32 research outputs found

    Coordinated Multicast Beamforming in Multicell Networks

    Full text link
    We study physical layer multicasting in multicell networks where each base station, equipped with multiple antennas, transmits a common message using a single beamformer to multiple users in the same cell. We investigate two coordinated beamforming designs: the quality-of-service (QoS) beamforming and the max-min SINR (signal-to-interference-plus-noise ratio) beamforming. The goal of the QoS beamforming is to minimize the total power consumption while guaranteeing that received SINR at each user is above a predetermined threshold. We present a necessary condition for the optimization problem to be feasible. Then, based on the decomposition theory, we propose a novel decentralized algorithm to implement the coordinated beamforming with limited information sharing among different base stations. The algorithm is guaranteed to converge and in most cases it converges to the optimal solution. The max-min SINR (MMS) beamforming is to maximize the minimum received SINR among all users under per-base station power constraints. We show that the MMS problem and a weighted peak-power minimization (WPPM) problem are inverse problems. Based on this inversion relationship, we then propose an efficient algorithm to solve the MMS problem in an approximate manner. Simulation results demonstrate significant advantages of the proposed multicast beamforming algorithms over conventional multicasting schemes.Comment: 10pages, 9 figure

    Analysis and Ad-hoc Networking Solutions for Cooperative Relaying Systems

    Get PDF
    Users of mobile networks are increasingly demanding higher data rates from their service providers. To cater to this demand, various signal processing and networking algorithms have been proposed. Amongst them the multiple input multiple output (MIMO) scheme of wireless communications is one of the most promising options. However, due to certain physical restrictions, e.g., size, it is not possible for many devices to have multiple antennas on them. Also, most of the devices currently in use are single-antenna devices. Such devices can make use of the MIMO scheme by employing cooperative MIMO methods. This involves nearby nodes utilizing the antennas of each other to form virtual antenna arrays (VAAs). Nodes with limited communication ranges can further employ multi-hopping to be able to communicate with far away nodes. However, an ad-hoc communications scheme with cooperative MIMO multi-hopping can be challenging to implement because of its de-centralized nature and lack of a centralized controling entity such as a base-station. This thesis looks at methods to alleviate the problems faced by such networks.In the first part of this thesis, we look, analytically, at the relaying scheme under consideration and derive closed form expressions for certain performance measures (signal to noise ratio (SNR), symbol error rate (SER), bit error rate (BER), and capacity) for the co-located and cooperative multiple antenna schemes in different relaying configurations (amplify-and-forward and decode-and-forward) and different antenna configurations (single input single output (SISO), single input multiple output (SIMO) and MIMO). These expressions show the importance of reducing the number of hops in multi-hop communications to achieve a better performance. We can also see the impact of different antenna configurations and different transmit powers on the number of hops through these simplified expressions.We also look at the impact of synchronization errors on the cooperative MIMO communications scheme and derive a lower bound of the SINR and an expression for the BER in the high SNR regime. These expressions can help the network designers to ensure that the quality of service (QoS) is satisfied even in the worst-case scenarios. In the second part of the thesis we present some algorithms developed by us to help the set-up and functioning of cluster-based ad-hoc networks that employ cooperative relaying. We present a clustering algorithm that takes into account the battery status of nodes in order to ensure a longer network life-time. We also present a routing mechanism that is tailored for use in cooperative MIMO multi-hop relaying. The benefits of both schemes are shown through simulations.A method to handle data in ad-hoc networks using distributed hash tables (DHTs) is also presented. Moreover, we also present a physical layer security mechanism for multi-hop relaying. We also analyze the physical layer security mechanism for the cooperative MIMO scheme. This analysis shows that the cooperative MIMO scheme is more beneficial than co-located MIMO in terms of the information theoretic limits of the physical layer security.Nutzer mobiler Netzwerke fordern zunehmend höhere Datenraten von ihren Dienstleistern. Um diesem Bedarf gerecht zu werden, wurden verschiedene Signalverarbeitungsalgorithmen entwickelt. Dabei ist das "Multiple input multiple output" (MIMO)-Verfahren für die drahtlose Kommunikation eine der vielversprechendsten Techniken. Jedoch ist aufgrund bestimmter physikalischer Beschränkungen, wie zum Beispiel die Baugröße, die Verwendung von mehreren Antennen für viele Endgeräte nicht möglich. Dennoch können solche Ein-Antennen-Geräte durch den Einsatz kooperativer MIMO-Verfahren von den Vorteilen des MIMO-Prinzips profitieren. Dabei schließen sich naheliegende Knoten zusammen um ein sogenanntes virtuelles Antennen-Array zu bilden. Weiterhin können Knoten mit beschränktem Kommunikationsbereich durch mehrere Hops mit weiter entfernten Knoten kommunizieren. Allerdings stellt der Aufbau eines solchen Ad-hoc-Netzwerks mit kooperativen MIMO-Fähigkeiten aufgrund der dezentralen Natur und das Fehlen einer zentral-steuernden Einheit, wie einer Basisstation, eine große Herausforderung dar. Diese Arbeit befasst sich mit den Problemstellungen dieser Netzwerke und bietet verschiedene Lösungsansätze.Im ersten Teil dieser Arbeit werden analytisch in sich geschlossene Ausdrücke für ein kooperatives Relaying-System bezüglicher verschiedener Metriken, wie das Signal-Rausch-Verhältnis, die Symbolfehlerrate, die Bitfehlerrate und die Kapazität, hergeleitet. Dabei werden die "Amplify-and forward" und "Decode-and-forward" Relaying-Protokolle, sowie unterschiedliche Mehrantennen-Konfigurationen, wie "Single input single output" (SISO), "Single input multiple output" (SIMO) und MIMO betrachtet. Diese Ausdrücke zeigen die Bedeutung der Reduzierung der Hop-Anzahl in Mehr-Hop-Systemen, um eine höhere Leistung zu erzielen. Zudem werden die Auswirkungen verschiedener Antennen-Konfigurationen und Sendeleistungen auf die Anzahl der Hops analysiert.  Weiterhin wird der Einfluss von Synchronisationsfehlern auf das kooperative MIMO-Verfahren herausgestellt und daraus eine untere Grenze für das Signal-zu-Interferenz-und-Rausch-Verhältnis, sowie ein Ausdruck für die Bitfehlerrate bei hohem Signal-Rausch-Verhältnis entwickelt. Diese Zusammenhänge sollen Netzwerk-Designern helfen die Qualität des Services auch in den Worst-Case-Szenarien sicherzustellen. Im zweiten Teil der Arbeit werden einige innovative Algorithmen vorgestellt, die die Einrichtung und die Funktionsweise von Cluster-basierten Ad-hoc-Netzwerken, die kooperative Relays verwenden, erleichtern und verbessern. Darunter befinden sich ein Clustering-Algorithmus, der den Batteriestatus der Knoten berücksichtigt, um eine längere Lebensdauer des Netzwerks zu gewährleisten und ein Routing-Mechanismus, der auf den Einsatz in kooperativen MIMO Mehr-Hop-Systemen zugeschnitten ist. Die Vorteile beider Algorithmen werden durch Simulationen veranschaulicht. Eine Methode, die Daten in Ad-hoc-Netzwerken mit verteilten Hash-Tabellen behandelt wird ebenfalls vorgestellt. Darüber hinaus wird auch ein Sicherheitsmechanismus für die physikalische Schicht in Multi-Hop-Systemen und kooperativen MIMO-Systemen präsentiert. Eine Analyse zeigt, dass das kooperative MIMO-Verfahren deutliche Vorteile gegenüber dem konventionellen MIMO-Verfahren hinsichtlich der informationstheoretischen Grenzen der Sicherheit auf der physikalischen Schicht aufweist

