601 research outputs found

    RCFD: A Novel Channel Access Scheme for Full-Duplex Wireless Networks Based on Contention in Time and Frequency Domains

    Get PDF
    In the last years, the advancements in signal processing and integrated circuits technology allowed several research groups to develop working prototypes of in-band full-duplex wireless systems. The introduction of such a revolutionary concept is promising in terms of increasing network performance, but at the same time poses several new challenges, especially at the MAC layer. Consequently, innovative channel access strategies are needed to exploit the opportunities provided by full-duplex while dealing with the increased complexity derived from its adoption. In this direction, this paper proposes RTS/CTS in the Frequency Domain (RCFD), a MAC layer scheme for full-duplex ad hoc wireless networks, based on the idea of time-frequency channel contention. According to this approach, different OFDM subcarriers are used to coordinate how nodes access the shared medium. The proposed scheme leads to efficient transmission scheduling with the result of avoiding collisions and exploiting full-duplex opportunities. The considerable performance improvements with respect to standard and state-of-the-art MAC protocols for wireless networks are highlighted through both theoretical analysis and network simulations.Comment: Submitted at IEEE Transactions on Mobile Computing. arXiv admin note: text overlap with arXiv:1605.0971

    Fly-By-Wireless for Next Generation Aircraft: Challenges and Potential solutions

    Get PDF
    โ€Fly-By-Wirelessโ€ paradigm based on wireless connectivity in aircraft has the potential to improve efficiency and flexibility, while reducing weight, fuel consumption and maintenance costs. In this paper, first, the opportunities and challenges for wireless technologies in safety-critical avionics context are discussed. Then, the assessment of such technologies versus avionics requirements is provided in order to select the most appropriate one for a wireless aircraft application. As a result, the design of a Wireless Avionics Network based on Ultra WideBand technology is investigated, considering the issues of determinism, reliability and security

    RCFD: A frequency-based channel access scheme for full-duplex wireless networks

    Get PDF
    Recently, several working implementations of inband full-duplex wireless systems have been presented, where the same node can transmit and receive simultaneously in the same frequency band. The introduction of such a possibility at the physical layer could lead to improved performance but also poses several challenges at the MAC layer. In this paper, an innovative mechanism of channel contention in full-duplex OFDM wireless networks is proposed. This strategy is able to ensure efficient transmission scheduling with the result of avoiding collisions and effectively exploiting full-duplex opportunities. As a consequence, considerable performance improvements are observed with respect to standard and state-of-the-art MAC protocols for wireless networks, as highlighted by extensive simulations performed in ad hoc wireless networks with varying number of nodes

    Survey of Inter-satellite Communication for Small Satellite Systems: Physical Layer to Network Layer View

    Get PDF
    Small satellite systems enable whole new class of missions for navigation, communications, remote sensing and scientific research for both civilian and military purposes. As individual spacecraft are limited by the size, mass and power constraints, mass-produced small satellites in large constellations or clusters could be useful in many science missions such as gravity mapping, tracking of forest fires, finding water resources, etc. Constellation of satellites provide improved spatial and temporal resolution of the target. Small satellite constellations contribute innovative applications by replacing a single asset with several very capable spacecraft which opens the door to new applications. With increasing levels of autonomy, there will be a need for remote communication networks to enable communication between spacecraft. These space based networks will need to configure and maintain dynamic routes, manage intermediate nodes, and reconfigure themselves to achieve mission objectives. Hence, inter-satellite communication is a key aspect when satellites fly in formation. In this paper, we present the various researches being conducted in the small satellite community for implementing inter-satellite communications based on the Open System Interconnection (OSI) model. This paper also reviews the various design parameters applicable to the first three layers of the OSI model, i.e., physical, data link and network layer. Based on the survey, we also present a comprehensive list of design parameters useful for achieving inter-satellite communications for multiple small satellite missions. Specific topics include proposed solutions for some of the challenges faced by small satellite systems, enabling operations using a network of small satellites, and some examples of small satellite missions involving formation flying aspects.Comment: 51 pages, 21 Figures, 11 Tables, accepted in IEEE Communications Surveys and Tutorial

