayesian networks and Markov random fields. The system-state probability distribution of CSMA wireless networks is a Markov random field. An interesting question is how BP can help the analysis and design of CSMA wireless networks. This paper explores three such applications. First,…
▽ More
The belief propagation (BP) algorithm is an efficient way to solve "inference" problems in graphical models, such as Bayesian networks and Markov random fields. The system-state probability distribution of CSMA wireless networks is a Markov random field. An interesting question is how BP can help the analysis and design of CSMA wireless networks. This paper explores three such applications. First, we show how BP can be used to compute the throughputs of different links in the network given their access intensities, defined as the mean packet transmission time divided by the mean backoff countdown time. Second, we propose an inverse-BP algorithm to solve the reverse problem: how to set the access intensities of different links to meet their target throughputs? Third, we introduce a BP-adaptive CSMA algorithm to find the link access intensities that can achieve optimal system utility. BP solves the three problems with exact results in tree networks. It may, however, lose accuracy in networks with a loopy contention graph. We show how a generalized version of BP, GBP, can be designed to solve the three problems with high accuracy for networks with a loopy contention graph. Importantly, we show how the BP and GBP algorithms in this paper can be implemented in a distributed manner, making them useful in practical CSMA network opera-tion.
△ Less
Submitted 14 July, 2011; v1 submitted 29 July, 2010;
originally announced July 2010.
-
Towards a More Accurate Carrier Sensing Model for CSMA Wireless Networks
Authors:
Caihong Kai,
Soung Chang Liew
Abstract:
This work calls into question a substantial body of past work on CSMA wireless networks. In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships (CS) among links. This is a 0-1 model in which two links can either sense each other completely or not. In real experiments, we observed that this is generally not the case: the CS rela…
▽ More
This work calls into question a substantial body of past work on CSMA wireless networks. In the majority of studies on CSMA wireless networks, a contention graph is used to model the carrier sensing relationships (CS) among links. This is a 0-1 model in which two links can either sense each other completely or not. In real experiments, we observed that this is generally not the case: the CS relationship between the links are often probabilistic and can vary dynamically over time. This is the case even if the distance between the links is fixed and there is no drastic change in the environment. Furthermore, this partial carrier sensing relationship is prevalent and occurs over a wide range of distances between the links. This observation is not consistent with the 0-1 contention graph and implies that many results and conclusions drawn from previous theoretical studies need to be re-examined. This paper establishes a more accurate CS model with the objective of laying down a foundation for future theoretical studies that reflect reality. Towards that end, we set up detailed experiments to investigate the partial carrier sensing phenomenon. We discuss the implications and the use of our partial carrier sensing model in network analysis.
△ Less
Submitted 25 September, 2008;
originally announced September 2008.
-
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
Authors:
S. C. Liew,
C. Kai,
J. Leung,
B. Wong
Abstract:
This work started out with our accidental discovery of a pattern of throughput distributions among links in IEEE 802.11 networks from experimental results. This pattern gives rise to an easy computation method, which we term back-of-the-envelop (BoE) computation, because for many network configurations, very accurate results can be obtained within minutes, if not seconds, by simple hand computat…
▽ More
This work started out with our accidental discovery of a pattern of throughput distributions among links in IEEE 802.11 networks from experimental results. This pattern gives rise to an easy computation method, which we term back-of-the-envelop (BoE) computation, because for many network configurations, very accurate results can be obtained within minutes, if not seconds, by simple hand computation. BoE beats prior methods in terms of both speed and accuracy. While the computation procedure of BoE is simple, explaining why it works is by no means trivial. Indeed the majority of our investigative efforts have been devoted to the construction of a theory to explain BoE. This paper models an ideal CSMA network as a set of interacting on-off telegraph processes. In develo** the theory, we discovered a number of analytical techniques and observations that have eluded prior research, such as that the carrier-sensing interactions among links in an ideal CSMA network result in a system state evolution that is time-reversible; and that the probability distribution of the system state is insensitive to the distributions of the "on" and "off" durations given their means, and is a Markov random field. We believe these theoretical frameworks are useful not just for explaining BoE, but could also be a foundation for a fundamental understanding of how links in CSMA networks interact. Last but not least, because of their basic nature, we surmise that some of the techniques and results developed in this paper may be applicable to not just CSMA networks, but also to other physical and engineering systems consisting of entities interacting with each other in time and space.
△ Less
Submitted 11 December, 2007;
originally announced December 2007.