• No results found

A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes

N/A
N/A
Protected

Academic year: 2021

Share "A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

A PHY-MAC Cross-Layer Protocol for Ad Hoc

Networks with Multiple-Antenna Nodes

Ioannis Spyropoulos and James R. Zeidler

Department of Electrical & Computer Engineering, University of California San Diego, La Jolla CA 92093-0407 Email: yiannis@ucsd.edu, zeidler@ece.ucsd.edu

Abstract—In this paper, we propose a physical (PHY) - medium access control (MAC) cross-layer protocol for ad hoc networks with antenna-array-equipped nodes that employ single-antenna transmission and multiple-antenna reception. Our protocol ex-tends the progressive back-off algorithm (PBOA), proposed by Toumpis and Goldsmith, by integrating medium access and power control with optimum receive beamforming (ORB); hence it is named PBOA-ORB. The protocol performance is evaluated via simulations over a single-hop ad hoc network that is subject to a uniform traffic load. It is shown that PBOA-ORB significantly enhances both the aggregate throughput and the energy efficiency of PBOA by harnessing the interference suppression and array gains of receive beamforming. Specifically, for a small number of antennas compared to the number of nodes, the aggregate throughput increases linearly with the number of antennas while the average energy consumption per data packet decreases.

I. INTRODUCTION

A fundamental challenge in the design of the medium access control (MAC) layer for ad hoc networks arises from the need to limit interference at the receivers while keeping the density of parallel transmissions (i.e., the spatial reuse) high. MAC protocols based on carrier sensing and collision avoidance, such as the CSMA/CA protocol used in the IEEE 802.11 standard, limit interference by reserving the channel around a transmitter-receiver pair via a request-to-send (RTS)/clear-to-send (CTS) handshake prior to data transmission. However, they suffer from poor spatial reuse and unresolved collisions, which severely restrict the network throughput [1]. Several research efforts have sought to address these shortcomings, often replacing the collision model with the more accurate signal-to-interference-plus-noise ratio (SINR) capture model. Such efforts include the CDMA-based protocol of [2] and the progressive back-off algorithm (PBOA) of [3], which incorporate power control into medium access so that mutually interfering transmissions take place simultaneously in the vicinity of a receiver. In so doing, these protocols achieve higher throughput than CSMA/CA and also reduce the energy consumption per data packet delivered.

Multiple-antenna or multiple-input-multiple-output (MIMO) techniques offer a great potential for enhancing the throughput of ad hoc networks, given that the latter often operate in rich scattering environments. Although space-time coding schemes This work was supported by the University of California Discovery Grant com07-10241, Intel Corp., QUALCOMM Inc., Texas Instruments Inc. and the Center for Wireless Communications at the University of California, San Diego.

considerably improve the reliability of individual links, it is the spatial multiplexing and beamforming schemes that are more likely to have a greater impact on network throughput by increasing spatial reuse. Upgrading the physical (PHY) layer with multiple-antenna techniques while keeping the MAC layer unchanged certainly benefits the network performance. However, significant gains are expected from the joint design of the two layers [4]. This PHY-MAC cross-layer design in multiple-antenna ad hoc networks is a topic that has recently started being addressed, with most existing works (e.g., [5] and [6]) elaborating on the use of spatial multiplexing.

In this paper, we propose a new PHY-MAC cross-layer protocol with the goal of enhancing network throughput in an energy efficient manner. Our protocol extends the PBOA protocol of [3] to account for antenna-array-equipped nodes that transmit over a single antenna and receive over all antennas, employing optimum receive beamforming (ORB) for maximum SINR. Hence, it is named PBOA-ORB. The pro-posed protocol is novel as it integrates medium access, power control, and optimum receive beamforming to increase spatial reuse. Although optimum receive beamforming combined with power control has been shown to improve the capacity and energy efficiency of cellular networks [7], the two techniques have not yet been jointly considered in ad hoc networks.

Similarly to PBOA, our protocol divides time into frames that consist of a contention slot and a data slot. Nodes with a data packet contend for channel access during the contention slot, and those that ‘win’ transmit their packet in the data slot. Assuming that channel variations are negligible over the frame duration, PBOA-ORB determines: i) a subset of contending nodes that will successfully deliver their packet to its destination, once they simultaneously transmit in the data slot; ii) their transmit power levels; and iii) the receive beam-forming weights at the destination nodes. The performance of PBOA-ORB is evaluated in terms of throughput and energy consumption, for various numbers of antennas, via simulations over a single-hop ad hoc network subject to a uniform traffic load. Since PBOA-ORB falls back to PBOA for single-antenna nodes, comparison of the two protocols is straightforward.

