684 research outputs found

    Design and Implementation of a Full-Duplex Pipelined MAC Protocol for Multihop Wireless Networks

    Get PDF
    In multihop wireless networks, data packets are forwarded from a source node to a destination node through intermediate relay nodes. With half-duplex relay nodes, the end-to-end delay performance of a multihop network degrades as the number of hops increases, because the relay nodes cannot receive and transmit at the same time. Full-duplex relay nodes can reduce their per-hop delay by starting to forward a packet before the whole packet is received. In this paper, we propose a pipelined medium access control (PiMAC) protocol, which enables the relay nodes on a multihop path to simultaneously transmit and receive packets for full-duplex forwarding. For pipelined transmission over a multihop path, it is important to suppress both the self-interference of each relay node with the full-duplex capability and the intra-flow interference from the next relay nodes on the same path. In the PiMAC protocol, each relay node can suppress both the self- and intra-flow interference for full-duplex relaying on the multihop path by estimating the channel coefficients and delays of the interference during a multihop channel acquisition phase. To evaluate the performance of the PiMAC protocol, we carried out extensive simulations and software-defined radio-based experiments

    Multihop Diversity in Wideband OFDM Systems: The Impact of Spatial Reuse and Frequency Selectivity

    Full text link
    The goal of this paper is to establish which practical routing schemes for wireless networks are most suitable for wideband systems in the power-limited regime, which is, for example, a practically relevant mode of operation for the analysis of ultrawideband (UWB) mesh networks. For this purpose, we study the tradeoff between energy efficiency and spectral efficiency (known as the power-bandwidth tradeoff) in a wideband linear multihop network in which transmissions employ orthogonal frequency-division multiplexing (OFDM) modulation and are affected by quasi-static, frequency-selective fading. Considering open-loop (fixed-rate) and closed-loop (rate-adaptive) multihop relaying techniques, we characterize the impact of routing with spatial reuse on the statistical properties of the end-to-end conditional mutual information (conditioned on the specific values of the channel fading parameters and therefore treated as a random variable) and on the energy and spectral efficiency measures of the wideband regime. Our analysis particularly deals with the convergence of these end-to-end performance measures in the case of large number of hops, i.e., the phenomenon first observed in \cite{Oyman06b} and named as ``multihop diversity''. Our results demonstrate the realizability of the multihop diversity advantages in the case of routing with spatial reuse for wideband OFDM systems under wireless channel effects such as path-loss and quasi-static frequency-selective multipath fading.Comment: 6 pages, to be published in Proc. 2008 IEEE International Symposium on Spread Spectrum Techniques and Applications (IEEE ISSSTA'08), Bologna, Ital

    Secrecy performance of TAS/SC-based multi-hop harvest-to-transmit cognitive WSNs under joint constraint of interference and hardware imperfection

    Get PDF
    In this paper, we evaluate the secrecy performance of multi-hop cognitive wireless sensor networks (WSNs). In the secondary network, a source transmits its data to a destination via the multi-hop relaying model using the transmit antenna selection (TAS)/selection combining (SC) technique at each hop, in the presence of an eavesdropper who wants to receive the data illegally. The secondary transmitters, including the source and intermediate relays, have to harvest energy from radio-frequency signals of a power beacon for transmitting the source data. Moreover, their transmit power must be adjusted to satisfy the quality of service (QoS) of the primary network. Under the joint impact of hardware imperfection and interference constraint, expressions for the transmit power for the secondary transmitters are derived. We also derive exact and asymptotic expressions of secrecy outage probability (SOP) and probability of non-zero secrecy capacity (PNSC) for the proposed protocol over Rayleigh fading channel. The derivations are then verified by Monte Carlo simulations.Web of Science195art. no. 116
    • …
    corecore