    Survey of Spectrum Sharing for Inter-Technology Coexistence

    Full text link
    Increasing capacity demands in emerging wireless technologies are expected to be met by network densification and spectrum bands open to multiple technologies. These will, in turn, increase the level of interference and also result in more complex inter-technology interactions, which will need to be managed through spectrum sharing mechanisms. Consequently, novel spectrum sharing mechanisms should be designed to allow spectrum access for multiple technologies, while efficiently utilizing the spectrum resources overall. Importantly, it is not trivial to design such efficient mechanisms, not only due to technical aspects, but also due to regulatory and business model constraints. In this survey we address spectrum sharing mechanisms for wireless inter-technology coexistence by means of a technology circle that incorporates in a unified, system-level view the technical and non-technical aspects. We thus systematically explore the spectrum sharing design space consisting of parameters at different layers. Using this framework, we present a literature review on inter-technology coexistence with a focus on wireless technologies with equal spectrum access rights, i.e. (i) primary/primary, (ii) secondary/secondary, and (iii) technologies operating in a spectrum commons. Moreover, we reflect on our literature review to identify possible spectrum sharing design solutions and performance evaluation approaches useful for future coexistence cases. Finally, we discuss spectrum sharing design challenges and suggest future research directions

    Seeing the Unseen: The REVEAL protocol to expose the wireless Man-in-the-Middle

    Full text link
    A Man-in-the-Middle (MiM) can collect over-the-air packets whether from a mobile or a base station, process them, possibly modify them, and forward them to the intended receiver. This paper exhibits the REVEAL protocol that can detect a MiM, whether it has half duplex capability, full duplex capability, or double full duplex capability. Protocol is based on synchronizing clocks between the mobile and the base station, with the MiM being detected if it interferes in the synchronization process. Once synchronized, the REVEAL protocol creates a sequence of challenge packets where the transmission times of the packets, their durations, and their frequencies, are chosen to create conflicts at the MiM, and make it impossible for the MiM to function. We implement the REVEAL protocol for detecting a MiM in 4G technology. We instantiate a MiM between the 4G/5G base station and a mobile, and exhibit the successful detection mechanisms. With the shared source code, our work can be reproduced using open software defined cellular networks with off-the-shelf device

