41 research outputs found

    Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access

    Full text link
    In this paper, a random access scheme is introduced which relies on the combination of packet erasure correcting codes and successive interference cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph representation of the SIC process, resembling iterative decoding of generalized low-density parity-check codes over the erasure channel, is exploited to optimize the selection probabilities of the component erasure correcting codes via density evolution analysis. The capacity (in packets per slot) of the scheme is then analyzed in the context of the collision channel without feedback. Moreover, a capacity bound is developed and component code distributions tightly approaching the bound are derived.Comment: The final version to appear in IEEE Trans. Inf. Theory. 18 pages, 10 figure

    Interference management in impulse-radio ultra-wide band networks

    Get PDF
    We consider networks of impulse-radio ultra-wide band (IR-UWB) devices. We are interested in the architecture, design, and performance evaluation of these networks in a low data-rate, self-organized, and multi-hop setting. IR-UWB is a potential physical layer for sensor networks and emerging pervasive wireless networks. These networks are likely to have no particular infrastructure, might have nodes embedded in everyday life objects and have a size ranging from a few dozen nodes to large-scale networks composed of hundreds of nodes. Their average data-rate is low, on the order of a few megabits per second. IR-UWB physical layers are attractive for these networks because they potentially combine low-power consumption, robustness to multipath fading and to interference, and location/ranging capability. The features of an IR-UWB physical layer greatly differ from the features of the narrow-band physical layers used in existing wireless networks. First, the bandwidth of an IR-UWB physical layer is at least 500 MHz, which is easily two orders of magnitude larger than the bandwidth used by a typical narrow-band physical layer. Second, this large bandwidth implies stringent radio spectrum regulations because UWB systems might occupy a portion of the spectrum that is already in use. Consequently, UWB systems exhibit extremely low power spectral densities. Finally IR-UWB physical layers offer multi-channel capabilities for multiple and concurrent access to the physical layer. Hence, the architecture and design of IR-UWB networks are likely to differ significantly from narrow-band wireless networks. For the network to operate efficiently, it must be designed and implemented to take into account the features of IR-UWB and to take advantage of them. In this thesis, we focus on both the medium access control (MAC) layer and the physical layer. Our main objectives are to understand and determine (1) the architecture and design principles of IR-UWB networks, and (2) how to implement them in practical schemes. In the first part of this thesis, we explore the design space of IR-UWB networks and analyze the fundamental design choices. We show that interference from concurrent transmissions should not be prevented as in protocols that use mutual exclusion (for instance, IEEE 802.11). Instead, interference must be managed with rate adaptation, and an interference mitigation scheme should be used at the physical layer. Power control is useless. Based on these findings, we develop a practical PHY-aware MAC protocol that takes into account the specific nature of IR-UWB and that is able to adapt its rate to interference. We evaluate the performance obtained with this design: It clearly outperforms traditional designs that, instead, use mutual exclusion or power control. One crucial aspect of IR-UWB networks is packet detection and timing acquisition. In this context, a network design choice is whether to use a common or private acquisition preamble for timing acquisition. Therefore, we evaluate how this network design issue affects the network throughput. Our analysis shows that a private acquisition preamble yields a tremendous increase in throughput, compared with a common acquisition preamble. In addition, simulations on multi-hop topologies with TCP flows demonstrate that a network using private acquisition preambles has a stable throughput. On the contrary, using a common acquisition preamble exhibits an effect similar to exposed terminal issues in 802.11 networks: the throughput is severely degraded and flow starvation might occur. In the second part of this thesis, we are interested in IEEE 802.15.4a, a standard for low data-rate, low complexity networks that employs an IR-UWB physical layer. Due to its low complexity, energy detection is appealing for the implementation of practical receivers. But it is less robust to multi-user interference (MUI) than a coherent receiver. Hence, we evaluate the performance of an IEEE 802.15.4a physical layer with an energy detection receiver to find out whether a satisfactory performance is still obtained. Our results show that MUI severely degrades the performance in this case. The energy detection receiver significantly diminishes one of the most appealing benefits of UWB, specifically its robustness to MUI and thus the possibility of allowing for parallel transmissions. This performance analysis leads to the development of an IR-UWB receiver architecture, based on energy detection, that is robust to MUI and adapted to the peculiarities of IEEE 802.15.4a. This architecture greatly improves the performance and entails only a moderate increase in complexity. Finally, we present the architecture of an IR-UWB physical layer implementation in ns-2, a well-known network simulator. This architecture is generic and allows for the simulation of several multiple-access physical layers. In addition, it comprises a model of packet detection and timing acquisition. Network simulators also need to have efficient algorithms to accurately compute bit or packet error rates. Hence, we present a fast algorithm to compute the bit error rate of an IR-UWB physical layer in a network setting with MUI. It is based on a novel combination of large deviation theory and importance sampling

