426 research outputs found
Millimeter Wave Cellular Networks: A MAC Layer Perspective
The millimeter wave (mmWave) frequency band is seen as a key enabler of
multi-gigabit wireless access in future cellular networks. In order to overcome
the propagation challenges, mmWave systems use a large number of antenna
elements both at the base station and at the user equipment, which lead to high
directivity gains, fully-directional communications, and possible noise-limited
operations. The fundamental differences between mmWave networks and traditional
ones challenge the classical design constraints, objectives, and available
degrees of freedom. This paper addresses the implications that highly
directional communication has on the design of an efficient medium access
control (MAC) layer. The paper discusses key MAC layer issues, such as
synchronization, random access, handover, channelization, interference
management, scheduling, and association. The paper provides an integrated view
on MAC layer issues for cellular networks, identifies new challenges and
tradeoffs, and provides novel insights and solution approaches.Comment: 21 pages, 9 figures, 2 tables, to appear in IEEE Transactions on
Communication
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution
In many wireless systems, interference is the main performance-limiting
factor, and is primarily dictated by the locations of concurrent transmitters.
In many earlier works, the locations of the transmitters is often modeled as a
Poisson point process for analytical tractability. While analytically
convenient, the PPP only accurately models networks whose nodes are placed
independently and use ALOHA as the channel access protocol, which preserves the
independence. Correlations between transmitter locations in non-Poisson
networks, which model intelligent access protocols, makes the outage analysis
extremely difficult. In this paper, we take an alternative approach and focus
on an asymptotic regime where the density of interferers goes to 0. We
prove for general node distributions and fading statistics that the success
probability \p \sim 1-\gamma \eta^{\kappa} for , and
provide values of and for a number of important special
cases. We show that is lower bounded by 1 and upper bounded by a value
that depends on the path loss exponent and the fading. This new analytical
framework is then used to characterize the transmission capacity of a very
general class of networks, defined as the maximum spatial density of active
links given an outage constraint.Comment: Submitted to IEEE Trans. Info Theory special issu
A Random Access Protocol incorporating Multi-Packet Reception, Retransmission Diversity and Successive Interference Cancellation
8th International Workshop on Multiple Access Communications (MACOM2015), Helsinki, Finland.This paper presents a random access protocol assisted by a set of signal processing tools that significantly improve the multi-packet reception (MPR) capabilities of the system. A receiver with M antennas is used to resolve collisions with multiplicity K _ M. The remaining unresolved conflicts (with multiplicity K > M) are processed by means of protocol-induced retransmissions that create an adaptive multiple-input multiple-output (MIMO) system. This scheme, also known as NDMA (network diversity multiple access) with MPR, can achieve in ideal conditions a maximum throughput of M packets/time-slot. A further improvement is proposed here, where the receiver attempts to recover the information immediately after the reception of each (re)transmission. This is different from conventional NDMA, where this decoding process only occurs once the adaptive MIMO channel is assumed to become full-rank (i.e., once the estimated number of required retransmissions has been collected). The signals that are correctly decoded at every step of the proposed algorithm are used to mitigate interference upon the remaining contending signals by means of successive interference cancellation (SIC). This allows for improved reception as well as for the reduction of the number of retransmissions required to resolve a collision. Significantly high throughput figures that surpass the nominal rate of the system (T > M) are here reported. To the best of our knowledge this is the first random access protocol that achieves this figure. Correlation between antennas and between retransmissions, as well as imperfections of SIC are also considered. In ideal conditions, the effects of SIC are equivalent to a splitting tree operation. The inclusion of SIC in NDMA-MPR also opens the possibility of backwards compatibility with legacy terminals. The protocol achieves the highest throughput in the literature of single-hop wireless random access with minimum feedback complexity. This is a significant result for future highly dense 5G networks
Energy Harvesting Wireless Communications: A Review of Recent Advances
This article summarizes recent contributions in the broad area of energy
harvesting wireless communications. In particular, we provide the current state
of the art for wireless networks composed of energy harvesting nodes, starting
from the information-theoretic performance limits to transmission scheduling
policies and resource allocation, medium access and networking issues. The
emerging related area of energy transfer for self-sustaining energy harvesting
wireless networks is considered in detail covering both energy cooperation
aspects and simultaneous energy and information transfer. Various potential
models with energy harvesting nodes at different network scales are reviewed as
well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications
(Special Issue: Wireless Communications Powered by Energy Harvesting and
Wireless Energy Transfer
MAC Aspects of Millimeter-Wave Cellular Networks
The current demands for extremely high data rate wireless services and the spectrum scarcity at the sub-6 GHz bands are forcefully motivating the use of the millimeter-wave (mmWave) frequencies. MmWave communications are characterized by severe attenuation, sparse-scattering environment, large bandwidth, high penetration loss, beamforming with massive antenna arrays, and possible noise-limited operation. These characteristics imply a major difference with respect to legacy communication technologies, primarily designed for the sub-6 GHz bands, and are posing major design challenges on medium access control (MAC) layer. This book chapter discusses key MAC layer issues at the initial access and mobility management (e.g., synchronization, random access, and handover) as well as resource allocation (interference management, scheduling, and association). The chapter provides an integrated view on MAC layer issues for cellular networks and reviews the main challenges and trade-offs and the state-of-the-art proposals to address them
- …