Professional Documents
Culture Documents
FACULTY OF INFORMATICS
DEPARTMENT OF INFORMATION TECHNOLOGY
Course Name: -Wireless and Mobile Technology
Course code:-IT717
Section -One
Prepared by:-
Name ID
1. Chilot G/mariam GUS/00022/10
2. Muluemebet Zeyesus GUS/00031/10
3. Desalegn Negusie GUS/00014/10
4. Kassahun Taffese GUS/00011/10
I. Introduction
The VST-TDMA access protocol has shown to have many advantages over existing protocols in centralized
(star) wireless network architectures Trends show that wireless technology is quickly evolving, reaching maturity
at the lower portion of the spectrum, more specifically below 5 GHz. [1] For example, in the Wireless Local Area
Network (WLAN) field, currently dominated by WiFi, which uses a 2.4/5 GHz carrier frequency, bandwidths of
20/40 MHz,. For this reason millimeter-wave (mm-wave) technology is becoming the new alternative for
Wireless Personal Area Networks (WPAN) [1] try to used simple techniques. The researcher was worked based
on a time multiplexing technique, called here Variable Slot Time - Time Division Multiplexing Access (VST-
TDMA). And various useful processes could be implemented without modifying the algorithm; VST-TDMA is
that QoS can be easily implemented
II. Objective
the main objective of the researcher is to improve the performance of networks that have essentially two traits: (1) small cell,
and (2) throughput demanding. [1].
III. Methodology
the method applied to the researcher are Access Allocation Mechanism, Protocol Information Exchange,
FRAME-LOSS RECOVERY and MODIFIED VST-TDMA techniques [1] used to achieve the objectives.
An alternate strategy can be to have the WAP reserve the exact amount of time as the previous instance.
IV. Outcomes (Result And Discussion)
The results showed that by using two scenarios varying RTT(long round-trip times) and varying wireless loss rate shown that
for any value of RTT there case with retransmissions has a throughput 3 times greater than that of the case without the
retransmissions. [1]. that was expected as these the connection does not perceive these are losses, since they are retransmitted at
the data-link layer.
V. Conclusion:
The researcher worked that presents a modification to the VST-TDMA access protocol. This variation of the
protocol has a recovery feature incorporated at the data-link level, which is not a common
Practice. [1] And as networks become more reliable, this improvement will continue to grow. The most
important point is that the researcher try to addressing the TCP weaknesses at the access layer improves
significantly the performance of the network.
VI. Recommendation
The limitations of the researcher variation of the protocol has a recovery feature
Incorporated at the data-link level, which is not a common practice this feature comes at a negligible cost and in some
Cases there is no extra time added to perform the recovery compared to the case where no recovery is performed Throughput
Millimetre-wave Sensor Communication Network (VHT-MSCN), there is no extra time added to perform the recovery compared
to the case where no recovery is performed. [1]
VII. Research Questions
How accessing TPC weakness at transport layer improves performance of the network?
What is the reason Wired links exhibit loss Rates that are much lower than wireless links;
. How the performance of VST-TDMA is the processing Power of the devices?
Why data-link layer protocols, does not have a recovery feature as data integrity is supervised By
the connection-oriented transport protocols?
OBJECTIVES
Objective of this article review is to provide a scheduling/relay strategy that maximizes the network capacity.
Methodology
The researcher did article first focus on a one dimensional problem. And find an upper bound on the optimal solution
of the one dimensional problem. Next turn to a two-dimensional case, and he consider the same simplifying
assumptions as previously. From the above optimization problem and the structure of the solutions, the researcher
obtains two important protocol design insights.
1. he show that the upper bound on the capacity remains constant, independent of the cell size, which is in
contrast with cellular networks with no relay where the capacity decreases exponentially.
2. The optimal scheduling divides a cell into two regions. The first region, around the BS, is such that the relay
channel is fully saturated. In the other region, the relay channel is never saturated, and there is no direct
traffic to users.
Research Questions
What are the methods used to increasing the capacity of cellular networks?
Reference s
[1] V. Q. a. C. Estevez, "VST-TDMA Access Protocol in Picocell/WPAN," IEEE Member, vol. 3, p. pp 12,
2018.
[2] S. Y. T. G. T. S. a. Y. M. H. Kano, "“Development," in Communications and Information Technologies
(ISCIT),, p. pp. 891–894., 2010.