293 research outputs found

    Performance limits for channelized cellular telephone systems

    Get PDF
    Studies the performance of channel assignment algorithms for “channelized” (e.g., FDMA or TDMA) cellular telephone systems, via mathematical models, each of which is characterized by a pair (H,p), where H is a hypergraph describing the channel reuse restrictions, and p is a probability vector describing the variation of traffic intensity from cell to cell. For a given channel assignment algorithm, the authors define T(r) to be the amount of carried traffic, as a function of the offered traffic, where both r and T(r) are measured in Erlangs per channel. They show that for a given H and p, there exists a function TH,p(r), which can be computed by linear programming, such that for every channel assignment algorithm, T(r) ≤ TH,p(r). Moreover, they show that there exist channel assignment algorithms whose performance approaches TH,p (r) arbitrarily closely as the number of channels increases. As a corollary, they show that for a given (H,p) there is a number r0 , which also can be computed by linear programming, such that if the offered traffic exceeds r0, then for any channel assignment algorithm, a positive fraction of all call requests must be blocked, whereas if the offered traffic is less than r0, all call requests can be honored, if the number of channels is sufficiently large. The authors call r0, whose units are Erlangs per channel, the capacity of the cellular system

    逐次干渉除去を用いた多元接続システムのパワー割り当てに関する研究

    Get PDF
    In future wireless communication networks, the number of devices is likely to increase dramatically due to potential development of new applications such as the Internet of Things (IoT). Consequently, radio access network is required to support multiple access of massive users and achieve high spectral efficiency. From the information theoretic perspective, orthogonal multiple access protocols are suboptimal. To achieve the multiple access capacity, non-orthogonal multiple access protocols and multiuser detection (MUD) are required. For the non-orthogonal code-division multiple access (CDMA), several MUD techniques have been proposed to improve the spectrum efficiency. Successive interference cancellation (SIC) is a promising MUD techniques due to its low complexity and good decoding performance. Random access protocols are designed for the system with bursty traffic to reduce the delay, compared to the channelized multiple access. Since the users contend for the channel instead of being assigned by the base station (BS), collisions happen with a certain probability. If the traffic load becomes relatively high, the throughput of these schemes steeply falls down because of collisions. However, it has been well-recognized that more complex procedures can permit decoding of interfering signals, which is referred to as multi-packet reception (MPR). Also, an SIC decoder might decode more packets by successively subtracting the correctly decoded packets from the collision. Cognitive radio (CR) is an emerging technology to solve the problem of spectrum scarcity by dynamically sharing the spectrum. In the CR networks, the secondary users (SUs) are allowed to dynamically share the frequency bands with primary users (PUs) under primary quality-of-service (QoS) protection such as the constraint of interference temperature at the primary base station (PBS). For the uplink multiple access to the secondary base station (SBS), transmit power allocation for the SUs is critical to control the interference temperature at the PBS. Transmit power allocation has been extensively studied in various multiple access scenarios. The power allocation algorithms can be classified into two types, depending on whether the process is controlled by the base station (BS). For the centralized power allocation (CPA) algorithms, the BS allocates the transmit powers to the users through the downlink channels. For the random access protocols, there are also efforts on decentralized power allocation (DPA) that the users select transmit powers according to given distributions of power and probability, instead of being assigned the transmit power at each time slot by the BS. In this dissertation, the DPA algorithms for the random access protocols with SIC are investigated and new methods are proposed. First a decentralized multilevel power allocation algorithm to improve the MAC throughput performance is proposed, for the general SIC receiver that can decode multiple packets from one collision. Then an improved DPA algorithm to maximize the overall system sum rate is proposed, taking into account of both the MAC layer and PHY layer. Finally, a DPA algorithm for the CR secondary random access is proposed, considering the constraint of interference temperature and the practical assumption of imperfect cancellation. An opportunistic transmission protocol for the fading environment to further reduce the interference temperature is also proposed. For the future work, the optimal DPA for the random access with the SIC receiver is still an open problem. Besides, advanced multiple access schemes that aim to approach the multiple access capacity by combining the advantages of the network coded cooperation, the repetition slotted ALOHA, and the SIC receiver are also interesting.電気通信大学201

    A Quality of Service Based Model for Supporting Mobile Secondary Users in Cognitive Radio Technology

