2,173 research outputs found

    60 GHz MAC Standardization: Progress and Way Forward

    Full text link
    Communication at mmWave frequencies has been the focus in the recent years. In this paper, we discuss standardization efforts in 60 GHz short range communication and the progress therein. We compare the available standards in terms of network architecture, medium access control mechanisms, physical layer techniques and several other features. Comparative analysis indicates that IEEE 802.11ad is likely to lead the short-range indoor communication at 60 GHz. We bring to the fore resolved and unresolved issues pertaining to robust WLAN connectivity at 60 GHz. Further, we discuss the role of mmWave bands in 5G communication scenarios and highlight the further efforts required in terms of research and standardization

    An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks

    Get PDF
    A high degree of reliability for critical data transmission is required in body sensor networks (BSNs). However, BSNs are usually vulnerable to channel impairments due to body fading effect and RF interference, which may potentially cause data transmission to be unreliable. In this paper, an adaptive and flexible fault-tolerant communication scheme for BSNs, namely AFTCS, is proposed. AFTCS adopts a channel bandwidth reservation strategy to provide reliable data transmission when channel impairments occur. In order to fulfill the reliability requirements of critical sensors, fault-tolerant priority and queue are employed to adaptively adjust the channel bandwidth allocation. Simulation results show that AFTCS can alleviate the effect of channel impairments, while yielding lower packet loss rate and latency for critical sensors at runtime.Comment: 10 figures, 19 page

    Enhancing the Performance of Low Priority SUs Using Reserved Channels in CRN

    Get PDF
    Cognitive radio networks (CRNs) are considered a promising solution for spectrum resources scarcity and efficient channel utilization. In this letter, multi-dimensional analytical Markov model based on reservation channel access scheme and channel aggregation method is proposed to enhance spectrum utilization, capacity of low priority secondary users (SUs) and reducing handoff probability of SUs. Moreover, the proposed method improves the performance of high priority SUs by providing the capability to resume the connection after dropping. The numerical results indicate that the modified reservation access model can enhance the performance of SUs compared to the traditional basic random access model

    Comprehensive survey on quality of service provisioning approaches in cognitive radio networks : part one

    Get PDF
    Much interest in Cognitive Radio Networks (CRNs) has been raised recently by enabling unlicensed (secondary) users to utilize the unused portions of the licensed spectrum. CRN utilization of residual spectrum bands of Primary (licensed) Networks (PNs) must avoid harmful interference to the users of PNs and other overlapping CRNs. The coexisting of CRNs depends on four components: Spectrum Sensing, Spectrum Decision, Spectrum Sharing, and Spectrum Mobility. Various approaches have been proposed to improve Quality of Service (QoS) provisioning in CRNs within fluctuating spectrum availability. However, CRN implementation poses many technical challenges due to a sporadic usage of licensed spectrum bands, which will be increased after deploying CRNs. Unlike traditional surveys of CRNs, this paper addresses QoS provisioning approaches of CRN components and provides an up-to-date comprehensive survey of the recent improvement in these approaches. Major features of the open research challenges of each approach are investigated. Due to the extensive nature of the topic, this paper is the first part of the survey which investigates QoS approaches on spectrum sensing and decision components respectively. The remaining approaches of spectrum sharing and mobility components will be investigated in the next part

    On the Performance of Channel Assembling and Fragmentation in Cognitive Radio Networks

