1,106 research outputs found

    Whether and Where to Code in the Wireless Relay Channel

    Full text link
    The throughput benefits of random linear network codes have been studied extensively for wirelined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations. In energy-constrained systems, however, coding subgraphs should be chosen to control the number of coding nodes while maintaining throughput. In this paper, we explore the strategic use of network coding in the wireless packet erasure relay channel according to both throughput and energy metrics. In the relay channel, a single source communicates to a single sink through the aid of a half-duplex relay. The fluid flow model is used to describe the case where both the source and the relay are coding, and Markov chain models are proposed to describe packet evolution if only the source or only the relay is coding. In addition to transmission energy, we take into account coding and reception energies. We show that coding at the relay alone while operating in a rateless fashion is neither throughput nor energy efficient. Given a set of system parameters, our analysis determines the optimal amount of time the relay should participate in the transmission, and where coding should be performed.Comment: 11 pages, 12 figures, to be published in the IEEE JSAC Special Issue on Theories and Methods for Advanced Wireless Relay

    Simultaneous Transmission and Reception: Algorithm, Design and System Level Performance

    Full text link
    Full Duplex or Simultaneous transmission and reception (STR) in the same frequency at the same time can potentially double the physical layer capacity. However, high power transmit signal will appear at receive chain as echoes with powers much higher than the desired received signal. Therefore, in order to achieve the potential gain, it is imperative to cancel these echoes. As these high power echoes can saturate low noise amplifier (LNA) and also digital domain echo cancellation requires unrealistically high resolution analog-to-digital converter (ADC), the echoes should be cancelled or suppressed sufficiently before LNA. In this paper we present a closed-loop echo cancellation technique which can be implemented purely in analogue domain. The advantages of our method are multiple-fold: it is robust to phase noise, does not require additional set of antennas, can be applied to wideband signals and the performance is irrelevant to radio frequency (RF) impairments in transmit chain. Next, we study a few protocols for STR systems in carrier sense multiple access (CSMA) network and investigate MAC level throughput with realistic assumptions in both single cell and multiple cells. We show that STR can reduce hidden node problem in CSMA network and produce gains of up to 279% in maximum throughput in such networks. Finally, we investigate the application of STR in cellular systems and study two new unique interferences introduced to the system due to STR, namely BS-BS interference and UE-UE interference. We show that these two new interferences will hugely degrade system performance if not treated appropriately. We propose novel methods to reduce both interferences and investigate the performances in system level.Comment: 20 pages. This manuscript will appear in the IEEE Transactions on Wireless Communication

    Handover analysis over mobile WiMAX technology.

    Get PDF
    As new mobile devices and mobile applications continue to growth, so does the data traffic demand for broadband services access and the user needs toward mobility, thereby, wireless application became today the fastest solution and lowest cost implementation unlike traditional wired deployment such as optical fibers and digital lines. WiMAX technology satisfies this gap through its high network performance over the air interface and high data rates based on the IEEE 802.16-2004 standards, this original specification does not support mobility. Therefore, the IEEE introduces a new standard that enables mobility profiles under 802.16e-2005, from which three different types of handovers process are introduced as hard handover (HHO), macro diversity handover (MDHO) and fast base station switching (FBSS) handover. The objective of this master thesis is to analyze how the handover process affects network performance. The analysis propose three scenarios, built over OPNET simulator to measure the most critical wireless parameter and performance indicator such as throughput, handover success rate, packet drop, delay and network usage.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Wireless communication, identification and sensing technologies enabling integrated logistics: a study in the harbor environment

    Get PDF
    In the last decade, integrated logistics has become an important challenge in the development of wireless communication, identification and sensing technology, due to the growing complexity of logistics processes and the increasing demand for adapting systems to new requirements. The advancement of wireless technology provides a wide range of options for the maritime container terminals. Electronic devices employed in container terminals reduce the manual effort, facilitating timely information flow and enhancing control and quality of service and decision made. In this paper, we examine the technology that can be used to support integration in harbor's logistics. In the literature, most systems have been developed to address specific needs of particular harbors, but a systematic study is missing. The purpose is to provide an overview to the reader about which technology of integrated logistics can be implemented and what remains to be addressed in the future

    Robust distributed resource allocation for cellular vehicle-to-vehicle communication

