171 research outputs found

    Effect of unequal power allocation in turbo coded multi-route multi-hop networks, Journal of Telecommunications and Information Technology, 2006, nr 1

    Get PDF
    Multi-hop ad hoc networks are promising candidates for next generation mobile communications. They have sufficient channel capacity to achieve high data rate transmission for large number of users. One advantage of multi-hop networks is to realize multi-route transmissions. Since information bit streams can be transmitted over multiple routes, we can obtain route diversity effect. In order to enhance the route diversity effect, we usually introduce forward error correction schemes. Turbo coding is one of suitable coding methods for multi-hop networks. The turbo encoder generates one message stream and two parity streams whilst the message stream is more important than the parity streams for achieving reliable communications. Thus an unequal power allocation to the message and parity streams could be effective in improving the performance. In this paper, the effect of unequal power allocation for turbo coded multi-hop networks is investigated. Assuming the channel as additive white Gaussian and binary symmetric, we will show considerable performance improvement by unequal power allocation in terms of the bit error rate performance in multi-route multi-hop networks

    Journal of Telecommunications and Information Technology, 2006, nr 1

    Get PDF
    kwartalni

    Cooperative communications in wireless networks.

    Get PDF
    Zhang Jun.Thesis (M.Phil.)--Chinese University of Hong Kong, 2006.Includes bibliographical references (leaves 82-92).Abstracts in English and Chinese.Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Multipath Fading Channels --- p.1Chapter 1.2 --- Diversity --- p.3Chapter 1.3 --- Outline of the Thesis --- p.6Chapter 2 --- Background and Related Work --- p.8Chapter 2.1 --- Cooperative Diversity --- p.8Chapter 2.1.1 --- User Cooperation --- p.9Chapter 2.1.2 --- Cooperative Diversity --- p.10Chapter 2.1.3 --- Coded Cooperation --- p.12Chapter 2.2 --- Information-Theoretic Studies --- p.13Chapter 2.3 --- Multihop Cellular Networks --- p.15Chapter 2.3.1 --- MCN: Multihop Cellular Network --- p.15Chapter 2.3.2 --- iCAR: Integrated Cellular and Ad Hoc Relaying Systems --- p.17Chapter 2.3.3 --- UCAN: Unified Cellular and Ad Hoc Network Architecture --- p.17Chapter 2.4 --- Wireless Ad Hoc Networks --- p.18Chapter 2.5 --- Space-Time Processing --- p.20Chapter 3 --- Single-Source Multiple-Relay Cooperation System --- p.23Chapter 3.1 --- System Model --- p.23Chapter 3.2 --- Fixed Decode-and-Forward Cooperation System --- p.26Chapter 3.2.1 --- BER for system with errors at the relay --- p.28Chapter 3.2.2 --- General BER formula for single-source nr-relay cooperation system --- p.30Chapter 3.2.3 --- Discussion of Interuser Channels --- p.31Chapter 3.3 --- Relay Selection Protocol --- p.33Chapter 3.3.1 --- Transmission Protocol --- p.34Chapter 3.3.2 --- BER Analysis for Relay Selection Protocol --- p.34Chapter 4 --- Multiple-Source Multiple-Relay Cooperation System --- p.40Chapter 4.1 --- Transmission Protocol --- p.41Chapter 4.2 --- Fixed Cooperative Coding System --- p.43Chapter 4.2.1 --- Performance Analysis --- p.43Chapter 4.2.2 --- Numerical Results and Discussion --- p.48Chapter 4.3 --- Adaptive Cooperative Coding --- p.49Chapter 4.3.1 --- Performance Analysis of Adaptive Cooperative Coding System --- p.50Chapter 4.3.2 --- Analysis of p2(2) --- p.52Chapter 4.3.3 --- Numerical Results and Discussion --- p.53Chapter 5 --- Cooperative Multihop Transmission --- p.56Chapter 5.1 --- System Model --- p.57Chapter 5.1.1 --- Conventional Multihop Transmission --- p.58Chapter 5.1.2 --- Cooperative Multihop Transmission --- p.59Chapter 5.2 --- Performance Evaluation --- p.59Chapter 5.2.1 --- Conventional Multihop Transmission --- p.60Chapter 5.2.2 --- Cooperative Multihop Transmission --- p.60Chapter 5.2.3 --- Numerical Results --- p.64Chapter 5.3 --- Discussion --- p.64Chapter 5.3.1 --- Cooperative Range --- p.64Chapter 5.3.2 --- Relay Node Distribution --- p.67Chapter 5.3.3 --- Power Allocation and Distance Distribution (2-hop Case) --- p.68Chapter 5.4 --- Cooperation in General Wireless Ad Hoc Networks --- p.70Chapter 5.4.1 --- Cooperation Using Linear Network Codes --- p.71Chapter 5.4.2 --- Single-Source Single-Destination Systems --- p.74Chapter 5.4.3 --- Multiple-Source Single-Destination Systems --- p.75Chapter 6 --- Conclusion --- p.80Bibliography --- p.82Chapter A --- Proof of Proposition 1-4 --- p.93Chapter A.1 --- Proof of Proposition 1 --- p.93Chapter A.2 --- Proof of Proposition 2 --- p.95Chapter A.3 --- Proof of Proposition 3 --- p.95Chapter A.4 --- Proof of Proposition 4 --- p.9