    Full text link
    [EN] Flexible channel allocation may be applied to multi-channel cognitive radio networks (CRNs) through either channel assembling (CA) or channel fragmentation (CF). While CA allows one secondary user (SU) occupy multiple channels when primary users (PUs) are absent, CF provides finer granularity for channel occupancy by allocating a portion of one channel to an SU flow. In this paper, we investigate the impact of CF together with CA for SU flows by proposing a channel access strategy which activates both CF and CA and correspondingly evaluating its performance. In addition, we also consider a novel scenario where CA is enabled for PU flows. The performance evaluation is conducted based on continuous time Markov chain (CTMC) modeling and simulations. Through mathematical analyses and simulation results, we demonstrate that higher system capacity can be achieved indeed by jointly employing both CA and CF, in comparison with the CA-only strategies. However, this benefit is obtained only under certain conditions which are pointed out in this paper. Furthermore, the theoretical capacity upper bound for SU flows with both CF and CA enabled is derived when PU activities are relatively static compared with SU flows.This work was supported by the EU Seventh Framework Programme FP7-PEOPLE-IRSES under Grant agreement 247083, project acronym S2EuNet. The work of L. Jiao was supported by the Research Council of Norway through the ECO-boat MOL project under Grant 210426. The work of V. Pla was supported in part by the Ministry of Economy and Competitiveness of Spain under Grant TIN2010-21378-C02-02. The associate editor coordinating the review of this paper and approving it for publication was H. Wymeersch.Jiao, L.; Balapuwaduge, IAM.; Li, FY.; Pla, V. (2014). On the Performance of Channel Assembling and Fragmentation in Cognitive Radio Networks. IEEE Transactions on Wireless Communications. 13(10):5661-5675. https://doi.org/10.1109/TWC.2014.2322057S56615675131

    Channel Access and Reliability Performance in Cognitive Radio Networks:Modeling and Performance Analysis

    Get PDF
    Doktorgradsavhandling ved Institutt for Informasjons- og kommunikasjonsteknologi, Universitetet i AgderAccording to the facts and figures published by the international telecommunication union (ITU) regarding information and communication technology (ICT) industry, it is estimated that over 3.2 billion people have access to the Internet in 2015 [1]. Since 2000, this number has been octupled. Meanwhile, by the end of 2015, there were more than 7 billion mobile cellular subscriptions in the world, corresponding to a penetration rate of 97%. As the most dynamic segment in ICT, mobile communication is providing Internet services and consequently the mobile broadband penetration rate has reached 47% globally. Accordingly, capacity, throughput, reliability, service quality and resource availability of wireless services become essential factors for future mobile and wireless communications. Essentially, all these wireless technologies, standards, services and allocation policies rely on one common natural resource, i.e., radio spectrum. Radio spectrum spans over the electromagnetic frequencies between 3 kHz and 300 GHz. Existing radio spectrum access techniques are based on the fixed allocation of radio resources. These methods with fixed assigned bandwidth for exclusive usage of licensed users are often not efficient since most of the spectrum bands are under-utilized, either/both in the space domain or/and in the time domain. In reality, it is observed that many spectrum bands are largely un-occupied in many places [2], [3]. For instance, the spectrum bands which are exclusively allocated for TV broadcasting services in USA remain un-occupied from midnight to early morning according to the real-life measurement performed in [4]. In addition to the wastage of radio resources, spectrum under-utilization constraints spectrum availability for other intended users. Furthermore, legacy fixed spectrum allocation techniques are not capable of adapting to the changes and interactions in the system, leading to degraded network performance. Unlike in the static spectrum allocation, a fraction of the radio spectrum is allocated for open access as license-free bands, e.g., the industrial, scientific and medical (ISM) bands (902-928, 2400-2483.5, 5725-5850 MHz). In 1985, the federal communications commission (FCC) permitted to use the ISM bands for private and unlicensed occupancy, however, under certain restrictions on transmission power [5]. Consequently, standards like IEEE 802.11 for wireless local area networks (WLANs) and IEEE 802.15 for wireless personal area networks (WPAN) have grown rapidly with open access spectrum policies in the 2.4 GHz and 5 GHz ISM bands. With the co-existence of both similar and dissimilar radio technologies, 802.11 networks face challenges for providing satisfactory quality of service (QoS). This and the above mentioned spectrum under-utilization issues motivate the spectrum regulatory bodies to rethink about more flexible spectrum access for licenseexempt users or more efficient radio spectrum management. Cognitive radio (CR) is probably the most promising technology for achieving efficient spectrum utilization in future wireless networks

