68 research outputs found

    Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi

    Get PDF
    We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show that mixing scheduled and random access incurs and inherent throughput/delay cost, the cost of heterogeneity. We derive the joint proportional fair rate allocation, which casts useful light on current LTE/WiFi discussions. We present experimental results on inter-technology detection and consider the impact of imperfect carrier sensing.Comment: 14 pages, 8 figures, journa

    Coding in 802.11 WLANs

    Get PDF
    Forward error correction (FEC) coding is widely used in communication systems to correct transmis- sion errors. In IEEE 802.11a/g transmitters, convolutional codes are used for FEC at the physical (PHY) layer. As is typical in wireless systems, only a limited choice of pre-speci¯ed coding rates is supported. These are implemented in hardware and thus di±cult to change, and the coding rates are selected with point to point operation in mind. This thesis is concerned with using FEC coding in 802.11 WLANs in more interesting ways that are better aligned with application requirements. For example, coding to support multicast tra±c rather than simple point to point tra±c; coding that is cognisant of the multiuser nature of the wireless channel; and coding which takes account of delay requirements as well as losses. We consider layering additional coding on top of the existing 802.11 PHY layer coding, and investigate the tradeo® between higher layer coding and PHY layer modulation and FEC coding as well as MAC layer scheduling. Firstly we consider the joint multicast performance of higher-layer fountain coding concatenated with 802.11a/g OFDM PHY modulation/coding. A study on the optimal choice of PHY rates with and without fountain coding is carried out for standard 802.11 WLANs. We ¯nd that, in contrast to studies in cellular networks, in 802.11a/g WLANs the PHY rate that optimizes uncoded multicast performance is also close to optimal for fountain-coded multicast tra±c. This indicates that in 802.11a/g WLANs cross-layer rate control for higher-layer fountain coding concatenated with physical layer modulation and FEC would bring few bene¯ts. Secondly, using experimental measurements taken in an outdoor environment, we model the chan- nel provided by outdoor 802.11 links as a hybrid binary symmetric/packet erasure channel. This hybrid channel o®ers capacity increases of more than 100% compared to a conventional packet erasure channel (PEC) over a wide range of RSSIs. Based upon the established channel model, we further consider the potential performance gains of adopting a binary symmetric channel (BSC) paradigm for multi-destination aggregations in 802.11 WLANs. We consider two BSC-based higher-layer coding approaches, i.e. superposition coding and a simpler time-sharing coding, for multi-destination aggre- gated packets. The performance results for both unicast and multicast tra±c, taking account of MAC layer overheads, demonstrate that increases in network throughput of more than 100% are possible over a wide range of channel conditions, and that the simpler time-sharing approach yields most of these gains and have minor loss of performance. Finally, we consider the proportional fair allocation of high-layer coding rates and airtimes in 802.11 WLANs, taking link losses and delay constraints into account. We ¯nd that a layered approach of separating MAC scheduling and higher-layer coding rate selection is optimal. The proportional fair coding rate and airtime allocation (i) assigns equal total airtime (i.e. airtime including both successful and failed transmissions) to every station in a WLAN, (ii) the station airtimes sum to unity (ensuring operation at the rate region boundary), and (iii) the optimal coding rate is selected to maximise goodput (treating packets decoded after the delay deadline as losses)

    Survey of Spectrum Sharing for Inter-Technology Coexistence

    Full text link
    Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and non-technical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e. (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions

    Offered load and stability controls in multi-hop wireless networks.

    Get PDF
    Ng Ping-chung.Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.Includes bibliographical references (leaves 71-72).Abstracts in English and Chinese.Chapter Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Overview and Motivation --- p.1Chapter 1.2 --- Background of Offered Load Control --- p.2Chapter 1.3 --- Background of Stability Control --- p.3Chapter 1.4 --- Organization of the Thesis --- p.4Chapter Chapter 2 --- Performance Problems and Solutions --- p.6Chapter 2.1 --- Simulation Set-up --- p.6Chapter 2.2 --- High Packet-Drop Rate --- p.7Chapter 2.3 --- Re-routing Instability --- p.8Chapter 2.3.1 --- Hidden-Node Problem --- p.8Chapter 2.3.2 --- Ineffectiveness of Solving Hidden-Node Problem with RTS/CTS …… --- p.9Chapter 2.4 --- Solutions to High-Packet Loss Rate and Re-routing Instability --- p.10Chapter 2.4.1 --- Link-Failure Re-routing --- p.11Chapter 2.4.2 --- Controlling Offered Load --- p.13Chapter 2.5 --- Verification of Simulation Results with Real-life Experimental Measurements --- p.14Chapter Chapter 3 --- Offered Load Control --- p.16Chapter 3.1 --- Capacity Limited by the Hidden-node and Exposed-node Problems --- p.16Chapter 3.1.1 --- Signal Capture --- p.18Chapter 3.1.2 --- Analysis of Vulnerable Period induced by Hidden Nodes --- p.20Chapter 3.1.3 --- Analysis of Vulnerable Period induced by Exposed Nodes --- p.21Chapter 3.1.4 --- Sustainable Throughput --- p.22Chapter 3.2 --- Capacity Limited by Carrier Sensing Property --- p.23Chapter 3.3 --- Numerical Results --- p.26Chapter 3.4 --- General Throughput Analysis of a Single Multi-hop Traffic Flow --- p.29Chapter 3.5 --- Throughput Analysis on Topologies with Variable Distances between Successive Nodes --- p.31Chapter Chapter 4 --- Discussions of Other Special Cases --- p.33Chapter 4.1 --- A Carrier-sensing Limited Example --- p.33Chapter 4.2 --- A Practical Solution to Improve Throughput --- p.34Chapter Chapter 5 --- Achieving Fairness in Other Network Topologies --- p.36Chapter 5.1 --- Lattice Topology --- p.36Chapter Chapter 6 --- Stability Control --- p.39Chapter 6.1 --- Ad-hoc routing protocols --- p.39Chapter 6.2 --- Proposed scheme --- p.40Chapter 6.2.1 --- Original AODV --- p.41Chapter 6.2.2 --- AODV with Proposed Scheme --- p.42Chapter 6.2.2.1 --- A Single Flow in a Single Chain of Nodes --- p.43Chapter 6.2.2.2 --- Real-break Case --- p.44Chapter 6.3 --- Improvements --- p.45Chapter Chapter 7 --- Impacts of Data Transmission Rate and Payload Size --- p.48Chapter 7.1 --- Signal Capture --- p.48Chapter 7.2 --- Vulnerable region --- p.50Chapter Chapter 8 --- Performance Enhancements in Multiple Flows --- p.53Chapter 8.1 --- Impacts of Re-routing Instability in Two Flow Topology --- p.53Chapter 8.2 --- Impacts of Vulnerable Periods in Multiple Flow Topologies --- p.55Chapter 8.2.1 --- The Vulnerable Period induced by Individual Hidden-terminal Flow --- p.57Chapter 8.2.2 --- The Number of Hidden-terminal Flows --- p.58Chapter 8.2.3 --- Correlation between Hidden-terminal Flows --- p.60Chapter Chapter 9 --- Conclusion --- p.63Chapter Appendix A: --- General Throughput Analysis of a Single Multi-hop Traffic Flow --- p.67Chapter A.l --- Capacity Limited by Hidden-node and Exposed-Node --- p.67Chapter A.1.1 --- Sustainable Throughput --- p.68Chapter A.2 --- Capacity Limited by Carrier Sensing Property --- p.68Bibliography --- p.7

