426 research outputs found

    Millimeter Wave Cellular Networks: A MAC Layer Perspective

    Full text link
    The millimeter wave (mmWave) frequency band is seen as a key enabler of multi-gigabit wireless access in future cellular networks. In order to overcome the propagation challenges, mmWave systems use a large number of antenna elements both at the base station and at the user equipment, which lead to high directivity gains, fully-directional communications, and possible noise-limited operations. The fundamental differences between mmWave networks and traditional ones challenge the classical design constraints, objectives, and available degrees of freedom. This paper addresses the implications that highly directional communication has on the design of an efficient medium access control (MAC) layer. The paper discusses key MAC layer issues, such as synchronization, random access, handover, channelization, interference management, scheduling, and association. The paper provides an integrated view on MAC layer issues for cellular networks, identifies new challenges and tradeoffs, and provides novel insights and solution approaches.Comment: 21 pages, 9 figures, 2 tables, to appear in IEEE Transactions on Communication

    Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Full text link
    This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical-layer message authentication is also introduced briefly. The survey concludes with observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 201

    High-SIR Transmission Capacity of Wireless Networks with General Fading and Node Distribution

    Full text link
    In many wireless systems, interference is the main performance-limiting factor, and is primarily dictated by the locations of concurrent transmitters. In many earlier works, the locations of the transmitters is often modeled as a Poisson point process for analytical tractability. While analytically convenient, the PPP only accurately models networks whose nodes are placed independently and use ALOHA as the channel access protocol, which preserves the independence. Correlations between transmitter locations in non-Poisson networks, which model intelligent access protocols, makes the outage analysis extremely difficult. In this paper, we take an alternative approach and focus on an asymptotic regime where the density of interferers η\eta goes to 0. We prove for general node distributions and fading statistics that the success probability \p \sim 1-\gamma \eta^{\kappa} for η→0\eta \rightarrow 0, and provide values of γ\gamma and κ\kappa for a number of important special cases. We show that κ\kappa is lower bounded by 1 and upper bounded by a value that depends on the path loss exponent and the fading. This new analytical framework is then used to characterize the transmission capacity of a very general class of networks, defined as the maximum spatial density of active links given an outage constraint.Comment: Submitted to IEEE Trans. Info Theory special issu

    A Random Access Protocol incorporating Multi-Packet Reception, Retransmission Diversity and Successive Interference Cancellation

    Get PDF
    8th International Workshop on Multiple Access Communications (MACOM2015), Helsinki, Finland.This paper presents a random access protocol assisted by a set of signal processing tools that significantly improve the multi-packet reception (MPR) capabilities of the system. A receiver with M antennas is used to resolve collisions with multiplicity K _ M. The remaining unresolved conflicts (with multiplicity K > M) are processed by means of protocol-induced retransmissions that create an adaptive multiple-input multiple-output (MIMO) system. This scheme, also known as NDMA (network diversity multiple access) with MPR, can achieve in ideal conditions a maximum throughput of M packets/time-slot. A further improvement is proposed here, where the receiver attempts to recover the information immediately after the reception of each (re)transmission. This is different from conventional NDMA, where this decoding process only occurs once the adaptive MIMO channel is assumed to become full-rank (i.e., once the estimated number of required retransmissions has been collected). The signals that are correctly decoded at every step of the proposed algorithm are used to mitigate interference upon the remaining contending signals by means of successive interference cancellation (SIC). This allows for improved reception as well as for the reduction of the number of retransmissions required to resolve a collision. Significantly high throughput figures that surpass the nominal rate of the system (T > M) are here reported. To the best of our knowledge this is the first random access protocol that achieves this figure. Correlation between antennas and between retransmissions, as well as imperfections of SIC are also considered. In ideal conditions, the effects of SIC are equivalent to a splitting tree operation. The inclusion of SIC in NDMA-MPR also opens the possibility of backwards compatibility with legacy terminals. The protocol achieves the highest throughput in the literature of single-hop wireless random access with minimum feedback complexity. This is a significant result for future highly dense 5G networks

    Energy Harvesting Wireless Communications: A Review of Recent Advances

    Get PDF
    This article summarizes recent contributions in the broad area of energy harvesting wireless communications. In particular, we provide the current state of the art for wireless networks composed of energy harvesting nodes, starting from the information-theoretic performance limits to transmission scheduling policies and resource allocation, medium access and networking issues. The emerging related area of energy transfer for self-sustaining energy harvesting wireless networks is considered in detail covering both energy cooperation aspects and simultaneous energy and information transfer. Various potential models with energy harvesting nodes at different network scales are reviewed as well as models for energy consumption at the nodes.Comment: To appear in the IEEE Journal of Selected Areas in Communications (Special Issue: Wireless Communications Powered by Energy Harvesting and Wireless Energy Transfer

    MAC Aspects of Millimeter-Wave Cellular Networks

    Get PDF
    The current demands for extremely high data rate wireless services and the spectrum scarcity at the sub-6 GHz bands are forcefully motivating the use of the millimeter-wave (mmWave) frequencies. MmWave communications are characterized by severe attenuation, sparse-scattering environment, large bandwidth, high penetration loss, beamforming with massive antenna arrays, and possible noise-limited operation. These characteristics imply a major difference with respect to legacy communication technologies, primarily designed for the sub-6 GHz bands, and are posing major design challenges on medium access control (MAC) layer. This book chapter discusses key MAC layer issues at the initial access and mobility management (e.g., synchronization, random access, and handover) as well as resource allocation (interference management, scheduling, and association). The chapter provides an integrated view on MAC layer issues for cellular networks and reviews the main challenges and trade-offs and the state-of-the-art proposals to address them
    • …
    corecore