The paper is organized as follows. The system model is introduced in Section II and the proposed PBOA-ORB protocol is presented in Section III. Section IV describes the simulation model used for performance evaluation and discusses the simulation results. Conclusions are drawn in

(2)

uiH ujH jj jj G H ii ii G H i P (ti) (tj) ij ij G H ji ji G H j P yj(n) vi vj (rj) (ri) xj(n) di(n) yi(n) dj(n) xi(n)

...

...

...

...

uiH ujH jj jj G H ii ii G H i P (ti) (tj) ij ij G H ji ji G H j P yj(n) vi vj (rj) (ri) xj(n) di(n) yi(n) dj(n) xi(n)

...

...

...

...

Fig. 1. Baseband equivalent link model of the ad hoc network under study. Two links are considered, namely, linki between nodes tiandri, and link

j between nodes tjandrj.

Section V.

II. SYSTEM MODEL

We consider an ad hoc network of N nodes that commu-nicate by exchanging packets over a wireless channel, at a common transmission rate R. For the purposes of this work, which focuses on the physical and MAC layers, the network is single-hop, meaning that nodes communicate directly, without relaying. Packet transmission is frame-based, and the nodes are synchronized to the frame boundaries (e.g., by means of the GPS technology). Each node is equipped with a packet queue, a half-duplex transceiver, and an array of M omnidirectional antenna elements. By virtue of this array, nodes are capable of transmit beamforming (i.e., sending weighted versions of the same data symbol over the transmit antennas) and receive beamforming (i.e., coherently combining the signals at the receive antenna outputs).

A baseband equivalent link model of the ad hoc network un-der study is illustrated in Fig. 1. Only two of the links that are active, at a given time, are shown for simplicity; namely, link i between the transmitting node ti and its intended receiver ri and link j between nodes tj and rj. Node ti transmits a packet at power Pi, in the range [0, Pmax], weighting each data symbol di(n) by the elements of an M × 1 unit-norm vector

vi. The channel from tjto riis described by a power gain Gij and an M× M channel matrix Hij and is assumed invariant over the duration of a frame. This is a reasonable assumption for low-mobility (e.g., pedestrian) scenarios. The power gain captures the effects of distance-dependent propagation and shadowing, while the kth element of Hij captures the flat fading between the th transmit antenna of node tj and the kth receive antenna of node ri.

The received signals at the antenna outputs of node ri are represented by the M × 1 vector

xi(n) =  PiGiiaiidi(n) + j=i  PjGijaijdj(n) + ni(n) (1) where aii = Hiivi and aij = Hijvj denote the effective channel vectors from nodes ti and tj to node ri, respectively.

These signals are linearly combined with weights provided by the conjugate of vector ui, and the output of the receive beamformer is yi(n) =  PiGiiuHi aiidi(n) +  j=i  PjGijuHi aijdj(n) + uH i ni(n). (2)

In the above expressions, the first term corresponds to the desired signal from node ti, the second term to interference from other transmitting nodes, such as tj, and the third term to thermal and background noise. The latter is modeled by the zero-mean circularly symmetric complex Gaussian random vector ni(n) with covariance matrix Φni = σn2I, for per-antenna noise power σ2n. Assuming that the data symbols di(n), dj(n) are uncorrelated and drawn from a unit-energy constellation, the SINR at the output of the receive beam-former is γi= PiGiiu H i aiiaHiiui uH i ΦI,iui (3) where ΦI,i=  j=i PjGijaijaHij + σn2I (4) is the interference-plus-noise covariance matrix.

