465 research outputs found

    Medium access control design for all-IP and ad hoc wireless network

    Get PDF
    Medium Access Control (MAC) protocol in a wireless network controls the access of wireless medium by mobile terminals, in order to achieve its fair and efficient sharing. It plays an important role in resource management and QoS support for applications. All-IP wireless WAN is fully IP protocol-based and it is a strong candidate beyond 3G (Third Generation Wireless Network). Ad hoc wireless network has recently been the topic of extensive research due to its ability to work properly without fixed infrastructure. This dissertation is composed of two main parts. The first part pursues a Prioritized Parallel Transmission MAC (PPTM) design for All-IP Wireless WAN. Two stages are used and each packet is with a priority level in PPTM. In stage 1, a pretransmission probability is calculated according to the continuous observation of the channel load for a certain period of time. In stage 2, a packet is prioritized and transmitted accordingly. It is modeled and analyzed as a nonpreemptive Head-Of-the-Line prioritized queueing system with Poisson arrival traffic pattern. Its performance is analyzed under three other traffic patterns, which are Constant Bit Rate, Exponential On/Off, and Pareto On/Off, by using a NS-2 simulator, and compared with that of Modified Channel Load Sensing Protocol. PPTM supports dynamic spread code allocation mechanism. A mobile terminal can apply for a spreading code according to the current channel condition. To use the idea of dynamic bandwidth allocation in PPTM for adhoc wireless network, a Dynamic-Rate-with-Collision-Avoidance (DRCA) MAC protocol is proposed in the second part of the dissertation. DRCA is based on spread spectrum technology. In DRCA, a terminal sets the spreading factor for a packet according to the activity level of neighboring nodes. If the total number of usable spreading codes with this spreading factor is less than the total number of mobile terminals in the network, to avoid collision, the spreading code id is broadcast such that other terminals can avoid using it when the packet is being transmitted. The performance of DRCA is theoretically analyzed in a slotted, single-hop, multi-user environment. To evaluate DRCA\u27s performance in an environment closed to a real one, a simulator that supports multi-hop, random mobility pattern is created with OPNET. Both theoretical and simulation results show that DRCA outperforms MACA/CT (Multiple Access with Collision Avoidance with Common Transmitter-based) in case if there are more than one communication pair and the ratio of inactive mobile terminals to active ones is high

    Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey

    Get PDF
    Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to errors and unique problems such as the hidden-terminal problem, the exposed-terminal problem, and signal fading effects. Although a lot of research has been conducted on MAC protocols, the various issues involved have mostly been presented in isolation of each other. We therefore make an attempt to present a comprehensive survey of major schemes, integrating various related issues and challenges with a view to providing a big-picture outlook to this vast area. We present a classification of MAC protocols and their brief description, based on their operating principles and underlying features. In conclusion, we present a brief summary of key ideas and a general direction for future work

    Performance improvement in mobile ad-hoc networks.