    A Cross-Layer Design Approach to Enhance 802.15.4

    Get PDF
    The low-power communication in wireless sensor networks can be impacted by severe channel impairments. In this paper, to address this problem and achieve high network goodput, we propose that the medium access control protocol takes into consideration the error performance of the underlying wireless links. We combine a distributed back-off strategy regulated by the wireless link quality with Carrier Sense Multiple Access with Collision Avoidance. We integrate our cross-layer operational approach in the IEEE 802.15.4 standard, taking advantage of existing functionality and signaling to avoid network overhead and achieve simplicity in implementation. Our performance evaluation indicates that our scheme is more effective, achieving up to 69% higher goodput, and more efficient, delivering up to 154% more data bits per unit of energy consumed in the network, at the expense of an up to 18% degradation in fairness, compared to the basic 802.15.4

    OFDM Technique in Packet Captured Slotted Aloha Mobile Communication Systems

    Get PDF
    School of Electrical and Computer Engineerin

    Konoritsu musen rokaru eria nettowaku ni okeru tagen akusesu hoshiki ni kansuru kenkyu

    Get PDF
    制度:新 ; 報告番号:甲3738号 ; 学位の種類:博士(国際情報通信学) ; 授与年月日:2012/7/25 ; 早大学位記番号:新6109Waseda Universit

    逐次干渉除去を用いた多元接続システムのパワー割り当てに関する研究

    Get PDF
    In future wireless communication networks, the number of devices is likely to increase dramatically due to potential development of new applications such as the Internet of Things (IoT). Consequently, radio access network is required to support multiple access of massive users and achieve high spectral efficiency. From the information theoretic perspective, orthogonal multiple access protocols are suboptimal. To achieve the multiple access capacity, non-orthogonal multiple access protocols and multiuser detection (MUD) are required. For the non-orthogonal code-division multiple access (CDMA), several MUD techniques have been proposed to improve the spectrum efficiency. Successive interference cancellation (SIC) is a promising MUD techniques due to its low complexity and good decoding performance. Random access protocols are designed for the system with bursty traffic to reduce the delay, compared to the channelized multiple access. Since the users contend for the channel instead of being assigned by the base station (BS), collisions happen with a certain probability. If the traffic load becomes relatively high, the throughput of these schemes steeply falls down because of collisions. However, it has been well-recognized that more complex procedures can permit decoding of interfering signals, which is referred to as multi-packet reception (MPR). Also, an SIC decoder might decode more packets by successively subtracting the correctly decoded packets from the collision. Cognitive radio (CR) is an emerging technology to solve the problem of spectrum scarcity by dynamically sharing the spectrum. In the CR networks, the secondary users (SUs) are allowed to dynamically share the frequency bands with primary users (PUs) under primary quality-of-service (QoS) protection such as the constraint of interference temperature at the primary base station (PBS). For the uplink multiple access to the secondary base station (SBS), transmit power allocation for the SUs is critical to control the interference temperature at the PBS. Transmit power allocation has been extensively studied in various multiple access scenarios. The power allocation algorithms can be classified into two types, depending on whether the process is controlled by the base station (BS). For the centralized power allocation (CPA) algorithms, the BS allocates the transmit powers to the users through the downlink channels. For the random access protocols, there are also efforts on decentralized power allocation (DPA) that the users select transmit powers according to given distributions of power and probability, instead of being assigned the transmit power at each time slot by the BS. In this dissertation, the DPA algorithms for the random access protocols with SIC are investigated and new methods are proposed. First a decentralized multilevel power allocation algorithm to improve the MAC throughput performance is proposed, for the general SIC receiver that can decode multiple packets from one collision. Then an improved DPA algorithm to maximize the overall system sum rate is proposed, taking into account of both the MAC layer and PHY layer. Finally, a DPA algorithm for the CR secondary random access is proposed, considering the constraint of interference temperature and the practical assumption of imperfect cancellation. An opportunistic transmission protocol for the fading environment to further reduce the interference temperature is also proposed. For the future work, the optimal DPA for the random access with the SIC receiver is still an open problem. Besides, advanced multiple access schemes that aim to approach the multiple access capacity by combining the advantages of the network coded cooperation, the repetition slotted ALOHA, and the SIC receiver are also interesting.電気通信大学201

