開頭.doc

Size: px
Start display at page:

Download "開頭.doc"

Transcription

1 國立交通大學 電子工程學系電子研究所碩士班 碩士論文 無線資源管理在行動 WiMAX 系統之研究 Radio Resource Management in Mobile WiMAX System 研究生 : 林盟翔 指導教授 : 黃經堯博士 中華民國九十五年六月

2 無線資源管理在行動 WiMAX 系統之研究 Radio Resource Management in Mobile WiMAX system 研究生 : 林盟翔 指導教授 : 黃經堯 Student:Meng-Shiang Lin Advisor:Ching-Yao Huang 國立交通大學電子工程學系電子研究所碩士班碩士論文 A Thesis Submitted to Department of Electronics Engineering College of Electrical Engineering and Computer Science National Chiao Tung University in partial Fulfillment of the Requirements for the Degree of Master in Electronics Engineering June 2006 Hsinchu, Taiwan, Republic of China 中華民國九十五年六月

3 無線資源管理在行動 W i M A X 系統之研究 學生 : 林盟翔 指導教授 : 黃經堯博士 國立交通大學電子工程學系電子研究所碩士班 摘 要 隨著使用者對於高速無線資料傳輸的需求增加, 行動 WiMAX 系統能滿足此需求且為 3.5 代行動系統的候選人之一 在本論文中, 我們將個別針對即時性和非即時性的服務, 在不同的排程控制方法之下去作效能分析, 並對允許進入的控制機制提出相關的判斷準則 我們也會針對在混合式服務之下, 有使用和沒有使用階層式排程控制其對於系統效能的影響和交互關係 更進一步地, 我們調查了不同的頻率重複使用係數對於整各系統效能的衝擊 為了量化行動 WiMAX 系統的效能, 我們發展了一個行動 WiMAX 模擬平台, 並且在這平台上建立了包含基礎無線資源管理機制的 MAC 層 根據模擬數據的分析, 我們可以得知若使用了考慮通道狀況的排程方法加上頻率正交多重接取技術的子載頻置換, 即使細胞站的佈置使用單一頻率, 仍然可以提供不錯的系統效能 若又使用階層且合適的排程方法將能夠改進系統在混合式服務之下的使用者容量 i

4 Radio Resource Management in Mobile WiMAX System student:meng-shiang Lin Advisor:Dr. Ching-Yao Huang Department ( Institute ) of Electronic Engineering National Chiao Tung University ABSTRACT With the increasing demand in high-speed wireless transmission, the mobile WiMAX based on IEEE e standard has been adopted as one of the candidates for beyond 3G cellular technologies. In this thesis, to effectively support real-time and non-real-time services, the system performance of mobile WiMAX with different radio resource managements in scheduler controls and the admission control criterion will be evaluated and analyzed. We also observe the effect and interaction with and without hierarchy scheduling in the mixed traffic. Furthermore, the impacts from different frequency reuse factors will also be investigated. The simulation platform, based on mobile WiMAX, is developed to quantify the mobile WiMAX performance. We also establish the MAC layer with basic resource management in this mobile WiMAX platform. The analytic results show the scheduling control, considered the channel condition and OFDMA permutation, can still offer a good performance in single frequency cell coverage and using hierarchy and appropriate scheduling controls can improve the system capacity with QoS guaranteed in a mixed traffic. ii

5 誌 謝 碩士班兩年的時光匆匆, 在新竹求學的六年時間將畫下句點 尤其在碩士班的兩年 當中, 有很多人跟我因為緣分而相遇, 更是我需要去感謝的貴人 也感謝老天讓我如此 幸運的遇見你們, 一起陪伴著我度過這段難忘的時光 首先, 我要感謝黃經堯老師, 除了在專業上教授了許多無線通訊相關的核心知識, 也讓我從只會讀書的大學生, 學習如何發掘重要的問題 細心的分析問題 最後解決問題 此外, 在做研究的過中, 老師就有如一盞明燈, 不時的指引我朝向正確的方向, 也鼓勵我要從挫折中振作起來 感謝老師在百忙之中抽空, 給予我在研究和寫作上的指導, 我才能順利地完成這篇論文 此外, 我也要感謝文嶽學長 慧源學長 鴻輝 昌叡以及工業研究院的郭高岳先生, 有你們可以一起討論 聆聽我的問題並提供我寶貴的意見 因為有了你們, 這篇論文才 能順利的製作 另外要感謝的, 就是在實驗室的日子裡, 一起共同努力的學長及伙伴們, 振坤學長 振哲學長 宜霖學長 明原學長 彥翔學長 宜鍵學長 雲懷學長 正達學長 裕隆學長 建銘學長 大瑜學長 勇嵐學長 宗奇 域晨及學弟們 有了你們的陪伴, 使我的研究生活能多采多姿, 這份心中的感動, 一定是我畢生難忘的回憶 最後, 我要感謝我的家人, 爸爸 媽媽 哥哥 女友維君及明純師母 當我遇到瓶 頸和困難時, 總是可以感受到來自於你們的關心及祝福, 不斷的支持鼓勵我, 讓我心中 時時充滿著溫暖及感恩 在此, 謹以我的畢業論文獻給大家, 希望你們能分享我的成果與喜悅, 感謝你們 林盟翔謹誌 2006 年 6 月,Wintech Lab, 交大, 新竹, 台灣 iii

6 Contents 中文提要 Abstract 誌謝.. i.. ii.. iii Contents.. iv List of Tables.. vi List of Figures.. vii Chapter 1 Introduction.. 1 Chapter 2 Overview of e system d/e system architecture Overview of Physical Layer PHY Frame Structure PHY Slot and Data Mapping Subcarrier Permutation Adaptive Modulation and Coding (AMC) Adaptive Antenna Systems (AAS) Space Time Coding Overview of MAC Layer MAC PDU Formats Fragmentation and Packing Automatic Retransmission Request (ARQ) QoS Based Service Classes Handoff (Handover) Request-and-Grant Mechanism Service and Data Flow. 25 Chapter 3 Simulation Setup The Architecture of Mobility Platform The Architecture of Frame Transmission 31 iv

7 3.3 Link Budget Basic Radio Resource Management Traffic Models.. 40 Chapter 4 Simulation Results Non-Real Time Service Slot Usage per Frame PHY Throughput per BS MAC Throughput per BS CDF of User Throughput Admission Control Criterion for Non-Real Time Service Scheduling Delay Scheduling Jitter AMC Usage Spectrum Efficiency Real Time Service Admission Control Criterion for Real Time Service Mixed Traffic Throughput of Non-Real Time Service Minimum Data Rate of Non-Real Time Service Packet Loss Rate of Real Time Service Capacity of Mixed Traffic 72 Chapter 5 Conclusions and Future Works 76 Reference.. 78 v

8 List of Tables Table FFT OFDMA downlink carrier allocations with PUSC Table 3-2 Link Budget Parameter of e system. 34 Table 3-3 Pathloss Model Scenarios Table 3-4 HTTP Traffic Model Table 3-5 VoIP Traffic Model 41 Table 3-6 The Parameter Setting in Simulation Platform.. 41 vi

9 List of Figures Figure 2-1 IEEE system architecture. 4 Figure 2-2 Example of an OFDMA frame (with only mandatory zone) in TDD mode... 6 Figure 2-3 OFDMA slot structure. 8 Figure 2-4 Example of mapping OFDMA slots to subchannels and symbols in the downlink PUSC mode. 9 Figure 2-5 Example of the statistic intercell interference in distributed subcarrier permutation mode Figure 2-6 Example of Space time coding flow with two transmit antennas 13 Figure protocol layer Figure 2-8 The functionality of Service-Specific Convergence Sublayer. 15 Figure 2-9 Single SDU forms multiple PDUs Figure 2-10 Multiple SDUs form single PDU. 18 Figure 2-11 Example of ARQ frame structure 19 Figure 2-12 Example of rearrangement Figure 2-13 Example of Network Model for Handoff Process Figure 2-14 Example of Service Flow. 25 Figure 2-15 Example of Data Flow of OFDMA TDD Mode.. 27 Figure 3-1 Cell Structure of System Simulation 29 Figure 3-2 Example of Wrap Around 29 Figure 3-3 Example of sector deployment. 30 Figure 3-4 Example of the Deployment of Frequency Reuse Factor 31 Figure 3-5 Example of SINR computation 36 Figure 4-1 Slot usage per frame in frequency reuse factor 1 44 Figure 4-2 Slot usage per frame in frequency reuse factor 3 44 Figure 4-3 PHY throughput of frequency reuse factor 1 per BS Figure 4-4 PHY throughput of frequency reuse factor 3 per BS.. 46 vii

10 Figure 4-5 MAC throughput of frequency reuse factor 1 per BS.. 47 Figure 4-6 MAC throughput of frequency reuse factor 3 per BS.. 47 Figure 4-7 CDF of user s PHY throughput with frequency reuse factor 1 at 30 users 49 Figure 4-8 CDF of user s PHY throughput with frequency reuse factor 3 at 30 users 49 Figure 4-9 Minimum data rate of non-real time services at frequency reuse factor Figure 4-10 Minimum data rate of non-real time services at frequency reuse factor Figure 4-11 Scheduling delay at frequency reuse factor Figure 4-12 Scheduling delay at frequency reuse factor Figure 4-13 Scheduling jitter at frequency reuse factor Figure 4-14 Scheduling jitter at frequency reuse factor Figure 4-15 AMC usage of RR at frequency reuse factor 1 55 Figure 4-16 AMC usage of RR at frequency reuse factor 3 55 Figure 4-17 AMC usage of FT at frequency reuse factor Figure 4-18 AMC usage of FT at frequency reuse factor Figure 4-19 AMC usage of PF at frequency reuse factor Figure 4-20 AMC usage of PF at frequency reuse factor Figure 4-21 AMC usage of MC at frequency reuse factor Figure 4-22 AMC usage of MC at frequency reuse factor Figure 4-23 Spectrum efficiency at 30 active users 59 Figure 4-24 Mean value of packet loss rate at frequency reuse factor Figure 4-25 Mean value of packet loss rate at frequency reuse factor Figure 4-26 Ratio of user number of different packet loss rate ranges and 60 active users at frequency reuse factor viii

11 Figure 4-27 Ratio of user number of different packet loss rate ranges and 65 active users at frequency reuse factor Figure 4-28 Ratio of user number of different packet loss rate ranges and 70 active users at frequency reuse factor Figure 4-29 Ratio of user number of different packet loss rate ranges and 75 active users at frequency reuse factor Figure 4-30 Ratio of user number of different packet loss rate ranges and 110 active users at frequency reuse factor 3 64 Figure 4-31 Ratio of user number of different packet loss rate ranges and 120 active users at frequency reuse factor 3 64 Figure 4-32 Ratio of user number of different packet loss rate ranges and 130 active users at frequency reuse factor 3 65 Figure 4-33 Ratio of user number of different packet loss rate ranges and 140 active users at frequency reuse factor 3 65 Figure 4-34 PHY throughputs of non-real time services of mixed traffic per BS with RR at frequency reuse factor Figure 4-35 PHY throughputs of non-real time services of mixed traffic per BS with PF at frequency reuse factor Figure 4-36 PHY throughputs of non-real time services of mixed traffic per BS with EDF+RR at frequency reuse factor Figure 4-37 PHY throughputs of non-real time services of mixed traffic per BS with EDF+PF at frequency reuse factor Figure 4-38 Minimum data rate of non-real time service of mixed traffic with RR at frequency reuse factor 1 70 Figure 4-39 Minimum data rate of non-real time service of mixed traffic with PF at frequency reuse factor Figure 4-40 Minimum data rate of non-real time service of mixed traffic with EDF+RR at frequency reuse factor ix

12 Figure 4-41 Minimum data rate of non-real time service of mixed traffic with EDF+PF at frequency reuse factor 1 71 Figure 4-42 Packet loss rate of real time service of mixed traffic with RR at frequency reuse factor Figure 4-43 Packet loss rate of real time service of mixed traffic with PF at frequency reuse factor Figure 4-44 Packet loss rate of real time service of mixed traffic with EDF+RR at frequency reuse factor Figure 4-45 Packet loss rate of real time service of mixed traffic with EDF+PF at frequency reuse factor 1 74 Figure 4-46 Capacity of mixed traffic at frequency reuse factor x

13 Chapter 1 Introduction The standards of IEEE [1][2] family provide fixed and mobile broadband wireless access (BWA) and promise to deliver multiple high data rates services over large areas. An industry group, Worldwide Interoperability for Microwave Access (WiMAX), cleans up and streamlines the implementation of IEEE standards. Using the new standard, users in the cell can directly connect to telecommunication networks and Internet via radio links. Based on the complexity and flexibility management of Medium Access Control (MAC) and Physical Layer (PHY), IEEE family can offer better QoS performances and an efficient deployment for operators. The first standard approved in 2001 is in the GHz range for line of sight wireless broadband services. In order to overcome the disadvantage of line of sight links, the a completed in 2003 is in the 2-11 GHz band for non-line of sight wireless broadband services. The d recently approved in 2004 (now named ) upgrades to the a standard and is the last version of fixed locations by radio links. The new e standard extends the d standard and provides the mobility support in cellular deployments [3]. The IEEE standards [1][2] define four different PHYs to provide a reliable end-to-end link. They are single carrier (SC) between GHz, single carrier release a (SCa) between 2-11 GHz, orthogonal frequency division multiplexing (OFDM), orthogonal frequency division multiple access (OFDMA). The SC and SCa are not used, because they are not suitable for non-line of sight transmissions. The OFDM is less complex than OFDMA and it is adopted by fixed products (802.16d). The OFDMA can offer more system gain performance and scalability than OFDM. Due to these reasons it is more suitable 1

14 for mobility products (802.16e) [4][5]. The wide bandwidth allocation and QoS mechanisms are provided in the standard. But the details of scheduling, admission control and reservation management are left undefined. This thesis focuses on the IEEE e mobile system level performances. The performance analysis adopts OFDMA technique and different evaluations for various system parameters, such as scheduling algorithms and frequency reuse factors. Detailed system level simulations have been performed in interference limited cellular environment with 6MHz bandwidth. This thesis will present the PHY/MAC throughput, capacity, spectrum efficiency, channel usage, scheduling delay, scheduling jitter, and adaptive modulation and coding scheme (AMC) usage of non-real time services. It will also present the packet loss rate and capacity of real time services. Finally, the interactive of mixed services and admission control criterion will be discussed. The rest of this thesis is organized as follows: In Chapter 2, the overview of PHY and MAC layers of e standard are briefly introduced. In Chapter 3, the settings of simulation platform and basic radio resource managements are addressed. Simulation results are presented in Chapter 4. Finally, conclusions and future works are provided in Chapter 5. 2