    Towards reliable communication in LTE-A connected heterogeneous machine to machine network

    Get PDF
    Machine to machine (M2M) communication is an emerging technology that enables heterogeneous devices to communicate with each other without human intervention and thus forming so-called Internet of Things (IoTs). Wireless cellular networks (WCNs) play a significant role in the successful deployment of M2M communication. Specially the ongoing massive deployment of long term evolution advanced (LTE-A) makes it possible to establish machine type communication (MTC) in most urban and remote areas, and by using LTE-A backhaul network, a seamless network communication is being established between MTC-devices and-applications. However, the extensive network coverage does not ensure a successful implementation of M2M communication in the LTE-A, and therefore there are still some challenges. Energy efficient reliable transmission is perhaps the most compelling demand for various M2M applications. Among the factors affecting reliability of M2M communication are the high endto-end delay and high bit error rate. The objective of the thesis is to provide reliable M2M communication in LTE-A network. In this aim, to alleviate the signalling congestion on air interface and efficient data aggregation we consider a cluster based architecture where the MTC devices are grouped into number of clusters and traffics are forwarded through some special nodes called cluster heads (CHs) to the base station (BS) using single or multi-hop transmissions. In many deployment scenarios, some machines are allowed to move and change their location in the deployment area with very low mobility. In practice, the performance of data transmission often degrades with the increase of distance between neighboring CHs. CH needs to be reselected in such cases. However, frequent re-selection of CHs results in counter effect on routing and reconfiguration of resource allocation associated with CH-dependent protocols. In addition, the link quality between a CH-CH and CH-BS are very often affected by various dynamic environmental factors such as heat and humidity, obstacles and RF interferences. Since CH aggregates the traffic from all cluster members, failure of the CH means that the full cluster will fail. Many solutions have been proposed to combat with error prone wireless channel such as automatic repeat request (ARQ) and multipath routing. Though the above mentioned techniques improve the communication reliability but intervene the communication efficiency. In the former scheme, the transmitter retransmits the whole packet even though the part of the packet has been received correctly and in the later one, the receiver may receive the same information from multiple paths; thus both techniques are bandwidth and energy inefficient. In addition, with retransmission, overall end to end delay may exceed the maximum allowable delay budget. Based on the aforementioned observations, we identify CH-to-CH channel is one of the bottlenecks to provide reliable communication in cluster based multihop M2M network and present a full solution to support fountain coded cooperative communications. Our solution covers many aspects from relay selection to cooperative formation to meet the user’s QoS requirements. In the first part of the thesis, we first design a rateless-coded-incremental-relay selection (RCIRS) algorithm based on greedy techniques to guarantee the required data rate with a minimum cost. After that, we develop fountain coded cooperative communication protocols to facilitate the data transmission between two neighbor CHs. In the second part, we propose joint network and fountain coding schemes for reliable communication. Through coupling channel coding and network coding simultaneously in the physical layer, joint network and fountain coding schemes efficiently exploit the redundancy of both codes and effectively combat the detrimental effect of fading conditions in wireless channels. In the proposed scheme, after correctly decoding the information from different sources, a relay node applies network and fountain coding on the received signals and then transmits to the destination in a single transmission. Therefore, the proposed schemes exploit the diversity and coding gain to improve the system performance. In the third part, we focus on the reliable uplink transmission between CHs and BS where CHs transmit to BS directly or with the help of the LTE-A relay nodes (RN). We investigate both type-I and type-II enhanced LTE-A networks and propose a set of joint network and fountain coding schemes to enhance the link robustness. Finally, the proposed solutions are evaluated through extensive numerical simulations and the numerical results are presented to provide a comparison with the related works found in the literature