    Get PDF
    The objective of this research is to enhance the network performance under realistic mobile ad-hoc networks environments without modification of the standard. Overview of this research is summarized as follows: First, a packet-fragmentation technique to improve network throughput under the worst channel conditions is proposed. While the conventional packet-fragmentation technique research focuses only on random-bit errors, the proposed technique employs both random bit errors and hidden-node collisions. The analytical models based on Markov-chain model shows that the optimal fragmentation technique can effectively reduce the number of retransmissions caused by both collisions from hidden nodes and corrupted packets by random bit errors, and eventually improving throughput in noisy VANETs channels. As a second contribution, a dynamic service-channel allocation (DSCA) scheme is proposed to maximize the network throughput by dynamically assigning different service channels to the users. The theoretical analysis in this thesis will consider wireless access in the vehicular environment (WAVE) protocol, which is the main characteristic of the vehicular ad-hoc networks standard (the IEEE 802.11p). To summarize, the main contribution of this research is that two schemes will improve the network throughput significantly without modification of the standard. Therefore, there is no implementation issue to deploy the proposed schemes in real devices.PhDCommittee Chair: Copeland, John; Committee Co-Chair: Chang, Yusun; Committee Member: Ammar, Mostafa; Committee Member: Beyah, Raheem; Committee Member: Owen, Henry; Committee Member: Taylor, Davi

    Contention techniques for opportunistic communication in wireless mesh networks

    Get PDF
    Auf dem Gebiet der drahtlosen Kommunikation und insbesondere auf den tieferen Netzwerkschichten sind gewaltige Fortschritte zu verzeichnen. Innovative Konzepte und Technologien auf der physikalischen Schicht (PHY) gehen dabei zeitnah in zellulรคre Netze ein. Drahtlose Maschennetzwerke (WMNs) kรถnnen mit diesem Innovationstempo nicht mithalten. Die Mehrnutzer-Kommunikation ist ein Grundpfeiler vieler angewandter PHY Technologien, die sich in WMNs nur ungenรผgend auf die etablierte Schichtenarchitektur abbilden lรคsst. Insbesondere ist das Problem des Scheduling in WMNs inhรคrent komplex. Erstaunlicherweise ist der Mehrfachzugriff mit Trรคgerprรผfung (CSMA) in WMNs asymptotisch optimal obwohl das Verfahren eine geringe Durchfรผhrungskomplexitรคt aufweist. Daher stellt sich die Frage, in welcher Weise das dem CSMA zugrunde liegende Konzept des konkurrierenden Wettbewerbs (engl. Contention) fรผr die Integration innovativer PHY Technologien verwendet werden kann. Opportunistische Kommunikation ist eine Technik, die die inhรคrenten Besonderheiten des drahtlosen Kanals ausnutzt. In der vorliegenden Dissertation werden CSMA-basierte Protokolle fรผr die opportunistische Kommunikation in WMNs entwickelt und evaluiert. Es werden dabei opportunistisches Routing (OR) im zustandslosen Kanal und opportunistisches Scheduling (OS) im zustandsbehafteten Kanal betrachtet. Ziel