15 Chapter 2 Overview of e System In this chapter, the overview of MAC and PHY of e will be first introduced. In the PHY layer, we present the some details of OFDMA frame structure, PHY slot and data mapping, subcarrier permutation, and adaptive modulation and coding (AMC). We also introduce the advanced features, such as adaptive antenna systems (AAS) and space time coding. In the MAC layer, the details of MAC PDU formats, fragmentation and packing, automatic retransmission request (ARQ), QoS based service classes, handoff / handover, and request-and-grant mechanism are presented. Finally, we use service and data flows to summary the flows of MAC and PHY layers d/e system architecture IEEE d architecture consists of two kinds of station: subscriber station (SS) and base station (BS) as shown in Figure 2-1. In IEEE e standard, the SS is replaced by mobile station (MS). The BS controls all the communicated resources in a cell. The communication path between MS and BS has two directions: downlink channel (from BS to MS) and uplink channel (from MS to BS). Each SS or MS can deliver voice and data using common interfaces with different QoS requirements. 2.2 Overview of Physical Layer In the first design of the PHY specification for GHz, line of sight transmission was deemed a practical necessity. With this condition, single carrier modulation 3

16 was selected. But the SS or MS may be too low for a clear sight line to the BS antenna due to obstruction by buildings or trees, so the 2-11 GHz PHY is driven by the need for non-line of sight operation, which allows inexpensive and flexible consumer deployment and operation. Therefore, significant multipath propagation must be expected. The three 2-11 GHz air interface specification are: WirelessMAN-SCa: This uses a single-carrier modulated air interface. WirelessMAN-OFDM: A 256 carrier orthogonal frequency division multiplexing (OFDM) scheme. Multiple access is time division multiple access (TDMA) based. WirelessMAN-OFDMA: This uses orthogonal frequency division multiple access. In this system, multiple access is provided by assigning a subset of the carriers to an individual receiver. In e standard, the total number of subcarriers has four choices: 128, 512, 1024, and 2048 [2]. Figure 2-1 IEEE system architecture The two OFDM based systems are more suitable for non-line of sight operation due to the simplicity of the equalization process for multicarrier signals. The OFDM PHY has lower 4

17 peak to average ration, faster fast Fourier transform calculation, and lesser requirements for frequency synchronization than the OFDMA PHY. But OFDMA s complex subcarrier permutation is aimed at better frequency reuse and easier cell planning. The permutation can minimize the probability of hits between adjacent sectors/cells by reusing subcarriers. The OFDMA enables multipath mitigation without using equalizers and training sequences and can provide single frequency cell coverage, where coverage problem exists and gives excellent coverage. The OFDMA also can offer frequency diversity by spreading the subcarriers all over the used spectrum and time diversity by optional interleaving of carrier groups in time. OFDMA offer high system performance by introducing up and downlink subchannelization and is well suited for full mobile applications [3][5]. In order to ensure global implementation, the standard has been defined with a variable channel bandwidth. The channel bandwidth can be an integer multiple of 1.25 MHz, 1.5 MHz, and 1.75 MHz with a maximum of 20 MHz [1] PHY Frame Structure The IEEE standard supports two duplex methods: time division duplex (TDD), in which the uplink and downlink share the same bandwidth but do not transmit simultaneously, and frequency division duplex (FDD), in which the uplink and downlink operate on separate bandwidths, sometimes simultaneously. In the TDD mode of PHY, the uplink subframe follows the downlink subframe on the same bandwidth. The system uses a frame of 2, 2.5, 4, 5, 8, 10, 12.5, or 20ms [1]. This frame is divided into physical slots for the purpose of bandwidth allocation and identification of PHY transitions. In this thesis, we focus on the e and OFDMA technique. Therefore, we only 5

18 introduce the OFDMA frame structure [2]. Figure 2-2 shows an example of an OFDMA frame structure in TDD mode. We can see the frame has two dimensions, frequency dimension and time dimension. The frame can be flexibly filled up with two dimensions. The minimum unit of OFDMA frame is a OFDMA symbol. A OFDMA symbol own one subchannel which contains several subcarriers according to the permutation mode. The downlink subframe (DL) consists of the following: Preamble, Frame Control Header (FCH), DL-MAP, and UL-MAP, DL burst. The uplink subframe (UL) consists Ranging subchannel and UL burst. OFDMA symbol number Time Subchannel number Preamble FCH DL-MAP DL burst #1 (carrying the UL-MAP) DL burst #3 DL burst #4 DL burst #5 Ranging subchannel UL burst #1 UL burst #2 UL burst #3 Preamble FCH DL-MAP Frequency DL burst #2 DL subframe DL burst #6 UL burst #4 UL burst #5 TTG UL subframe RTG Figure 2-2 Example of an OFDMA frame (with only mandatory zone) in TDD mode The first symbol is occupied by the preamble. The preamble is used for synchronization. The FCH contains the DL_Frame Prefix, and specifies the length of the DL-MAP message that immediately follows the DL_Frame_Prefix and the repetition coding used for the DL-MAP message. The DL-MAP and UL-MAP completely describe the contents of the DL and UL subframes. The DL-MAP and UL-MAP are used for resource allocation of DL and UL data bursts, include what bursts belong to MSs, modulation and coding schemes 6

19 per burst, which are indicated by the Downlink Interval Usage Code (DIUC) and uplink Interval Usage Code (UIUC). The UL-MAP also grants bandwidth to specific MSs. Therefore, the MSs can transmit data in their assigned uplink allocation. The DL bursts and UL bursts are used for data transmission of different users. The ranging subchannel is used for initial ranging, periodic ranging, and bandwidth requests. The initial ranging transmission shall be used by any MS that wants to synchronize to the system channel for the first time. Periodic-ranging transmissions are sent periodically for system time and power update. Bandwidth requests transmissions are for requesting uplink allocations from the BS. Ranging subchannels are dynamically allocated by the MAC layer and indicated in the UL-MAP. The transmit/receive transition gap (TTG) is a gap between the downlink burst and the subsequent uplink burst. It allows time for the BS to switch from transmit to receive mode and MSs to switch from receive to transmit mode. The receive/transmit transition gap (RTG) is a gap between the uplink burst and the subsequent downlink burst. It allows time for the BS to switch from receive to transmit mode and SSs to switch from transmit to receive mode PHY Slot and Data Mapping The OFDMA slot is a minimum unit for data transmissions. One OFDMA slot occupies one subchannel and several OFDMA symbols as shown in Figure 2-3. For downlink Full Usage of Subcarriers (FUSC) using the distributed subcarrier permutation, one slot is one subchannel by one OFDMA symbol. For downlink Partial Usage of Subcarriers (PUSC) using the distributed subcarrier permutation, one slot is one subchannel by two OFDMA symbols. For uplink PUSC using either of the distributed subcarrier permutations, one slot is one subchannel by three OFDMA symbols. For uplink and downlink Band Adaptive modulation 7

20 and coding (Band AMC) using the adjacent subcarrier permutation, one slot is one subchannel by one, two, three, or six OFDMA symbols. The FUSC, PUSC, Band AMC, and distributed/adjacent subcarrier permutations will be discussed later. Figure 2-3 OFDMA slot structure A Data Region is a two-dimensional allocation which contents a group of contiguous subchannels and OFDMA symbols. All the allocations refer to logical subchannels. A two dimensional allocation may be visualized as a rectangle, such as the 4 3 rectangle shown in Figure 2-4 [2]. Figure 2-4 also show the principle of data mapping. The minimum unit of data mapping is a OFDMA slot. The basic principles are to segment the data after the modulation block into blocks sized to fit into one OFDMA slot, and map the slots in the subchannels with higher priority than that in the OFDMA symbols. In other words, the data mapping method is frequency first which can meet the delay bound of real time services more easily Subcarrier Permutation In IEEE standard, subcarrier permutation is a method for assigning frequency subcarriers to subchannels. The allocation of subcarriers to subcahnnels is 8

21 accomplished via a permutation rule, include permutation formula and permutation series. The permutation is a function of an IDCell parameter. This parameter is set by the network administrator, and it is different from a sector to other sectors. The resulting subchannels allocations are such the each subchannel overlap subchannels OFDMA symbol index Time Frequency Subchannel number k k+1 k+2 k+3 k+4 k+5 k+6 k+7 k+8 k+9 k+10 k+11 k+12 Slot (n) Slot (n+1) Slot (n+14) Slot (n+13) Slot (n+26) Figure 2-4 Example of mapping OFDMA slots to subchannels and symbols in the downlink PUSC mode in adjacent subchannels cells only by a fraction of its subcarriers. So, subcarrier permutation can achieve averaging interference from neighboring cells, by using different basic carrier permutations between users in different cells. Interference within the cell is averaged by using allocation with cyclic permutations. There are two kinds of permutation modes: distributed and adjacent subcarrier permutation mode. The distributed subcarrier permutation mode can usefully average intercell interference and avoid fading effect by selecting subcarriers pseudo randomly. Using this characteristic, the burst interference that affect other cells at the same 9

22 OFDMA slots will be shared on the all subframe in the statistic, like Figure 2-5. The adjacent subcarrier permutation mode groups adjacent subcarriers into a subset and assign to users. If the adjacent subcarrier permutation is adopted, the frequency selected fading can be used and can get better multiuser frequency diversity as long as the channel does not change significantly during the scheduling process [6]. The IEEE has three ways of grouping subcarriers into channels [2]: time Burst#1 Burst#2 Burst#3 frequency Preamble FCH... Burst#4 Burst#5 0 1 DL Subframe f time Permutation Interference density (dbm/hz) frequency Preamble FCH... Figure 2-5 Example of the statistic intercell interference in distributed subcarrier permutation mode Full Usage of Subchannels (FUSC): This mode is downlink only and can use all subcarriers to do permutation for one subchannel. It can achieves the best frequency diversity by spreading subcarriers over entireband. Partial Usage of Subchannels (PUSC): This method can be used for both uplink and downlink. It groups subcarriers into tiles/clusters to enable fractional frequency re-use. This means the subcarriers of one subchannel only arrange from per groups and a group just offers one subcarrier. It still has distribution of subcarriers across band for each 10

23 subchannel. Band Adaptive Modulation and Coding (Band AMC): It is also suitable for uplink and downlink. In e standard, if Band AMC is used, all bandwidth will be divided into four sub-bands. Users will measure the transmitted qualities of sub-bands, respectively, and choose better bands for data transmissions. This permutation method is designed for the function of Band AMC and needs the Adaptive Antenna System (AAS). This method uses adjacent subcarriers for each subchannel for use with beamforming. The PUSC and FUSC belong to distributed subcarrier permutation mode. The Band AMC belongs to adjacent subcarrier permutation mode Adaptive Modulation and Coding (AMC) Adaptive modulation allows the IEEE system to adjust the signal modulation scheme depending on the carrier to interference plus noise ratio (CINR) condition of the radio link. IEEE e OFDMA architecture supports multiple modulation levels: Quadrature Phase Shift Keying (QPSK), 16-state Quadrature Amplitude modulation (16-QAM), and 64-state QAM (64-QAM). When the radio link is good quality, the highest modulation scheme is used. The modulation-level will be dynamically adjusted based on the radio link quality. This feature allows the system to overcome time-selective fading. The OFDMA architecture also supports several coding schemes, like Convolution Code (CC), Low Density Parity Check Code (LDPC), Block Turbo Code (BTC), and Convolution Turbo Code (CTC). The BTC and CTC are optionally supported. Turbo coding can improve the ability of error correction, but increase decoding complexity and latency. The channel quality information channel (CQICH) and UL Sounding help change the modulation and coding scheme. In the distributed subcarrier permutation mode, the MSs use CQICH to report the average downlink CINR of BS preamble. In the adjacent subcarrier permutation mode, the MSs will report the 11

24 different CINR values of four frequency bands on the CQICH. The BS can use this information to determine the downlink modulation and coding scheme (MCS) level. The UL Sounding, is a kind of uplink pilot signal, can be used to determine the uplink MCS level Adaptive Antenna Systems (AAS) The IEEE system enables the usage of intelligent antenna systems. Adaptive Antenna Systems (AAS) is used in the specification to describe beam forming techniques. An array of antennas is used at the BS to increase gain to the intended MSs and nulls out interference to and from other MS s interference sources. AAS techniques can be used to enable Spatial Division Multiple Access (SDMA), where multiple MS s that are separated in space can receive and transmit on the same subchannel at the same time. By using beam forming, the BS is able to direct the desired signal to the different MS s and can distinguish between the signals of different MS s even though they are operating on the same subchannels Space Time Coding Space time coding is an optional diversity scheme that can be provided in the downlink. In IEEE e, this transmit diversity scheme uses two or four antennas at the BS to transmit an STC encoded signal and one reception antenna on the MS side, in order to provide the gains that result from second-order diversity as shown in Figure 2-6. This scheme requires Multiple Input Single Output channel estimation. Decoding is very similar to maximum ratio combining. Each of two (or four) antennas transmits a different symbol in the first symbol time. The two (or four) antennas then transmit the complex conjugate of the symbols of first symbol time in the second symbol time. The resulting data rate is the same as 12

25 without transmit diversity. If the STC and AAS with SDMA enable, this system can implement the function of Multiple Input, Multiple Output (MIMO). IFFT Filter DAC RF Subcarrier modulation IFFT input packing Tx diversity encoder IFFT Filter DAC RF RF DAC Filter FFT Diversity combiner Subchannel demod. Log-likelihood ratios Decoder Figure 2-6 Example of Space time coding flow with two transmit antennas. 2.3 Overview of MAC Layer The MAC layer of IEEE was designed for point to multipoint (PMP) broadband wireless access applications and is connection-oriented. It is designed to meet the needs of very high data rate applications with a variety of quality of service (QoS) requirements on both downlink and uplink. The access and bandwidth allocation have been designed for offering a large number of MSs. The MAC layer protocol of IEEE system is flexible and efficient over a wide range of different data traffic models. Under the situations of multiple connections per MS, multiple QoS levels per MS, and a large number of statistically multiplexed users, the MAC layer can keep the system efficiency. Because the bandwidth request-and-grant mechanism of MAC layer are designed to be scalable, efficient, and self-correcting. It takes advantage of a wide variety of request mechanisms, balancing the 13