We assume that node riis able to receive a packet from node ti with negligible probability of error (i.e., successfully), pro-vided that the SINR γiexceeds a threshold γT, which depends on the common transmission rate R and the modulation/coding scheme used. Otherwise the packet cannot be detected. Based on this assumption, it is optimum, in terms of packet through-put, that node ri employs the beamforming vector ui which maximizes the SINR. By complex linear algebra, it can be shown that this optimum receive beamforming (ORB) vector is given by ui,o= argmax |ui|=1  uH i aiiaHiiui uH i ΦI,iui  = Φ −1 I,iaii |Φ−1 I,iaii| (5) where a unit-norm constraint is also imposed on ui without loss of generality. In this case, the maximum SINR is simply γi,o= PiGiiaHiiΦ−1I,iaii. (6) In essence, the optimum receive beamformer maximizes the SINR by selecting its weights so that the array response yi(n) is enhanced along the ‘spatial signature’ aii of the desired signal and reduced along the ‘spatial signatures’ aij of the main interferers.

Using the theory of [8], it can be shown that the minimum-mean-square-error (MMSE) beamformer achieves the maxi-mum SINR γi,o, as well. This beamformer minimizes the mean square error between the desired signal di(n) and its output, and, for our system model, it is given by

ui,MMSE = argmin ui E|di(n) − uHi xi(n)|2 = PiGii 1 + PiGiiaHiiΦ−1I,iaiiΦ −1 I,iaii. (7)

(3)

Frame Frame Frame Data slot RT S 1 CT S 1 RT S 2 CT S 2 RT S m CT S m . . . Contention slot m minislot pairs l l+1 1 − l

Frame Frame Frame

Data slot RT S 1 CT S 1 RT S 2 CT S 2 RT S m CT S m . . . Contention slot mminislot pairs l l+1 1 − l

Fig. 2. Frame format of the PBOA-ORB protocol.

In practical systems, the MMSE beamformer is implemented by means of an adaptive algorithm (e.g., LMS or RLS) that estimates a training sequence {di(n)} a priori known to the receiver. Hence, there is no need for accurate knowledge of the effective channel vectoraiiand the interference-plus-noise covariance matrix ΦI,i at the receiver, as suggested by the theoretical expression of (7). This practical implementation also applies to the optimum beamformer of (5), which is just a normalized version of the MMSE beamformer.

Finally, we note that our system model also accounts for the case where two (or more) nodes, say ti and tj, transmit one packet each to node ri ≡ rj, at the same time. The antenna outputs xi(n) can, then, be linearly combined using two different receive beamformersui,oanduj,o, one adapting to estimate the training sequence of ti and the other the training sequence of tj, provided that these are uncorrelated and a priori known to the receiver. In this way, node ri is able to successfully receive up to two packets depending on whether the corresponding SINRs exceed the threshold γT or not. This multi-packet reception capability generalizes up to M packets for nodes with M antennas.

III. THEPROPOSEDPBOA-ORB PROTOCOL We now present the proposed PHY-MAC cross-layer proto-col for ad hoc networks described by the model of Section II. Our protocol is named PBOA-ORB since it adopts the contention resolution and power control mechanisms of the PBOA protocol of [3] and integrates them with optimum receive beamforming. The same frame format as in PBOA is assumed and is shown in Fig. 2. Each frame consists of a contention slot, which is divided into m minislot pairs, and a data slot. The first minislot of each pair is dedicated to the transmission of an RTS packet and the second to the transmission of a CTS packet. Among other fields (e.g., guard times, source and destination MAC addresses), the RTS and CTS packets contain a training sequence field for the practical implementation of optimum beamforming at the receivers. In addition, the CTS packet contains a power scaling factor field that is used in power control.

A. Basic Idea

At the beginning of the contention slot, every node with a non-empty packet queue is a contending node and will

initially attempt to transmit the packet at the head of its queue to its destination. All the remaining nodes are silent. During the contention slot, the goal of the protocol is to determine a subset of contending nodes (named locked) that will successfully deliver their packet to its destination, once they transmit simultaneously in the subsequent data slot. To achieve this goal in a way that enhances the number of locked nodes (i.e., the spatial reuse), the following mechanisms are employed: i) optimum receive beamforming, so that contending nodes have a better chance to be successful in achieving the SINR threshold γT at their intended receiver; ii) power control, so that contending nodes which are successful reduce their transmit power, thus causing less interference and increasing the chances of others; iii) progressive back-off, so that contend-ing nodes which are unsuccessful quit the contention process, with some probability, to facilitate others; and iv) non-first-in-first-out (non-FIFO) queueing, so that contending nodes which are unsuccessful but persist contend for a new packet with a different, possibly more ‘favorable’, destination.

B. Protocol Operation

In more detail, the PBOA-ORB protocol operation can be described as follows.