ist es, den Durchsatz von elastischen Paketflรผssen gerecht zu maximieren. Es werden Modelle fรผr รœberlastkontrolle, Routing und konkurrenzbasierte opportunistische Kommunikation vorgestellt. Am Beispiel von IEEE 802.11 wird illustriert, wie der schichtรผbergreifende Entwurf in einem Netzwerksimulator prototypisch implementiert werden kann. Auf Grundlage der Evaluationsresultate kann der Schluss gezogen werden, dass die opportunistische Kommunikation konkurrenzbasiert realisierbar ist. Darรผber hinaus steigern die vorgestellten Protokolle den Durchsatz im Vergleich zu etablierten Lรถsungen wie etwa DCF, DSR, ExOR, RBAR und ETT.In the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY technologies rely on multi-user communication, so that the established abstraction of the network stack does not work well for WMNs. The scheduling problem in WMNs is inherent complex. Surprisingly, carrier sense multiple access (CSMA) in WMNs is asymptotically utility-optimal even though it has a low computational complexity and does not involve message exchange. Hence, the question arises whether CSMA and the underlying concept of contention allows for the assimilation of advanced PHY technologies into WMNs. In this thesis, we design and evaluate contention protocols based on CSMA for opportunistic communication in WMNs. Opportunistic communication is a technique that relies on multi-user diversity in order to exploit the inherent characteristics of the wireless channel. In particular, we consider opportunistic routing (OR) and opportunistic scheduling (OS) in memoryless and slow fading channels, respectively. We present models for congestion control, routing and contention-based opportunistic communication in WMNs in order to maximize both throughput and fairness of elastic unicast traffic flows. At the instance of IEEE 802.11, we illustrate how the cross-layer algorithms can be implemented within a network simulator prototype. Our evaluation results lead to the conclusion that contention-based opportunistic communication is feasible. Furthermore, the proposed protocols increase both throughput and fairness in comparison to state-of-the-art approaches like DCF, DSR, ExOR, RBAR and ETT

    ๋น„๋ฉดํ—ˆ๋Œ€์—ญ ์…€๋ฃฐ๋ผ ํ†ต์‹ ์˜ ์„ฑ๋Šฅ ๋ถ„์„ ๋ฐ ์„ฑ๋Šฅ ํ–ฅ์ƒ ๊ธฐ๋ฒ• ์—ฐ๊ตฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ •๋ณด๊ณตํ•™๋ถ€, 2021. 2. ๋ฐ•์„ธ์›….3GPP๋Š” LAA (licensed-assisted access)๋ผ๊ณ ํ•˜๋Š” 5GHz ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ LTE๋ฅผ ๊ฐœ๋ฐœํ–ˆ์Šต๋‹ˆ๋‹ค. LAA๋Š” ์ถฉ๋Œ ๋ฐฉ์ง€ ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•ด Wi-Fi์˜ CSMA / CA (Carrier Sense Multiple Access with Collision avoidance)์™€ ์œ ์‚ฌํ•œ LBT (Listen Before Talk) ์ž‘์—…์„ ์ฑ„ํƒํ•˜์—ฌ ๊ฐ LAA ๋‹ค์šด ๋งํฌ ๋ฒ„์ŠคํŠธ์˜ ํ”„๋ ˆ์ž„ ๊ตฌ์กฐ ์˜ค๋ฒ„ ํ—ค๋“œ๋Š” ๊ฐ๊ฐ์˜ ์ข…๋ฃŒ ์‹œ๊ฐ„์— ๋”ฐ๋ผ ๋‹ฌ๋ผ์ง‘๋‹ˆ๋‹ค. ์ด์ „ LBT ์ž‘์—…. ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹ ์„ ๋ถ„์„ํ•˜๊ธฐ์œ„ํ•œ ์ˆ˜์น˜ ๋ชจ๋ธ์„ ์ œ์•ˆํ•œ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹ ์˜ ๋‹ค์Œ ๋‘ ๊ฐ€์ง€ ํ–ฅ์ƒ๋œ ๊ธฐ๋Šฅ์„ ๊ณ ๋ คํ•ฉ๋‹ˆ๋‹ค. ๋Œ€์—ญ ๋…๋ฆฝํ˜• ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹ . ๊ธฐ์กด WiFi ๋ถ„์„ ๋ชจ๋ธ๋กœ๋Š” LAA์˜ ์„ฑ๋Šฅ์„ ํ‰๊ฐ€ํ•  ์ˆ˜ ์—†๋‹ค๋Š” ์ ์„ ๊ฐ์•ˆํ•˜์—ฌ ๋ณธ ์„œ์‹ ์—์„œ๋Š” ์—ฌ๋Ÿฌ ๊ฒฝํ•ฉ ์ง„ํ™” ๋œ NodeB๋กœ ๊ตฌ์„ฑ๋œ LAA ๋„คํŠธ์›Œํฌ์˜ ์„ฑ๋Šฅ์„ ๋ถ„์„ํ•˜๊ธฐ์œ„ํ•œ ์ƒˆ๋กœ์šด Markov ์ฒด์ธ ๊ธฐ๋ฐ˜ ๋ถ„์„ ๋ชจ๋ธ์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. LAA ํ”„๋ ˆ์ž„ ๊ตฌ์กฐ ์˜ค๋ฒ„ ํ—ค๋“œ์˜ ๋ณ€ํ˜•. LTE-LAA๋Š” LTE์—์„œ ์ƒ์† ๋œ ์†๋„ ์ ์‘ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์œ„ํ•ด ์ ์‘ ๋ณ€์กฐ ๋ฐ ์ฝ”๋”ฉ (AMC) ์„ ์ฑ„ํƒํ•ฉ๋‹ˆ๋‹ค. AMC๋Š” ์ง„ํ™” ๋œ nodeB (eNB)๊ฐ€ ํ˜„์žฌ ์ „์†ก์˜ ์ฑ„๋„ ํ’ˆ์งˆ ํ‘œ์‹œ๊ธฐ ํ”ผ๋“œ ๋ฐฑ์„ ์‚ฌ์šฉํ•˜์—ฌ ๋‹ค์Œ ์ „์†ก์„์œ„ํ•œ ๋ณ€์กฐ ๋ฐ ์ฝ”๋”ฉ ๋ฐฉ์‹ (MCS)์„ ์„ ํƒํ•˜๋„๋ก ๋•์Šต๋‹ˆ๋‹ค. ๋ผ์ด์„ ์Šค ๋Œ€์—ญ์—์„œ ๋™์ž‘ํ•˜๋Š” ๊ธฐ์กด LTE์˜ ๊ฒฝ์šฐ ๋…ธ๋“œ ๊ฒฝํ•ฉ ๋ฌธ์ œ๊ฐ€ ์—†์œผ๋ฉฐ AMC ์„ฑ๋Šฅ ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ž˜ ์ง„ํ–‰๋˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ์—์„œ ๋™์ž‘ํ•˜๋Š” LTE-LAA ์˜ ๊ฒฝ์šฐ ์ถฉ๋Œ ๋ฌธ์ œ๋กœ ์ธํ•ด AMC ์„ฑ๋Šฅ์ด ์ œ๋Œ€๋กœ ์ฒ˜๋ฆฌ๋˜์ง€ ์•Š์•˜์Šต๋‹ˆ๋‹ค. ์ด ํŽธ์ง€์—์„œ๋Š” AMC ์šด์˜์„ ๊ณ ๋ คํ•œ ํ˜„์‹ค์ ์ธ ์ฑ„๋„ ๋ชจ๋ธ์—์„œ LTELAA ์„ฑ๋Šฅ์„ ๋ถ„์„ํ•˜๊ธฐ์œ„ํ•œ ์ƒˆ๋กœ ์šด Markov ์ฒด์ธ ๊ธฐ๋ฐ˜ ๋ถ„์„ ๋ชจ๋ธ์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. ๋ฌด์„  ๋„คํŠธ์›Œํฌ ๋ถ„์„์— ๋„๋ฆฌ ์‚ฌ์šฉ๋˜๋Š” Rayleigh ํŽ˜์ด๋”ฉ ์ฑ„๋„ ๋ชจ๋ธ์„ ์ฑ„ํƒํ•˜๊ณ  ๋ถ„์„ ๊ฒฐ๊ณผ๋ฅผ ns-3 ์‹œ๋ฎฌ๋ ˆ์ดํ„ฐ์—์„œ ์–ป์€ ๊ฒฐ๊ณผ ์™€ ๋น„๊ตํ•ฉ๋‹ˆ๋‹ค. ๋น„๊ต ๊ฒฐ๊ณผ๋Š” ํ‰๊ท  ์ •ํ™•๋„๊ฐ€ 99.5%๋กœ ๋ถ„์„ ๋ชจ๋ธ์˜ ์ •ํ™•๋„๋ฅผ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ๋†’์€ ๋ฐ์ดํ„ฐ ์†๋„์— ๋Œ€ํ•œ ์š”๊ตฌ ์‚ฌํ•ญ์œผ๋กœ ์ธํ•ด 3GPP๋Š” LTE-LAA๋ฅผ์œ„ํ•œ ๋‹ค์ค‘ ๋ฐ˜์†กํŒŒ ์šด์˜์„ ์ œ๊ณตํ–ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋‹ค์ค‘ ๋ฐ˜์†กํŒŒ ๋™์ž‘์€ OOBE์— ์ทจ์•ฝํ•˜๊ณ  ์ œํ•œ๋œ ์ „์†ก ์ „๋ ฅ์„ ์‚ฌ์šฉํ•˜์—ฌ ๋น„ํšจ์œจ์  ์ธ ์ฑ„๋„ ์‚ฌ์šฉ์„ ์ดˆ๋ž˜ํ•ฉ๋‹ˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์€ ์ฑ„๋„ ํšจ์œจ์„ ๋†’์ด๊ธฐ์œ„ํ•œ ์ƒˆ๋กœ์šด ๋‹ค์ค‘ ๋ฐ˜์†กํŒŒ ์ ‘๊ทผ ๋ฐฉ์‹์„ ์ œ์•ˆํ•œ๋‹ค. ์šฐ๋ฆฌ๊ฐ€ ์ œ์•ˆํ•œ ๋ฐฉ์‹์€ ์ „์†ก ๋ฒ„์ŠคํŠธ๋ฅผ ์—ฌ๋Ÿฌ ๊ฐœ๋กœ ๋ถ„ํ• ํ•˜๊ณ  ์ „์†ก ์ „๋ ฅ ์ œํ•œ์„ ์ถฉ์กฑํ•˜๋ฉด์„œ ์งง์€ ์„œ๋ธŒ ํ”„๋ ˆ์ž„ ์ „์†ก ์„ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ ์ฑ„๋„ ์ƒํƒœ๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ํŒ๋‹จํ•˜์—ฌ OOBE ๋ฌธ์ œ๋ฅผ ๊ทน๋ณต ํ•  ์ˆ˜์žˆ๋Š” ์—๋„ˆ์ง€ ๊ฐ์ง€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. ์†Œํ”„ํŠธ์›จ์–ด ์ •์˜ ๋ผ๋””์˜ค๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋กœํ†  ํƒ€์ž…์€ 99% ์ด์ƒ์˜ ์ •ํ™•๋„๋กœ ์ฑ„๋„ ์ƒํƒœ๋ฅผ ๊ฒฐ์ •ํ•˜๋Š” ์—๋„ˆ์ง€ ๊ฐ์ง€ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ์‹คํ–‰ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ์ œ์•ˆ ๋œ ๋‹ค์ค‘ ๋ฐ˜์†กํŒŒ ์•ก์„ธ์Šค ๋ฐฉ์‹์ด ๊ธฐ์กด LBT ์œ ํ˜• A ๋ฐ ์œ ํ˜• B์— ๋น„ํ•ด ์‚ฌ์šฉ์ž์ธ์ง€ ์ฒ˜๋ฆฌ๋Ÿ‰์—์„œ ๊ฐ๊ฐ ์ตœ๋Œ€ 59% ๋ฐ 21.5%์˜ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๋‹ฌ์„ฑ ํ•จ์„ ํ™•์ธํ–ˆ์Šต๋‹ˆ๋‹ค. ๋ ˆ๊ฑฐ์‹œ LAA์—๋Š” ๋ฐฐํฌ ๋ฌธ์ œ๊ฐ€ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— 3GPP์™€ MulteFire ์–ผ๋ผ์ด์–ธ์Šค๋Š” ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ ๋…๋ฆฝํ˜• ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹  ์‹œ์Šค ํ…œ์„ ์ œ์•ˆํ–ˆ์Šต๋‹ˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜, ์ข…๋ž˜์˜ ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ ๋…๋ฆฝํ˜• ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹  ์‹œ์Šคํ…œ์€ ์ƒํ–ฅ ๋งํฌ ์ œ์–ด ๋ฉ”์‹œ์ง€์˜ ์ „์†ก ํ™•๋ฅ ์ด ๋‚ฎ๋‹ค. ์ด ๋…ผ๋ฌธ์€ Wi-Fi ๋ธ”๋ก ACK ํ”„๋ ˆ์ž„์— ์—… ๋งํฌ ์ œ์–ด ๋ฉ”์‹œ์ง€๋ฅผ ๋„ฃ๋Š” W ARQ : Wi-Fi ์ง€์› HARQ๋ฅผ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. ๋˜ํ•œ W-ARQ์˜ ์ฒ˜ ๋ฆฌ ์„ฑ๋Šฅ์„ ํ–ฅ์ƒ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ๋ณ‘๋ ฌ HARQ ๋ฐ ํด๋Ÿฌ์Šคํ„ฐ๋ง ๋œ Minstrel์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. ์šฐ๋ฆฌ๊ฐ€ ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ๊ธฐ์กด MulteFire๊ฐ€ ๊ฑฐ์˜ ์ œ๋กœ ์ฒ˜๋ฆฌ๋Ÿ‰ ์„ฑ๋Šฅ์„ ๋ณด์ด๋Š” ๊ฒฝ์šฐ ๋†’์€ ์ฒ˜๋ฆฌ๋Ÿ‰ ์„ฑ๋Šฅ์„ ๋ณด์—ฌ์ค๋‹ˆ๋‹ค. ์š”์•ฝํ•˜๋ฉด ๋น„๋ฉดํ—ˆ ๋Œ€์—ญ ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹ ์˜ ์„ฑ๋Šฅ์„ ๋ถ„์„ ํ•ฉ๋‹ˆ๋‹ค. ์ œ์•ˆ ๋œ ๋ชจ๋ธ์„ ์‚ฌ์šฉํ•จ์œผ๋กœ์จ ์šฐ๋ฆฌ๋Š” ๋ ˆ๊ฑฐ์‹œ ๋‹ค์ค‘ ๋ฐ˜์†กํŒŒ ๋™์ž‘์„ ์ฃผ์žฅํ•˜๋ฉฐ ๋น„๋ฉดํ—ˆ ์…€๋ฃฐ๋Ÿฌ ํ†ต์‹ ์˜ HARQ๋Š” ํšจ์œจ์ ์ด์ง€ ์•Š๋‹ค. ์ด๋Ÿฌํ•œ ์ด์œ ๋กœ, ์šฐ๋ฆฌ๋Š” ์ตœ์ฒจ๋‹จ ๊ธฐ ์ˆ ์— ๋น„ํ•ด UPT ๋ฐ ์ฒ˜๋ฆฌ๋Ÿ‰๊ณผ ๊ฐ™์€ ๋„คํŠธ์›Œํฌ ์„ฑ๋Šฅ ํ–ฅ์ƒ์„ ๋‹ฌ์„ฑํ•˜๋Š” OOBE ์ธ์‹ ์ถ”๊ฐ€ ์•ก์„ธ์Šค ๋ฐ W-ARQ๋ฅผ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค.3GPP has developed 5 GHz unlicensed band LTE, referred to as licensed-assisted access (LAA). LAA adopts listen before talk (LBT) operation, resembling Wi-Fis carrier sense multiple access with collision avoidance (CSMA/CA), to enable collision avoidance capability, while the frame structure overhead of each LAA downlink burst varies with the ending time of each preceding LBT operation. In this dissertation, we propose numerical model to analyze unlicensed band cellular communication. Next, we consider the following two enhancements of unlicensed band cellular communication: (i) out-of-band emission (OOBE) aware additional carrier access, and (ii) Wi-Fi assisted hybrid automatic repeat request (H-ARQ) for unlicensed-band stand-alone cellular communication. Given that, existing analytic models of Wi-Fi cannot be used to evaluate the performance of LAA, in this letter, we propose a novel Markov chain-based analytic model to analyze the performance of LAA network composed of multiple contending evolved NodeBs by considering the variation of the LAA frame structure overhead. LTE-LAA adopts adaptive modulation and coding (AMC) for the rate adaptation algorithm inherited from LTE. AMC helps the evolved nodeB (eNB) to select a modulation and coding scheme (MCS) for the next transmission using the channel quality indicator feedback of the current transmission. For the conventional LTE operating in the licensed band, there is no node contention problem and AMC performance has been well studied. However, in the case of LTE-LAA operating in the unlicensed band, AMC performance has not been properly addressed due to the collision problem. In this letter, we propose a novel Markov chain-based analysis model for analyzing LTELAA performance under a realistic channel model considering AMC operation. We adopt Rayleigh fading channel model widely used in wireless network analysis, and compare our analysis results with the results obtained from ns-3 simulator. Comparison results show an average accuracy of 99.5%, which