    ๊ณ ๋ฐ€๋„ ๋ฌด์„ ๋žœ ๋™์‹œ ์ „์†ก ํ–ฅ์ƒ ๊ธฐ๋ฒ•

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› ๊ณต๊ณผ๋Œ€ํ•™ ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2017. 8. ์ตœ์„ฑํ˜„.๋ฌด์„  ํ†ต์‹ ์— ๋Œ€ํ•œ ์ˆ˜์š”๊ฐ€ ์ฆ๊ฐ€ํ•จ์— ๋”ฐ๋ผ, Wi-Fi๋กœ ํ”ํžˆ ์•Œ๋ ค์ง„ IEEE 802.11 ํ‘œ์ค€ ๊ธฐ๋ฐ˜ ๋ฌด์„ ๋žœ(WLAN, Wireless Local Area Network)์€ ์–ด๋””์—์„œ๋‚˜ ์ฐพ์•„๋ณผ ์ˆ˜ ์žˆ๋Š” ๊ธฐ์ˆ ๋กœ ๊ฑฐ๋“ญ๋‚ฌ๋‹ค. ์ด๋กœ ์ธํ•ด ๋ฌด์„ ๋žœ์˜ ๊ณ ๋ฐ€ํ™”, ์ฆ‰ ๊ณต๊ฐ„์ ์œผ๋กœ ์ธ์ ‘ํ•œ ๋งŽ์€ AP(Access Point)์™€ STA(station)๋“ค์ด ๋™์ผํ•œ ์ฃผํŒŒ์ˆ˜ ์ฑ„๋„์„ ์‚ฌ์šฉํ•˜๋ฉฐ ์ด๋กœ ์ธํ•ด ํ•œ ๋‹จ๋ง์ด ์–ป์„ ์ˆ˜ ์žˆ๋Š” ์„ฑ๋Šฅ์ด ์ œํ•œ๋˜๋Š” ํ˜„์ƒ์ด ๋‘๋“œ๋Ÿฌ์ง€๊ณ  ์žˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ด๋Ÿฌํ•œ ๊ณ ๋ฐ€๋„ ๋ฌด์„ ๋žœ ํ™˜๊ฒฝ์—์„œ๋Š” ๋‹จ์ผ ์ „์†ก์— ๋Œ€ํ•œ ์ŠคํŽ™ํŠธ๋Ÿผ ํšจ์œจ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ์ฃผํŒŒ์ˆ˜ ์ž์›์˜ ๊ณต๊ฐ„ ์žฌ์‚ฌ์šฉ(spatial reuse)์˜ ์ค‘์š”์„ฑ ๋˜ํ•œ ๊ฐ•์กฐ๋œ๋‹ค. ์ฆ‰, ํŠน์ • ๊ณต๊ฐ„ ๋‚ด์—์„œ ์–ผ๋งˆ๋‚˜ ๋งŽ์€ ๋™์‹œ ์ „์†ก์ด ๊ฐ€๋Šฅํ•œ์ง€๊ฐ€ ์ค‘์š”ํ•œ ์ด์Šˆ๋กœ ์ž๋ฆฌ๋งค๊น€ํ•˜๊ณ  ์žˆ๋‹ค. ๋ณธ ํ•™์œ„๋…ผ๋ฌธ์—์„œ๋Š” ๊ณ ๋ฐ€๋„ ๋ฌด์„ ๋žœ ํ™˜๊ฒฝ์—์„œ ๋” ๋งŽ์€ ๋™์‹œ ์ „์†ก์„ ์„ฑ๊ณต์‹œํ‚ค๊ธฐ ์œ„ํ•˜์—ฌ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์„ธ ๊ฐ€์ง€ ์ „๋žต์„ ๊ณ ๋ คํ•œ๋‹ค. (i) ๋งค์ฒด์ ‘๊ทผ์ œ์–ด(MAC, Medium Access Control) ๊ณ„์ธต์˜ ACK(Acknowledgment) ๋ฐ CTS(Clear-To-Send) ํ”„๋ ˆ์ž„์— ๋Œ€ํ•œ ์†ก์‹  ์ „๋ ฅ ์ œ์–ด, (ii) ๋ฐ˜์†กํŒŒ ๊ฐ์ง€ ์ž„๊ณ„๊ฐ’(CST, Carrier-Sense Threshold) ์ ์‘, (iii) ๋™์‹œ ์†ก์‹  ๋ฐ ์ˆ˜์‹  (STR, Simultaneous Transmit and Receiver), ์ฆ‰ ๋™์ผ๋Œ€์—ญ ์ „์ด์ค‘ ํ†ต์‹ (in-band full duplex). ์ฒซ๋ฒˆ์งธ๋กœ, ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ๋ฐ์ดํ„ฐ ํ”„๋ ˆ์ž„์— ์˜ํ•œ ๋™์ผ ์ฑ„๋„ ๊ฐ„์„ญ(CCI, Co-Channel Interference)๋ณด๋‹ค ๋œ ์กฐ๋ช…๋˜์–ด ์™”๋˜ MAC ACK ํ”„๋ ˆ์ž„์— ์˜ํ•ด ๋ฐœ์ƒํ•˜๋Š” CCI์— ์ฃผ๋ชฉํ•œ๋‹ค. ํ™•๋ฅ ์  ๊ธฐํ•˜ ๋ถ„์„(stochastic geometry analysis)์„ ๊ธฐ๋ฐ˜์œผ๋กœ ACK ํ”„๋ ˆ์ž„์˜ ์†ก์‹  ์ „๋ ฅ ์กฐ์ ˆ์˜ ํ•„์š”์„ฑ์„ ํ™•์ธํ•˜์˜€์œผ๋ฉฐ, ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ๋™์  ACK ํ”„๋ ˆ์ž„ ์†ก์‹  ์ „๋ ฅ ์ œ์–ด ์•Œ๊ณ ๋ฆฌ์ฆ˜์ธ Quiet ACK(QACK)์„ ์ œ์•ˆํ•œ๋‹ค. QACK์€ ๋ฐ์ดํ„ฐ ํ”„๋ ˆ์ž„ ์ˆ˜์‹  ์ค‘ ์ˆ˜ํ–‰๋˜๋Š” CCI ๊ฒ€์ถœ ๋ฐ CCI ์ „๋ ฅ ์ถ”์ • ๊ธฐ๋ฒ•๊ณผ ACK ํ”„๋ ˆ์ž„ ์ „์†ก ํ†ต๊ณ„๋ฅผ ํ™œ์šฉํ•˜์—ฌ ์„ธ๋ฐ€ํ•˜๊ณ  ์‹ ์†ํ•˜๊ฒŒ ACK ํ”„๋ ˆ์ž„์˜ ์†ก์‹  ์ „๋ ฅ์„ ์กฐ์ ˆํ•œ๋‹ค. ๋”๋ถˆ์–ด, QACK์„ ๋ฐ”ํƒ•์œผ๋กœ CTS ํ”„๋ ˆ์ž„ ์†ก์‹  ์ „๋ ฅ์„ ์กฐ์ ˆํ•˜์—ฌ ๋” ๋งŽ์€ ๋™์‹œ ์ „์†ก์ด ์‹œ๋„๋  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜๋Š” Quiet CTS(QCTS)๋ผ๋Š” ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋˜ํ•œ ์ œ์•ˆํ•œ๋‹ค. QACK์˜ ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์€ SDR(Software-Defined Radio) ๊ธฐ๋ฐ˜ ํ”„๋กœํ† ํƒ€์ž…์„ ํ†ตํ•ด ๊ฒ€์ฆํ•˜๋ฉฐ ๊ธฐ์กด ๋ฐฉ์‹ ๋Œ€๋น„ ์•ฝ 1.5๋ฐฐ ๋†’์€ ์ˆ˜์œจ์„ ์–ป์„ ์ˆ˜ ์žˆ์Œ์„ ํ™•์ธํ•œ๋‹ค. ๋ณด๋‹ค ์ผ๋ฐ˜์ ์ธ ๋ฌด์„ ๋žœ ํ™˜๊ฒฝ์—์„œ์˜ QACK ๋ฐ QCTS์˜ ์„ฑ๋Šฅ์€ ns-3๋ฅผ ์‚ฌ์šฉํ•œ ๋‹ค์–‘ํ•œ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ํ‰๊ฐ€ํ•œ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ๋™์‹œ์— ๋” ๋งŽ์€ ๋™์‹œ ์ „์†ก์ด ์‹œ๋„๋  ์ˆ˜ ์žˆ๋„๋ก ๊ฐ„์„ญ์›(interferer node)๊ณผ ๋ชฉ์  ๋…ธ๋“œ(destination node)์— ๋”ฐ๋ผ CST๋ฅผ ์ œ์–ดํ•˜๋Š” โ€‹โ€‹CST ์ ์‘ ๋ฐฉ๋ฒ•, FACT(Fine-grained Adaptation of Carrier-sense Threshold)๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๋ฐฉ๋ฒ•์€ ๋ฌด์„ ๋žœ ํ‘œ์ค€์—์„œ ์ด๋ฏธ ์ •์˜๋˜์–ด ์žˆ๋Š” ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜๋ฏ€๋กœ ์ƒ์šฉ ๋ฌด์„ ๋žœ ๊ธฐ๊ธฐ์—์„œ ์‰ฝ๊ฒŒ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ FACT ๋ฐ ๋‹ค๋ฅธ CST ์ ์‘ ๊ธฐ๋ฒ•๊ณผ ํ•จ๊ป˜ ๋™์ž‘ํ•  ์ˆ˜ ์žˆ๋Š” CCA(Clear Channel Assessment) ์˜ค๋ฒ„ํ—ค๋“œ ๊ฐ์†Œ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•˜๋ฉฐ, ์ œ์•ˆํ•œ ๊ธฐ๋ฒ•๋“ค์˜ ์„ฑ๋Šฅ์„ ns-3 ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ๋น„๊ตํ‰๊ฐ€ํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ๋ฅผ ํ†ตํ•ด ์ œ์•ˆํ•œ ๋ฐฉ๋ฒ•์ด ๊ธฐ์กด ๋ฐฉ๋ฒ•์— ๋น„ํ•ด ๋„คํŠธ์›Œํฌ ์ „์ฒด ์ˆ˜์œจ์„ ํฐ ํญ์œผ๋กœ ํ–ฅ์ƒ์‹œํ‚ฌ ์ˆ˜ ์žˆ์Œ์„ ํ™•์ธํ•œ๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ, ๋ฌด์„ ๋žœ์—์„œ STR์„ ๊ฐ€๋Šฅํ•˜๊ฒŒํ•˜๋Š” ์ƒˆ๋กœ์šด MAC ํ”„๋กœํ† ์ฝœ, ์ฆ‰ MASTaR(MAC Protocol for Access points in Simultaneous Transmit and Receive mode)๋ฅผ ๊ธฐ์กด ๋ฌด์„ ๋žœ ํ‘œ์ค€์„ ์ค€์ˆ˜ํ•˜๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ ์ œ์•ˆํ•œ๋‹ค. ๋˜ํ•œ MASTaR ๋™์ž‘์„ ์œ„ํ•ด ํ•„์š”ํ•œ ๋ฌผ๋ฆฌ๊ณ„์ธต์—์„œ ๋””์ง€ํ„ธ ์ž๊ฐ€ ๊ฐ„์„ญ ์ƒ์‡„(SIC, Self-Interference Cancellation) ์ „๋žต์„ ์ œ์•ˆํ•˜๋ฉฐ ๊ทธ ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์„ 3์ฐจ์› ๊ด‘์„  ์ถ”์ (3D-ray tracing) ๊ธฐ๋ฐ˜ ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด ๋‹ค์–‘ํ•œ ์ธก๋ฉด์—์„œ ํ‰๊ฐ€ํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ๋Š” ํ˜„์žฌ ๋ฌด์„ ๋žœ MAC ํ”„๋กœํ† ์ฝœ๋ณด๋‹ค ์ตœ๋Œ€ 2.58๋ฐฐ ๋†’์€ ์ˆ˜์œจ์ด MASTaR๋ฅผ ํ†ตํ•ด ์–ป์–ด์งˆ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์ธ๋‹ค. ์š”์•ฝํ•˜๋ฉด, ๋ณธ ํ•™์œ„๋…ผ๋ฌธ์—์„œ๋Š” ACK ๋ฐ CTS ํ”„๋ ˆ์ž„์˜ ์†ก์‹  ์ „๋ ฅ ์ œ์–ด ์•Œ๊ณ ๋ฆฌ์ฆ˜๊ณผ CST ์ ์‘ ๋ฐ STR์„ ์œ„ํ•œ ํ”„๋กœํ† ์ฝœ์„ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜ ๋ฐ ํ”„๋กœํ† ์ฝœ์˜ ์‹คํ˜„ ๊ฐ€๋Šฅ์„ฑ๊ณผ ์„ฑ๋Šฅ์€ ์ˆ˜์น˜ ํ•ด์„, 3์ฐจ์› ๊ด‘์„  ์ถ”์ , ns-3 ๊ธฐ๋ฐ˜ ์‹œ์Šคํ…œ ์ˆ˜์ค€(system-level) ์‹œ๋ฎฌ๋ ˆ์ด์…˜, SDR ๊ธฐ๋ฐ˜ ํ”„๋กœํ† ํƒ€์ž… ๋“ฑ ๋‹ค์–‘ํ•œ ๋ฐฉ๋ฒ•๋ก ์„ ํ†ตํ•ด ์ž…์ฆํ•œ๋‹ค.With increasing demand for wireless connectivity, IEEE 802.11 wireless local area network (WLAN), a.k.a. Wi-Fi, has become ubiquitous and continues to grow in number. This leads to the high density of WLAN, where many access points (APs) and client stations (STAs) operate on the same frequency channel. In a densely deployed WLAN, greater emphasis is placed on the importance of spatial reuse as well as