    Security and Prioritization in Multiple Access Relay Networks

    Get PDF
    In this work, we considered a multiple access relay network and investigated the following three problems: 1- Tradeoff between reliability and security under falsified data injection attacks; 2-Prioritized analog relaying; 3- mitigation of Forwarding Misbehaviors in Multiple access relay network. In the first problem, we consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays which may inject a falsified data into the network. To detect the malicious relays and discard (erase) data from them, tracing bits are embedded in the information data at each source node. Parity bits may be also added to correct the errors caused by fading and noise. When the total amount of redundancy, tracing bits plus parity bits, is fixed, an increase in parity bits to increase the reliability requires a decrease in tracing bits which leads to a less accurate detection of malicious behavior of relays, and vice versa. We investigate the tradeoff between the tracing bits and the parity bits in minimizing the probability of decoding error and maximizing the throughput in multi-source, multi-relay networks under falsified data injection attacks. The energy and throughput gains provided by the optimal allocation of redundancy and the tradeoff between reliability and security are analyzed. In the second problem, we consider a multiple access relay network where multiple sources send independent data simultaneously to a common destination through multiple relay nodes. We present three prioritized analog cooperative relaying schemes that provide different class of service (CoS) to different sources while being relayed at the same time in the same frequency band. The three schemes take the channel variations into account in determining the relay encoding (combining) rule, but differ in terms of whether or how relays cooperate. Simulation results on the symbol error probability and outage probability are provided to show the effectiveness of the proposed schemes. In the third problem, we propose a physical layer approach to detect the relay node that injects false data or adds channel errors into the network encoder in multiple access relay networks. The misbehaving relay is detected by using the maximum a posteriori (MAP) detection rule which is optimal in the sense of minimizing the probability of incorrect decision (false alarm and miss detection). The proposed scheme does not require sending extra bits at the source, such as hash function or message authentication check bits, and hence there is no transmission overhead. The side information regarding the presence of forwarding misbehavior is exploited at the decoder to enhance the reliability of decoding. We derive the probability of false alarm and miss detection and the probability of bit error, taking into account the lossy nature of wireless links

    Resource Allocation in Relay Networks

    Get PDF
    Demand for high data rates is increasing rapidly, due to the rapid rise of mobile data traffic volume. In order to meet the demands, the future generation of wireless communication systems has to support higher data rates and quality of service. The inherent unreliable and unpredictable nature of wireless medium provides a challenge for increasing the data rate. Cooperative communications, is a prominent technique to combat the detrimental fading effect in wireless communications. Adding relay nodes to the network, and creating s virtual multiple-input multiple-output (MIMO) antenna array is proven to be an efficient method to mitigate the multipath fading and expand the network coverage. Therefore, cooperative relaying is considered as a fundamental element in the Long Term Evolution (LTE)-Advanced standard. In this thesis, we address the problem of resource allocation in cooperative networks. We provide a detailed review on the resource allocation problem. We look at the joint subcarrier-relay assignment and power allocation. The objective of this optimization problem is to allocate the resources fairly, so even the cell-edge users with weakest communication links receive a fair share of resources. We propose a simple and practical algorithm to find the optimal solution. We assess the performance of the proposed algorithm by providing simulations. Furthermore, we investigate the optimality and complexity of the proposed algorithm. Due to the layered architecture of the wireless networks, to achieve the optimal performance it is necessary that the design of the algorithms be based on the underlying physical and link layers. For a cooperative network with correlated channels, we propose a cross-layer algorithm for relay selection, based on both the physical and link-layer characteristics, in order to maximize the linklayer throughput. The performance of the proposed algorithm is studied in different network models. Furthermore, we investigate the optimum number of relays required for cooperation in order to achieve maximum throughput. Buffering has proven to improve the performance of the cooperative network. In light of this, we study the performance of buffer-aided relay selection. In order to move one step closer to the practical applications, we consider a system with coded transmissions. We study three different coding schemes: convolutional code, Turbo code, and distributed Turbo code (DTC). For each scheme, the performance of the system is simulated and assessed analytically. We derive a closed form expression of the average throughput. Using the analysis results, we investigate the diversity gain of the system in asymptotic conditions. Further, we investigate the average transmission delay for different schemes

    Capacity Approaching Coding Strategies for Machine-to-Machine Communication in IoT Networks

