742 research outputs found
Cross-Sender Bit-Mixing Coding
Scheduling to avoid packet collisions is a long-standing challenge in
networking, and has become even trickier in wireless networks with multiple
senders and multiple receivers. In fact, researchers have proved that even {\em
perfect} scheduling can only achieve . Here
is the number of nodes in the network, and is the {\em medium
utilization rate}. Ideally, one would hope to achieve ,
while avoiding all the complexities in scheduling. To this end, this paper
proposes {\em cross-sender bit-mixing coding} ({\em BMC}), which does not rely
on scheduling. Instead, users transmit simultaneously on suitably-chosen slots,
and the amount of overlap in different user's slots is controlled via coding.
We prove that in all possible network topologies, using BMC enables us to
achieve . We also prove that the space and time
complexities of BMC encoding/decoding are all low-order polynomials.Comment: Published in the International Conference on Information Processing
in Sensor Networks (IPSN), 201
A Tutorial on Clique Problems in Communications and Signal Processing
Since its first use by Euler on the problem of the seven bridges of
K\"onigsberg, graph theory has shown excellent abilities in solving and
unveiling the properties of multiple discrete optimization problems. The study
of the structure of some integer programs reveals equivalence with graph theory
problems making a large body of the literature readily available for solving
and characterizing the complexity of these problems. This tutorial presents a
framework for utilizing a particular graph theory problem, known as the clique
problem, for solving communications and signal processing problems. In
particular, the paper aims to illustrate the structural properties of integer
programs that can be formulated as clique problems through multiple examples in
communications and signal processing. To that end, the first part of the
tutorial provides various optimal and heuristic solutions for the maximum
clique, maximum weight clique, and -clique problems. The tutorial, further,
illustrates the use of the clique formulation through numerous contemporary
examples in communications and signal processing, mainly in maximum access for
non-orthogonal multiple access networks, throughput maximization using index
and instantly decodable network coding, collision-free radio frequency
identification networks, and resource allocation in cloud-radio access
networks. Finally, the tutorial sheds light on the recent advances of such
applications, and provides technical insights on ways of dealing with mixed
discrete-continuous optimization problems
Pseudo-random Aloha for Enhanced Collision-recovery in RFID
In this letter we motivate the need to revisit the MAC protocol used in Gen2
RFID system in order to leverage receiver structures with Collision Recovery
capabilities at the PHY layer. To this end we propose to consider a simple
variant of the Framed Slotted Aloha with pseudo-random (deterministic) slot
selection as opposite to the classical random selection. Pseudo-random access
allows naturally to implement Inter-frame Successive Interference Cancellation
(ISIC) without changing the PHY modulation and coding format of legacy RFID
standard. By means of simulations we show that ISIC can bring 20-25% gain in
throughput with respect to traditional intra-frame SIC. Besides that, we
elaborate on the potential of leveraging pseudo-random access protocols in
combination with advanced PHY techniques in the context of RFID applications.Comment: This manuscript has been submitted to IEEE on the 19th September 201
Caraoke: An E-Toll Transponder Network for Smart Cities
Electronic toll collection transponders, e.g., E-ZPass, are a widely-used wireless technology. About 70% to 89% of the cars in US have these devices, and some states plan to make them mandatory. As wireless devices however, they lack a basic function: a MAC protocol that prevents collisions. Hence, today, they can be queried only with directional antennas in isolated spots. However, if one could interact with e-toll transponders anywhere in the city despite collisions, it would enable many smart applications. For example, the city can query the transponders to estimate the vehicle flow at every intersection. It can also localize the cars using their wireless signals, and detect those that run a red-light. The same infrastructure can also deliver smart street-parking, where a user parks anywhere on the street, the city localizes his car, and automatically charges his account. This paper presents Caraoke, a networked system for delivering smart services using e-toll transponders. Our design operates with existing unmodified transponders, allowing for applications that communicate with, localize, and count transponders, despite wireless collisions. To do so, Caraoke exploits the structure of the transponders' signal and its properties in the frequency domain. We built Caraoke reader into a small PCB that harvests solar energy and can be easily deployed on street lamps. We also evaluated Caraoke on four streets on our campus and demonstrated its capabilities.National Science Foundation (U.S.
Backscattering UWB/UHF hybrid solutions for multi-reader multi-tag passive RFID systems
Ultra-wideband (UWB) technology is foreseen as a promising solution to overcome the limits of ultra-high frequency (UHF) techniques toward the development of green radio frequency identification (RFID) systems with low energy consumption and localization capabilities. While UWB techniques have been already employed for active tags, passive tags solutions are more appealing also due to their lower cost. With the fundamental requirement of maintaining backward compatibility in the RFID domain, we propose a hybrid UWB/UHF architecture to improve passive tag identification both in single-reader and multi-reader scenarios. We then develop two hybrid algorithms: the first one exploits the UWB signal to improve ISO/IEC 18000-6C UHF standard, while the other one exploits UWB to enhance a compressive sensing (CS) technique for tag identification in the multi-reader, multi-tag scenario. Both solutions are able to improve success rate and reading speed in the tag identification process and reduce the energy consumption. The multi-reader version of the proposed approaches is based on a cooperative scheme in order to manage reader-tag collisions and reader-reader collisions besides the typical tag-tag collisions. Furthermore, timing synchronization non-idealities are analyzed for the proposed solutions and simulation results reveal the effectiveness of the developed schemes
- …