    LTE-LAA ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ์œ„ํ•œ MAC ๊ณ„์ธต ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ์ตœ์„ฑํ˜„.3GPP long term evolution (LTE) operation in unlicensed spectrum is emerging as a promising technology in achieving higher data rate with LTE since ultra-wide unlicensed spectrum, e.g., about 500 MHz at 5โ€“6 GHz range, is available in most countries. Recently, 3GPP has finalized standardization of licensed-assisted access (LAA) for LTE operation in 5 GHz unlicensed spectrum, which has been a playground only for Wi-Fi. In this dissertation, we propose the following three strategies to enhance the performance of LAA: (1) Receiver-aware COT adaptation, (2) Collision-aware link adaptation, and (3) Power and energy detection threshold adaptation. First, LAA has a fixed maximum channel occupancy time (MCOT), which is the maximum continuous transmission time after channel sensing, while Wi-Fi may transmit for much shorter time duration. As a result, when Wi-Fi coexists with LAA, Wi-Fi airtime and throughput can be much less than those achieved when Wi-Fi coexists with another Wi-Fi. To guarantee fair airtime and improve throughput of Wi-Fi, we propose a receiver-aware channel occupancy time (COT) adaptation ( RACOTA ) algorithm, which observes Wi-Fi aggregate MAC protocol data unit (A-MPDU) frames and matches LAAs COT to the duration of A-MPDU frames when any Wi-Fi receiver has more data to receive. Moreover, RACOTA detects saturation of Wi-Fi traffic and adjusts COT only if Wi-Fi traffic is saturated. We prototype saturation detection algorithm of RACOTA with commercial off-the-shelf Wi-Fi device and show that RACOTA detects saturation of Wi-Fi networks accurately. Through ns-3 simulations, we demonstrate that RACOTA provides airtime fairness between LAA and Wi-Fi while achieves up to 334% Wi-Fi throughput gain. Second, the link adaptation scheme of the conventional LTE, adaptive modulation and coding (AMC), cannot operate well in the unlicensed band due to intermittent collisions. Intermittent collisions make LAA eNB lower modulation and coding scheme (MCS) for the subsequent transmission and such unnecessarily lowered MCS significantly degrades spectral efficiency. To address this problem, we propose a collision-aware link adaptation algorithm ( COALA ). COALA exploits k-means unsupervised clustering algorithm to discriminate channel quality indicator (CQI) reports which are measured with collision interference and selects the most suitable MCS for the next transmission. By prototype-based experiments, we demonstrate that COALA detects collisions accurately, and by conducting ns-3 simulations in various scenarios, we also show that COALA achieves up to 74.9% higher user perceived throughput than AMC. Finally, we propose PETAL to mitigate the negative impact of spatial reuse (SR) operation. We