demonstrates the accuracy of our analysis model. Due to the requirement for a high data rate, the 3GPP has provided multi-carrier operation for LTE-LAA. However, multi-carrier operation is susceptible to OOBE and uses limited transmission power, resulting in inefficient channel usage. This paper proposes a novel multi-carrier access scheme to enhance channel efficiency. Our proposed scheme divides a transmission burst into multiple ones and uses short subframe transmission while meeting the transmission power limitation. In addition, we propose an energy detection algorithm to overcome the OOBE problem by deciding the channel status accurately. Our prototype using software-defined radio shows the feasibility and performance of the energy detection algorithm that determines the channel status with over 99% accuracy. Through ns-3 simulation, we confirm that the proposed multi-carrier access scheme achieves up to 59% and 21.5% performance gain in userperceived throughput compared with the conventional LBT type A and type B, respectively. Since the legacy LAA has deployment problem, 3GPP and MulteFire alliance proposed unlicensed band stand-alone cellular communication system. However, conventional unlicensed band stand-alone cellular communication system has low transmission probability of uplink control messages. This disertation proposes W-ARQ: Wi-Fi assisted HARQ which put uplink control messages into Wi-Fi block ACK frame. In addition we propose parallel HARQ and clustered Minstrel to enhance throughput performance of W-ARQ. Our proposed algorithm shows high throughput performance where conventional MulteFire shows almost zero throughput performance. In summary, we analyze the performance of unlicensed-band cellular communication. By using the proposed model, we insist the legacy multi-carrier operation and HARQ of unlicensed cellular communication is not efficient. By this reason, we propose OOBE aware additional access and W-ARQ which achievee enhancements of network performance such as UPT and throughput compared with state-of-the-art techniques.Abstract i Contents iv List of Tables vii List of Figures viii 1 Introduction 1 1.1 Unlicensed Band Communication System . . . . . . . . . . . . . . . 1 1.2 Overview of Existing Approaches . . . . . . . . . . . . . . . . . . . 2 1.2.1 License-assisted access . . . . . . . . . . . . . . . . . . . . . 2 1.2.2 Further LAA . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2.3 Non-3GPP Unlicensed Band Cellular Communication . . . . 6 1.3 Main Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.3.1 Performance Analysis of LTE-LAA . . . . . . . . . . . . . . 6 1.3.2 Out-of-Band Emission Aware Additional Carrier Access for LTE-LAA Network . . . . . . . . . . . . . . . . . . . . . . . 7 1.3.3 W-ARQ: Wi-Fi Assisted HARQ for Unlicensed Band StandAlone Cellular Communication System . . . . . . . . . . . . 8 1.4 Organization of the Dissertation . . . . . . . . . . . . . . . . . . . . 8 2 Performance Analysis of LTE-LAA network 10 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 2.3 Proposed Markov-Chain Model . . . . . . . . . . . . . . . . . . . . . 