During the kth RTS minislot:

1) Contending nodes transmit an RTS packet to their in-tended receiver at maximum power Pi(k)= Pmax, using only one transmit antenna.

2) Locked nodes transmit an RTS packet to their intended receiver, using only one transmit antenna, at power Pi(k) that was specified by this receiver in a previous CTS minislot.

3) Silent nodes listen. If there is an RTS packet for them, they calculate the ORB vectoru(k)i,o, based on the training sequence embedded in the packet, and use it to receive the remainder of the packet at maximum SINR γi,o(k). During the kth CTS minislot:

1) Silent nodes that received an RTS packet from a con-tending or a locked node with SINR γi,o(k) ≥ γT, send back a CTS packet at power Pmax, using u(k)∗i,o as the transmit beamforming vector. This packet notifies the contending or locked node of the factor gi(k) = min{1, (1 + )γT/γi,o(k)} ≤ 1 by which it must scale its power, where  is a small margin parameter. 2) Contending and locked nodes listen. If there is a CTS

packet for them, they calculate the ORB vector, based on the training sequence embedded in the packet, and use it to receive the remainder of the packet.

At the end of the kth CTS minislot:

1) Contending nodes that successfully received a CTS packet destined for them become locked and scale down their power to Pi(k+1)= g(k)i Pi(k).

2) Contending nodes that did not receive a CTS packet either persist contending with probability p, or back off and become silent for the rest of the frame with probability 1− p. If possible, persisting nodes select

(4)

from their queue a packet with a different destination to contend for, in the next minislot pair (non-FIFO queueing).

3) Locked nodes that successfully received a CTS packet destined for them scale down their power to Pi(k+1)= g(k)i Pi(k), otherwise they set Pi(k+1)= Pi(k).

During the data slot, locked nodes transmit their data packet, using only one antenna, at the power level specified by the last CTS packet they received. Silent nodes receive the data packet destined for them using the ORB vectoru(m)i,o that they calculated during the last (mth) RTS minislot.

C. Remarks

The proposed protocol guarantees that, once a contending node becomes locked, it will transmit its subsequent RTS pack-ets and its data packet successfully, as long as the channel does not vary during a frame. The mathematical justification for this property is provided in [9]. Note that the margin parameter  is introduced in the expression of gi(k) to compensate for channel fluctuations and SINR estimation inaccuracies (e.g., due to imperfect beamforming) that could occur in practice.

Regarding the use of antenna arrays, the following remarks can be made. During an RTS minislot, contending and locked nodes transmit over only one antenna since they lack side information about the channel that would allow them to beam-form. This corresponds tovi= vj = [1 0 . . . 0]T in the model of Fig. 1, if the first antenna is used for simplicity. Silent nodes, on the other hand, employ optimum receive beamforming by exploiting the training sequence that is embedded in their RTS packet. The theoretical expression for the ORB vectoru(k)i,o is provided by (5). During a CTS minislot, silent nodes transmit while contending and locked nodes receive, hence the link model is the reciprocal of that in Fig. 1. Due to reciprocity, it makes sense that silent nodes employ transmit beamforming using the same weights u(k)∗i,o that were used for optimum receive beamforming in the previous RTS minislot [10]. In this way, they reduce the interference caused to contending or locked nodes other than their corresponding one. Contending and locked nodes, on the other hand, extract from the training sequence of their CTS packet the receive beamforming vector that maximizes their SINR. The theoretical expression for this vector is provided by (5) after replacing Gij with Gji and setting Pj = Pmax,aii = HiiTu(k)∗i,o , andaij = HjiTu(k)∗j,o .

IV. PERFORMANCEEVALUATION

A. Simulation Model

We evaluate the performance of the PBOA-ORB protocol by simulating its operation over a single-hop ad hoc network of N = 20 nodes. These are randomly and uniformly placed in a 100 m×100 m square area. The network is fully connected, in the sense that the average (with respect to shadowing and fading) signal-to-noise ratio of any link between two nodes exceeds the threshold γT. Thus, a node can, theoretically, com-municate with any other node in the absence of interference. This is guaranteed by our choice of parameter values.