26 stability of contentionless access with the efficiency of contention-oriented access. In system, the MAC layer is divided into three sublayer as shown in Figure 2-7. CS SAP Service-Specific Convergence Sublayer (CS) MAC MAC SAP MAC Common Part Sublayer (MAC CPS) Security Sublayer PHY SAP PHY Physical Layer (PHY) Figure protocol layer The MAC layer includes service-specific convergence sublayer that interface to higher layers, the core MAC common part sublayer that carries out the key MAC functions, and the security sublayer. Service-Specific Convergence Sublayer (CS): This sublayer is used to map the transport-layer-specific traffic to MAC layer that is flexible enough to efficiently carry any traffic types. The main function of this sublayer, as shown in Figure 2-8, is to classify service data units (SDUs) to the proper MAC connection and assign connection ID (CID) used for distinguishing different connections and different QoS requirements for each connection. It also enables bandwidth allocation. The detail of packet classifier 14

27 can refer to [10]. Depending on the type of service, there are different mapping forms. IEEE standard defines two types of service-specific convergence sublayers for mapping services to and from MAC connections. The ATM convergence sublayer is defined for ATM services, and the packet convergence sublayer is defined for mapping packet services such as IPv4, IPv6, and Ethernet. The convergence sublayers can also perform more accomplished functions such as payload header suppression and reconstruction to enhance the airlink efficiency. Common Part Sublayer (CPS): The common part sublayer is independent of the transport mechanism, such as TCP and UDP protocols. The responsibilities of this sublayer are support the main control mechanisms, such as QoS control, fragmentation Upper Layer of transmitter (Bridge, router, or Host ) SDU CS SAP CID 1 CID 2 Packet Classifier CID n {SDU, CID, } transmitter MAC SAP Upper Layer of receiver (Bridge, router, or Host ) SDU CS SAP Reconstitution {SDU, CID, } receiver MAC SAP MAC CPS MAC CPS Figure 2-8 The functionality of Service-Specific Convergence Sublayer 15

28 and segmentation of MAC service data units (SDUs) into MAC protocol data units (PDUs), scheduling control, bandwidth requests and grants, admission control, ARQ and HARQ retransmission of MAC PDUs, and handoff process. We will introduce these later. Security Sublayer: This sublayer performs the authentication of network access, registration, key exchange, and encryption of PDUs. Privacy has two component protocols as follows: First, an encapsulation protocol for encrypting packet data across the fixed BWA network. This protocol defines a set of supported cryptographic suites, i.e., pairings of data encryption and authentication algorithms, and the rules for applying those algorithms to a MAC PDU payload. Second, a key management protocol (PKM) providing the secure distribution of keying data from BS to MS. Through this key management protocol, the MS and the BS synchronize keying data. In addition, the BS uses the protocol to enforce conditional access to network services. In the rest chapter, we will discuss the functionality of CPS MAC PDU Formats The MAC PDU is a data exchanged unit between the MAC layer of the BS and its MSs. A MAC PDU consists of a 48 bits MAC header, a variable-length data payload, and an optional 32 bits Cyclic Redundancy Check (CRC). There are two types of MAC headers: a generic header and a Bandwidth Request (BR) MAC header. The generic header is used to transmit data or MAC messages. The BR header is used by the MS to request more bandwidth on the uplink and bandwidth request MAC PDUs contain no payload. The maximum length of the MAC PDU is 2048 bytes, including header, payload, and CRC. The MAC also defines six types of subheaders which may be present in a MAC PDU with generic MAC header: Mesh, Fragmentation, Packing, Fast-feedback allocation, extended and Grant Management 16

29 subheader. The subheaders of each PDU may be inserted in MAC PDUs immediately following the Generic MAC header. Grant Management subheader is used to transport bandwidth allocation states between the BS and MS. Fragmentation and Packing subheaders are used to utilize the bandwidth allocation efficiently. The fragmentation subheader indicates the presence and orientation in the payload of any fragments of SDUs. The packing subheader is used to indicate the packing of multiple SDUs into a single PDU. Fast-Feedback allocation is designed for MIMO operation. Mesh subheader is only useful in mesh mode Fragmentation and Packing In the system, MAC SDUs from CS will be formatted according to the MAC PDU format in the CPS, possibly with fragmentation and/or packing. After traversing the airlink, MAC PDUs are reconstructed back into the original MAC SDUs. Because airlink resources are very precious, the MAC layer performs both fragmentation of MAC SDUs and packing of MAC SDUs in the CS. The system takes advantage of incorporating the packing and fragmentation processes with the bandwidth allocation process to maximize the flexibility and efficiency. Fragmentation is the process in which a MAC SDU is divided into one or more MAC SDU fragments. Then, these fragments are packed into the payload field of the PDUs that the payload field is too small to transmit a complete SDU. Figure 2-9 shows the process of fragmentation. Packing is the process in which multiple MAC SDUs are packed into a single MAC PDU payload in order to fill up the remaining payload field preventing wastage of resources. The CPS allows simultaneous fragmentation and packing for efficient use of the bandwidth as shown in Figure Both processes may be initiated by either a BS for a downlink connection or an MS for an uplink connection. 17

30 MAC SDU Generic MAC Header Other Sub Header CRC Generic MAC Header Other Sub Header CRC MAC PDU MAC PDU Figure 2-9 Single SDU forms multiple PDUs Fragmented Part MAC SDU MAC SDU MAC SDU Generic MAC Header Other Sub Header CRC MAC PDU Figure 2-10 Multiple SDUs form single PDU Automatic Retransmission Request (ARQ) The automatic retransmission request (ARQ) can request the retransmission of part of a SDU. A MAC SDU is logically partitioned into ARQ blocks whose length is specified by ARQ_BLOCK_SIZE and MAC PDU is formatted by integer number of ARQ blocks as shown in Figure Once an SDU is partitioned into a set of blocks, partitioning remains in effect until all blocks of the SDU are successfully delivered to the receiver, or the SDU is discarded by the transmitter state machine. The processing is the process of retransmitting MAC ARQ blocks of one PDU that have been lost or in error. The MAC uses a simple 18

31 Frag0 SDU #1 SDU #2 Frag Two consecutive SDUs presented to MAC for the same connection 5 PDU #1 Frag0 of SDU # Frag1 of SDU #1 Original transmission Packed PDU # Frag1 of SDU #1 Packed PDU # Retransmission of PDU #2 without rearrangement Figure 2-11 Example of ARQ frame structure sliding window based approach, where the transmitter can transmit up to a negotiated number of blocks without receiving an acknowledgement. The receiver sends acknowledgement or negative acknowledgement messages to indicate to the transmitter which ARQ blocks of the PDUs have successfully been received and which have been lost. If any block of one PDU is lost or in error, the transmitter will retransmit all ARQ blocks of this PDU. When ARQ blocks of a PDU are acknowledged to have been received, the sliding window is moved forward. The system also optionally provides the rearrangement of the retransmission blocks. If the ARQ blocks of one PDU need be retransmitted, it can be divided into different PDUs which share the blocks, just like the PDU #3 of Figure 2-11 can be changed to two retransmitted PDUs as shown in Figure Hybrid automatic repeat request (HARQ) scheme is an optional part of the MAC. HARQ may be supported only for the OFDMA PHY. Two main variants of HARQ are supported Chase Combining and Incremental Redundancy (IR). MS may support either Chase Combining or IR. For IR, the PHY layer will encode the HARQ packet generating several versions of encoded subpackets. Each subpacket shall be uniquely 19

32 PDU #3 Frag 1 of SDU #1 Frag 2 of SDU #1 Packed PDU # Retransmission of PDU #2 with rearrangement Figure 2-12 Example of rearrangement identified using a subpacket identifier (SPID). For Chase Combining, the PHY layer shall encode the HARQ packet generating only one version of the encoded packet. As a result, no SPID is required for Chase Combining. For downlink HARQ operation, the BS will send a version of the encoded HARQ packet. The SS will attempt to decode the encoded packet on this first HARQ attempt. If the decoding succeeds, the SS will send an ACK to the BS. If the decoding fails, the SS will send a NAK to the BS. In response, the BS will send another HARQ attempt. The BS may continue to send HARQ attempts until the SS successfully decodes the packet and sends an acknowledgement The utilization of HARQ is on a per-connection basis, that is, it can be enabled on a per CID basis. Two implementations of HARQ are supported: first, per-terminal, that is, HARQ is enabled for all active CIDs for a terminal, and second, per-connection, that is, it can be enabled on a per CID basis. The two implementation methods shall not be employed simultaneously on any terminal. If HARQ is supported, MS shall support per-terminal or per-connection implementation. A burst cannot have a mixture of HARQ and non- HARQ traffic. One or more MAC PDUs can be concatenated and an HARQ packet formed by adding a CRC to the PHY burst. The good overview of HARQ can be found in [7][ 8] [9] QoS Based Service Classes 20

33 The e MAC supports QoS differentiation for different types of applications which might transmit on the e system. The e standard defines five types of services: Unsolicited Grant Service (UGS): The UGS is designed to support real-time service flows that generate transport fixed-size data packets on a periodic basis, such as T1/E1. The service offers fixedsize grants on a real-time periodic basis, which eliminate the overhead and latency of MS bandwidth requests in order to meet the delay and delay jitter requirements of the underlying services and assure that grants are available to meet the flow s real-time needs. When used with UGS, the grant management subheader includes the poll-me bit. Connections configured with UGS are not allowed to utilize random access opportunities for bandwidth requests. Real-Time Polling Service (rtps): The rtps is designed to support real-time service flows that generate transport variable size data packets on a periodic basis. The service offers real-time, periodic, unicast request opportunities, which meet the flow s real-time needs and allow the MS to specify the size of the desired grant. This service requires more request overhead and latency than UGS, but supports variable grant sizes for optimum data transport efficiency. The rtps is well suited for connections carrying services such as VoIP or moving pictures experts group (MPEG) video. Extended Real-Time Polling Service (ertps): The ertps is designed to support real-time service flows that generate variable size data packets on a periodic basis, such as Voice over IP services. Extended rtps is builds on the efficiency of both UGS and rtps. The BS shall provide unicast grants in an unsolicited manner like in UGS, thus saving the latency of a bandwidth request. However, whereas UGS allocations are fixed in size, ertps allocations are dynamic. Non-Real-Time Polling Service (nrtps): The nrtps is designed to support delay-tolerant data streams consisting of variable-sized data packets for which a 21

34 minimum data rate is required and may utilize random access transmit opportunities for sending bandwidth requests. In general, services carried on these connections tolerate longer delays and are rather insensitive to delay jitter. The nrtps is suitable for Internet access with a minimum guaranteed rate, such as FTP and HTTP. Best Effort Service (BE): The BE service is designed to support data streams for which no minimum service level is required and therefore may be handled on a space-available basis, such as . Neither throughput nor delay guarantees are provided. The service classes are distinguished by the Service-Specific Convergence Sublayer (CS). When the packets are classified in the CS, the connection which they are placed into is chosen based on the type of QoS required of applications Handoff (Handover) Figure 2-13 Example of Network Model for Handoff Process Figure 2-13 shows an example where two BSs are connected to operator backbone network. BS1 is the Serving BS for an MS and BS2 is the Neighbor BS. For handoff process, Serving BS broadcasts MOB NBR-ADV message which contains information of Neighbor 22

35 BSs and the MSS can scan neighbor BSs to measure the signal power of Neighbor BSs periodically. If the MS moves closer to BS2, BS2 might become a Target BS for a handoff and the MS sends a handover request message to Serving BS. The MS could select several BSs as candidate of Target BS. Then, the Serving BS and Neighbor BSs exchange the handoff information of MS, negotiate handover capability through backbone network and select one Target BS finally. The serving BS sends handover response message to the MSS trying to handover. Then, the MS releases the connection with Serving BS and makes a new connection with Target BS and conducts network re-entry process. The Target BS could get security information of MS from Serving BS or authentication and service authorization (ASA) server. After network re-entry process, which includes synchronization with new downlink, ranging and synchronization with uplink, re-authorization, and re-registration procedures, the MS can send or receive traffic. After releasing the connection with Serving BS, the MS have to synchronize with new downlink of Target BS and obtain downlink parameters with DL-MAP message. After synchronization, the MS shall wait for UCD message from the BS in order to retrieve a set of transmission parameters for a possible uplink channel. The MS conducts ranging process to get correct timing offset and power adjustments. For this ranging process, Target BS can use Fast-Ranging IE to give a non-contention based ranging opportunity to the MSS. If the MSS fails to receive Fast-Ranging IE message, it should conduct contention based ranging process by transmitting the CDMA codes. The remained network re-entry processes are re-authorization and re-registration. If the serving BS transfers all MAC states and security information of the MSS to Target BS by backbone network during the handover process, this MSS could skip re-authorization and re-registration processes. The more detail of handoff process can be founded in [11][12][13] Request-and-Grant Mechanism 23

36 In IEEE standard, there are two kinds of transmitting the bandwidth request: contention mode and contention-free mode (polling). The Bandwidth Request (BW-Request) message may be transmitted during any uplink allocation, except during initial ranging intervals. BW-Requests may be incremental or aggregate. When the BS receives an incremental BW-Request, it shall add the quantity of bandwidth requested to its bandwidth. When the BS receives an aggregate BW-Request, it shall replace its bandwidth. In contention mode, MSs send BW-Request during the contention period. Contention is resolved using back-off mechanism. In contention-free mode, BS polls each MS and MSs reply by sending BW-request. Polling is the process by which the BS allocates to the MSs bandwidth specifically for the purpose of making bandwidth requests. There are three kinds of polling: Unicast, Multicast, and Poll-me bit (PM). In the unicast polling, the MS is polled individually and has sufficient bandwidth to respond with a BW-Request. If insufficient bandwidth is available to individually poll many inactive MSs, some MSs may be polled in multicast groups or a broadcast poll using multicast polling. MSs with currently active UGS connections may set the PM bit in a MAC packet of the UGS connection to indicate to the BS that they need to be polled to request bandwidth for non-ugs connections. Contention-free mode is more suitable for real time applications due to the predictable signaling delay of the polling scheme. In the IEEE MAC, there are two classes of MS, differentiated by their ability to accept bandwidth grants simply for a connection or for the MS as a whole. With the grant per connection (GPC) class of MS, bandwidth is explicitly granted to a connection, and the MS uses the grant only for that connection. With the grant per SS (GPSS) class, MSs are granted bandwidth aggregated into a single grant to the MS itself. The GPSS MS needs to be more intelligent in its handling of QoS. The two classes of SS allow a trade-off between simplicity and efficiency. GPC is simpler but less efficient than GPSS. Additionally, the ability of the GPSS MS to react more quickly to the needs of the PHY and those of connections enhances system performance. GPSS is the only class of MS allowed with the 24

