scispace - formally typeset
Search or ask a question
Author

Jeong Geun Kim

Other affiliations: University of Arizona, Samsung, Qualcomm
Bio: Jeong Geun Kim is an academic researcher from Kyung Hee University. The author has contributed to research in topics: Communication channel & Wireless sensor network. The author has an hindex of 16, co-authored 46 publications receiving 1031 citations. Previous affiliations of Jeong Geun Kim include University of Arizona & Samsung.

Papers
More filters
Proceedings ArticleDOI
09 Apr 1997
TL;DR: The results show that the IEEE 802.11 WLAN can achieve a reasonably high efficiency when the medium is almost error-free, but may degrade appreciably under harsh fading, and that time-sensitive traffic can be supported together with other intensive traffic such as packet data.
Abstract: Analysis of the draft IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard's ad hoc and infrastructure networks. The performance of the medium access control (MAC) sublayer, which consists of distributed coordination function (DCF) and point coordination function (PCF), is determined by simulating asynchronous data traffic in a 1 Mbps ad hoc network, and asynchronous data and packetized voice traffic in a 1 Mbps infrastructure network. The simulation models incorporate the effect of burst errors, packet size, RTS threshold and fragmentation threshold on network throughput and delay. The results show that the IEEE 802.11 WLAN can achieve a reasonably high efficiency when the medium is almost error-free, but may degrade appreciably under harsh fading. The results also show that time-sensitive traffic such as packet voice can be supported together with other intensive traffic such as packet data. However, an echo canceller is required for packet voice systems.

127 citations

Journal ArticleDOI
TL;DR: This work considers the cases of a single and multiplexed traffic streams and derives the exact packet-loss rate (PLR) due to buffer overflow at the sender side of the wireless link and obtains a good approximation using the Chernoff-dominant eigenvalue (CDE) approach.
Abstract: Providing quality-of-service (QoS) guarantees over wireless packet networks poses a host of technical challenges that are not present in wireline networks. One of the key issues is how to account for the characteristics of the time-varying wireless channel and for the impact of link-layer error control in the provisioning of packet-level QoS. We accommodate both aspects in analyzing the packet-loss performance over a wireless link. We consider the cases of a single and multiplexed traffic streams. The link capacity fluctuates according to a fluid version of Gilbert-Elliott channel model. Traffic sources are modeled as on-off fluid processes. For the single-stream case, we derive the exact packet-loss rate (PLR) due to buffer overflow at the sender side of the wireless link. We also obtain a closed-form approximation for the corresponding wireless effective bandwidth. In the case of multiplexed streams, we obtain a good approximation for the PLR using the Chernoff-dominant eigenvalue (CDE) approach. Our analysis is then used to study the optimal forward error correction code rate that guarantees a given PLR while minimizing the allocated bandwidth. Numerical results and simulations are used to verify the adequacy of our analysis and to study the impact of error control on the allocation of bandwidth for guaranteed packet-loss performance.

117 citations

Journal ArticleDOI
Jeong Geun Kim1, Marwan Krunz
TL;DR: It is shown that ignoring the autocorrelations in the arrival process or the time-varying nature of the channel state can lead to significant underestimation of the delay performance, particularly at high channel error rates.
Abstract: In this paper, we analyze the mean delay experienced by a Markovian source over a wireless channel with time-varying error characteristics. The wireless link implements the selective-repeat automatic repeat request (ARQ) scheme for retransmission of erroneous packets. We obtain good approximations of the total delay, which consists of transport and resequencing delays. The transport delay, in turn, consists of queueing and transmission delays. In contrast to previous studies, our analysis accommodates both the inherent correlations between packet interarrival times (i.e., traffic burstiness) and the time-varying nature of the channel error rate. The probability generating function (PGF) of the queue length under the "ideal" SR ARQ scheme is obtained and combined with the retransmission delay to obtain the mean transport delay. For the resequencing delay, the analysis is performed under the assumptions of heavy traffic and small window sizes (relative to the channel sojourn times). The inaccuracy due to these assumptions is observed to be negligible. We show that ignoring the autocorrelations in the arrival process or the time-varying nature of the channel state can lead to significant underestimation of the delay performance, particularly at high channel error rates. Some interesting effects of key system parameters on the delay performance are observed.

97 citations

Journal ArticleDOI
TL;DR: An analytical model is used to investigate the delay distribution and the packet discard rate (PDR) over a wireless link that accommodates the inherent autocorrelations in both the traffic source as well as the channel error characteristics.
Abstract: Providing quality-of-service (QoS) guarantees over wireless links requires thorough understanding and quantification of the interactions among the traffic source, the wireless channel, and the underlying link-layer error control mechanisms. We account for such interactions in an analytical model that we use to investigate the delay distribution and the packet discard rate (PDR) over a wireless link. Our analysis accommodates the inherent autocorrelations in both the traffic source as well as the channel error characteristics. An on-off fluid process is used to model the arrival of packets at the transmitter. These packets are temporarily stored in a first-in-first-out (FIFO) buffer before being transmitted over a channel with a time-varying and autocorrelated service rate. Using fluid analysis, we first derive the distribution for the queueing delay at the transmitter. As part of this analysis, we solve a fundamental fluid problem, namely, the probability distribution for the workload generated by a two-state fluid source over a fixed time interval. We then use the delay analysis to derive the PDR at the receiver. A closed-form expression for the effective bandwidth subject to a delay constraint is provided as a function of the source, channel, and error scheme parameters. This expression enables fast assessment of the bandwidth requirement of real-time traffic over QoS-based wireless networks. Numerical results and simulations are used to verify the adequacy of the analysis and to study the interactions among various system parameters.