first design the baseline algorithm, which operates SR aggressively, and show that the baseline algorithm degrades the throughput performance severely when the UE is close to an interferer. Our proposed algorithm PETAL estimates and compares the spectral efficiency for the SR operation and non-SR operation. Then, PETAL operates SR only if the spectral efficiency of SR operation is expected to be higher than the case of non-SR operation. Our simulation verifies the performance of PETAL in various scenarios. When two pair of an eNB and a UE coexists, PETAL improves the throughput by up to 329% over the baseline algorithm. In summary, we identify interesting problems that appeared with LAA and shows the impact of the problems through the extensive simulations and propose compelling algorithms to solve the problems. The airtime fairness between Wi-Fi and LAA is improved with COT adaptation. Furthermore, link adaptation accuracy and SR operation are improved by exploiting CQI reports history. The performance of the proposed schemes is verified by system level simulation.๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ์˜ LTE ๋™์ž‘์€ ๋” ๋†’์€ ๋ฐ์ดํ„ฐ ์ „์†ก๋ฅ ์„ ๋‹ฌ์„ฑํ•˜๋Š” ์œ ๋งํ•œ ๊ธฐ์ˆ ๋กœ ๋ถ€๊ฐ๋˜๊ณ  ์žˆ๋‹ค. ์ตœ๊ทผ 3GPP๋Š” ๊ธฐ์กด Wi-Fi ๊ธฐ์ˆ ์ด ์‚ฌ์šฉํ•˜๋˜ 5 GHz ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ LTE๋ฅผ ์‚ฌ์šฉํ•˜๋Š” licensed-assisted access (LAA) ๊ธฐ์ˆ ์˜ ํ‘œ์ค€ํ™”๋ฅผ ์™„๋ฃŒํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ ์šฐ๋ฆฌ๋Š” LAA์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์„ธ ๊ฐ€์ง€ ์ „๋žต์„ ์ œ์•ˆํ•œ๋‹ค: (1) ์ˆ˜์‹ ๊ธฐ ์ธ์‹ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„ ์ ์‘, (2) ์ถฉ๋Œ ์ธ์‹ ๋งํฌ ์ ์‘, (3) ์ „๋ ฅ ๋ฐ ์—๋„ˆ์ง€ ๊ฒ€์ถœ ์—ญ์น˜ ์ ์‘. ์ฒซ์งธ, LAA๋Š” ๊ณ ์ •๋œ ์ตœ๋Œ€ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ  ๊ทธ ์‹œ๊ฐ„ ๋งŒํผ ์—ฐ์†์ ์œผ๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐ˜๋ฉด, Wi-Fi๋Š” ๋น„๊ต์  ์งง์€ ์‹œ๊ฐ„ ๋™์•ˆ๋งŒ ์—ฐ์†์ ์œผ๋กœ ์ „์†กํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ Wi-Fi๊ฐ€ LAA์™€ ๊ณต์กดํ•  ๋•Œ Wi-Fi์˜ airtime๊ณผ ์ˆ˜์œจ ์„ฑ๋Šฅ์€ Wi-Fi๊ฐ€ ๋˜ ๋‹ค๋ฅธ Wi-Fi์™€ ๊ณต์กดํ•  ๋•Œ์— ๋น„ํ•˜์—ฌ ์ €ํ•˜๋˜๊ฒŒ๋œ๋‹ค. ๋”ฐ๋ผ์„œ ์šฐ๋ฆฌ๋Š” Wi-Fi์˜ airtime๊ณผ ์ˆ˜์œจ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•˜์—ฌ Wi-Fi์˜ A-MPDU ํ”„๋ ˆ์ž„ ์ „์†ก ์‹œ๊ฐ„์— ๋งž์ถ”์–ด LAA์˜ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„์„ ์กฐ์ ˆํ•˜๋Š” ์ˆ˜์‹ ๊ธฐ ์ธ์‹ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„ ์ ์‘ ๊ธฐ๋ฒ•์ธ RACOTA๋ฅผ ์ œ์•ˆํ•œ๋‹ค. RACOTA ๋Š” ํฌํ™” ๊ฐ์ง€ ๊ฒฐ๊ณผ Wi-Fi ์ˆ˜์‹ ๊ธฐ๊ฐ€ ๋” ๋ฐ›์„ ๋ฐ์ดํ„ฐ๊ฐ€ ์žˆ๋‹ค๊ณ  ํŒ๋‹จ๋  ๋•Œ์—๋งŒ ์ฑ„๋„ ์ ์œ  ์‹œ๊ฐ„์„ ์กฐ์ ˆํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” RACOTA ์˜ ํฌํ™” ๊ฐ์ง€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ƒ์šฉ Wi-Fi ์žฅ๋น„์— ๊ตฌํ˜„ํ•˜์—ฌ ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์‹ค์ธก์„ ํ†ตํ•ด RACOTA ๊ฐ€ ๊ณต์กดํ•˜๋Š” Wi-Fi์˜ ํฌํ™” ์—ฌ๋ถ€๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ๊ฐ์ง€ํ•ด๋ƒ„์„ ๋ณด์ธ๋‹ค. ๋˜ํ•œ ์šฐ๋ฆฌ๋Š” ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ RACOTA ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” LAA๊ฐ€ ๊ณต์กดํ•˜๋Š” Wi-Fi์—๊ฒŒ ๊ณต์ •ํ•œ airtime์„ ์ œ๊ณตํ•˜๊ณ  ๊ธฐ์กด LAA์™€ ๊ณต์กดํ•˜๋Š” Wi-Fi ๋Œ€๋น„ ์ตœ๋Œ€ 334%์˜ Wi-Fi ์ˆ˜์œจ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๊ฐ€์ ธ์˜ด์„ ๋ณด์ธ๋‹ค. ๋‘˜์งธ, ๊ฐ„ํ—์ ์ธ ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ๋Š” ๊ธฐ์กด LTE์˜ ๋งํฌ ์ ์‘ ๊ธฐ๋ฒ•์ธ adaptive modulation and coding (AMC)์ด ์ž˜ ๋™์ž‘ํ•˜์ง€ ์•Š์„ ์ˆ˜ ์žˆ๋‹ค. ๊ฐ„ํ—์ ์ธ ์ถฉ๋Œ์€ LAA ๊ธฐ์ง€๊ตญ์œผ๋กœ ํ•˜์—ฌ๊ธˆ modulation and coding scheme (MCS)์„ ๋‚ฎ์ถ”์–ด์„œ ๋‹ค์Œ ์ „์†ก์„ ํ•˜๋„๋ก ํ•˜๋Š”๋ฐ ๋‹ค์Œ ์ „์†ก ์‹œ์— ์ถฉ๋Œ์ด ๋ฐœ์ƒํ•˜์ง€ ์•Š๋Š”๋‹ค๋ฉด ๋ถˆํ•„์š”ํ•˜๊ฒŒ ๋‚ฎ์ถ˜ MCS๋กœ ์ธํ•ด ์ฃผํŒŒ์ˆ˜ ํšจ์œจ์ด ํฌ๊ฒŒ ์ €ํ•˜๋œ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ์œ„ํ•ด ์šฐ๋ฆฌ๋Š” ์ถฉ๋Œ ์ธ์‹ ๋งํฌ ์ ์‘ ๊ธฐ๋ฒ•์ธ COALA ๋ฅผ ์ œ์•ˆํ•œ๋‹ค. COALA ๋Š” k-means ๋ฌด๊ฐ๋… ํด๋Ÿฌ์Šคํ„ฐ๋ง ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์‚ฌ์šฉํ•˜์—ฌ channel quality indicator (CQI) ๋ฆฌํฌํŠธ ์ค‘ ์ถฉ๋Œ ๊ฐ„์„ญ์— ์˜ํ–ฅ์„ ๋ฐ›์€ CQI ๋ฆฌํฌํŠธ๋“ค์„ ๊ตฌ๋ณ„ํ•ด๋‚ด๊ณ  ์ด๋ฅผ ํ†ตํ•ด ๋‹ค์Œ ์ „์†ก์„ ์œ„ํ•œ ์ตœ์ ์˜ MCS๋ฅผ ์„ ํƒํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ์‹ค์ธก์„ ํ†ตํ•˜์—ฌ COALA ๊ฐ€ ์ •ํ™•ํ•˜๊ฒŒ ์ถฉ๋Œ์„ ๊ฐ์ง€ํ•ด๋ƒ„์„ ๋ณด์ธ๋‹ค. ๋˜ํ•œ ์šฐ๋ฆฌ๋Š” ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ COALA ๊ฐ€ AMC ๋Œ€๋น„ ์ตœ๋Œ€ 74.9%์˜ ์‚ฌ์šฉ์ž ์ธ์‹ ์ˆ˜์œจ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๊ฐ€์ ธ์˜ด์„ ๋ณด์ธ๋‹ค. ์…‹์งธ, ์šฐ๋ฆฌ๋Š” ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์˜ ๋ถ€์ž‘์šฉ์„ ์ตœ์†Œํ™”ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์ˆ˜์‹  ๋‹จ๋ง์„ ๊ณ ๋ คํ•˜์—ฌ ์ „์†ก ํŒŒ์›Œ ๋ฐ ์—๋„ˆ์ง€ ๊ฒ€์ถœ ์—ญ์น˜๋ฅผ ์ ์‘์ ์œผ๋กœ ์กฐ์ ˆํ•˜๋Š” PETAL ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ๋จผ์ € ์ˆ˜์‹  ๋‹จ๋ง์„ ๊ณ ๋ คํ•˜์ง€ ์•Š๊ณ  ๊ณต๊ฒฉ์ ์œผ๋กœ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•˜๋Š” baseline ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์„ค๊ณ„ํ•˜๊ณ  ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ์ˆ˜์‹  ๋‹จ๋ง์ด ๊ฐ„์„ญ์›์— ๊ฐ€๊นŒ์šด ๊ฒฝ์šฐ baseline ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ์„ฑ๋Šฅ์ด ์‹ฌ๊ฐํ•˜๊ฒŒ ์—ดํ™”๋จ์„ ๋ณด์ธ๋‹ค. ์ œ์•ˆํ•˜๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜์ธ PETAL ์€ ์ˆ˜์‹  ๋‹จ๋ง๋กœ๋ถ€ํ„ฐ ๋ฐ›์€ CQI ๋ฆฌํฌํŠธ ์ •๋ณด์™€ ์ฑ„๋„ ์ ์œ  ์‹œ์ ๊นŒ์ง€์˜ ํ‰๊ท  ๋Œ€๊ธฐ ์‹œ๊ฐ„์„ ์ด์šฉํ•˜์—ฌ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•  ๋•Œ ์˜ˆ์ƒ๋˜๋Š” ์ฃผํŒŒ์ˆ˜ ํšจ์œจ๊ณผ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•˜์ง€ ์•Š์„ ๋•Œ ์˜ˆ์ƒ๋˜๋Š” ์ฃผํŒŒ์ˆ˜ ํšจ์œจ์„ ๋น„๊ตํ•˜์—ฌ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•  ๋•Œ ์˜ˆ์ƒ๋˜๋Š” ์ฃผํŒŒ์ˆ˜ ํšจ์œจ์ด ๋” ํด ๋•Œ์—๋งŒ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์„ ํ•œ๋‹ค. ์šฐ๋ฆฌ๋Š” ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ PETAL ์ด