    Optimising Cooperative Spectrum Sensing in Cognitive Radio Networks Using Interference Alignment and Space-Time Coding

    Get PDF
    In this thesis, the process of optimizing Cooperative Spectrum Sensing in Cognitive Radio has been investigated in fast-fading environments where simulation results have shown that its performance is limited by the Probability of Reporting Errors. By proposing a transmit diversity scheme using Differential space-time block codes (D-STBC) where channel state information (CSI) is not required and regarding multiple pairs of Cognitive Radios (CR’s) with single antennas as a virtual MIMO antenna arrays in multiple clusters, Differential space-time coding is applied for the purpose of decision reporting over Rayleigh channels. Both Hard and Soft combination schemes were investigated at the fusion center to reveal performance advantages for Hard combination schemes due to their minimal bandwidth requirements and simplistic implementation. The simulations results show that this optimization process achieves full transmit diversity, albeit with slight performance degradation in terms of power with improvements in performance when compared to conventional Cooperative Spectrum Sensing over non-ideal reporting channels. Further research carried out in this thesis shows performance deficits of Cooperative Spectrum Sensing due to interference on sensing channels of Cognitive Radio. Interference Alignment (IA) being a revolutionary wireless transmission strategy that reduces the impact of interference seems well suited as a strategy that can be used to optimize the performance of Cooperative Spectrum Sensing. The idea of IA is to coordinate multiple transmitters so that their mutual interference aligns at their receivers, facilitating simple interference cancellation techniques. Since its inception, research efforts have primarily been focused on verifying IA’s ability to achieve the maximum degrees of freedom (an approximation of sum capacity), developing algorithms for determining alignment solutions and designing transmission strategies that relax the need for perfect alignment but yield better performance. With the increased deployment of wireless services, CR’s ability to opportunistically sense and access the unused licensed frequency spectrum, without causing harmful interference to the licensed users becomes increasingly diminished, making the concept of introducing IA in CR a very attractive proposition. For a multiuser multiple-input–multiple-output (MIMO) overlay CR network, a space-time opportunistic IA (ST-OIA) technique has been proposed that allows spectrum sharing between a single primary user (PU) and multiple secondary users (SU) while ensuring zero interference to the PUs. With local CSI available at both the transmitters and receivers of SUs, the PU employs a space-time WF (STWF) algorithm to optimize its transmission and in the process, frees up unused eigenmodes that can be exploited by the SU. STWF achieves higher performance than other WF algorithms at low to moderate signal-to-noise ratio (SNR) regimes, which makes it ideal for implementation in CR networks. The SUs align their transmitted signals in such a way their interference impairs only the PU’s unused eigenmodes. For the multiple SUs to further exploit the benefits of Cooperative Spectrum Sensing, it was shown in this thesis that IA would only work when a set of conditions were met. The first condition ensures that the SUs satisfy a zero interference constraint at the PU’s receiver by designing their post-processing matrices such that they are orthogonal to the received signal from the PU link. The second condition ensures a zero interference constraint at both the PU and SUs receivers i.e. the constraint ensures that no interference from the SU transmitters is present at the output of the post-processing matrices of its unintended receivers. The third condition caters for the multiple SUs scenario to ensure interference from multiple SUs are aligned along unused eigenmodes. The SU system is assumed to employ a time division multiple access (TDMA) system such that the Principle of Reciprocity is employed towards optimizing the SUs transmission rates. Since aligning multiple SU transmissions at the PU is always limited by availability of spatial dimensions as well as typical user loads, the third condition proposes a user selection algorithm by the fusion centre (FC), where the SUs are grouped into clusters based on their numbers (i.e. two SUs per cluster) and their proximity to the FC, so that they can be aligned at each PU-Rx. This converts the cognitive IA problem into an unconstrained standard IA problem for a general cognitive system. Given the fact that the optimal power allocation algorithms used to optimize the SUs transmission rates turns out to be an optimal beamformer with multiple eigenbeams, this work initially proposes combining the diversity gain property of STBC, the zero-forcing function of IA and beamforming to optimize the SUs transmission rates. However, this solution requires availability of CSI, and to eliminate the need for this, this work then combines the D-STBC scheme with optimal IA precoders (consisting of beamforming and zero-forcing) to maximize the SUs data rates