37 10 66 GHz PHY. 2.4 Service and Data Flow In Figure 2-14, we show the service flow of system. IEEE standard can support multiple services with different requirements of QoS, such as data, voice, video. The MAC layer defines QoS signaling mechanisms and functions that can control BS and MS data transmissions. The CS layer of downlink and uplink classifies the different QoS services into TDM Voice VoIP TFTP MAC CS MAC CPS MAC CPS MAC CS Packet Classifier CID#5 CID#6 CID#7 UL BW Request Generator BW-Request Scheduler Packet Re- CID#5 construct CID#6 CID#7 TDM Voice VoIP TFTP HTTP Uplink CID#8 UL BW Grant Processor Data Traffic UL BW Grant Generator CID#8 HTTP Downlink TDM Voice VoIP TFTP HTTP Packet Reconstruct CID#1 CID#2 CID#3 CID#4 DL Traffic Processor UL-MAP Data Traffic DL-MAP DL Traffic Processor DL-Map Generator Packet Classifier CID#1 CID#2 CID#3 CID#4 TDM Voice VoIP TFTP HTTP MS BS Figure 2-14 Example of Service Flow connections and assigns the connection with a unique connection indicator (CID). Then, the data of the connections are forwarded to the appropriate queues. On the downlink, the transmission is relatively simple because the BS is the only one that transmits during the 25

38 downlink subframe. The BS schedules the all downlink connections and the data are broadcasted to all MSs and an MS uses the DL-MAP information to picks up the data belong to it. The BS determines the number of slots that each MS will be allowed to transmit in an uplink subframe. This information is broadcasted by the BS through UL-MAP at the beginning of each frame. UL-MAP contains information element (IE), which include the transmission opportunities, i.e. the slots in which the MS can transmit during the uplink subframe. After receiving the UL-MAP, each MS will transmit data in the predefined slots as indicated in IE. The BS uplink-scheduler determines the IEs using BW-request sent from MSs to BS. In Figure 2-15, we show the data flow of OFDMA TDD mode. The service traffic got into the MAC layer will be mapped into MAC SDUs. A MAC SDU is divided into one or more MAC PDUs or multiple MAC SDUs are packed into a single MAC PDU through the operation of fragmentation or packing. Multiple MAC PDUs may be concatenated into bursts having the same modulation and coding in either uplink or downlink directions. The bursts are mapped into OFDMA frame and transmitted after subcarrier permutation. In this chapter, we brief introduce the IEEE e system and you can refer to [3][6][14~18] about those insufficient details. The wide bandwidth allocation and QoS mechanisms are provided in the standard. But the details of scheduling, admission control and reservation management are left undefined and provide an important mechanism for vendors to differentiate their equipment. In this thesis, to effectively support real-time and non-real-time services, the system performance of e with different radio resource managements in scheduler controls and admission control criterion will be evaluated. 26

39 Figure 2-15 Example of Data Flow of OFDMA TDD Mode 27

40 Chapter 3 Simulation Setup In this chapter, the IEEE e system level simulation platform will be described. The details of system architecture and simulation parameters are going to be presented. Then, the Link Budget, such as path loss and shadow fading, is set to be suitable for IEEE e standard. The setting of basic radio resource managements, such as power control, rate control (AMC), scheduling controls, and handoff method, is showed in this chapter. Finally, the traffic models of simulation are introduced. 3.1 The Architecture of Mobility Platform In the simulation of a mobile system, the interference from other cells is an important element that would affect the overall performance of single cell. This effect need to be considered into the simulation. When the number of simulation cells increase, it will cause high load of the simulation time and computation. Between these two tradeoffs of accurate simulation and computing cost, we consider two-tier interference cells. According to approximate the cell coverage with a hexagon, we consider nineteen cells in our simulation as shown in Figure 3-1. From Figure 3-1, we can see that only the central cell completely has two-tier interference cells, the other cells can not find out the symmetric two-tier interference cells. Even if we use nineteen cells to simulate, only the statistic simulation value of the central cell can be referred, causing a lower simulated efficiency. Hence, we adopt a wrap around technique as shown in Figure 3-2. This technique can make any of nineteen cells owns complete two-tier interference cells. The main ideal is the lacks of any two-tier interference 28

41 Figure 3-1 Cell Structure of System Simulation Figure 3-2 Example of Wrap Around 29

42 cells of a specific cell are copies from the simulated cells which are besides the two-tier interference cells of the specific cell. Through the clever arrangement, any cell has complete, symmetric, and different two-tier interference cells. Because the cell owns whole interference after wrap around, the statistic simulation value of nineteen cells would be meaningful. The cell radius which we set is 1 km [19]. This approximate cell coverage is a result from a plan of Link Budget. The total cell bandwidth that we choose is 6 MHz [1]. In our simulation platform, a cell is divided into three sectors as shown in Figure 3-3. Each sector has the different antenna direction and a regular pattern of deployment. The sector architecture in e system can reduce the transmission power of BS antenna and intercell interference. But it still has a small part of intercell interference in different sectors of distinct BSs due to subcarrier permutation. This characteristic is very difficult to simulate, so we assume a sector would produce interference to other sectors which have the same direction. 3-Sector Scenario Figure 3-3 Example of sector deployment In our simulation platform, the setting of antenna pattern uses the 3GPP s model [20] as shown in (1). 30

43 θ 2 o A( θ ) = min [ 12( ), Am ] where 180 θ θ, where θ 3dB is 70 and A m is 3dB 20 db. 180 o (1) The cell s frequency reuse factor in our simulation platform has two select, one (1x1) or three (1x3). The total bandwidth of frequency reuse factor 1 is 6 MHz in our simulation. Frequency reuse factor 3 need triple bandwidth, 18 MHz. The cells with frequency reuse factor 3 has longer distance between two cell used the same bandwidth than frequency reuse factor 1. Therefore, the interference in frequency reuse factor 3 scenario is lower due to stronger interference pathloss caused by longer distance. But the cost is the triple bandwidth need be used. Figure 3-4 shows the deployment of frequency reuse factor. In frequency reuse factor 1 scenario, the overall cells use the same bandwidth. In frequency reuse factor 3 scenario, only partial cells use the same bandwidth. For instance, #0 (# means number), #7, #9, #11, #13, #15, #17 cells use the identical cell bandwidth in Figure 3-4. Frequency reuse factor 1 Frequency reuse factor Figure 3-4 Example of the Deployment of Frequency Reuse Factor 3.2 The Architecture of Frame Transmission 31

44 In this thesis, we focus on the downlink transmission and use the OFDMA technique with TDD mode. The IEEE standard can support an asymmetric downlink and uplink transmission of TDD mode, which adjusts the ratio according to the traffic loading of downlink and uplink transmission. In our simulation, we use a simple assumption. We assume the downlink and uplink transmission have a ratio of equality and they use a half frame, respectively. In 2.3.1, we introduce the time duration of a frame. In our simulation, the frame length we used is 10 ms. The frame structure we used is 2048-FFT OFDMA downlink carrier allocations PUSC mode defined in the standard. The carrier distribution is shown in Table 3-1. In the 2048 subcarriers, only 1680 subcarriers can carry data information and other subcarriers are used for guard band and dc subcarrier. Table FFT OFDMA downlink carrier allocations with PUSC Subcarrier types number Total subcarriers 2048 DC subcarriers 1 Guard subcarriers 184 (Left), 183 (Right) Sub-channels 60 Data sub-carriers within each sub-channel 24 The length of an OFDMA symbol is an important parameter which involves how many symbols a frame has. The IEEE standard provides the method to calculate the OFDMA symbol time, just like (2). 32

45 Sampling frequency : F = floor(n S Subcarrier spacing : Δf = F /N S FFT Useful symbol time : T = 1 /ΔΔ b CP Time : T = G T g b OFDMA Sampling symbol time : T b time : T S / N FFT = T b + T g BW/ 8000 ) 8000 (2) BW is the nominal channel bandwidth. N FFT is the smallest power of two greater than Nused which is the number of used subcarriers includes the DC subcarrier. n is a sampling factor. This parameter, in conjunction with BW and Nused determines the subcarrier spacing, and the useful symbol time. This value is set to 8/7. G is the ratio of CP time to useful time. The following values shall be supported: 1/32, 1/16, 1/8, and 1/4. From these equations, we can get the OFDMA symbol time with our settings. We use 6 MHz bandwidth and set G value equal to 1/32. The OFDMA symbol time will be 308 μs. Using this value, one subchannel has sixteen OFDMA symbols roughly per frame. Under the equal downlink and uplink transmitted ratio, a subcannel of downlink or uplink subframes owns eight OFDMA symbols, respectively. In the downlink PUSC mode, a transmission slot occupies two OFDMA symbols, so one subchannel has four slots in the downlink subframe. The total slots of a downlink subframe of PUSC mode are 240 (4*60). 3.3 Link Budget The link budget settings of downlink transmission in our simulation are as far as possible to match the IEEE e real environment. In IEEE S802.16e-03/23 document [19], it makes deployment scenario assumptions for e, like Table 3-2. In our simulation, we adopt the outdoor vehicular scenario, which the BS transmitted power is 46 dbm, the BS antenna gain is 17 dbi, the SS (MS) antenna gain is 3dBi on the downlink transmission. The BS back off which is used to avoid the RF circuit working in the non-linear region due to the 33

46 peak-to-average power ratio (PAPR) of OFDM system is 5 db. The common usage value of thermal noise density is db / Hz. The receiver noise figure of MSs is 9dB [21]. Table 3-2 Link Budget Parameter of e system Scenario Indoor Outdoor to indoor Outdoor vehicular Parameter BS Tx power 27 dbm (0.5 W) 36 dbm (4 W) 46 dbm (40 W) MS Tx power 17 dbm 17 dbm 27 dbm BS ant gain 6 dbi 17 dbi 17 dbi MS ant gain 0 dbi 0 dbi 3 dbi BS ant height 15 m 30 m In wireless channel, the transmitted signals will suffer the fading effect, which can change the original signals. The fading can be divided into three type: pathloss, shadow fading, and fast fading (multipath and doppler effect). In our simulation, we only consider the pathloss and shadow fading. The fast fading will be used in the future work. The pathloss model is used to present the signal strength decreases with increasing distance between transmitter and receiver. In Winner D5.4 document [22], it provides several pathloss models, such as Table 3-3. Because the cell radius is 1 km in our simulation and the signal transmission in 2~11 GHz is non-line of sight (NLOS), the C2 scenario is more suitable and we use it in our simulation. 34

47 Table 3-3 Pathloss Model Scenarios Scenario Path-loss [db] Shadow fading standard dev. Applicability range A1 LOS 18.7 log 10 (d[m])+46.8 σ = 3.1 db 3m < d < 100m A1 NLOS PL(d) = 36.8 log 10 (d[m])+38.8 σ = 3.5 db 3m < d < 100m B1 LOS 22.7 log 10 (d[m])+41.0 σ = 2.3 db 10m < d < 650m B1 NLOS d 1 [m]+65+ ( d 1 [m]) log 10 (d 2 [m]) σ = 3.1 db 10m < d 1 < 550m w/2 < d 2 < 450m C2 NLOS 35.0 log 10 (d[m])+31.5 σ = 8 db 50m < d < 5km D1 LOS PL(d) = 21.5 log 10 (d[m])+44.6 = 40.0 log 10 (d/d BP ) log 10 (d BP ) σ = 3.5 db σ = 6.0 db 30m < d < d BP d BP < d < 10km D1 NLOS PL(d) = 25.1 log 10 (d[m])+55.8 σ = 8.0 db 30m < d < 10km The main reason forms shadow fading is from the shelters, like buildings, or mountain, on the signal transmitted path. According to the test result of the real wireless environment, we can know the variant of shadow fading is a log-normal distribution statistically. So, we can use the log-normal distribution to produce the shadow fading effect. The standard deviation of this distribution is based on the simulation environment. In our simulation, we use 8 db for the standard deviation [22]. When the user is fixed, the shadow fading effect will not alter. On the other hand, the shadow fading changes with different locations at the mobile user. In the different simulation points, we can use the log-normal distribution to produce a value for the shadow fading, respectively. But this method has a problem, the time between two neighbor simulation points is very small so that the mobile user location will not change very obvious even at high mobile speed. It means the variance the shadow fading will not be large and have a correlated relationship between two neighbor time points. Hence, we use the concept of a correlation model, called Gudmundson s correlation model [23], in (3). 35

48 ρ x ln2 d ( x) e cor = (3),where ρ is the auto-correlation constant between two simulation sample points, Δx is the distance of two sample points and is a function of sampling times between them, sampling duration, and user speed. The d cor is de-correlation distance and the values in the suburban macro, urban macro, and urban micro environments are 200m, 50m, and 5m, respectively. In our simulation, we use 5m as our parameter. Using log-normal distribution and correlation model, the simulation can get more actual shadow fading. TxPow +TxAntGain -BackOff SINR TxEIRP Pathloss Shadow Fade RxAntGain RxPow + - Interferer EIRP Pathloss Shadow Fade RxAntGain Total Interference... AWGN (+ NoiseFig) Figure 3-5 Example of SINR computation In Figure 3-5, we present the flow of signal-to-interference and noise ratio (SINR) computation. The OFDMA technique uses the multiple carrier to transmit signal and we should compute carrier-to-interference and noise ratio (CINR), not SINR. But the MSs of system with PUSC or FUSC mode only compute and report the sum of received 36