baseline ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋Œ€๋น„ ์ตœ๋Œ€ 329%์˜ ์ˆ˜์œจ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๊ฐ€์ ธ์˜ด์„ ๋ณด์ธ๋‹ค. ์š”์•ฝํ•˜์ž๋ฉด, ์šฐ๋ฆฌ๋Š” LAA์˜ ๋“ฑ์žฅ๊ณผ ํ•จ๊ป˜ ์ƒˆ๋กญ๊ฒŒ ๋Œ€๋‘๋˜๋Š” ํฅ๋ฏธ๋กœ์šด ๋ฌธ์ œ๋“ค์„ ํ™•์ธํ•˜๊ณ  ๋ฌธ์ œ๋“ค์˜ ์‹ฌ๊ฐ์„ฑ์„ ๋‹ค์–‘ํ•œ ํ™˜๊ฒฝ์—์„œ์˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ์‚ดํŽด๋ณด๊ณ  ์ด ๋Ÿฌํ•œ ๋ฌธ์ œ๋“ค์„ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. Wi-Fi์™€ LAA ์‚ฌ์ด์˜ airtime ๊ณต์ •์„ฑ์€ LAA์˜ ์—ฐ์† ์ „์†ก ์‹œ๊ฐ„์„ ์ ์‘์ ์œผ๋กœ ์กฐ์ ˆํ•˜์—ฌ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ ๋งํฌ ์ ์‘ ์ •ํ™•๋„์™€ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ ๋™์ž‘์˜ ํšจ์œจ์„ฑ์€ CQI ๋ฆฌํฌํŠธ๋“ค์˜ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฐœ์„ ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ œ์•ˆํ•˜๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜๋“ค์˜ ์„ฑ๋Šฅ์€ ์‹œ์Šคํ…œ ๋ ˆ๋ฒจ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•˜์—ฌ ๊ฒ€์ฆ๋˜์—ˆ๋‹ค.1 Introduction 1 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Overview of Existing Approaches . . . . . . . . . . . . . . . . . . . 2 1.3 Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3.1 RACOTA: Receiver-Aware Channel Occupancy Time Adaptation for LTE-LAA . . . . . . . 2 1.3.2 COALA: Collision-Aware Link Adaptation for LTE-LAA . . 3 1.3.3 PETAL: Power and Energy Detection Threshold Adaptation for LAA . . . . . . . . . . . . . . 4 1.4 Organization of the Dissertation . . . . . . . . . . . . . . . . . . . . 5 2 RACOTA:Receiver-AwareChannelOccupancyTimeAdaptationforLTE- LAA 6 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 MAC Mechanisms of Wi-Fi and LAA . . . . . . . . . . . . . . . . . 10 2.3.1 Wi-Fi MAC Operation . . . . . . . . . . . . . . . . . . . . . 10 2.3.2 LAA Listen-Before-Talk (LBT) Mechanism . . . . . . . . . . 11 2.3.3 Wide Bandwidth Operation . . . . . . . . . . . . . . . . . . 13 2.4 Coexistence performance of LAA and Wi-Fi . . . . . . . . . . . . . . 14 2.4.1 Simulation Setup . . . . . . . . . . . . . . . . . . . . . . . . 14 2.4.2 Unfairness between LAA and Wi-Fi . . . . . . . . . . . . . . 15 2.5 Receiver-Aware COT Adaptation Algorithm . . . . . . . . . . . . . . 17 2.5.1 Saturation Detection (SD) . . . . . . . . . . . . . . . . . . . 20 2.5.2 Receiver-Aware COT Decision . . . . . . . . . . . . . . . . . 22 2.6 Performance Evaluation of SD Algorithm . . . . . . . . . . . . . . . 22 2.6.1 Measurement Setup . . . . . . . . . . . . . . . . . . . . . . . 22 2.6.2 PPDUMaxTime Detection . . . . . . . . . . . . . . . . . . . 24 2.6.3 Saturation Detection Performance . . . . . . . . . . . . . . . 26 2.7 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 27 2.7.1 Saturated Traffic Scenario . . . . . . . . . . . . . . . . . . . 28 2.7.2 Unsaturated Traffic Scenario . . . . . . . . . . . . . . . . . . 