spectral efficiency. In other words, it is of particular importance how many simultaneous transmissions are possible in a given area. In this dissertation, we consider the following three strategies to increase the number of successful simultaneous transmissions: (i) Transmit power control for medium access control (MAC) acknowledgment (ACK) and clear-to-send (CTS) frames, (ii) carrier sense threshold (CST) adaptation, and (iii) simultaneous transmit and receive (STR), i.e., in-band full-duplex communication. First, this dissertation sheds light on the co-channel interference (CCI) caused by 802.11 MAC ACK frames, which has been less studied than the CCI caused by data frames. Based on stochastic geometry analysis, we propose Quiet ACK (QACK), a dynamic transmit power control algorithm for ACK frames. Fine-grained transmit power adjustment is enabled by CCI detection and CCI power estimation in the middle of a data frame reception. A power control algorithm for clear-to-send (CTS) frame transmission, namely Quiet CTS (QCTS) is also proposed based on QACK. Our prototype using software-defined radio shows the feasibility and performance gain of QACK, i.e., 1.5X higher throughput than the legacy 802.11 WLAN. The performance of QACK and QCTS is further evaluated in more general WLAN environments via extensive simulations using ns-3. Second, a fine-grained CST adaptation method, which controls CST depending on both interferer and destination nodes, is proposed to improve spatial reuse in WLAN. The proposed method utilizes pre-defined functions in the WLAN standard, thus making itself easily implementable in commercial WLAN devices. Supplementary clear channel assessment (CCA) method is also proposed to further enhance network performance by reducing CCA overhead. The performance of the proposed methods is comparatively evaluated via ns-3 simulation. Simulation results show that the proposed methods significantly improve network throughput compared with the legacy method. Finally, a novel MAC protocol that enables STR in 802.11 WLAN, namely MASTaR, is proposed based on standard-compliant methods. Also, a digital self-interference cancellation (SIC) strategy is proposed to support the operation of MASTaR. The feasibility and the performance of MASTaR are extensively evaluated via 3D ray tracing-based simulation. The simulation results demonstrate that significant performance enhancement,e.g., up to 2.58X higher throughput than the current 802.11 MAC protocol, can be achieved by an STR-capable access point. In summary, we propose an algorithm for ACK and CTS transmission power control and two protocols each for CST adaptation and STR which enhance the efficiency of WLAN by enriching simultaneous transmission. The feasibility