49 CINR per carrier to BS, not individual CINR. Hence, the SINR and CINR are the same under these conditions. Finally, the mobility model we use is like below. The MS speed is 30 km/hr. Probability to change direction is 0.2 when position update. Max. angle for direction update is 45 o. 3.4 Basic Radio Resource Management The purpose of radio resource managements is to raise the efficiency and reliability of wireless transmission. In our performance analysis, we will use the basic radio resource management method as follow. Power Control: In e system, the power control is not a major method to maintain the transmitted quality and is more required for MSs. So, we assume the BS use maximum and fixed power to transmit signals. The power of per subcarrier is the same. Rate Control (AMC): The adaptive modulation and coding scheme is a major method to keep the quality of wireless transmission. The IEEE e standard supports a variety of modulation and coding scheme, which we introduce in In our simulation, we only get the link performances of BPSK, QPSK, 16-QAM, and 64-QAM modulation schemes, so we use these modulation schemes. In formal, the BPSK is not available in e OFDMA version, but we can use QPSK which repeats the data of BPSK once to transmit. The coding scheme is used to correct errors in the receiver and we use convolution code (CC) with 1/2 code rate. From and 3.2, we can get one slot using BPSK, QPSK, 16-QAM, and 64-QAM with CC 1/2 can carry 24, 48, 96, 144 bits, respectively. Channel assignment: The OFDMA frame structure has two dimensions, the slot with two OFDMA symbols and the subchannel, for channel assignment. In our simulation, we obey the definition of e standard that we introduce in The basic principles 37

50 are to segment the data after the modulation block into blocks sized to fit into one OFDMA slot, and map the slots in the subchannels with higher priority than that in the OFDMA symbols. In other words, the data mapping method is frequency first. Subcarrier permutation: In our platform, we use the distributed subcarrier permutation. If we use the permutation formula and series to implement the permutation, it is too complex and low efficient in simulation computation. So, we use the statistic method to simulate the permutation effect, like Figure 2-5. The interference of one slot produced by the other cells will be dispersed to all subframe. Scheduling method: The scheduling control is an important radio resource management. Many research has made about all kinds of scheduling methods. In our simulation, we choose some famous and suitable scheduling method for OFDMA techniques, such as round robin (RR), proportional fair (PF), max CINR (MC), fair throughput (FT), and early deadline first (EDF) [24][25][26][27]. The detail will be introduced as follow: Round Robin (RR): With respect to Round Robin scheduling, where users are cyclically scheduled irrespective of the channel condition. Proportional Fair (PF): The PF scheduler allocates the user m* who maximizes the ratio of achievable instantaneous data-rate over average received data-rate. The PF provide a good tradeoff between allocation fairness and system throughput by utilizing the multiuser diversity. The user in the OFDMA system is scheduled at frame n using following function (4): m * S s DRCm( n) s= 1 argm max{ } R ( n) = (4) m, where DRC s m (n) denoting the achievable instantaneous data-rate for user m at time n on subcarrier s, R m (n) denotes the moving average of data-rate at user m has received up to time n according to the following equation (5): 38

51 R 1 1 ' ( n) = (1 ) Rm ( n 1) + DRCm ( n 1) N N m (5) T, where N T denoting the length of moving average, which has been set to 750. Max CINR (MC): The MC scheduler allocates the user m* who has maximum received CINR. The MC provides a good multiuser diversity, but less fairness. The user in the OFDMA system is scheduled at frame n using following function (6): S * s m = argm max{ CINRm ( n)} (6) s= 1, where CINR s m (n) denoting the carrier-to-interference and noise ratio for user m at time n on subcarrier s. Fair Throughput (FT): The FT scheduler allocates the user m* who has minimum average received data-rate and it is a special case of PF. The FT provides a good fairness, but less multiuser diversity. The user is scheduled at frame n using following function (7): T m * = arg min{ R ( n)} (7) m m, where R m (n) denotes the moving average of data-rate at user m has received up to time n and is equal to equation (5). Early Deadline First (EDF): The EDF scheduler allocates the user m* who has minimum remainder time needs be transmitted. The EDF provides a guarantee of QoS for real time services. The user is scheduled at frame n using following function (8): m * = arg min{ DB Age } (8) m T t, where DB is delay bound, Age is the time that the user s packet has stayed in the MAC layer, and the T t is the required time to finish the transmission of the packet. Handoff method: In this thesis, handoff is not a weight-bearing point. So, we use the simplest method: hard handoff. This method is Break-Before-Make. 39

52 ARQ retransmission: In our simulation, we only implement the ARQ retransmission and don t use the HARQ. When the PDU is error, the ARQ retransmission will work. We don t limit the retransmission times. The PDU can be retransmitted at all times until it is correct. 3.5 Traffic Models In IEEE e standard, the data traffics are divided into five QoS classes, such as UGS, rtps, ertps, nrtps, and BE. The details are described in In general, UGS, rtps, and ertps are designed for real time services and the major differences among these classes are bandwidth request-and-grant on the uplink. The nrtps and BE are devised for non-real time services. In order to reduce the simulation time and computed loading, we reasonably use the HTTP services to stand for non-real time services and the VoIP services to represent real time services on the downlink based on the previous discuss. The HTTP traffic model adopts 3GPP model [28] as shown in Table 3-4. The VoIP traffic model uses G729-1 codec [29] as shown in Table 3-5. The HTTP services use TCP/IP protocol to transmit, so the HTTP Table 3-4 HTTP Traffic Model events distribution number Number of packet call requests per session Geometrically 5 Reading time between two consecutive packet call Geometrically 412 Number of packets in a packet call Geometrically 25 Time interval between two packets inside a packet call Geometrically 4/rate Packet size Pareto A=1.1 K=

53 packet needs to add 20 bytes TCP header and 20 bytes IP header. The VoIP services use RTP/UDP/IP protocol to transmit. The VoIP packet must add 12 bytes RTP header, 8 bytes UDP header, and 20 bytes IP header. Table 3-5 VoIP Traffic Model codec Framesize(byte) samples Interval(ms) Rate(bps) G k Finally, we use Table 3-6 to summarize this chapter and present the arrangement of the parameter setting in our simulation platform. Table 3-6 The Parameter Setting in Simulation Platform Parameters Cell layout Value/Comment Hexagonal grid, 19 cells (wrap around) Sectors per cell 3 Frequency reuse factor Available bandwidth 1x1 and 1x3 6 MHz in 1x1 reuse 18 MHz in 1x3 reuse Antenna pattern 70 with 20 db front-to-back ratio, according to [20] Cell radius Transmitter/Receiver Duplex 1 km Downlink (from BS to MSs) TDD mode DL/UL subframe ratio 1:1 Frame length 10ms, according to [1] 41

54 Frame structure 2048-FFT OFDMA downlink carrier allocations with PUSC, according to [1] OFDMA symbol length 308μs, according to [1] OFDMA symbols per slot 2 symbols BS Tx power 46dBm (40 Watt), according to [19] BS Antenna gain 17 dbi, according to [19] BS back off 5 db, according to [21] Thermal Noise Density db/hz, according to [21] MS Noise Figure 9dB, according to [21] MS Antenna gain 3 dbi, according to [19] Pathloss model 35.0log(d[m])+31.5, 50m<d<5km, according to [22] Shadow fading model Log-normal distribution with STD=8dB and Gudmundson s correlation model, according to [23] Mobility model BS Power contol MS speed : 30 km/hr Probability to change direction : 0.2 Max. angle for direction update : 45 o Max power AMC BPSK+CC 1/2, QPSK+CC 1/2, 16-QAM+CC 1/2, 64-QAM+CC 1/2, according to [2] Channel assignment Frequency first, according to [2] Scheduling control Handoff Round Robin (RR), Proportional Fair (PF) Max CINR (MC), Fair Throughput (FT), Early Deadline First (EDF) Hard handoff Traffic model HTTP and VoIP, according to [28][29] 42

55 Chapter 4 Simulation Results In this chapter, we will show the simulation results with different scheduling controls and frequency reuse factors. First, the performances of non-real time services are presented include slot usage, PHY layer throughput, MAC layer throughput, the CDF of user throughput, admission control criterion, scheduling delay and jitter, AMC usage, and spectrum efficiency. Second, the performances of real time services are demonstrated include packet loss rate and admission control criterion. Finally, the affect of mixed traffic will be addressed and discussed. 4.1 Non-Real Time Service In this section, we only use the users of non-real time services to simulate all kinds of performance targets Slot Usage per Frame A slot is the minimum unit for data transmission. We simulate the slot usage per frame with non-real time services at different active users as shown in Figure 4-1 and 4-2. Figure 4-1 and 4-2 use frequency reuse factor one and three, respectively. From these figures, we can find that frequency reuse factor 3 has lower slot usage at the same active users. The reason is the users at frequency reuse factor 3 own higher transmission rate and can use less slots to transmit the same data. But the slots will be full usage over 30 active users, no matter what frequency reuse factor is. 43

56 frequncy reuse factor = 1 slot usage per frame (%) RR PF MC FT NR active users Figure 4-1 Slot usage per frame in frequency reuse factor 1 frequncy reuse factor = 3 slot usage per frame (%) RR PF MC FT NR active users Figure 4-2 Slot usage per frame in frequency reuse factor 3 44

57 4.1.2 PHY Throughput per BS Figure 4-3 and 4-4 display the PHY throughput per BS with different scheduling controls and frequency reuse factors. The PHY throughput per BS means the data throughput transmits between physical layers include the header and ARQ retransmission of MAC PDUs. From these figure we can discover the order of the dimension of throughput is maximum CINR (MC), proportional fair (PF), round robin (RR), and then fair throughput (FT), no matter what frequency reuse factor is. Frequency reuse factor three has higher throughput because of lower interference. At frequency reuse factor one the PF has the range from 50% to 70% more than RR. The PF just has the range from 30% to 40% at frequency reuse factor three. So the scheduling controls which consider channel condition are more important at frequency reuse factor one. The throughput of frequency reuse factor three is 60% more than that of frequency reuse factor one with RR. But the throughput of frequency reuse factor three is only 35% more than that of frequency reuse factor one with PF. The PF with frequency reuse factor one and RR with reuse factor three can get the same throughput MAC Throughput per BS The MAC throughput per BS means the data throughput transmits between MAC layers except the header and ARQ retransmission of MAC PDUs. The PHY throughput per BS which subtracts the header and ARQ retransmission of MAC PDUs, called overheads, will become the MAC throughput per BS. Figure 4-5 and 4-6 show the MAC throughput per BS at frequency reuse factor one and three. From Figure 4-3 and 4-5, we can observe the overheads of PF and MC are 10% and those of RR and FT are 20% at frequency reuse factor one, respectively. Because PF and MC let the users with better channel conditions to transmit data, 45

58 frequency reuse factor = 1 PHY throughput (Mbps) RR PF MC FT NR active users Figure 4-3 PHY throughput of frequency reuse factor 1 per BS frequency reuse factor = 3 PHY throughput (Mbps) RR PF MC FT NR active users Figure 4-4 PHY throughput of frequency reuse factor 3 per BS 46

59 frequency reuse factor = 1 Mac throughput (Mbps) RR PF MC FT NR active users Figure 4-5 MAC throughput of frequency reuse factor 1 per BS frequency reuse factor = 3 Mac throughput (Mbps) RR PF MC FT NR active users Figure 4-6 MAC throughput of frequency reuse factor 3 per BS 47

60 the packet error rate is lower caused lower overheads for retransmissions. From Figure 4-4 and 4-6, the overheads of PF and MC are 7% and those of RR and FT are 9% at frequency reuse factor three, respectively. When frequency reuse factor three is adopted, the overheads can be roughly reduced half CDF of User Throughput Figure 4-7 and 4-8 address the CDF of user s PHY throughput with frequency reuse factor one and three at 30 active users. Regardless of frequency reuse factor one or three the trends of curves are identical. Although MC has maximum system throughput, the throughput per user has a large variation and the fairness of throughput for different users is disappointing. The fairness of throughput with FT is the best, but it has lowest system throughput. The throughput of users with PF has an identical trend of the curve and is always higher than that with RR. The channel condition and fairness can be looked after both sides with PF Admission Control Criterion for Non-Real Time Service In the d/e standard, the non-real time services have a QoS parameter which is the minimum data rate. Figure 4-9 and 4-10 present the minimum rate of users with frequency reuse factor one and three at different active users. If we assume the minimum data rate is 50 kbps, the minimum data rate at frequency reuse factor one will below 50kbps over 30, 60, 25, and 40 active users with RR, PF, MC, and FT, respectively and we should do admission control over these active users. The same situation at frequency reuse factor three is over 50, 90, 35, and 70 active users with RR, PF, MC, and FT. Therefore, the needs for admission control obey the order: MC, RR, FT, and then PF. 48

61 Figure 4-7 CDF of user s PHY throughput with frequency reuse factor 1 at 30 users Figure 4-8 CDF of user s PHY throughput with frequency reuse factor 3 at 30 users 49

Microsoft PowerPoint - Aqua-Sim.pptx

Microsoft PowerPoint - Aqua-Sim.pptx Peng Xie, Zhong Zhou, Zheng Peng, Hai Yan, Tiansi Hu, Jun-Hong Cui, Zhijie Shi, Yunsi Fei, Shengli Zhou Underwater Sensor Network Lab 1 Outline Motivations System Overview Aqua-Sim Components Experimental

More information

穨control.PDF

穨control.PDF TCP congestion control yhmiu Outline Congestion control algorithms Purpose of RFC2581 Purpose of RFC2582 TCP SS-DR 1998 TCP Extensions RFC1072 1988 SACK RFC2018 1996 FACK 1996 Rate-Halving 1997 OldTahoe

More information

MAN- Metropolitan Area Network Resilient Packet Ring a : 5GHz 54Mbps b : 2.4GHz 11Mbps c : MAC Bridge 802.1D 80

MAN- Metropolitan Area Network Resilient Packet Ring a : 5GHz 54Mbps b : 2.4GHz 11Mbps c : MAC Bridge 802.1D 80 IEEE 802.11a s0323516@ncnu.edu.tw 1 (WLAN) [1] 1963 IEEE Institute Of Electrical and Electronics Engineers LAN MAN-Metropolitan Area Network IEEE 802 IEEE 802 Working Group 802.11 IEEE 802 802.1 LAN MAN

