17 research outputs found

    A Framework for Handling Heterogeneous M2M Traffic

    Get PDF
    Sensors, actuators and devices that compose the Internet of Things (IoT) world are becoming more diverse every day in terms of capabilities and amount of generated traffic. Current Machine-to-Machine (M2 M) communication standardization efforts try to formalize the interfaces between M2 M nodes based on the perspective of exchanging uniform small data size with low sampling rate only. However, many devices will require support for more heterogeneous traffic patterns, with different network capacity. This paper introduces a communication concept for supporting gracefully a heterogeneous set of devices. This paper analyses the effect of traffic size in M2 M transactions and propose a concept to adapt gracefully to support heterogeneous traffic patterns in M2 M systems. To prove its feasibility, the concept is exemplified on top of oneM2 M architecture and implemented as part of the Fraunhofer FOKUS OpenMTC toolkit. Additionally, the concept was applied to a deployment in an E-Health pilot and practical measurements during functional evaluation are reported

    Novel approach for hybrid MAC scheme for balanced energy and transmission in sensor devices

    Get PDF
    Hybrid medium access control (MAC) scheme is one of the prominent mechanisms to offer energy efficiency in wireless sensor network where the potential features for both contention-based and schedule-based approaches are mechanized. However, the review of existing hybrid MAC scheme shows many loopholes where mainly it is observed that there is too much inclusion of time-slotting or else there is an inclusion of sophisticated mechanism not meant for offering flexibility to sensor node towards extending its services for upcoming applications of it. Therefore, this manuscript introduces a novel hybrid MAC scheme which is meant for offering cost effective and simplified scheduling operation in order to balance the performance of energy efficiency along with data aggregation performance. The simulated outcome of the study shows that proposed system offers better energy consumption, better throughput, reduced memory consumption, and faster processing in contrast to existing hybrid MAC protocols

    Energy efficient and delay-aware adaptive slot allocation medium access control protocol for Wireless Body Area Network

    Get PDF
    Wireless Body Area Network (WBAN) is the cheapest solution using BioMedical Sensors. They monitor different physiological vital signs of a patient. The output of vital signs does not accept collision, delay, loss, and a high energy consumption of BMSs. This paper proposes Energy Efficient and Delay-Aware Adaptive Slots Allocation Medium Access Control (EED-MAC) Protocol for WBAN. This Proposed MAC provides sufficient and dedicated channels to all types of BMSs. The patient's data are divided according to the need of a patient. Moreover, the contentions of BMSs are reduced and does not drop data by proposing a Reduced Contention Adaptive Slots Allocation CSMA/CA (RCA-CSMA/CA) scheme. The third proposed scheme is Reliability-Aware Channel Allocation (RAC), which allocates channels for emergency-based BMSs using alert signals without contention. The simulation of the proposed MAC and other schemes achieve significant improvements against the state-of-the-art MAC protocols

    An efficient MAC protocol with adaptive energy harvesting for machine-to-machine networks

    Full text link
    In a machine-to-machine network, the throughput performance plays a very important role. Recently, an attractive energy harvesting technology has shown great potential to the improvement of the network throughput, as it can provide consistent energy for wireless devices to transmit data. Motivated by that, an efficient energy harvesting-based medium access control (MAC) protocol is designed in this paper. In this protocol, different devices first harvest energy adaptively and then contend the transmission opportunities with energy level related priorities. Then, a new model is proposed to obtain the optimal throughput of the network, together with the corresponding hybrid differential evolution algorithm, where the involved variables are energy-harvesting time, contending time, and contending probability. Analytical and simulation results show that the network based on the proposed MAC protocol has greater throughput than that of the traditional methods. In addition, as expected, our scheme has less transmission delay, further enhancing its superiority

    ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์••์ถ•์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2019. 2. ์ด๊ด‘๋ณต.Massive machine-type communication (mMTC) is a newly introduced service category in 5G wireless communication systems to support a variety of Internet-of-Things (IoT) applications. In the mMTC network, a large portion of devices is inactive and hence does not transmit data. Thus, the transmit vector consisting of data symbols of both active and inactive devices can be readily modeled as a sparse vector. In recovering sparsely represented multi-user vectors, compressed sensing based multi-user detection (CS-MUD) can be used. CS-MUD is a feasible solution to the grant-free uplink non-orthogonal multiple access (NOMA) environments. In this dissertation, two novel techniques regarding CS-MUD for mMTC networks are proposed. In the first part of the dissertation, the sparsity-aware ordered successive interference cancellation (SA-OSIC) technique is proposed. In CS-MUD, multi-user vectors are detected based on a sparsity-aware maximum a posteriori probability (S-MAP) criterion. To reduce the computational complexity of S-MAP detection, sparsity-aware successive interference cancellation (SA-SIC) can be used. SA-SIC is a simple low-complexity scheme that recovers transmit symbols in a sequential manner. However, SA-SIC does not perform well without proper layer sorting due to error propagation. When multi-user vectors are sparse and each device is active with a distinct probability, the detection order determined solely by channel gains might not be optimal. In this dissertation, to reduce the error propagation and enhance the performance of SA-SIC, an activity-aware sorted QR decomposition (A-SQRD) algorithm that finds the optimal detection order is proposed. The proposed technique finds the optimal detection order based on the activity probabilities and channel gains of machine-type devices. Numerical results verify that the proposed technique greatly improves the performance of SA-SIC. In the second part of the dissertation, the expectation propagation based joint AUD and CE (EP-AUD/CE) technique is proposed. In several studies regarding CS-MUD, the uplink channel state information (CSI) from the MTD to the BS is assumed to be perfectly known to the BS. In practice, however, the uplink CSI from the devices to the BS should be estimated before data detection. To address this issue, various joint active user detection (AUD) and channel estimation (CE) schemes have been proposed. Since only a few devices are active at one time, an element-wise (i.e., Hadamard) product of the binary activity pattern and the channel vector is also a sparse vector and thus compressed sensing (CS)-based technique is a good fit for the problem at hand. One potential shortcoming in these studies is that a prior distribution of the sparse vector is not exploited. In fact, these studies are based on the non-Bayesian greedy algorithms such as the orthogonal matching pursuit (OMP) and approximate message passing (AMP) algorithms, which do not require a prior distribution of the sparse vector. In essence, these algorithms find out non-zero values based on the instantaneous correlation between the sensing matrix and the observation vector so that they might not be effective in the situation where the prior distribution is available. In this case, clearly, by exploiting the statistical distribution of the sparse vector, the performance of AUD and CE can be improved substantially. The proposed technique finds the best approximation of the posterior distribution of the sparse channel vector based on the expectation propagation (EP) algorithm. Using the approximate distribution, AUD and CE are jointly performed. Numerical simulations show that the proposed technique substantially enhances AUD and CE performances over competing algorithms.๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ (massive machine-type communications, mMTC)์€ ๋‹ค์–‘ํ•œ ์‚ฌ๋ฌผ ์ธํ„ฐ๋„ท(internet of things, IoT) ์„œ๋น„์Šค๋ฅผ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ์ฐจ์„ธ๋Œ€ ๋ฌด์„  ํ†ต์‹  ํ‘œ์ค€์— ์ƒˆ๋กœ ๋„์ž…๋œ ์„œ๋น„์Šค ๋ฒ”์ฃผ์ด๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹  ํ™˜๊ฒฝ์—์„œ๋Š” ๋งŽ์€ ์ˆ˜์˜ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ(machine-type device, MTD)๊ฐ€ ๋Œ€๋ถ€๋ถ„์˜ ํƒ€์ž„ ์Šฌ๋กฏ(time slot)์—์„œ ๋น„ํ™œ์„ฑ ์ƒํƒœ์ด๋ฉฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ „์†กํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋”ฐ๋ผ์„œ, ํ™œ์„ฑ ๋ฐ ๋น„ํ™œ์„ฑ ๊ธฐ๊ธฐ ๋ชจ๋‘์˜ ๋ฐ์ดํ„ฐ ์‹ฌ๋ณผ๋กœ ๊ตฌ์„ฑ๋œ ์ „์†ก ๋ฒกํ„ฐ๋Š” ํฌ์†Œ(sparse) ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ๋กœ ํ‘œํ˜„๋œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋ฅผ ๋ณต์›ํ•˜๊ธฐ ์œ„ํ•ด, ์••์ถ• ์„ผ์‹ฑ ๊ธฐ๋ฐ˜ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(CS-MUD)์ด ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค. CS-MUD๋Š” ์Šค์ผ€์ค„๋ง(scheduling) ์ ˆ์ฐจ๊ฐ€ ์—†๋Š” ์ƒํ–ฅ๋งํฌ(uplink) ๋น„์ง๊ต ๋‹ค์ค‘ ์ ‘์†(non-orthogonal multiple access, NOMA)์„ ์œ„ํ•œ ํ•ต์‹ฌ ๊ธฐ์ˆ  ์ค‘ ํ•˜๋‚˜์ด๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์„ ์œ„ํ•œ ์ƒˆ๋กœ์šด CS-MUD ๊ธฐ์ˆ ๋“ค์„ ์ œ์•ˆํ•œ๋‹ค. ๋…ผ๋ฌธ์˜ ์ฒซ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ •๋ ฌ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware ordered successive interference cancellation, SA-OSIC) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์—์„œ ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๋Š” ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ตœ๋Œ€ ์‚ฌํ›„ ํ™•๋ฅ (sparsity-aware maximum a posteriori probability, S-MAP) ๊ธฐ์ค€์— ๋”ฐ๋ผ ๊ฒ€์ถœ๋œ๋‹ค. S-MAP ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ํฌ์†Œ์„ฑ์„ ๊ณ ๋ คํ•œ ์ˆœ์ฐจ์  ๊ฐ„์„ญ ์ œ๊ฑฐ(sparsity-aware successive interference cancellation, SA-SIC)๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋‹ค. ํฌ์†Œ ๋ฐ์ดํ„ฐ ๋ฒกํ„ฐ ๊ฒ€์ถœ์˜ ๊ณ„์‚ฐ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉ๋˜๋Š” ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ ๊ธฐ์ˆ ์€ ์˜ค๋ฅ˜ ์ „ํŒŒ(error propagation)๋กœ ์ธํ•ด ์ ์ ˆํ•œ ์‚ฌ์šฉ์ž ์ •๋ ฌ ์—†์ด๋Š” ์„ฑ๋Šฅ์ด ์ข‹์ง€ ์•Š๋‹ค. ๋‹ค์ค‘ ์‚ฌ์šฉ์ž ๋ฒกํ„ฐ๊ฐ€ ํฌ์†Œ ๋ฒกํ„ฐ์ด๊ณ  ๊ฐ ๊ธฐ๊ธฐ๊ฐ€ ๋‹ค๋ฅธ ํ™•๋ฅ ๋กœ ํ™œ์„ฑ์ผ ๊ฒฝ์šฐ ์ฑ„๋„ ์ด๋“(channel gain)์— ์˜ํ•ด์„œ๋งŒ ๊ฒฐ์ •๋œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ์ˆœ์„œ๋Š” ์ตœ์ ์ด ์•„๋‹ ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š”, ์˜ค๋ฅ˜ ์ „ํŒŒ๋ฅผ ์ค„์ด๊ณ  ํฌ์†Œ์„ฑ ๊ณ ๋ ค ์—ฐ์† ๊ฐ„์„ญ ์ œ๊ฑฐ์˜ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒํ•˜๊ธฐ ์œ„ํ•ด ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ์˜ ํ™œ์„ฑ ํ™•๋ฅ (activity probability)๊ณผ ์ฑ„๋„ ์ด๋“์„ ๊ธฐ๋ฐ˜์œผ๋กœ ์ตœ์ ์˜ ๊ฒ€์ถœ ์ˆœ์„œ๋ฅผ ์ฐพ๋Š” ์ƒˆ๋กœ์šด ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ๊ฒ€์ถœ ์ˆœ์„œ ์ •๋ ฌ ๊ธฐ์ˆ ์€ ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ๋…ผ๋ฌธ์˜ ๋‘ ๋ฒˆ์งธ ๋ถ€๋ถ„์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ ๊ธฐ๋ฐ˜ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •(expectation propagation based active user detection channel estimation, EP-AUD/CE) ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. CS-MUD์— ๊ด€ํ•œ ๋ช‡๋ช‡ ์—ฐ๊ตฌ์—์„œ, ๊ฐ ์‚ฌ๋ฌผ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ(base station, BS)์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด(channel state information, CSI)๋Š” ๊ธฐ์ง€๊ตญ์— ์™„์ „ํžˆ ์•Œ๋ ค์ ธ ์žˆ๋‹ค๊ณ  ๊ฐ€์ •๋œ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์‹ค์ œ๋กœ๋Š”, ๋ฐ์ดํ„ฐ ๊ฒ€์ถœ ์ „์— ๊ฐ ๊ธฐ๊ธฐ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ง€๊ตญ์œผ๋กœ์˜ ์ƒํ–ฅ๋งํฌ ์ฑ„๋„ ์ƒํƒœ ์ •๋ณด๋ฅผ ์ถ”์ •ํ•ด์•ผ ํ•œ๋‹ค. ์ด ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ(active user detection, AUD) ๋ฐ ์ฑ„๋„ ์ถ”์ •(channel estimation, CE) ๊ธฐ์ˆ ์ด ์ œ์•ˆ๋˜์—ˆ๋‹ค. ๋Œ€๊ทœ๋ชจ ์‚ฌ๋ฌผ ํ†ต์‹ ์—์„œ๋Š” ํ•˜๋‚˜์˜ ํƒ€์ž„ ์Šฌ๋กฏ์— ์ ์€ ์ˆ˜์˜ ์žฅ์น˜๋งŒ ํ™œ์„ฑํ™”๋˜๊ธฐ ๋•Œ๋ฌธ์— ์ด์ง„(binary)๊ฐ’์œผ๋กœ ์ด๋ฃจ์–ด์ง„ ํ™œ์„ฑ ์—ฌ๋ถ€ ๋ฒกํ„ฐ์™€ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ๊ณฑ์€ ํฌ์†Œ ๋ฒกํ„ฐ๊ฐ€ ๋˜์–ด ์••์ถ•์„ผ์‹ฑ ์•Œ๊ณ ๋ฆฌ์ฆ˜์œผ๋กœ ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Ÿฌํ•œ ์—ฐ๊ตฌ๋“ค์˜ ๋‹จ์  ์ค‘ ํ•˜๋‚˜๋Š” ํฌ์†Œ ๋ฒกํ„ฐ์˜ ์‚ฌ์ „ ๋ถ„ํฌ(prior distritubion)๊ฐ€ ํ™œ์šฉ๋˜์ง€ ์•Š๋Š”๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ํฌ์†Œ ๋ฒกํ„ฐ์˜ ํ†ต๊ณ„์  ์‚ฌ์ „ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜๋ฉด ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ํฌ๊ฒŒ ํ–ฅ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š”, ๊ธฐ๋Œ“๊ฐ’ ์ „ํŒŒ(expectation propagation, EP) ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•ด ํฌ์†Œ ์ฑ„๋„ ๋ฒกํ„ฐ์˜ ์‚ฌํ›„ ๋ถ„ํฌ(posterior distribution)์˜ ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ฐพ๊ณ , ํ•ด๋‹น ๊ทผ์‚ฌ ๋ถ„ํฌ๋ฅผ ์ด์šฉํ•˜์—ฌ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ๊ณผ ์ฑ„๋„ ์ถ”์ •์„ ๋™์‹œ์— ์ˆ˜ํ–‰ํ•˜๋Š” ๊ธฐ์ˆ ์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆํ•œ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ • ๊ธฐ์ˆ ์€ ํ™œ์„ฑ ์‚ฌ์šฉ์ž ๊ฒ€์ถœ ๋ฐ ์ฑ„๋„ ์ถ”์ •์˜ ์„ฑ๋Šฅ์„ ์ƒ๋‹นํžˆ ํ–ฅ์ƒํ•จ์„ ๊ฒ€์ฆํ•˜์˜€๋‹ค.1 Introduction . . . . . 1 1.1 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 3 1.2 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 4 2 Sparsity-Aware Ordered Successive Interference Cancellation . . . . . 7 2.1 System model . . . . . 7 2.2 Sparsity-Aware Successive Interference Cancellation (SA-SIC) . . . . . 9 2.2.1 Derivation of S-MAP Detection . . . . . 9 2.2.2 Sparsity-Aware SIC (SA-SIC) Detection . . . . . 10 2.3 Proposed Activity-Aware Sorted-QRD (A-SQRD) Algorithm . . . . . 11 2.4 Complexity Analysis . . . . . 15 2.5 Numerical Results . . . . . 15 2.5.1 Simulation Setup . . . . . 16 2.5.2 Simulation Results . . . . . 20 3 Expectation Propagation-based Joint Active User Detection and Channel Estimation . . . . . 21 3.1 System model . . . . . 21 3.2 Joint Active User Detection and Channel Estimation . . . . . 23 3.3 EP-Based Active User Detection and Channel Estimation . . . . . 26 3.3.1 A Brief Review of Expectation Propagation . . . . . 29 3.3.2 Form of the Approximation . . . . . 30 3.3.3 Iterative EP Update Rules . . . . . 31 3.3.4 Active User Detection and Channel Estimation . . . . . 36 3.3.5 Data Detection . . . . . 37 3.3.6 Comments on Complexity . . . . . 38 3.4 Simulation Results and Discussions . . . . . 39 3.4.1 Simulation Setup . . . . . 39 3.4.2 Simulation Results . . . . . 52 4 Conclusion . . . . . 54 Abstract (In Korean) . . . . . 60Docto
    corecore