    High Performance Signal Processing-Based Collision Resolution for Random Access Schemes

    Get PDF
    Els darrers anys han experimentat un augment de la demanda de serveis interactius per satèl·lit per al gran consum, cobrint serveis fixes i mòbils, tal i com accés de banda ampla, comunicacions màquina-màquina (M2M), supervisió, control i adquisició de dades (SCADA), transaccions i aplicacions de seguretat crítiques. Aquestes xarxes de comunicacions es caracteritzen per tenir una gran població d’usuaris compartint l’amplada de banda amb unes condicions de tràfic molt dinàmiques. Concretament, en el canal de retorn (de l’usuari a la xarxa) de xarxes d’accés de banda ampla, els usuaris residencials generen grans ràfegues de tràfic amb períodes d’inactivitat freqüents. Una situació similar succeeix en xarxes de comunicacions mòbils per satèl·lit, on una gran població de terminals generen transmissions infreqüents de senyalització, serveis basats en la localització or altres aplicacions de missatgeria. Aquests serveis requereixen el desenvolupament de protocols d’accés múltiple eficients que puguin operar en les condicions descrites anteriorment. Els protocols d´accés aleatori són bons candidats per servir tràfic poc predictiu, amb transmissions infreqüents així com sensibles amb el retard. A més, els protocols d´accés aleatori suporten un gran nombre de terminals compartint el canal de comunicacions i requereixen poca complexitat en el terminals. El protocols d´accés aleatori han estat àmpliament estudiats i desplegats en xarxes terrestres, però les seves prestacions són pobres en el entorn satèl·lital, que està caracteritzat per retards de propagació molt grans. Avui en dia, el seu ús en les xarxes de comunicacions per satèl·lit està principalment limitat a la senyalització d’inici de sessió, transmissió de paquets de control i en alguns casos a la transmissió de petits volums de dades amb unes eficiència d’utilització del canal molt baixa. Aquesta tesi proposa tres noves tècniques d’accés aleatori, bens adaptades per proveir els serveis esmentats anteriorment en un entorn satèl·lital, amb altes prestacions i una complexitat en el terminal d’usuari reduïda. Les noves tècniques d’accés aleatori són Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA) i Enhanced Spread Spectrum Aloha (E-SSA), adaptades per un tipus d’accés ranurat, asíncron i d’espectre eixamplat respectivament. Les tres tècniques utilitzen una codificació de canal (FEC) robusta, capaç d’operar en front de interferències elevades, que són típiques en l’accés aleatori, i d’un mecanisme de cancel·lació successiva d’interferència que s’implementa en el receptor sobre els paquets descodificats satisfactòriament. Els nous protocols obtenen un throughput normalitzat superior a 1 bit/s/Hz amb una tassa de pèrdua de paquets inferior a 10-3, el qual representa un factor de millora de 1000 respecte a protocols d’accés aleatori tradicionals com l’ALOHA ranurat. Les prestacions de les noves tècniques d’accés aleatori has estat analitzades per mitjà de simulacions, així com amb nou models analítics desenvolupats en aquesta tesi capaços de caracteritzar el tràfic, la distribució estadística de la potència dels paquets, les prestacions de la codificació de canal (FEC) i el procés de cancel·lació d’interferència successiva.Los últimos años han experimentado un crecimiento de la demanda de servicios interactivos por satélite para el gran consumo, cubriendo servicios fijos i móviles, como el acceso de banda ancha, comunicaciones máquina a máquina (M2M), supervisión, control y adquisición de datos (SCADA), transacciones i aplicaciones criticas de seguridad. Estas redes de comunicaciones se caracterizan por tener una gran población de usuarios compartiendo el ancho de banda en unas condiciones de tráfico muy dinámicas. Concretamente, en el canal de retorno (del usuario a la red) de redes de acceso de banda ancha, los usuarios residenciales generan grandes ráfagas de tráfico con periodos frecuentes de inactividad. Una situación similar ocurre en las redes de comunicaciones móviles por satélite, donde una gran población de terminales generan transmisiones infrecuentes de señalización, servicios basados en la localización u otras aplicaciones me mensajería. Estos servicios requieren el desarrollo de protocolos de acceso múltiple eficientes capaces de operar en las condiciones descritas anteriormente. Los protocolos de acceso aleatorio son buenos candidatos para servir el tráfico poco predictivo, con transmisiones infrecuentes así como sensibles al retardo. Además, los protocolos de acceso soportan un gran número de terminales compartiendo el canal de comunicaciones y requieren poca complejidad en los terminales. Los protocolos de