More information

2

2 1 2 3 4 PHY (RAN1) LTE/LTE-A 6.3 Enhanced Downlink Multiple Antenna Transmission 6.3.1 CSI RS 6.4 Uplink Multiple Antenna Transmission 6.4.1 Transmission modes and Signalling requirements for SU-MIMO 6.5

More information

Master Thesis_專門用來製作目錄.doc

Master Thesis_專門用來製作目錄.doc Introduction All-IP [1-4] All-IP packet switching long delay time, jitter packet loss All-IP Budget-Based QoS End-to-End QoS (real time on demand) 1 1.1 Circuit Switching Packet Switching DWDM IP VoIP

More information

lan03_yen

lan03_yen IEEE 8. LLC Logical Link Control ll rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical,

More information

WTO

WTO 10384 200015128 UDC Exploration on Design of CIB s Human Resources System in the New Stage (MBA) 2004 2004 2 3 2004 3 2 0 0 4 2 WTO Abstract Abstract With the rapid development of the high and new technique

More information

untitled

untitled LBS Research and Application of Location Information Management Technology in LBS TP319 10290 UDC LBS Research and Application of Location Information Management Technology in LBS , LBS PDA LBS

More information

2/80 2

2/80 2 2/80 2 3/80 3 DSP2400 is a high performance Digital Signal Processor (DSP) designed and developed by author s laboratory. It is designed for multimedia and wireless application. To develop application

More information

Microsoft PowerPoint - talk8.ppt

Microsoft PowerPoint - talk8.ppt Adaptive Playout Scheduling Using Time-scale Modification Yi Liang, Nikolaus Färber Bernd Girod, Balaji Prabhakar Outline QoS concerns and tradeoffs Jitter adaptation as a playout scheduling scheme Packet

More information

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I

IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I 2004 5 IP TCP/IP PC OS µclinux MPEG4 Blackfin DSP MPEG4 IP UDP Winsock I/O DirectShow Filter DirectShow MPEG4 µclinux TCP/IP IP COM, DirectShow I Abstract The techniques of digital video processing, transferring

More information

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot

OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Prot OSI OSI OSI 15% 20% OSI OSI ISO International Standard Organization 1984 OSI Open-data System Interface Reference Model OSI OSI OSI OSI ISO Prototype Protocol OSI OSI OSI OSI OSI O S I 2-1 Application

More information

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673

Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1-1MRS755673 Olav Lundström MicroSCADA Pro Marketing & Sales 2005 ABB - 1 - Contents MicroSCADA Pro Portal Marketing and sales Ordering MicroSCADA Pro Partners Club 2005 ABB - 2 - MicroSCADA Pro - Portal Imagine that

More information

BC04 Module_antenna__ doc

BC04 Module_antenna__ doc http://www.infobluetooth.com TEL:+86-23-68798999 Fax: +86-23-68889515 Page 1 of 10 http://www.infobluetooth.com TEL:+86-23-68798999 Fax: +86-23-68889515 Page 2 of 10 http://www.infobluetooth.com TEL:+86-23-68798999

More information

LH_Series_Rev2014.pdf

LH_Series_Rev2014.pdf REMINDERS Product information in this catalog is as of October 2013. All of the contents specified herein are subject to change without notice due to technical improvements, etc. Therefore, please check

More information

國立中山大學學位論文典藏.PDF

國立中山大學學位論文典藏.PDF 國 立 中 山 大 學 企 業 管 理 學 系 碩 士 論 文 以 系 統 動 力 學 建 構 美 食 餐 廳 異 國 麵 坊 之 管 理 飛 行 模 擬 器 研 究 生 : 簡 蓮 因 撰 指 導 教 授 : 楊 碩 英 博 士 中 華 民 國 九 十 七 年 七 月 致 謝 詞 寫 作 論 文 的 過 程 是 一 段 充 滿 艱 辛 與 淚 水 感 動 與 窩 心 的 歷 程, 感 謝 這 一

More information

財金資訊-80期.indd

財金資訊-80期.indd IPv6 / LINE YouTube TCP/IP TCP (Transmission Control Protocol) IP (Internet Protocol) (node) (address) IPv4 168.95.1.1 IPv4 1981 RFC 791 --IP IPv4 32 2 32 42 IP (Internet Service Provider ISP) IP IP IPv4

More information

國家圖書館典藏電子全文

國家圖書館典藏電子全文 i ii Abstract The most important task in human resource management is to encourage and help employees to develop their potential so that they can fully contribute to the organization s goals. The main

More information

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx ENSC 427 Communication Networks Spring 2016 Group #2 Project URL: http://www.sfu.ca/~rkieu/ensc427_project.html Amer, Zargham 301149920 Kieu, Ritchie 301149668 Xiao, Lei 301133381 1 Roadmap Introduction

More information

HC50246_2009

HC50246_2009 Page: 1 of 7 Date: June 2, 2009 WINMATE COMMUNICATION INC. 9 F, NO. 111-6, SHING-DE RD., SAN-CHUNG CITY, TAIPEI, TAIWAN, R.O.C. The following merchandise was submitted and identified by the vendor as:

More information

10384 X2009230010 UDC The Design and Implementation of Small and Medium-sized Courier Company Logistics Vehicle Scheduling System 2012 06 Abstract With the arrival of the information age, tremendous

More information

y 1 = 槡 P 1 1h T 1 1f 1 s 1 + 槡 P 1 2g T 1 2 interference 2f 2 s y 2 = 槡 P 2 2h T 2 2f 2 s 2 + 槡 P 2 1g T 2 1 interference 1f 1 s + n n

y 1 = 槡 P 1 1h T 1 1f 1 s 1 + 槡 P 1 2g T 1 2 interference 2f 2 s y 2 = 槡 P 2 2h T 2 2f 2 s 2 + 槡 P 2 1g T 2 1 interference 1f 1 s + n n 37 1 Vol 37 No 1 2013 1 Journal of Jiangxi Normal UniversityNatural Science Jan 2013 1000-5862201301-0037-05 MISO 郭荣新, 袁继昌 361021 2 RVQ 2 MISO 3 TN 911 7 A 0 MIMO 2 MISO 3 MIMOnetwork MIMO 3GPP LTE-A 2

More information

Microsoft PowerPoint - TTCN-Introduction-v5.ppt

Microsoft PowerPoint - TTCN-Introduction-v5.ppt Conformance Testing and TTCN 工研院無線通訊技術部林牧台 / Morton Lin 03-5912360 mtlin@itri.org.tw 1 Outline Introduction and Terminology Conformance Testing Process 3GPP conformance testing and test cases A real world

More information

Microsoft PowerPoint - 数据通信-ch1.ppt

Microsoft PowerPoint - 数据通信-ch1.ppt 主 要 内 容 与 基 本 要 求 主 要 内 容 数 据 通 信 与 计 算 机 网 络 计 算 机 网 络 的 发 展 过 程 分 类 以 及 主 要 性 能 指 标 ; 分 组 交 换 的 基 本 原 理 及 其 与 电 路 交 换 报 文 交 换 的 联 系 与 区 别 ; 计 算 机 网 络 的 协 议 与 体 系 结 构 第 1 章 概 述 基 本 要 求 掌 握 分 组 交 换 电 路

More information

RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming Media, Transaction, Bulk dat

RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming Media, Transaction, Bulk dat Realtime Application QOS Monitoring (RAQMON) Dan Romascanu dromasca@avaya.com 1 RAQMON Context Setting MG PDA Applications RTP / FTP/ HTTP TCP/UDP S ignaling control plane (e.g. RS VP, NS IS) Streaming

More information

A Study on Grading and Sequencing of Senses of Grade-A Polysemous Adjectives in A Syllabus of Graded Vocabulary for Chinese Proficiency 2002 I II Abstract ublished in 1992, A Syllabus of Graded Vocabulary

More information

UDC Empirical Researches on Pricing of Corporate Bonds with Macro Factors 厦门大学博硕士论文摘要库

UDC Empirical Researches on Pricing of Corporate Bonds with Macro Factors 厦门大学博硕士论文摘要库 10384 15620071151397 UDC Empirical Researches on Pricing of Corporate Bonds with Macro Factors 2010 4 Duffee 1999 AAA Vasicek RMSE RMSE Abstract In order to investigate whether adding macro factors

More information

Public Projects A Thesis Submitted to Department of Construction Engineering National Kaohsiung First University of Science and Technology In Partial

Public Projects A Thesis Submitted to Department of Construction Engineering National Kaohsiung First University of Science and Technology In Partial Public Projects A Thesis Submitted to Department of Construction Engineering National Kaohsiung First University of Science and Technology In Partial Fulfillment of the Requirements For the Degree of Master

More information

[2] AMPS Advanced Mobile Phone Service FDMA Frequency Division Multiple Access GSM Global System for Mobile Communication CDMAOne (IS-95A) US-

[2] AMPS Advanced Mobile Phone Service FDMA Frequency Division Multiple Access GSM Global System for Mobile Communication CDMAOne (IS-95A) US- 2.1 2.1 [2] AMPS Advanced Mobile Phone Service FDMA Frequency Division Multiple Access GSM Global System for Mobile Communication CDMAOne (IS-95A) US-TDMA (IS-136) 2.5 GPRS General Packet Radio System

More information

Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower thresh

Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower thresh SWOT 5 Abstract Today, the structures of domestic bus industry have been changed greatly. Many manufacturers enter into the field because of its lower threshold. All of these lead to aggravate drastically

More information

Outline Speech Signals Processing Dual-Tone Multifrequency Signal Detection 云南大学滇池学院课程 : 数字信号处理 Applications of Digital Signal Processing 2

Outline Speech Signals Processing Dual-Tone Multifrequency Signal Detection 云南大学滇池学院课程 : 数字信号处理 Applications of Digital Signal Processing 2 CHAPTER 10 Applications of Digital Signal Processing Wang Weilian wlwang@ynu.edu.cn School of Information Science and Technology Yunnan University Outline Speech Signals Processing Dual-Tone Multifrequency

More information

XML SOAP DOM B2B B/S B2B B2B XML SOAP

XML SOAP DOM B2B B/S B2B B2B XML SOAP 10384 9831010 U D C B2B 2 0 0 1 4 2 0 0 1 5 2 0 0 1 2001 4 XML SOAP DOM B2B B/S B2B B2B XML SOAP ABSTRACT Based on the research of Supply Chain Management theory and E-Commerce theory, especially in Business

More information

Construction of Chinese pediatric standard database A Dissertation Submitted for the Master s Degree Candidate:linan Adviser:Prof. Han Xinmin Nanjing

Construction of Chinese pediatric standard database A Dissertation Submitted for the Master s Degree Candidate:linan Adviser:Prof. Han Xinmin Nanjing 密 级 : 公 开 学 号 :20081209 硕 士 学 位 论 文 中 医 儿 科 标 准 数 据 库 建 设 研 究 研 究 生 李 楠 指 导 教 师 学 科 专 业 所 在 学 院 毕 业 时 间 韩 新 民 教 授 中 医 儿 科 学 第 一 临 床 医 学 院 2011 年 06 月 Construction of Chinese pediatric standard database

More information

Time Estimation of Occurrence of Diabetes-Related Cardiovascular Complications by Ching-Yuan Hu A thesis submitted in partial fulfillment of the requi

Time Estimation of Occurrence of Diabetes-Related Cardiovascular Complications by Ching-Yuan Hu A thesis submitted in partial fulfillment of the requi Time Estimation of Occurrence of Diabetes-Related Cardiovascular Complications by Ching-Yuan Hu Master of Science 2011 Institute of Chinese Medical Sciences University of Macau Time Estimation of Occurrence

More information

國立中山大學學位論文典藏.PDF

國立中山大學學位論文典藏.PDF The Study on the New Pension Scheme for Civil Servants Evidence from Kaohsiung County I II 1. III Thesis Abstract Title of Thesis The Study on the New Pension Scheme for Civil Servants: Evidence from Kaohsiung

More information

天 主 教 輔 仁 大 學 社 會 學 系 學 士 論 文 小 別 勝 新 婚? 久 別 要 離 婚? 影 響 遠 距 家 庭 婚 姻 感 情 因 素 之 探 討 Separate marital relations are getting better or getting worse? -Exp

天 主 教 輔 仁 大 學 社 會 學 系 學 士 論 文 小 別 勝 新 婚? 久 別 要 離 婚? 影 響 遠 距 家 庭 婚 姻 感 情 因 素 之 探 討 Separate marital relations are getting better or getting worse? -Exp 天 主 教 輔 仁 大 學 社 會 學 系 學 士 論 文 小 別 勝 新 婚? 久 別 要 離 婚? 影 響 遠 距 家 庭 婚 姻 感 情 因 素 之 探 討 Separate marital relations are getting better or getting worse? -Explore the impact of emotional factors couples do not

More information

...1 What?...2 Why?...3 How? ( ) IEEE / 23

...1 What?...2 Why?...3 How? ( ) IEEE / 23 .... IEEE 1588 2010 7 8 ( ) IEEE 1588 2010 7 8 1 / 23 ...1 What?...2 Why?...3 How? ( ) IEEE 1588 2010 7 8 2 / 23 ...1 What?...2 Why?...3 How? ( ) IEEE 1588 2010 7 8 3 / 23 IEEE 1588 ( ) IEEE 1588 2010

More information

IP505SM_manual_cn.doc

IP505SM_manual_cn.doc IP505SM 1 Introduction 1...4...4...4...5 LAN...5...5...6...6...7 LED...7...7 2...9...9...9 3...11...11...12...12...12...14...18 LAN...19 DHCP...20...21 4 PC...22...22 Windows...22 TCP/IP -...22 TCP/IP

More information

输电线路智能监测系统通信技术应用研究

输电线路智能监测系统通信技术应用研究 Smart Grid 智 能 电 网, 2014, 4, 11-15 http://dx.doi.org/10.12677/sg.2014.41003 Published Online February 2014 (http://www.hanspub.org/journal/sg.html) Application Research of Communication Technology for

More information

Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies to all d

Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies to all d WeChat Search Visual Identity Guidelines WEDESIGN 2018. 04 Preface This guide is intended to standardize the use of the WeChat brand and ensure the brand's integrity and consistency. The guide applies