88 citations

Proceedings ArticleDOI
07 Apr 1997
TL;DR: The goal is to design cooperative strategies between server and client to provide access to information in such a way as to minimize energy expenditure by clients.
Abstract: Mobile computing has the potential for managing information globally. Data management issues in mobile computing have received some attention in recent times, and the design of adaptive broadcast protocols has been posed as an important problem. Such protocols are employed by database servers to decide on the content of broadcasts dynamically, in response to client mobility and demand patterns. In this paper we design such protocols and also propose efficient retrieval strategies that may be employed by clients to download information from broadcasts. The goal is to design cooperative strategies between server and client to provide access to information in such a way as to minimize energy expenditure by clients. We evaluate the performance of our protocols analytically.

88 citations


Cited by
More filters
Proceedings ArticleDOI
09 Jul 2003
TL;DR: In this paper, the performance of the IEEE 802.11b wireless local area networks is analyzed theoretically by deriving simple expressions for the useful throughput, validate them by means of simulation, and compare with several performance measurements.
Abstract: The performance of the IEEE 802.11b wireless local area networks is analyzed. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks in which a host far away from an access point is subject to important signal fading and interference. To cope with this problem, the host changes its modulation type, which degrades its bit rate to some lower value. Typically, 802.11b products degrade the bit rate from 11 Mb/s to 5.5, 2, or 1 Mb/s when repeated unsuccessful frame transmissions are detected. In such a case, a host transmitting for example at 1 Mb/s reduces the throughput of all other hosts transmitting at 11 Mb/s to a low value below 1 Mb/s. The basic CSMA/CA channel access method is at the root of this anomaly: it guarantees an equal long term channel access probability to all hosts. When one host captures the channel for a long time because its bit rate is low, it penalizes other hosts that use the higher rate. We analyze the anomaly theoretically by deriving simple expressions for the useful throughput, validate them by means of simulation, and compare with several performance measurements.

1,273 citations

Journal ArticleDOI
TL;DR: The performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function, however, the findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.
Abstract: The draft IEEE 802.11 wireless local area network (WLAN) specification is approaching completion. In this article, the IEEE 802.11 protocol is explained, with particular emphasis on the medium access control sublayer. Performance results are provided for packetized data and a combination of packetized data and voice over the WLAN. Our performance investigation reveals that an IEEE 802.11 network may be able to carry traffic with time-bounded requirements using the point coordination function. However, our findings suggest that packetized voice traffic must be handled in conjunction with an echo canceler.

1,080 citations

BookDOI
01 Feb 2002
TL;DR: H Handbook of Internet Computing pdf eBook copy write by good Handbook of Wireless Networks and Mobile Computing Google Books.
Abstract: If you want to get Handbook of Internet Computing pdf eBook copy write by good Handbook of Wireless Networks and Mobile Computing Google Books. Mobile Computing General. Handbook of Algorithms for Wireless Networking and Mobile Computing by Azzedine Boukerche (Editor). Call Number: TK 5103.2. CITS4419 Mobile and Wireless Computing software projects related to wireless networks, (2) write technical reports and documentation for complex computer.

532 citations

Journal ArticleDOI
Jia Tang1, Xi Zhang1
TL;DR: This work derives an optimal adaptation policy by integrating information theory with the concept of effective capacity for a block fading channel model and considers a more practical scenario where variable-power adaptive modulation is employed over both block fading and Markov correlated fading channels.
Abstract: We propose a quality-of-service (QoS) driven power and rate adaptation scheme over wireless links in mobile wireless networks. Specifically, our proposed scheme aims at maximizing the system throughput subject to a given delay QoS constraint. First, we derive an optimal adaptation policy by integrating information theory with the concept of effective capacity for a block fading channel model. Our analyses reveal an important fact that there exists a fundamental tradeoff between throughput and QoS provisioning. In particular, when the QoS constraint becomes loose, the optimal power-control policy converges to the well-known water-filling scheme, where Shannon (ergodic) capacity can be achieved. On the other hand, when the QoS constraint gets stringent, the optimal policy converges to the total channel inversion scheme under which the system operates at a constant rate. Inspired by the above observations, we then consider a more practical scenario where variable-power adaptive modulation is employed over both block fading and Markov correlated fading channels. In both cases, we derive the associated power and rate adaptation policies. The obtained results suggest that the channel correlation has a significant impact on QoS-driven power and rate adaptations. The higher the correlation is, the faster the power-control policy converges to the total channel inversion when the QoS constraint becomes more stringent. Finally, we conduct simulations to verify that the adaptation policy proposed for Markov channel models can also be applied to the more general channel models.

514 citations

Journal Article
TL;DR: This paper proposes a method to modify the CSMA/CA protocol such that station priorities can be supported, and results show that DCF is able to carry the prioritized traffic with the proposed scheme.
Abstract: IEEE 802.11 is a standard for wireless LANs. The basic access method in its MAC layer protocol is the distributed coordination function (DCF) for the ad hoc networks. It is based on the mechanism of carrier sense multiple access with collision avoidance (CSMA/CA). DCF is used to support asynchronous data transmission. However, frames in DCF do not have priorities, making it unsuitable for real-time applications. With a little bad luck, a station might have to wait arbitrarily long to send a frame. In this paper, we propose a method to modify the CSMA/CA protocol such that station priorities can be supported. The method is simple, efficient and easy to implement in comparison to point coordination function (PCF), another access method in IEEE 802.11 based on access points (base stations). Simulations are conducted to analyze the proposed scheme. The results show that DCF is able to carry the prioritized traffic with the proposed scheme. key words: wireless LAN, CSMA/CA, multimedia applications,

408 citations