14 2.3.1 Markov Property . . . . . . . . . . . . . . . . . . . . . . . . 14 2.3.2 Markov Chain Model for EPS Type Variation . . . . . . . . . 16 2.3.3 LAA Network Throughput Estimation . . . . . . . . . . . . . 18 2.4 Model Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 2.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 3 Out-of-Band Emission Aware Additional Carrier Access for LTE-LAA Network 35 3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 3.2 Related work and Background . . . . . . . . . . . . . . . . . . . . . 37 3.2.1 Related work . . . . . . . . . . . . . . . . . . . . . . . . . . 37 3.2.2 Listen Before Talk . . . . . . . . . . . . . . . . . . . . . . . 38 3.2.3 Out-of-Band Emission . . . . . . . . . . . . . . . . . . . . . 39 3.3 Multi-carrier Operation of LTE-LAA . . . . . . . . . . . . . . . . . . 39 3.4 Carrier Sensing considering Out-of-Band Emission . . . . . . . . . . 47 3.4.1 Energy Detection Algorithm . . . . . . . . . . . . . . . . . . 49 3.4.2 Nominal Band Energy Detection . . . . . . . . . . . . . . . . 50 3.4.3 OOBE-Free Region Energy Detection . . . . . . . . . . . . . 51 3.5 Additional Carrier Access Scheme . . . . . . . . . . . . . . . . . . . 52 3.5.1 Basic Operation . . . . . . . . . . . . . . . . . . . . . . . . . 52 3.5.2 Transmission Power Limitation . . . . . . . . . . . . . . . . 53 3.5.3 Dividing Transmission Burst . . . . . . . . . . . . . . . . . . 54 3.5.4 Short Subframe Decision . . . . . . . . . . . . . . . . . . . . 54 3.6 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 57 3.6.1 Performance of Energy Detection considering OOBE . . . . . 57 3.6.2 Simulation Environments . . . . . . . . . . . . . . . . . . . . 57 3.6.3 Performance of Proposed Carrier Access Scheme . . . . . . . 58 3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 4 W-ARQ: Wi-Fi Assisted HARQ for Unlicensed Band Stand-Alone Cellular Communication System 66 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 4.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 4.3 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 4.4 W-ARQ: Wi-Fi assisted HARQ for Unlicensed Band Stand-Alone Cellular Communication System . . . . . . . . . . . . . . . . . . . . . . 69 4.4.1 Parallel HARQ . . . . . . . . . . . . . . . . . . . . . . . . . 71 4.4.2 Clustered Minstrel . . . . . . . . . . . . . . . . . . . . . . . 72 4.5 Performance Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . 75 4.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 5 Concluding Remarks 80 5.1 Research Contributions . . . . . . . . . . . . . . . . . . . . . . . . . 80 5.2 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Abstract (In Korean) 90 ๊ฐ์‚ฌ์˜ ๊ธ€ 93Docto

    Evaluation of Interference-Cancellation Based MAC Protocols for Vehicular Communications

    Get PDF