    Get PDF
    Current wireless networks are characterized by a static spectrum allocation policy, where governmental agencies assign wireless spectrum to license holders on a long-term basis for large geographical regions. The operators claim that the spectrum bands for mobile operation are highly occupied. Even then, a significant amount of licensed spectrum remains underutilized. Cognitive radio senses the radio environment with a twofold objective: identify those subbands of the radio spectrum that are underutilized by the primary (i.e., legacy) users and providing the means for making those bands available for employment by secondary (i.e., unlicensed) users. For unlicensed communication, the Quality of Service parameters need to be considered. Quality of Service comprises of channel availability, accessibility, and maintainability. Assessment of vacant channels of licensed band in a geographical region is termed as availability. An analysis of the collected data lead to arrive at the conclusion that more than one-eighth part of resources of each band are nearly permanently vacant, which is enough to design in-band common control signaling methods for cognitive radio. Measurement result plot of vacant channels in cities with known population will help to assess availability of vacant channels for any city and hence, measurement complexity can be avoided. The strategy to occupy the vacant channels without disturbing the primary user operation is referred as accessibility (or selection). Accessibility of a channel is dependent on blocking probability (or Quality of Service) measured in duration of minutes instead of hours. Instantaneous blocking probability has been calculated based on current minute occupancy for all available channels as reference. A comprehensive prediction model is employed in the proposed work to compute the instantaneous blocking probability both on immediate minute occupancy basis and its preceding 60 min basis from time of request by SU. Validation through actual data establishes that channelized blocking probability estimation model has lower error value compared to estimation through prediction models of other researchers. It was also observed that hourly basis prediction model has constant blocking probability value during clock hour, whereas minutewise Grade of Service (GoS) prediction model addresses the local peak demand and hence leads to a stringent GoS estimation. On secondary user request for vacant channel, the cognitive radio network needs to evaluate the expected holding time of the particular Secondary User and to ensure channel maintainability (or allocation), and it shall predict that the allotted channel shall be able to provide interruption-free service for holding time duration. Minutewise channel occupancy traffic is bumpy in nature; hence, the present work predicts call arrival rate using Holt Winter’s method. Also, at the instant of SU channel request, the channel allocation processor inputs all PU channel status minutewise, calculates actual mean residual lifetime (MRL) in minutes for each vacant channel and selects the channel with highest predicted free time. A simulation program runs on data collected from mobile switch of cellular network, which creates pseudo-live environment for channel allocation. The present work has compared the mean residual lifetime (MRL) method with the other researchers using probabilistic method of channel allocation and MRL method has been established as more accurate. The selection and allocation process with defined blocking probability model has been verified retrieving big data from data warehouse

    Spatial spectrum and energy efficiency of random cellular networks

    Get PDF
    It is a great challenge to evaluate the network performance of cellular mobile communication systems. In this paper, we propose new spatial spectrum and energy efficiency models for Poisson-Voronoi tessellation (PVT) random cellular networks. To evaluate the user access the network, a Markov chain based wireless channel access model is first proposed for PVT random cellular networks. On that basis, the outage probability and blocking probability of PVT random cellular networks are derived, which can be computed numerically. Furthermore, taking into account the call arrival rate, the path loss exponent and the base station (BS) density in random cellular networks, spatial spectrum and energy efficiency models are proposed and analyzed for PVT random cellular networks. Numerical simulations are conducted to evaluate the network spectrum and energy efficiency in PVT random cellular networks.Comment: appears in IEEE Transactions on Communications, April, 201

    Real-Time Localization Using Software Defined Radio

    Get PDF
    Service providers make use of cost-effective wireless solutions to identify, localize, and possibly track users using their carried MDs to support added services, such as geo-advertisement, security, and management. Indoor and outdoor hotspot areas play a significant role for such services. However, GPS does not work in many of these areas. To solve this problem, service providers leverage available indoor radio technologies, such as WiFi, GSM, and LTE, to identify and localize users. We focus our research on passive services provided by third parties, which are responsible for (i) data acquisition and (ii) processing, and network-based services, where (i) and (ii) are done inside the serving network. For better understanding of parameters that affect indoor localization, we investigate several factors that affect indoor signal propagation for both Bluetooth and WiFi technologies. For GSM-based passive services, we developed first a data acquisition module: a GSM receiver that can overhear GSM uplink messages transmitted by MDs while being invisible. A set of optimizations were made for the receiver components to support wideband capturing of the GSM spectrum while operating in real-time. Processing the wide-spectrum of the GSM is possible using a proposed distributed processing approach over an IP network. Then, to overcome the lack of information about tracked devices’ radio settings, we developed two novel localization algorithms that rely on proximity-based solutions to estimate in real environments devices’ locations. Given the challenging indoor environment on radio signals, such as NLOS reception and multipath propagation, we developed an original algorithm to detect and remove contaminated radio signals before being fed to the localization algorithm. To improve the localization algorithm, we extended our work with a hybrid based approach that uses both WiFi and GSM interfaces to localize users. For network-based services, we used a software implementation of a LTE base station to develop our algorithms, which characterize the indoor environment before applying the localization algorithm. Experiments were conducted without any special hardware, any prior knowledge of the indoor layout or any offline calibration of the system