    Get PDF
    Mit Release 14 des LTE Standards unterstützt dieser die direkte Fahrzeug-zu-Fahrzeug-Kommunikation über den Sidelink. Diese Dissertation beschäftigt sich mit dem Scheduling Modus 4, einem verteilten MAC-Protokoll ohne Involvierung der Basisstation, das auf periodischer Wiederverwendung von Funkressourcen aufbaut. Der Stand der Technik und eine eigene Analyse des Protokolls decken verschiedene Probleme auf. So wiederholen sich Kollisionen von Paketen, wodurch manche Fahrzeuge für längere Zeit keine sicherheitskritischen Informationen verbreiten können. Kollisionen entstehen vermehrt auch dadurch, dass Hidden-Terminal-Probleme in Kauf genommen werden oder veränderliche Paketgrößen und -raten schlecht unterstützt werden. Deshalb wird ein Ansatz namens "Scheduling based on Acknowledgement Feedback Exchange" vorgeschlagen. Zunächst wird eine Funkreservierung in mehrere ineinander verschachtelte Unter-Reservierungen mit verschiedenen Funkressourcen unterteilt, was die Robustheit gegenüber wiederholenden Kollisionen erhöht. Dies ist die Grundlage für eine verteilte Staukontrolle, die die Periodizitätseigenschaft nicht verletzt. Außerdem können so veränderliche Paketgrößen oder -raten besser abgebildet werden. Durch die periodische Wiederverwendung können Acknowledgements für Funkressourcen statt für Pakete ausgesendet werden. Diese können in einer Bitmap in den Padding-Bits übertragen werden. Mittels der Einbeziehung dieser Informationen bei der Auswahl von Funkressourcen können Hidden-Terminal-Probleme effizient vermieden werden, da die Acknowledgements auch eine Verwendung dieser Funkressource ankündigen. Kollisionen können nun entdeckt und eine Wiederholung vermieden werden. Die Evaluierung des neuen MAC-Protokolls wurde zum großen Teil mittels diskreter-Event-Simulationen durchgeführt, wobei die Bewegung jedes einzelnen Fahrzeuges simuliert wurde. Der vorgeschlagene Ansatz führt zu einer deutlich erhöhten Paketzustellrate. Die Verwendung einer anwendungsbezogenen Awareness-Metrik zeigt, dass die Zuverlässigkeit der Kommunikation durch den Ansatz deutlich verbessert werden kann. Somit zeigt sich der präsentierte Ansatz als vielversprechende Lösung für die erheblichen Probleme, die der LTE Modus 4 mit sich bringt.The LTE Standard added support for a direct vehicle-to-vehicle communication via the Sidelink with Release 14. This dissertation focuses on the scheduling Mode 4, a distributed MAC protocol without involvement of the base station, which requires the periodic reuse of radio resources. The state of the art and a own analysis of this protocol unveil multiple problems. For example, packet collisions repeat in time, so that some vehicles are unable to distribute safety-critical information for extended periods of time. Collisions also arise due to the hidden-terminal problem, which is simply put up with in Mode 4. Additionally, varying packet sizes or rates can hardly be supported. Consequently, an approach called "Scheduling based on Acknowledgement Feedback Exchange" is proposed. Firstly, a reservation of radio resources is split into multiple, interleaved sub-reservations that use different radio resources. This increases the robustness against repeating collisions. It is also the basis for a distributed congestion control that does not violate the periodicity. Moreover, different packet rates or sizes can be supported. The periodic reuse of radio resources enables the transmission of acknowledgements for radio resources instead of packets. These can be transmitted in a bitmap inside the padding bits. Hidden-terminal problems can be mitigated by considering the acknowledgements when selecting radio resources as they announce the use of these radio resources. Collisions can also be detected and prevented from re-occurring. The evaluation of the MAC protocol is mostly performed using discrete-event simulations, which model the movement of every single vehicle. The presented approach leads to a clear improvement of the packet delivery rate. The use of an application-oriented metric shows that the communication robustness can be improved distinctly. The proposed approach hence presents itself as a promising solution for the considerable problems of LTE Mode 4

    Maximum Throughput of a Secondary User Cooperating with an Energy-Aware Primary User

    Full text link
    This paper proposes a cooperation protocol between a secondary user (SU) and a primary user (PU) which dedicates a free frequency subband for the SU if cooperation results in energy saving. Time is slotted and users are equipped with buffers. Under the proposed protocol, the PU releases portion of its bandwidth for secondary transmission. Moreover, it assigns a portion of the time slot duration for the SU to relay primary packets and achieve a higher successful packet reception probability at the primary receiver. We assume that the PU has three states: idle, forward, and retransmission states. At each of these states, the SU accesses the channel with adaptive transmission parameters. The PU cooperates with the SU if and only if the achievable average number of transmitted primary packets per joule is higher than the number of transmitted packets per joule when it operates alone. The numerical results show the beneficial gains of the proposed cooperative cognitive protocol.Comment: Accepted WiOpt 201
    corecore