Each node can transmit at any power up to Pmax = 0.2 W and is subject to noise power σ2n = −114 dBm while receiving. The power gain between two nodes of distance dij is provided by Gij = KSij(do/dij)α, for K = 10−4, do= 1 m, α = 4, and lognormal shadowing Sij with 6 dB standard deviation. The corresponding channel matrix Hij consists of i.i.d. zero-mean and unit-variance circularly symmetric complex Gaussian random entries that vary independently per frame (i.e., fading is quasi-static, flat, Rayleigh distributed, and independent across the antennas). The SINR threshold is set to γT = 10 dB and the power control margin to  = 0.01.

Data traffic in the network is generated according to a Poisson process with aggregate rate λ packets/s. The traffic load is uniform, meaning that each node creates data packets at rate λ/(N (N − 1)) for any other node. Data packets are 10 Kbits long and each node can store up to 100 of them in its queue. RTS and CTS packets are 100 bits long. The transmission rate is fixed to R = 1 Mbps, resulting in data slot duration τD= 10 ms and RTS-CTS minislot pair duration τm= 0.2 ms.

B. Simulation Results

The performance of our protocol is evaluated for M = 1, 2, 3, and 4 antennas per node. Note that PBOA-ORB coincides with PBOA for M = 1. Our results are obtained using the optimum value of persistence probability p for the number of contention minislot pairs m considered. Such a value exists since, if p is too small, the throughput decreases as nodes back off too ‘soon’, while, if p is too large, the throughput decreases as contention is not resolved. The optimum values po for numerous values of m were determined by exhaustive simulation search but are not reported here for lack of space. Fig. 3 depicts the aggregate throughput versus the network traffic load for m = 12 minislot pairs. In this work, aggregate throughput denotes the total average number of correctly re-ceived data bits per time unit. As the traffic load increases, the throughput increases in proportion, up to a point where node queues fill up due to high contention, and any extra load causes them to overflow, leading to throughput saturation. Multiple antennas enable nodes to cope with higher levels of contention thanks to the interference suppression and multi-packet recep-tion capabilities offered by optimum receive beamforming. As a result, PBOA-ORB achieves higher throughput than PBOA. Interestingly, the throughput is roughly proportional to the number of antennas.

In Fig. 4, the average energy consumed per data packet is plotted versus the aggregate throughput for m = 12 minislot pairs. PBOA-ORB is more energy efficient than PBOA since the SINR maximization achieved by optimum receive beam-forming translates into transmit power reduction via power control. The maximum SINR increases with the number of antennas due to array gain, hence the energy consumption decreases. However, it increases with aggregate throughput as more interference, caused by heavier traffic, needs to be overcome.

(5)

0 100 200 300 400 500 0 0.5 1 1.5 2 2.5 3 3.5 4

Traffic rate λ (packets/s)

Aggregate throughput T (Mbps)

M = 1 ant. M = 2 ant. M = 3 ant. M = 4 ant.

Fig. 3. Aggregate throughput versus traffic rate form = 12 and optimum

p, namely po= 0.7 (M = 1), po= 0.75 (M = 2), po= 0.8 (M = 3), and po= 0.825 (M = 4). 0 0.5 1 1.5 2 2.5 3 3.5 0 0.05 0.1 0.15 0.2 0.25 Aggregate throughput T (Mbps)

Energy per data packet E

p (mJoules) M = 1 ant. M = 2 ant. M = 3 ant. M = 4 ant.

Fig. 4. Average energy consumed per data packet versus aggregate throughput form = 12 and optimum p (same po values as in Fig. 3).

In Fig. 5, the maximum aggregate throughput T is plotted as a function of the number of minislot pairs m. In our simulations, maximum aggregate throughput is defined so that at most 1% of the generated packets of any source-destination pair are discarded due to queue overflow, and it corresponds to a point near the ‘knee’ of the curves in Fig. 3. The throughput increases with m up to a value mo, above which any throughput gain due to contention resolution over more minislot pairs is outweighed by the overhead that they incur. The optimum operation points (mo, To) are marked with ‘crosses’ on the plot. From the corresponding values, we deduce that: i) the protocol overhead, as expressed by mo, is a non-increasing function of the number of antennas; and ii) the peak throughput To increases linearly (at very good accuracy) with the number of antennas. Finally, our protocol is quite robust to the choice of m since more than 94% of the peak throughput is achieved for 8≤ m ≤ 16.