acceso aleatorio han estado ampliamente estudiados i desplegados en las redes terrestres, pero sus prestaciones son pobres en el entorno satelital, que se caracteriza por retardos de comunicaciones muy elevados. Hoy en día, su uso en la redes de comunicaciones por satélite está principalmente limitado a la señalización de inicio de sesión, transmisión de pequeños volumenes de datos con eficiencia de utilización del canal muy baja. Esta tesis propone tres nuevas técnicas de acceso aleatorio bien adaptadas para proveer los servicios mencionados anteriormente en un entorno de comunicaciones por satélite, con altas prestaciones y una complejidad en el terminal de usuario reducida. Las nuevas técnicas de acceso aleatorio son Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA) y Enhanced Spread Spectrum Aloha (E-SSA), adaptadas para un tipo de acceso ranurado, asíncrono y de espectro ensanchado respectivamente. Las tres técnicas utilizan una codificación de canal (FEC) robusta, capaz de operar en condiciones de interferencia elevadas, que son típicas en el acceso aleatorio, y de un mecanismo de cancelación sucesiva de interferencias que se implementa en el receptor sobre los paquetes que han sido decodificados satisfactoriamente. Los nuevos protocolos obtienen un throughput normalizado superior a 1 bit/s/Hz con una tasa de pérdida de paquetes inferior a 10-3, lo cual representa un factor de mejora de 1000 respecto a los protocolos de acceso aleatorio tradicionales como el ALOHA ranurado. Las prestaciones de las nuevas técnicas de acceso aleatorio han sido analizadas con simulaciones así como con nuevos modelos analíticos desarrollados en esta tesis, capaces de caracterizar el tráfico, la distribución estadística de la potencia de los paquetes, las prestaciones de la codificación de canal (FEC) y el proceso de cancelación sucesiva de interferencias.Over the past years there has been a fast growing demand for low-cost interactive satellite terminals supporting both fixed and mobile services, such as consumer broadband access, machine-to-machine communications (M2M), supervisory control and data acquisition (SCADA), transaction and safety of life applications. These networks, are generally characterized by a large population of terminals sharing the available resources under very dynamic traffic conditions. In particular, in the return link (user to network) of commercial satellite broadband access networks, residential users are likely to generate a large amount of low duty cycle bursty traffic with extended inactivity periods. A similar situation occurs in satellite mobile networks whereby a large number of terminals typically generate infrequent packets for signaling transmission as well for position reporting or other messaging applications. These services call for the development of efficient multiple access protocols able to cope with the above operating conditions. Random Access (RA) techniques are by nature, good candidates for the less predictive, low duty cycle as well as time sensitive return link traffic. Besides, RA techniques are capable of supporting large population of terminals sharing the same capacity and require low terminal complexity. RA schemes have been widely studied and deployed in terrestrial networks, but do not perform well in the satellite environment, which is characterized by very long propagation delays. Today, their use in satellite networks is mainly limited to initial network login, the transmission of control packets, and in some cases, for the transmission of very small volumes of data with very low channel utilization. This thesis proposes three novel RA schemes well suited for the provision of the above-mentioned services over a satellite environment with high performance and low terminal complexity. The new RA schemes are Contention Resolution Diversity Slotted Aloha (CRDSA), Asynchronous Contention Resolution Diversity Aloha (ACRDA) and Enhanced Spread Spectrum Aloha (E-SSA), suited for slotted, unslotted and spread spectrum-based systems respectively. They all use strong Forward Error Correction (FEC) codes, able to cope with heavy co-channel interference typically present in RA, and successive interference cancellation implemented over the successfully decoded packets. The new schemes achieve a normalized throughput above 1 bit/s/Hz for a packet loss ratio below 10-3, which represents a 1000-fold increase compared to Slotted ALOHA. The performance of the proposed RA schemes has been analyzed by means of detailed simulations as well as novel analytical frameworks that characterize traffic and packets power statistical distributions, the performance of the FEC coding as well as the iterative interference cancellation processing at the receiver