    Get PDF
    Radio access technologies for mobile communications are characterized by multiple access (MA) strategies. Orthogonal MA techniques were a reasonable choice for achieving good performance with single user detection. With the tremendous growth in the number of mobile users and the new internet of things (IoT) shifting paradigm, it is expected that the monthly mobile data traffic worldwide will exceed 24.3 exabytes by 2019, over 100 billion IoT connections by 2025, and the financial impact of IoT on the global economy varies in the range of 3.9 to 11.1 trillion dollars by 2025. In light of the envisaged exponential growth and new trends, one promising solution to further enhance data rates without increasing the bandwidth is by increasing the spectral efficiency of the channel. Non-orthogonal MA techniques are potential candidates for future wireless communications. The two corner points on the boundary region of the MA channel are known to be achievable by single user decoding followed by successive decoding (SD). Other points can also be achieved using time sharing or rate splitting. On the other hand, machine-to-machine (M2M) communication which is an enabling technology for the IoT, enables massive multipurpose networked devices to exchange information among themselves with minor or no human intervention. This thesis consists of three main parts. In the first part, we propose new practical encoding and joint belief propagation (BP) decoding techniques for 2-user MA erasure channel (MAEC) that achieve any rate pair close to the boundary of the capacity region without using time sharing nor rate splitting. While at the encoders, the corresponding parity check matrices are randomly built from a half-rate LDPC matrix, the joint BP decoder employs the associated Tanner graphs of the parity check matrices to iteratively recover the erasures in the received combined codewords. Specifically, the joint decoder performs two steps in each decoding iteration: 1) simultaneously and independently runs the BP decoding process at each constituent sub-graph to recover some of the common erasures, 2) update the other sub-graph with newly recovered erasures and vice versa. When the number of erasures in the received combined codewords is less than or equal to the number of parity check constraints, the decoder may successfully decode both codewords, otherwise the decoder declares decoding failure. Furthermore, we calculate the probability of decoding failure and the outage capacity. Additionally, we show how the erasure probability evolves with the number of decoding iterations and the maximum tolerable loss. Simulations show that any rate pair close to the capacity boundary is achievable without using time sharing. In the second part, we propose a new cooperative joint network and rateless coding strategy for machine-type communication (MTC) devices in the multicast settings where three or more MTC devices dynamically form a cluster to disseminate messages between themselves. Specifically, in the basic cluster, three MTC devices transmit their respective messages simultaneously to the relay in the first phase. The relay broadcasts back the combined messages to all MTC devices within the basic cluster in the second phase. Given the fact that each MTC device can remove its own message, the received signal in the second phase is reduced to the combined messages coming from the other two MTC devices. Hence, this results in exploiting the interference caused by one message on the other and therefore improving the bandwidth efficiency. Furthermore, each group of three MTC devices in vicinity can form a basic cluster for exchanging messages, and the basic scheme extends to N MTC devices. Furthermore, we propose an efficient algorithm to disseminate messages among a large number of MTC devices. Moreover, we implement the proposed scheme employing practical Raptor codes with the use of two relaying schemes, namely amplify and forward (AF) and de-noise and forward (DNF). We show that with very little processing at the relay using DNF relaying scheme, performance can be further enhanced. We also show that the proposed scheme achieves a near optimal sum rate performance. In the third part, we present a comparative study of joint channel estimation and decoding of factor graph-based codes over flat fading channels and propose a simple channel approximation scheme that performs close to the optimal technique. Specifically, when channel state information (CSI) is not available at the receiver, a simpler approach is to estimate the channel state of a group of received symbols, then use the approximated value of the channel with the received signal to compute the log likelihood ratio. Simulation results show that the proposed scheme exhibits about 0.4 dB loss compared to the optimal solution when perfect CSI is available at the receiver

    Cross-Layer design and analysis of cooperative wireless networks relying on efficient coding techniques

    Get PDF
    2011/2012This thesis work aims at analysing the performance of efficient cooperative techniques and of smart antenna aided solutions in the context of wireless networks. Particularly, original contributions include a performance analysis of distributed coding techniques for the physical layer of communication systems, the design of practical efficient coding schemes that approach the analytic limiting bound, the cross-layer design of cooperative medium access control systems that incorporate and benefit from advanced physical layer techniques, the study of the performance of such solutions under realistic network assumptions, and, finally the design of access protocols where nodes are equipped with smart antenna systems.XXV Ciclo198
    corecore