More information

Thesis for the Master degree in Engineering Research on Negative Pressure Wave Simulation and Signal Processing of Fluid-Conveying Pipeline Leak Candi

Thesis for the Master degree in Engineering Research on Negative Pressure Wave Simulation and Signal Processing of Fluid-Conveying Pipeline Leak Candi U17 10220 UDC624 Thesis for the Master degree in Engineering Research on Negative Pressure Wave Simulation and Signal Processing of Fluid-Conveying Pipeline Leak Candidate:Chen Hao Tutor: Xue Jinghong

More information

中文朗科AirTrackTM T600 迷你无线路由器用户手册.doc

中文朗科AirTrackTM T600 迷你无线路由器用户手册.doc AirTrack T600 http://www.netac.com.cn Netac Netac AirTrack OnlyDisk Netac Netac Netac http://www.netac.com.cn Netac 800-830-3662 FCC 15 B 1 2 3 4 / FCC 20cm 1 2 3 / / ...1 1.1...1 1.2...1 1.3...1 1.4...3...4

More information

HC20131_2010

HC20131_2010 Page: 1 of 8 Date: April 14, 2010 WINMATE COMMUNICATION INC. 9 F, NO. 111-6, SHING-DE RD., SAN-CHUNG CITY, TAIPEI, TAIWAN, R.O.C. The following merchandise was submitted and identified by the vendor as:

More information

Microsoft PowerPoint - ch2-stallings.ppt

Microsoft PowerPoint - ch2-stallings.ppt Transmission Fundamentals Chapter 2 (Stallings Book) 1 Electromagnetic Signal is a function of time can also be expressed as a function of frequency Signal consists of components of different frequencies

More information

THE APPLICATION OF ISOTOPE RATIO ANALYSIS BY INDUCTIVELY COUPLED PLASMA MASS SPECTROMETER A Dissertation Presented By Chaoyong YANG Supervisor: Prof.D

THE APPLICATION OF ISOTOPE RATIO ANALYSIS BY INDUCTIVELY COUPLED PLASMA MASS SPECTROMETER A Dissertation Presented By Chaoyong YANG Supervisor: Prof.D 10384 070302 9825042 UDC 2001.6. 2001.7. 20016 THE APPLICATION OF ISOTOPE RATIO ANALYSIS BY INDUCTIVELY COUPLED PLASMA MASS SPECTROMETER A Dissertation Presented By Chaoyong YANG Supervisor: Prof.Dr. Xiaoru

More information

Microsoft PowerPoint - STU_EC_Ch08.ppt

Microsoft PowerPoint - STU_EC_Ch08.ppt 樹德科技大學資訊工程系 Chapter 8: Counters Shi-Huang Chen Fall 2010 1 Outline Asynchronous Counter Operation Synchronous Counter Operation Up/Down Synchronous Counters Design of Synchronous Counters Cascaded Counters

More information

Abstract After over ten years development, Chinese securities market has experienced from nothing to something, from small to large and the course of

Abstract After over ten years development, Chinese securities market has experienced from nothing to something, from small to large and the course of 2003 MBA 600795 SWOT Abstract After over ten years development, Chinese securities market has experienced from nothing to something, from small to large and the course of being standardized. To all securities

More information

<4D6963726F736F667420506F776572506F696E74202D20C8EDBCFEBCDCB9B9CAA6D1D0D0DEBDB2D7F92E707074>

<4D6963726F736F667420506F776572506F696E74202D20C8EDBCFEBCDCB9B9CAA6D1D0D0DEBDB2D7F92E707074> 软 件 架 构 师 研 修 讲 座 胡 协 刚 软 件 架 构 师 UML/RUP 专 家 szjinco@public.szptt.net.cn 中 国 软 件 架 构 师 网 东 软 培 训 中 心 小 故 事 : 七 人 分 粥 当 前 软 件 团 队 的 开 发 现 状 和 面 临 的 问 题 软 件 项 目 的 特 点 解 决 之 道 : 从 瀑 布 模 型 到 迭 代 模 型 解 决 项

More information

南華大學數位論文

南華大學數位論文 南華大學 碩士論文 中華民國九十五年六月十四日 Elfin Excel I II III ABSTRACT Since Ming Hwa Yuan Taiwanese Opera Company started to cooperate with the Chinese orchestra, the problem of how the participation of Chinese music

More information

(baking powder) 1 ( ) ( ) 1 10g g (two level design, D-optimal) 32 1/2 fraction Two Level Fractional Factorial Design D-Optimal D

(baking powder) 1 ( ) ( ) 1 10g g (two level design, D-optimal) 32 1/2 fraction Two Level Fractional Factorial Design D-Optimal D ( ) 4 1 1 1 145 1 110 1 (baking powder) 1 ( ) ( ) 1 10g 1 1 2.5g 1 1 1 1 60 10 (two level design, D-optimal) 32 1/2 fraction Two Level Fractional Factorial Design D-Optimal Design 1. 60 120 2. 3. 40 10

More information

苗 栗 三 山 國 王 信 仰 及 其 地 方 社 會 意 涵 The Influences and Implications of Local Societies to Three Mountain Kings Belief, in Taiwan Miaoli 研 究 生 : 林 永 恩 指 導

苗 栗 三 山 國 王 信 仰 及 其 地 方 社 會 意 涵 The Influences and Implications of Local Societies to Three Mountain Kings Belief, in Taiwan Miaoli 研 究 生 : 林 永 恩 指 導 國 立 交 通 大 學 客 家 文 化 學 院 客 家 社 會 與 文 化 學 程 碩 士 論 文 苗 栗 三 山 國 王 信 仰 及 其 地 方 社 會 意 涵 The Influences and Implications of Local Societies to Three Mountain Kings Belief, in Taiwan Miaoli 研 究 生 : 林 永 恩 指 導 教

More information

Shanghai International Studies University THE STUDY AND PRACTICE OF SITUATIONAL LANGUAGE TEACHING OF ADVERB AT BEGINNING AND INTERMEDIATE LEVEL A Thes

Shanghai International Studies University THE STUDY AND PRACTICE OF SITUATIONAL LANGUAGE TEACHING OF ADVERB AT BEGINNING AND INTERMEDIATE LEVEL A Thes 上 海 外 国 语 大 学 硕 士 学 位 论 文 对 外 汉 语 初 中 级 副 词 情 境 教 学 研 究 与 实 践 院 系 : 国 际 文 化 交 流 学 院 学 科 专 业 : 汉 语 国 际 教 育 姓 名 : 顾 妍 指 导 教 师 : 缪 俊 2016 年 5 月 Shanghai International Studies University THE STUDY AND PRACTICE

More information

<4D6963726F736F667420506F776572506F696E74202D20B5DAD2BBD5C228B4F2D3A1B0E6292E707074205BBCE6C8DDC4A3CABD5D>

<4D6963726F736F667420506F776572506F696E74202D20B5DAD2BBD5C228B4F2D3A1B0E6292E707074205BBCE6C8DDC4A3CABD5D> Homeworks ( 第 三 版 ):.4 (,, 3).5 (, 3).6. (, 3, 5). (, 4).4.6.7 (,3).9 (, 3, 5) Chapter. Number systems and codes 第 一 章. 数 制 与 编 码 . Overview 概 述 Information is of digital forms in a digital system, and

More information

東莞工商總會劉百樂中學

東莞工商總會劉百樂中學 /2015/ 頁 (2015 年 版 ) 目 錄 : 中 文 1 English Language 2-3 數 學 4-5 通 識 教 育 6 物 理 7 化 學 8 生 物 9 組 合 科 學 ( 化 學 ) 10 組 合 科 學 ( 生 物 ) 11 企 業 會 計 及 財 務 概 論 12 中 國 歷 史 13 歷 史 14 地 理 15 經 濟 16 資 訊 及 通 訊 科 技 17 視 覺

More information

國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 表 11 國 立 政 治 大 學 教 育 學 系 博 士 班 資 格 考 試 抵 免 申 請 表... 46 論 文 題 目 申 報 暨 指 導 教 授... 47 表 12 國 立 政 治 大 學 碩 博 士 班 論

國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 表 11 國 立 政 治 大 學 教 育 學 系 博 士 班 資 格 考 試 抵 免 申 請 表... 46 論 文 題 目 申 報 暨 指 導 教 授... 47 表 12 國 立 政 治 大 學 碩 博 士 班 論 國 立 政 治 大 學 教 育 學 系 2016 新 生 入 學 手 冊 目 錄 一 教 育 學 系 簡 介... 1 ( 一 ) 成 立 時 間... 1 ( 二 ) 教 育 目 標 與 發 展 方 向... 1 ( 三 ) 授 課 師 資... 2 ( 四 ) 行 政 人 員... 3 ( 五 ) 核 心 能 力 與 課 程 規 劃... 3 ( 六 ) 空 間 環 境... 12 ( 七 )

More information

WLAN 2

WLAN 2 1 WLAN 2 IEEE 802.11 HomeRF GSM/ GPRS CDMA 3 ( ) (Infrared) (Laser) (Microwave) (DSSS) (FHSS) (HomeRF) (Bluetooth) 4 ( ) IrDA (Direct-Beam IR, DB/ IR) (Diffuse IR, DF/ IR) (Ominidirectional IR, Omini/

More information

A dissertation for Master s degree Metro Indoor Coverage Systems Analysis And Design Author s Name: Sheng Hailiang speciality: Supervisor:Prof.Li Hui,

A dissertation for Master s degree Metro Indoor Coverage Systems Analysis And Design Author s Name: Sheng Hailiang speciality: Supervisor:Prof.Li Hui, 中 国 科 学 技 术 大 学 工 程 硕 士 学 位 论 文 地 铁 内 移 动 通 信 室 内 覆 盖 分 析 及 应 用 作 者 姓 名 : 学 科 专 业 : 盛 海 亮 电 子 与 通 信 导 师 姓 名 : 李 辉 副 教 授 赵 红 媛 高 工 完 成 时 间 : 二 八 年 三 月 十 日 University of Science and Technology of Ch A dissertation

More information

UDC 厦门大学博硕士论文摘要库

UDC 厦门大学博硕士论文摘要库 10384 9924012 UDC 2002 5 2002 2002 2002 5 1 Study on High Speed Switch System and Their ASIC Frontend Design Thesis for MS By Shuicheng Cai Supervisor: Prof. Donghui Guo Department of Physics Xiamen Unviersity

More information

IEC 传输帧格式

IEC 传输帧格式 IEC 60870-5-1 GB GB/T XXXXX XXXX idt IEC 60870-5-1:1990 Telecontrol Equipment and Systems Part 5:Transmission Protocol Section 1: Transmission frame formats ( ) 1998.6.28 2000.2.10 2000.5.7 200x-xx-xx

More information

99年度提案審查

99年度提案審查 1/21 2 97 98 99 00 01 02 03 04 05 06 07 3 年度 年 類 例 年 行 量 年 行 量 4 Source NCC 5 行 WAP, GPRS, PHS, 3G (Source: NCC) 6 Source: Allot Mobile Trends 7 ARPU from $48 to $24 by 2011 HSPA Modules from $70 to $35

More information

東吳大學

東吳大學 律 律 論 論 療 行 The Study on Medical Practice and Coercion 林 年 律 律 論 論 療 行 The Study on Medical Practice and Coercion 林 年 i 讀 臨 療 留 館 讀 臨 律 六 礪 讀 不 冷 療 臨 年 裡 歷 練 禮 更 老 林 了 更 臨 不 吝 麗 老 劉 老 論 諸 見 了 年 金 歷 了 年

More information

PowerPoint Presentation

PowerPoint Presentation Decision analysis 量化決策分析方法專論 2011/5/26 1 Problem formulation- states of nature In the decision analysis, decision alternatives are referred to as chance events. The possible outcomes for a chance event

More information

Value Chain ~ (E-Business RD / Pre-Sales / Consultant) APS, Advanc

Value Chain ~ (E-Business RD / Pre-Sales / Consultant) APS, Advanc Key @ Value Chain fanchihmin@yahoo.com.tw 1 Key@ValueChain 1994.6 1996.6 2000.6 2000.10 ~ 2004.10 (E- RD / Pre-Sales / Consultant) APS, Advanced Planning & Scheduling CDP, Collaborative Demand Planning

More information

出國報告電子檔規格

出國報告電子檔規格 會 議 報 告 ( 會 議 類 別 : 其 他 ) 3GPP RAN #69 Meeting 會 議 報 告 出 席 人 員 : 陳 瓊 璋 / 陳 弘 仁 派 赴 地 區 : 美 國 / 鳳 凰 城 會 議 期 間 :104 年 9 月 14 日 至 9 月 18 日 報 告 日 期 :104 年 10 月 15 日 1 摘 要 本 次 3GPP RAN #69 會 議 於 9 月 在 美 國 的

More information

UDC Hainan Airlines Investment Valuation Analysis (MBA) 厦门大学博硕士论文摘要库

UDC Hainan Airlines Investment Valuation Analysis (MBA) 厦门大学博硕士论文摘要库 10384 200015140 UDC Hainan Airlines Investment Valuation Analysis (MBA) 2003 3 2003 3 2003 9 2 0 0 3 3 1993 A B 8 1000 100 2002 10 11 501 473 560 85% 1999 2001 SWOT EBO Abstract Hainan Airlines, as the

More information

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl

Improved Preimage Attacks on AES-like Hash Functions: Applications to Whirlpool and Grøstl SKLOIS (Pseudo) Preimage Attack on Reduced-Round Grøstl Hash Function and Others Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou March 20, 2012 Institute. of Software, Chinese Academy

More information

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库

UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 厦门大学博硕士论文摘要库 10384 200128011 UDC The Design and Implementation of a Specialized Search Engine Based on Robot Technology 2004 5 2004 2004 2004 5 World Wide Web Robot Web / (Focused Crawling) Web Meta data Web Web I

More information

601988 2010 040 113001 2010 8 26 2010 8 12 2010 8 26 15 15 2010 15 0 0 15 0 0 6035 20022007 20012002 19992001 200720081974 1999 2010 20082008 2000 197

601988 2010 040 113001 2010 8 26 2010 8 12 2010 8 26 15 15 2010 15 0 0 15 0 0 6035 20022007 20012002 19992001 200720081974 1999 2010 20082008 2000 197 BANK OF CHINA LIMITED 3988 2010 8 26 ** ** *** # Alberto TOGNI # # # * # 1 601988 2010 040 113001 2010 8 26 2010 8 12 2010 8 26 15 15 2010 15 0 0 15 0 0 6035 20022007 20012002 19992001 200720081974 1999