    Vehicular communications form an important part of future intelligent transport systems. Wireless connectivity between vehicles can enhance safety in vehicular networks and enable new services such as adaptive traffic control, collision detection and avoidance. As several new algorithms are being developed for enhancing vehicle to vehicle wireless connectivity, it is important to validate the performance of these algorithms using reasonably accurate wireless channel models. Specifically, some recent developments in the medium access control (MAC) layer algorithms appear to have the potential to improve the performance of vehicle to vehicle communications; however, these algorithms have not been validated with realistic channel models encountered in vehicular communications. The aforementioned issues are addressed in this thesis and correspondingly, there are two main contributions - (i) A complete IEEE 802.11p based transceiver model has been simulated in MATLAB and its performance & reliability are tested using existing empirically-developed wireless channel models. (ii) A new MAC layer algorithm based on slotted ALOHA with successive interference cancellation(SIC) has been evaluated and tested by taking into consideration the performance of underlying physical layer. The performance of slotted ALOHA-SIC and the already existing carrier sense multiple access with collision avoidance (CSMA/CA) scheme with respect to channel access delay and average packet loss ratio is also studied

    Voice Call Capacity Over Wireless Mesh Networks

    Get PDF
    The goal of this thesis is to understand the voice call carrying capacity of an IEEE 802.11b/e based ad hoc network. We begin with the modelling of conversational speech and define a six state semi-Markov voice model based on ITU-T P59 recommendation. We perform a theoretical analysis of the voice model and compare it with results obtained via simulations. Using a Java based IEEE 802.11 medium access layer simulator, we determine the upper-bound for the number of voice calls carried by an ad hoc network. We use a linear topology with the ideal carrier sensing range and evaluate the number of calls carried using packet loss and packet delay as metrics. We observe that, for one, two, three and four hop, 5.5 Mbps IEEE 802.11 wireless links have an upper-bound of eight, six, five, and three voice calls respectively. We then consider a carrier sensing range and a path loss model and compare them with the ideal case. We observe, after considering a carrier sensing range with path loss model, there is a reduction in the number of calls carried by the linear networks. One, two, three and four hop 5.5 Mbps IEEE 802.11 wireless links support eight, five, four, and two voice calls respectively, when a carrier sensing range and a path loss model is considered. We also find that by adopting packet dropping policies at the nodes, we improve the call carrying capacity and quality of service on the network. In our simulations of a two hop network in path loss conditions, we find that, by adopting a time delay based packet dropping policy at the nodes, the number of calls supported simultaneously increased from five to six. In a four hop linear network we find that by total packet loss is reduced by 20%, adopting a random packet dropping policy and by 50% adopting a time delay based packet dropping policy. Although there is no change in number of calls supported, load on the network is reduced
    • โ€ฆ
    corecore