    Hypergraph models for cellular mobile communication systems

    Full text link

    Frequency-aware rate adaptation and MAC protocol

    Get PDF
    There has been burgeoning interest in wireless technologies that can use wider frequency spectrum. Technology advances, such as 802.11n and ultra-wideband (UWB), are pushing toward wider frequency bands. The analog-to-digital TV transition has made 100-250 MHz of digital whitespace bandwidth available for unlicensed access. Also, recent work on WiFi networks has advocated discarding the notion of channelization and allowing all nodes to access the wide 802.11 spectrum in order to improve load balancing. This shift towards wider bands presents an opportunity to exploit frequency diversity. Specifically, frequencies that are far from each other in the spectrum have significantly different SNRs, and good frequencies differ across sender-receiver pairs. This paper presents FARA, a combined frequency-aware rate adaptation and MAC protocol. FARA makes three departures from conventional wireless network design: First, it presents a scheme to robustly compute per-frequency SNRs using normal data transmissions. Second, instead of using one bit rate per link, it enables a sender to adapt the bitrate independently across frequencies based on these per-frequency SNRs. Third, in contrast to traditional frequency-oblivious MAC protocols, it introduces a MAC protocol that allocates to a sender-receiver pair the frequencies that work best for that pair. We have implemented FARA in FPGA on a wideband 802.11-compatible radio platform. Our experiments reveal that FARA provides a 3.1x throughput improvement in comparison to frequency-oblivious systems that occupy the same spectrum.Industrial Technology Research InstituteNational Science Foundation (U.S.)

    Multiple access protocols for multichannel communication systems

    Get PDF
    Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.Includes bibliographical references (leaves 108-111).System architecture design, evaluation, and optimization are key issues to developing communication systems that meet the requirements of today and expectations of the future. In this thesis, we introduce the concept of multiple access communication and the need to use efficient transmission techniques to expand both present and future wireless communication networks. We will study two areas regarding multiple access on multichannel communication systems. First, we describe fundamental multiplexing techniques that we can build upon and investigate the performance of different candidate architectures for the transmission of messages from bursty sources on multiple channels. We will consider traditional protocols such as Time Division Multiple Access (TDMA) and Slotted ALOHA (S-ALOHA) alongside a channelized architecture, which is based on the idea of multiplexing by dividing total transmission capacity into a fixed number of frequency channels. We develop mathematical models that describe the overall delay for sending large messages of a fixed length arriving from bursty sources and analyze their performances. We will make real-world parameter assumptions in the context of wireless networks and analyze the performance to develop intuition about the effectiveness of the different architectures. Second, we will investigate channel capacity allocation among mixed traffic, i.e., multiple classes of users. We will consider a first-come first-serve (FCFS) access strategy, a non-preemptive priority scheme, a preemptive resume priority scheme, and several channel capacity allocation schemes. We develop models that describe the overall delay for sending messages and analyze their performance. Our focus will concentrate on two classes of users. This scenario is typical of classes of users with small and large messages to transmit. present quantitative results by making real-world parameter assumptions in the context of wireless networks and analyze the performance to develop intuition about the effectiveness of each architecture.by Serena Chan.M.Eng

    Analysis and Optimization of Dynamic Spectrum Sharing for Cognitive Radio Networks

    Get PDF
    The goal of this dissertation is to present the analysis and optimization of dynamic spectrum sharing for cognitive radio networks (CRNs). Spectrum scarcity is a well known problem at present. In order to deal with this problem, dynamic spectrum sharing (DSS) was proposed. DSS is a technique where cognitive radio networks dynamically and opportunistically share the channels with primary users. The major contribution of this dissertation is in analyzing the problem of dynamic spectrum sharing under different scenarios and developing optimal solutions for these scenarios. In the first scenario, a contention based dynamic spectrum sharing model is considered and its throughput analysis is presented. One of the applications of this throughput analysis is in finding the optimal number of secondary users in such a scenario. The problem is studied for fixed and random allocation of channels to primary users while secondary users try to opportunistically use these channels. Primary users contend for the channels, and secondary users try to use the channels only when primary users are not using it. These secondary users themselves contend for the opportunistic usage. The numerical formulas developed for finding the optimal number of secondary users have been carefully analyzed with the solutions obtained using the throughput model directly and finding the optimal number of secondary users. These two match very closely with each other and hence provide simple numerical formulas to calculate the optimal number. The second scenario studied is based upon the idea of pre-knowledge of primary user activity. For instance, the active broadcasting periods of TV channels can be obtained from past measurements as the TV channels activities are approximately fixed. In this scenario, time spectrum block (TSB) allocation for DSS is studied. Optimal TSB allocation is considered to minimize the total interference of the system and hence maximize the overall throughput of the system of community networks. The results obtained using the proposed ABCD algorithm follow very closely with the optimal results. Thus the simple algorithm developed can be used for time spectrum block allocation in practical scenarios
    corecore