2 4 6 8 10 12 14 16 18 20 0 0.5 1 1.5 2 2.5 3 3.5 4 Minislot pairs m

Maximum aggregate throughput T (Mbps)

M = 1 ant. M = 2 ant. M = 3 ant. M = 4 ant. (12, 2.551) (12, 3.378) (13, 1.702) (14, 0.846)

Fig. 5. Maximum aggregate throughput versus the number of minislot pairs

m. For each value of m the optimum persistence probability pois used. V. CONCLUSION

We have proposed a new PHY-MAC cross-layer protocol for ad hoc networks with nodes that employ single-antenna transmission and multiple-antenna reception. Our protocol is named PBOA-ORB as it extends the PBOA protocol of [3] by integrating medium access and power control with optimum receive beamforming for increased spatial reuse. Simulations over a single-hop ad hoc network with uniform traffic load have shown that PBOA-ORB achieves higher throughput and energy efficiency than PBOA with smaller overhead. Notably, for a small number of antennas compared to the number of nodes, the throughput increases linearly with the number of antennas. Incorporating multiple-antenna transmission in our protocol is a topic of ongoing research [9].

REFERENCES

[1] G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE J. Select. Areas Commun., vol. 18, no. 3, pp. 535–547, Mar. 2000.

[2] A. Muqattash and M. Krunz, “CDMA-based MAC protocol for wireless ad hoc networks,” in Proc. ACM MOBIHOC, Jun. 2003, pp. 153–164. [3] S. Toumpis and A. J. Goldsmith, “New media access protocols for

wireless ad hoc networks based on cross-layer principles,” IEEE Trans.

Wireless Commun., vol. 5, no. 8, pp. 2228–2241, Aug. 2006.

[4] M. Zorzi, J. R. Zeidler, A. Anderson et al., “Cross-layer issues in MAC protocol design for MIMO ad hoc networks,” IEEE Wireless Commun.

Mag., vol. 13, no. 4, pp. 62–76, Aug. 2006.

[5] M. Park, R. W. Heath Jr., and S. M. Nettles, “Improving throughput and fairness for MIMO ad hoc networks using antenna selection diversity,” in Proc. IEEE GLOBECOM, Nov. 2004, pp. 3363– 3367.

[6] P. Casari, M. Levorato, and M. Zorzi, “On the implications of layered space-time multiuser detection on the design of MAC protocols for ad hoc networks,” in Proc. IEEE PIMRC, Sep. 2005, pp. 1354– 1360. [7] F. Rashid-Farrokhi, L. Tassiulas, and K. J. R. Liu, “Joint optimal power

control and beamforming in wireless networks using antenna arrays,”

IEEE Trans. Commun., vol. 46, no. 10, pp. 1313–1324, Oct. 1998.

[8] H. L. Van Trees, Optimum Array Processing. Part IV of Detection,

Estimation and Modulation Theory. New York: Wiley-Interscience, 2002.

[9] I. Spyropoulos and J. R. Zeidler, “A PHY-MAC cross-layer protocol for MIMO ad hoc networks,” Feb. 2009, in preparation.

[10] B. Song, R. L. Cruz, and B. D. Rao, “Network duality for multiuser MIMO beamforming networks and applications,” IEEE Trans. Commun., vol. 55, no. 3, pp. 618–629, Mar. 2007.

References

Related documents

Jansson A (2020) Global Financial Reports Convergence: A Study of the Adoption of International Financial Reporting Standards by the Swedish Accountancy Profession?. Competition

Abstract A cross-sectional study was conducted on local and broiler chickens in Afaha Ibesikpo Local Government Area, Akwa Ibom State, to determine the prevalence

* Infusion Nurses Society (INS) Gulfcoast Chapter – Current Member * League of Intravenous Therapy Education (LITE) – Member 2006 to 2010.. Programs Authored

In Figures 6 and 7, it is seen that our proposed scheme, with the aid of RNC-FB, significantly increases the TCP congestion window size; it recovers most of

By utilizing their experienced staff of home health nurses to conduct multi-factorial fall risk assessment and intervention, home health agencies can be a primary source for

Michael Rauh, M.D Orthopaedic Sports Medicine specialist at the State University of New York and Clinical Assistant Professor of Orthopaedic Surgery, School of Medicine and

constructed, socially and historically, regarding the relationship between the learner and the target community and the desire to learn and use the language of that community

Taking a closer look at peer group influence by investigating the peer effects of best friends, rather than on the composition of peers at school or grade cohorts level which