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    RESOURCE ALLOCATION FOR WIRELESS RELAY NETWORKS

    Get PDF
    In this thesis, we propose several resource allocation strategies for relay networks in the context of joint power and bandwidth allocation and relay selection, and joint power allocation and subchannel assignment for orthogonal frequency division multiplexing (OFDM) and orthogonal frequency division multiple access (OFDMA) systems. Sharing the two best ordered relays with equal power between the two users over Rayleigh flat fading channels is proposed to establish full diversity order for both users. Closed form expressions for the outage probability, and bit error probability (BEP) performance measures for both amplify and forward (AF) and decode and forward (DF) cooperative communication schemes are developed for different scenarios. To utilize the full potentials of relay-assisted transmission in multi user systems, we propose a mixed strategy of AF relaying and direct transmission, where the user transmits part of the data using the relay, and the other part is transmitted using the direct link. The resource allocation problem is formulated to maximize the sum rate. A recursive algorithm alternating between power allocation and bandwidth allocation steps is proposed to solve the formulated resource allocation problem. Due to the conflict between limited wireless resources and the fast growing wireless demands, Stackelberg game is proposed to allocate the relay resources (power and bandwidth) between competing users, aiming to maximize the relay benefits from selling its resources. We prove the uniqueness of Stackelberg Nash Equilibrium (SNE) for the proposed game. We develop a distributed algorithm to reach SNE, and investigate the conditions for the stability of the proposed algorithm. We propose low complexity algorithms for AF-OFDMA and DF-OFDMA systems to assign the subcarriers to the users based on high SNR approximation aiming to maximize the weighted sum rate. Auction framework is proposed to devise competition based solutions for the resource allocation of AF-OFDMA aiming tomaximize either vi the sum rate or the fairness index. Two auction algorithms are proposed; sequential and one-shot auctions. In sequential auction, the users evaluate the subcarrier based on the rate marginal contribution. In the one-shot auction, the users evaluate the subcarriers based on an estimate of the Shapley value and bids on all subcarriers at once

    An Overview of Physical Layer Security with Finite-Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision

    Radio Communications

    Get PDF
    In the last decades the restless evolution of information and communication technologies (ICT) brought to a deep transformation of our habits. The growth of the Internet and the advances in hardware and software implementations modified our way to communicate and to share information. In this book, an overview of the major issues faced today by researchers in the field of radio communications is given through 35 high quality chapters written by specialists working in universities and research centers all over the world. Various aspects will be deeply discussed: channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic scheduling, advanced admission control, handover management, systems performance assessment, routing issues in mobility conditions, localization, web security. Advanced techniques for the radio resource management will be discussed both in single and multiple radio technologies; either in infrastructure, mesh or ad hoc networks

    Recent Advances in Wireless Communications and Networks

    Get PDF
    This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters

    An Overview of Physical Layer Security with Finite Alphabet Signaling

    Get PDF
    Providing secure communications over the physical layer with the objective of achieving secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and discuss some open problems and directions for future research
    corecore