30 2.7.3 Bursty Traffic Scenario . . . . . . . . . . . . . . . . . . . . . 30 2.7.4 Heterogeneous Wi-Fi Traffic Generation Scenario . . . . . . 31 2.7.5 Multiple Node Scenario . . . . . . . . . . . . . . . . . . . . 34 2.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3 COALA: Collision-Aware Link Adaptation for LTE-LAA 36 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 3.2 Backgound and Related Work . . . . . . . . . . . . . . . . . . . . . 38 3.2.1 LAA and LBT . . . . . . . . . . . . . . . . . . . . . . . . . 38 3.2.2 AMC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 3.2.3 Inter-Cell Interference Cancellation . . . . . . . . . . . . . . 39 3.2.4 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 40 3.3 Impact of Collision to Link Adaptation . . . . . . . . . . . . . . . . . 41 3.4 COALA: Collision-aware Link Adaptation . . . . . . . . . . . . . . . 47 3.4.1 CQI Clustering Algorithm . . . . . . . . . . . . . . . . . . . 48 3.4.2 Collision Detection and Collision Probability Estimation . . . 48 3.4.3 Suitable MCS Selection . . . . . . . . . . . . . . . . . . . . 49 3.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 50 3.5.1 Prototype-based Feasibility Study . . . . . . . . . . . . . . . 51 3.5.2 Contention Collision with LAA eNBs . . . . . . . . . . . . . 53 3.5.3 Hidden Collision . . . . . . . . . . . . . . . . . . . . . . . . 57 3.5.4 Bursty Hidden Collision . . . . . . . . . . . . . . . . . . . . 58 3.5.5 Contention Collision with Wi-Fi Transmitters . . . . . . . . . 58 3.6 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 4 PETAL: Power and Energy Detection Threshold Adaptation for LAA 62 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 4.2 Backgound and Related Work . . . . . . . . . . . . . . . . . . . . . 64 4.2.1 Energy Detection Threshold . . . . . . . . . . . . . . . . . . 64 4.2.2 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . 64 4.3 Baseline Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 4.3.1 Design of the Baseline Algorithm . . . . . . . . . . . . . . . 65 4.3.2 Performance of the Baseline Algorithm . . . . . . . . . . . . 66 4.4 PETAL: Power and Energy Detection Threshold Adaptation . . . . . 68 4.4.1 CQI Management . . . . . . . . . . . . . . . . . . . . . . . . 69 4.4.2 Success Probability and Airtime Ratio Estimation . . . . . . . 69 4.4.3 CQI Clustering Algorithm . . . . . . . . . . . . . . . . . . . 71 4.4.4 SR Decision . . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.5.1 Two Cell Scenario . . . . . . . . . . . . . . . . . . . . . . . 73 4.5.2 Coexistence with Standard LAA . . . . . . . . . . . . . . . . 75 4.5.3 Four Cell Scenario . . . . . . . . . . . . . . . . . . . . . . . 76 4.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 5 Concluding Remarks 79 5.1 Research Contributions . . . . . . . . . . . . . . . . . . . . . . . . . 79 Abstract (In Korean) 88 ๊ฐ์‚ฌ์˜ ๊ธ€ 92Docto