and the performance of the algorithm and protocols are demonstrated via various methodologies including numerical analysis, 3D ray-tracing, ns-3 based system-level simulation, and prototype using a software-defined radio.1 Introduction 1 1.1 Motivation 1 1.2 Overview of Existing Approaches 3 1.2.1 Transmit power control for CCI reduction 3 1.2.2 CST adaptation for better spatial reuse 3 1.2.3 MAC protocol for STR in WLAN 4 1.3 Main Contributions 7 1.3.1 Quiet ACK: ACK Transmit Power Control 7 1.3.2 FACT: CST adaptation scheme 8 1.3.3 MASTaR: MAC protocol for STR in WLAN 8 1.4 Organization of the Dissertation 9 2 Quiet ACK: ACK Transmit Power Control in IEEE 802.11 WLANs 10 2.1 Introduction 10 2.2 Numerical Analysis 12 2.2.1 System Model 13 2.2.2 AISR Expansion by ACK Power Control 18 2.2.3 Optimization of ACK Outage Tolerance 19 2.3 QACK: Proposed ACK power Control 21 2.3.1 CCI Detection and CCI Power Estimation 22 2.3.2 Link Margin Estimation 26 2.3.3 ACK Power Adjustment 29 2.3.4 Conditional QACK Enabling/Disabling 30 2.4 Prototyping-Based Feasibility Evaluation 30 2.4.1 Feasibility of CCI Detection and CCI Power Estimation 30 2.4.2 Throughput Enhancement by QACK 33 2.5 Simulation-based Performance Evaluation 34 2.5.1 Two BSS Topology 35 2.5.2 Multiple BSS Environment 38 2.5.3 Coexistence with Legacy Devices 41 2.6 Quiet CTS: Proposed CTS Power Control 41 2.6.1 Problem Statement 41 2.6.2 CTS Power Control 42 2.6.3 Relationship with Quiet ACK 44 2.6.4 Simulation Results 45 2.7 Summary 48 3 FACT: Fine-Grained Adaptation of Carrier Sense Threshold in IEEE 802.11 WLANs 49 3.1 Introduction 49 3.2 Preliminaries 50 3.2.1 IEEE 802.11h Transmit Power Control (TPC) 50 3.2.2 IEEE 802.11ah Basic Service Set (BSS) Color 52 3.3 FACT: Proposed CST Adaptation Scheme 52 3.3.1 Basic Principle 53 3.3.2 Challenges and Solutions 54 3.3.3 Specification 54 3.3.4 Transmit Power Adjustment 56 3.3.5 Conditional Update of CST 57 3.4 Blind CCA and Backoff Compensation 57 3.4.1 Blind CCA 58 3.4.2 Backoff Compensation 59 3.5 Performance Evaluation 59 3.6 Summary 63 4 MASTaR: MAC Protocol for Access Points in Simultaneous Transmit and Receive Mode 64 4.1 Introduction 64 4.2 Preliminaries 68 4.2.1 Explicit Block ACK 68 4.2.2 Capture Effect 69 4.3 MASTaR: Proposed MAC Protocol 70 4.3.1 PTX Identification 70 4.3.2 Initial Training 73 4.3.3 Link Map Management 73 4.3.4 Secondary Transmission 74 4.4 Feasibility Study 76 4.4.1 Analog SIC and Channel Modeling 76 4.4.2 Digital SIC for WLAN 79 4.5 Performance Evaluation 83 4.5.1 Simulation with UDP Data Traffic 87 4.5.2 Simulation with Voice and Data Traffic 100 4.6 Summary 102 5 Concluding Remarks 103 5.1 Research Contributions 103 5.2 Future Work 104 Abstract (In Korean) 110Docto
    • โ€ฆ
    corecore