    Adaptive Two-Level Frame Aggregation for Fairness and Efficiency in IEEE 802.11n Wireless LANs

    Get PDF

    Flexible Spectrum Assignment for Local Wireless Networks

    Get PDF
    In this dissertation, we consider the problem of assigning spectrum to wireless local-area networks (WLANs). In line with recent IEEE 802.11 amendments and newer hardware capabilities, we consider situations where wireless nodes have the ability to adapt not only their channel center-frequency but also their channel width. This capability brings an important additional degree of freedom, which adds more granularity and potentially enables more efficient spectrum assignments. However, it also comes with new challenges; when consuming a varying amount of spectrum, the nodes should not only seek to reduce interference, but they should also seek to efficiently fill the available spectrum. Furthermore, the performances obtained in practice are especially difficult to predict when nodes employ variable bandwidths. We first propose an algorithm that acts in a decentralized way, with no communication among the neighboring access points (APs). Despite being decentralized, this algorithm is self-organizing and solves an explicit tradeoff between interference mitigation and efficient spectrum usage. In order for the APs to continuously adapt their spectrum to neighboring conditions while using only one network interface, this algorithm relies on a new kind of measurement, during which the APs monitor their surrounding networks for short durations. We implement this algorithm on a testbed and observe drastic performance gains compared to default spectrum assignments, or compared to efficient assignments using a fixed channel width. Next, we propose a procedure to explicitly predict the performance achievable in practice, when nodes operate with arbitrary spectrum configurations, traffic intensities, transmit powers, etc. This problem is notoriously difficult, as it requires capturing several complex interactions that take place at the MAC and PHY layers. Rather than trying to find an explicit model acting at this level of generality, we explore a different point in the design space. Using a limited number of real-world measurements, we use supervised machine-learning techniques to learn implicit performance models. We observe that these models largely outperform other measurement-based models based on SINR, and that they perform well, even when they are used to predict performance in contexts very different from the context prevailing during the initial set of measurements used for learning. We then build a second algorithm that uses the above-mentioned learned models to assign the spectrum. This algorithm is distributed and collaborative, meaning that neighboring APs have to exchange a limited amount of control traffic. It is also utility-optimal -- a feature enabled both by the presence of a model for predicting performance and the ability of APs to collaboratively take decisions. We implement this algorithm on a testbed, and we design a simple scheme that enables neighboring APs to discover themselves and to implement collaboration using their wired backbone network. We observe that it is possible to effectively gear the performance obtained in practice towards different objectives (in terms of efficiency and/or fairness), depending on the utility functions optimized by the nodes. Finally, we study the problem of scheduling packets both in time and frequency domains. Such ways of scheduling packets have been made possible by recent progress in system design, which make it possible to dynamically tune and negotiate the spectrum band [...

    Fair coexistence of scheduled and random access wireless networks: unlicensed LTE/WiFi

    Get PDF
    We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly withWiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this paper, we show that mixing scheduled and random access incurs an inherent throughput/delay cost and the cost of heterogeneity. We derive the joint proportional fair rate allocation, which casts useful light on current LTE/WiFi discussions. We present experimental results on inter-technology detection and consider the impact of imperfect carrier sensing.This work was supported in part by the Science Foundation Ireland under Grant 11/PI/1177 and Grant 13/RC/207, in part by the European Commission in the framework of the H2020-ICT-2014-2 Project Flex5Gware under Grant 671563, and in part by the Spanish Ministry of Economy and the FEDER regional development fund through SINERGIA Project under Grant TEC2015-71303-R
    • …
    corecore