    Belaidลพio ryลกio tinklลณ terpฤ—s prieigos valdymo tyrimas

    Get PDF
    Over the years, consumer requirements for Quality of Service (QoS) has been growing exponentially. Recently, the ratification process of newly IEEE 802.11ad amendment to IEEE 802.11 was finished. The IEEE 802.11ad is the newly con-sumer wireless communication approach, which will gain high spot on the 5G evolution. Major players in wireless market, such as Qualcomm already are inte-grating solutions from unlicensed band, like IEEE 802.11ac, IEEE 802.11ad into their architecture of LTE PRO (the next evolutionary step for 5G networking) (Qualcomm 2013; Parker et al. 2015). As the demand is growing both in enter-prise wireless networking and home consumer markets. Consumers started to no-tice the performance degradation due to overcrowded unlicensed bands. The un-licensed bands such as 2.4 GHz, 5 GHz are widely used for up-to-date IEEE 802.11n/ac technologies with upcoming IEEE 802.11ax. However, overusage of the available frequency leads to severe interference issue and consequences in to-tal system performance degradation, currently existing wireless medium access method can not sustain the increasing intereference and thus wireless needs a new methods of wireless medium access. The main focal point of this dissertation is to improve wireless performance in dense wireless networks. In dissertation both the conceptual and multi-band wireless medium access methods are considered both from theoretical point of view and experimental usage. The introduction chapter presents the investigated problem and itโ€™s objects of research as well as importance of dissertation and itโ€™s scientific novelty in the unlicensed wireless field. Chapter 1 revises used literature. Existing and up-to-date state-of-the-art so-lution are reviewed, evaluated and key point advantages and disadvantages are analyzed. Conclusions are drawn at the end of the chapter. Chapter 2 describes theoretical analysis of wireless medium access protocols and the new wireless medium access method. During analysis theoretical simula-tions are performed. Conclusions are drawn at the end of the chapter. Chapter 3 is focused on the experimental components evaluation for multi-band system, which would be in line with theoretical concept investigations. The experimental results, showed that components of multi-band system can gain sig-nificant performance increase when compared to the existing IEEE 802.11n/ac wireless systems. General conclusions are drawn after analysis of measurement results
    • โ€ฆ
    corecore