    Analysis and Optimization of Dynamic Spectrum Sharing for Cognitive Radio Networks

    Get PDF
    The goal of this dissertation is to present the analysis and optimization of dynamic spectrum sharing for cognitive radio networks (CRNs). Spectrum scarcity is a well known problem at present. In order to deal with this problem, dynamic spectrum sharing (DSS) was proposed. DSS is a technique where cognitive radio networks dynamically and opportunistically share the channels with primary users. The major contribution of this dissertation is in analyzing the problem of dynamic spectrum sharing under different scenarios and developing optimal solutions for these scenarios. In the first scenario, a contention based dynamic spectrum sharing model is considered and its throughput analysis is presented. One of the applications of this throughput analysis is in finding the optimal number of secondary users in such a scenario. The problem is studied for fixed and random allocation of channels to primary users while secondary users try to opportunistically use these channels. Primary users contend for the channels, and secondary users try to use the channels only when primary users are not using it. These secondary users themselves contend for the opportunistic usage. The numerical formulas developed for finding the optimal number of secondary users have been carefully analyzed with the solutions obtained using the throughput model directly and finding the optimal number of secondary users. These two match very closely with each other and hence provide simple numerical formulas to calculate the optimal number. The second scenario studied is based upon the idea of pre-knowledge of primary user activity. For instance, the active broadcasting periods of TV channels can be obtained from past measurements as the TV channels activities are approximately fixed. In this scenario, time spectrum block (TSB) allocation for DSS is studied. Optimal TSB allocation is considered to minimize the total interference of the system and hence maximize the overall throughput of the system of community networks. The results obtained using the proposed ABCD algorithm follow very closely with the optimal results. Thus the simple algorithm developed can be used for time spectrum block allocation in practical scenarios
    corecore