More information

Microsoft Word - 上傳電子檔.doc

Microsoft Word - 上傳電子檔.doc 創 新 設 計 研 究 所 碩 士 學 位 論 文 臺 北 聯 營 公 車 站 立 輔 助 設 備 最 適 設 置 高 度 研 究 In Search of the Appropriate Height for the Standing Support Equipments on the City Bus at Taipei 研 究 生 : 賴 振 永 指 導 教 授 : 黃 啟 梧 中 華 民 國

More information

Microsoft PowerPoint _代工實例-1

Microsoft PowerPoint _代工實例-1 4302 動態光散射儀 (Dynamic Light Scattering) 代工實例與結果解析 生醫暨非破壞性分析團隊 2016.10 updated Which Size to Measure? Diameter Many techniques make the useful and convenient assumption that every particle is a sphere. The

More information

世新稿件end.doc

世新稿件end.doc Research Center For Taiwan Economic Development (RCTED) 2003 8 1 2 Study of Operational Strategies on Biotechnology Pharmaceutical Products Industry in Taiwan -- Case Study on Sinphar Pharmaceutical Company

More information

東方設計學院文化創意設計研究所

東方設計學院文化創意設計研究所 東 方 設 計 學 院 文 化 創 意 設 計 研 究 所 碩 士 學 位 論 文 應 用 德 爾 菲 法 建 立 社 區 業 餘 油 畫 課 程 之 探 討 - 以 高 雄 市 湖 內 區 為 例 指 導 教 授 : 薛 淞 林 教 授 研 究 生 : 賴 秀 紅 中 華 民 國 一 o 四 年 一 月 東 方 設 計 學 院 文 化 創 意 設 計 研 究 所 碩 士 學 位 論 文 Graduate

More information

10384 200115009 UDC Management Buy-outs MBO MBO MBO 2002 MBO MBO MBO MBO 000527 MBO MBO MBO MBO MBO MBO MBO MBO MBO MBO MBO Q MBO MBO MBO Abstract Its related empirical study demonstrates a remarkable

More information

University of Science and Technology of China A dissertation for master s degree Research of e-learning style for public servants under the context of

University of Science and Technology of China A dissertation for master s degree Research of e-learning style for public servants under the context of 中 国 科 学 技 术 大 学 硕 士 学 位 论 文 新 媒 体 环 境 下 公 务 员 在 线 培 训 模 式 研 究 作 者 姓 名 : 学 科 专 业 : 导 师 姓 名 : 完 成 时 间 : 潘 琳 数 字 媒 体 周 荣 庭 教 授 二 一 二 年 五 月 University of Science and Technology of China A dissertation for

More information

A VALIDATION STUDY OF THE ACHIEVEMENT TEST OF TEACHING CHINESE AS THE SECOND LANGUAGE by Chen Wei A Thesis Submitted to the Graduate School and Colleg

A VALIDATION STUDY OF THE ACHIEVEMENT TEST OF TEACHING CHINESE AS THE SECOND LANGUAGE by Chen Wei A Thesis Submitted to the Graduate School and Colleg 上 海 外 国 语 大 学 SHANGHAI INTERNATIONAL STUDIES UNIVERSITY 硕 士 学 位 论 文 MASTER DISSERTATION 学 院 国 际 文 化 交 流 学 院 专 业 汉 语 国 际 教 育 硕 士 题 目 届 别 2010 届 学 生 陈 炜 导 师 张 艳 莉 副 教 授 日 期 2010 年 4 月 A VALIDATION STUDY

More information

10384 19020101152519 UDC Rayleigh Quasi-Rayleigh Method for computing eigenvalues of symmetric tensors 2 0 1 3 2 0 1 3 2 0 1 3 2013 , 1. 2. [4], [27].,. [6] E- ; [7], Z-. [15]. Ramara G. kolda [1, 2],

More information

Microsoft PowerPoint - ryz_030708_pwo.ppt

Microsoft PowerPoint - ryz_030708_pwo.ppt Long Term Recovery of Seven PWO Crystals Ren-yuan Zhu California Institute of Technology CMS ECAL Week, CERN Introduction 20 endcap and 5 barrel PWO crystals went through (1) thermal annealing at 200 o

More information

声 明 本 人 郑 重 声 明 : 此 处 所 提 交 的 硕 士 学 位 论 文 基 于 等 级 工 鉴 定 的 远 程 考 试 系 统 客 户 端 开 发 与 实 现, 是 本 人 在 中 国 科 学 技 术 大 学 攻 读 硕 士 学 位 期 间, 在 导 师 指 导 下 进 行 的 研 究

声 明 本 人 郑 重 声 明 : 此 处 所 提 交 的 硕 士 学 位 论 文 基 于 等 级 工 鉴 定 的 远 程 考 试 系 统 客 户 端 开 发 与 实 现, 是 本 人 在 中 国 科 学 技 术 大 学 攻 读 硕 士 学 位 期 间, 在 导 师 指 导 下 进 行 的 研 究 中 国 科 学 技 术 大 学 硕 士 学 位 论 文 题 目 : 农 村 电 工 岗 位 培 训 考 核 与 鉴 定 ( 理 论 部 分 ) 的 计 算 机 远 程 考 试 系 统 ( 服 务 器 端 ) 的 开 发 与 实 现 英 文 题 目 :The Realization of Authenticating Examination System With Computer & Web for

More information

EE Lecture 11 (Wireless Communications Systems)

EE Lecture 11 (Wireless Communications Systems) EE110300 Lecture 11 (Wireless Communications Systems) Contents ( ) (RF) (Antenna) m(t) m(t) 90 50 40 30 20 10 0 ( ) 10 300 330 0 30 60 270 90 240 210 180 150 120 (LAN) (VSAT ) (Pager) (Cellular Phone)

More information

<4D6963726F736F667420576F7264202D2032303130C4EAC0EDB9A4C0E04142BCB6D4C4B6C1C5D0B6CFC0FDCCE2BEABD1A15F325F2E646F63>

<4D6963726F736F667420576F7264202D2032303130C4EAC0EDB9A4C0E04142BCB6D4C4B6C1C5D0B6CFC0FDCCE2BEABD1A15F325F2E646F63> 2010 年 理 工 类 AB 级 阅 读 判 断 例 题 精 选 (2) Computer mouse How does the mouse work? We have to start at the bottom, so think upside down for now. It all starts with mouse ball. As the mouse ball in the bottom

More information

Microsoft Word - 01李惠玲ok.doc

Microsoft Word - 01李惠玲ok.doc 康 寧 學 報 11:1-20(2009) 1 數 位 學 習 於 護 理 技 術 課 程 之 運 用 與 評 值 * 李 惠 玲 ** 高 清 華 *** 呂 莉 婷 摘 要 背 景 : 網 路 科 技 在 教 育 的 使 用 已 成 為 一 種 有 利 的 教 學 輔 助 工 具 網 路 教 學 的 特 性, 在 使 學 習 可 不 分 時 間 與 空 間 不 同 進 度 把 握 即 時 性 資

More information

Abstract Since 1980 s, the Coca-Cola came into China and developed rapidly. From 1985 to now, the numbers of bottlers has increased from 3 to 23, and

Abstract Since 1980 s, the Coca-Cola came into China and developed rapidly. From 1985 to now, the numbers of bottlers has increased from 3 to 23, and Abstract Since 1980 s, the Coca-Cola came into China and developed rapidly. From 1985 to now, the numbers of bottlers has increased from 3 to 23, and increases ulteriorly. When the Coca-Cola company came

More information

The Development of Color Constancy and Calibration System

The Development of Color Constancy and Calibration System The Development of Color Constancy and Calibration System The Development of Color Constancy and Calibration System LabVIEW CCD BMP ii Abstract The modern technologies develop more and more faster, and

More information

K301Q-D VRT中英文说明书141009

K301Q-D VRT中英文说明书141009 THE INSTALLING INSTRUCTION FOR CONCEALED TANK Important instuction:.. Please confirm the structure and shape before installing the toilet bowl. Meanwhile measure the exact size H between outfall and infall

More information

untitled

untitled 20 90 1998 2001 1 Abstract Under the environment of drastic competitive market, risk and uncertainty that the enterprise faces are greater and greater, the profit ability of enterprise assets rises and

More information

UDC The Policy Risk and Prevention in Chinese Securities Market

UDC The Policy Risk and Prevention in Chinese Securities Market 10384 200106013 UDC The Policy Risk and Prevention in Chinese Securities Market 2004 5 2004 2004 2004 5 : Abstract Many scholars have discussed the question about the influence of the policy on Chinese

More information

Microsoft PowerPoint - ATF2015.ppt [相容模式]

Microsoft PowerPoint - ATF2015.ppt [相容模式] Improving the Video Totalized Method of Stopwatch Calibration Samuel C.K. Ko, Aaron Y.K. Yan and Henry C.K. Ma The Government of Hong Kong Special Administrative Region (SCL) 31 Oct 2015 1 Contents Introduction

More information

Important Notice SUNPLUS TECHNOLOGY CO. reserves the right to change this documentation without prior notice. Information provided by SUNPLUS TECHNOLO

Important Notice SUNPLUS TECHNOLOGY CO. reserves the right to change this documentation without prior notice. Information provided by SUNPLUS TECHNOLO Car DVD New GUI IR Flow User Manual V0.1 Jan 25, 2008 19, Innovation First Road Science Park Hsin-Chu Taiwan 300 R.O.C. Tel: 886-3-578-6005 Fax: 886-3-578-4418 Web: www.sunplus.com Important Notice SUNPLUS

More information

國立中山大學學位論文典藏.PDF

國立中山大學學位論文典藏.PDF I II III The Study of Factors to the Failure or Success of Applying to Holding International Sport Games Abstract For years, holding international sport games has been Taiwan s goal and we are on the way

More information

國 立 新 竹 教 育 大 學 音 樂 學 系 音 樂 教 學 碩 士 班 學 位 論 文 新 瓦 屋 客 家 花 鼓 之 研 究 A Research on Hsin-Wa-Wu Hakka Flower-Drum 研 究 生 : 陳 怡 妃 指 導 教 授 : 明 立 國 中 華 民 國 九 十 八 年 三 月 本 論 文 獲 行 政 院 文 化 建 設 委 員 會 文 化 資 產 總 管 理

More information

1990-1997 1980-1997 Abstract The relationship between human resource development and economy increase has been an important research item with the coming of knowledge economy. In this paper, ahead item

More information

PS PS GMM SM.zte.com.

PS PS GMM SM.zte.com. WBUB-010-1 ZXWN PS V0411.zte.com. PS PS GMM SM.zte.com. PS TMSI Packet-Temporary mobile subscriber identification number P-TMSI) GPRS MS P- TMSI 4 BCD 3G TS 23.003 MSC SGSN SGSN P-TMSI 11 MSC TMSI 00 01

More information

学 校 编 码 :10384 分 类 号 密 级 学 号 :X2007155130 UDC 厦 门 怡 福 养 生 健 康 管 理 有 限 公 司 创 业 计 划 王 韬 指 导 教 师 姓 名 : 郭 霖 教 授 厦 门 大 学 硕 士 学 位 论 文 厦 门 怡 福 养 生 健 康 管 理 有 限 公 司 创 业 计 划 A Business Plan for Xiamen Eve Health

More information

AL-M200 Series

AL-M200 Series NPD4754-00 TC ( ) Windows 7 1. [Start ( )] [Control Panel ()] [Network and Internet ( )] 2. [Network and Sharing Center ( )] 3. [Change adapter settings ( )] 4. 3 Windows XP 1. [Start ( )] [Control Panel

More information

ABSTRACT ABSTRACT Based on analyzing public corporation in foreign countries, this paper studies basic theories of public legal establishment, with our country s reality in the social transferring period

More information

(Pattern Recognition) 1 1. CCD

(Pattern Recognition) 1 1. CCD ********************************* ********************************* (Pattern Recognition) 1 1. CCD 2. 3. 4. 1 ABSTRACT KeywordsMachine Vision, Real Time Inspection, Image Processing The purpose of this

More information

沒有投影片標題

沒有投影片標題 EE110300 Lecture 11 (Wireless Communications Systems) Dr. Tsai Contents Dr. Tsai 2 Dr. Tsai ( ) (RF) (Antenna) m(t) m(t) Dr. Tsai 4 90 50 40 30 20 10 0 ( ) 10 Dr. Tsai 5 300 330 0 30 60 270 90 240 210

More information

http / /yxxy. cbpt. cnki. net / % % %

http / /yxxy. cbpt. cnki. net / % % % 2017 3 Mar. 2017 5 2 Chongqing Higher Education Research Vol. 5 No. 2 DOI 10. 15998 /j. cnki. issn1673-8012. 2017. 02. 006 230039 2011 2015 2016 G649. 21 A 1673-8012 2017 02-0037-11 2017-01-03 2015zdjy024

More information

2015年4月11日雅思阅读预测机经(新东方版)

2015年4月11日雅思阅读预测机经(新东方版) 剑 桥 雅 思 10 第 一 时 间 解 析 阅 读 部 分 1 剑 桥 雅 思 10 整 体 内 容 统 计 2 剑 桥 雅 思 10 话 题 类 型 从 以 上 统 计 可 以 看 出, 雅 思 阅 读 的 考 试 话 题 一 直 广 泛 多 样 而 题 型 则 稳 中 有 变 以 剑 桥 10 的 test 4 为 例 出 现 的 三 篇 文 章 分 别 是 自 然 类, 心 理 研 究 类,

More information

ch_code_infoaccess

ch_code_infoaccess 地 產 代 理 監 管 局 公 開 資 料 守 則 2014 年 5 月 目 錄 引 言 第 1 部 段 數 適 用 範 圍 1.1-1.2 監 管 局 部 門 1.1 紀 律 研 訊 1.2 提 供 資 料 1.3-1.6 按 慣 例 公 布 或 供 查 閱 的 資 料 1.3-1.4 應 要 求 提 供 的 資 料 1.5 法 定 義 務 及 限 制 1.6 程 序 1.7-1.19 公 開 資

More information