198 research outputs found

    Computation Over Gaussian Networks With Orthogonal Components

    Get PDF
    Function computation of arbitrarily correlated discrete sources over Gaussian networks with orthogonal components is studied. Two classes of functions are considered: the arithmetic sum function and the type function. The arithmetic sum function in this paper is defined as a set of multiple weighted arithmetic sums, which includes averaging of the sources and estimating each of the sources as special cases. The type or frequency histogram function counts the number of occurrences of each argument, which yields many important statistics such as mean, variance, maximum, minimum, median, and so on. The proposed computation coding first abstracts Gaussian networks into the corresponding modulo sum multiple-access channels via nested lattice codes and linear network coding and then computes the desired function by using linear Slepian-Wolf source coding. For orthogonal Gaussian networks (with no broadcast and multiple-access components), the computation capacity is characterized for a class of networks. For Gaussian networks with multiple-access components (but no broadcast), an approximate computation capacity is characterized for a class of networks.Comment: 30 pages, 12 figures, submitted to IEEE Transactions on Information Theor

    Performance Analysis of Channel-Aware Media Access Control Schemes

    Get PDF
    This thesis proposes a new Channel-Aware MAC (CA-MAC) protocol that allows more than two simultaneous transmissions to take place within a single wireless collision domain. In this proposed work, Multiple-Input Multiple-Output (MIMO) system is used to achieve higher spectral efficiency. The MIMO-based PHY layer has been adopted to help in controlling the transmission and to avoid any collisions by using weights gains technique on the antenna transmission, and by recovering any possible collisions using ZigZag decoding. In order to develop CA-MAC algorithm, to exploit the full potential of MIMO system, the library of 802.11x standard has been modified. NS-2 based simulations were conducted to study the performance of the proposed system. Detailed analysis and comparisons with current protocols schemes are presented

    In defense of wireless carrier sense

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2009.This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.Includes bibliographical references.Carrier sense, or clear channel assessment (CCA), is widely used in wireless medium access control (MAC) protocols as the means to arbitrate access and regulate concurrency, striking a balance between interference protection and spatial reuse. Criticized widely in the literature, carrier sense has been subject to many replacement attempts with sophisticated and complex alternatives, yet it remains extremely popular. Is the search for a superior alternative justified? In this thesis, we develop a physically motivated theoretical model for average case carrier sense behavior in the two-sender case, based upon radio propagation theory and Shannon capacity. We argue from our model that common notions about carrier sense, such as the hidden and exposed terminal phenomena, are inherently misleading in the context of adaptive bitrate, casting in black and white terms effects that often cause only mild reduction in throughput. The frequency of severe misbehavior is low. We also demonstrate that it is possible to choose a fixed sense threshold which performs well across a wide range of scenarios, in large part due to the role of the noise floor. The noise floor has a significant effect on fairness as well. Using our model, we show that, when implemented well, average-case carrier sense performance is surprisingly close to optimal. We conclude with experimental results from our indoor 802.11 testbed, which corroborate these claims.by Micah, Z. Brodsky.S.M

    Network Coding for Packet Radio Networks

    Get PDF
    We present methods for network-coded broadcast and multicast distribution of files in ad hoc networks of half-duplex packet radios. Two forms of network coding are investigated: fountain coding and random linear network coding. Our techniques exploit the broadcast nature of the wireless medium by permitting nodes to receive packets from senders other than their designated relays. File transfer is expedited by having multiple relays cooperate to forward the file to a destination. When relay nodes apply fountain coding to the file, they employ a simple mechanism to completely eliminate the possibility of sending duplicate packets to the recipients. It is not necessary for the nodes to transmit multiple packets simultaneously or to receive packets from multiple senders simultaneously. To combat the effects of time varying propagation loss on the links, each sender has the option to adapt the modulation format and channel-coding rate packet-by-packet by means of an adaptive transmission protocol. We use simulations to compare our network-coded file distributions with conventional broadcast and multicast techniques that use automatic repeat request (ARQ). Our numerical results show that the proposed strategies outperform ARQ-based file transfers by large margins for most network configurations. We also provide analytical upper bounds on the throughput of file distributions in networks comprising four nodes. We illustrate that our network-coded file-distribution strategies, when applied to the four-node networks, perform very close to the bounds

    A Time-Efficient Strategy For Relay Selection and Link Scheduling In Wireless Communication Networks

    Get PDF
    Despite the unprecedented success and proliferation of wireless communication, sustainable reliability and stability among wireless users are still considered important issues in the underlying link protocols. Existing link-layer protocols, like ARQ [44] or HARQ [57,67] approaches are designed to achieve this goal by discarding a corrupted packet at the receiver and performing one or more retransmissions until the packet is successfully decoded or a maximum number of retransmission attempts is reached. These strategies suffer from degradation of throughput and overall system instability since packets need to be en/decode in every hop, leading to high burden for relay nodes especially when the traffic load is high. On the other hand, due to the broadcast nature of wireless communication, when a relay transmits a packet to a specific receiver, it could become interference to other receivers. Thus, rather than activating all the relays simultaneously, we can only schedule a subset of relays in each time slot such that the interference among the links will not cause some transmissions to fail. Accordingly, in this dissertation, we mainly address the following two problems: 1) Relay selection: given a route (i.e., a sequence of relays), how to select the relays to en/decode packets to minimize the latency to reach the destination? 2) Link scheduling: how to schedule relays such that the interference among the relays will not cause transmission failure and the throughput is maximized? Relay Selection Problem. To solve the relay selection problem, we propose a Code Embedded Distributed Adaptive and Reliable (CEDAR) link-layer framework that targets low latency. CEDAR is the first theoretical framework for selecting en/decoding relays to minimize packet latency in wireless communication networks. It employs a theoretically-sound framework for embedding channel codes in each packet and performs the error correcting process in selected intermediate nodes in packet\u27s route. To identify the intermediate relay nodes for en/decoding to minimize average packet latency, we mathematically analyze the average packet delay, using Finite State Markovian Channel model and priority queuing model, and then formalize the problem as a non-linear integer programming problem. To solve this problem, we design a scalable and distributed scheme which has very low complexity. The experimental results demonstrate that CEDAR is superior to the schemes using hop-by-hop decoding and destination-decoding in terms of both packet delay and throughput. In addition, the simulation results show that CEDAR can achieve the optimal performance in most cases. Link Scheduling Problem. As for the link scheduling problem, we formulate a new problem called Fading-Resistant Link Scheduling (Fadin-R-LS) problem, which aims to maximize the throughput (the sum data rate) for all the links in a single time slot. The problem is different from the existing link scheduling problems by incorporating the Rayleigh-fading model to describe the interference. This model extends the deterministic interference model based on the Signal-to-Interference Ratio (SIR) using stochastic propagation to address fading effects in wireless networks. Based on the geometric structure of Fadin-R-LS, we then propose three centralized schemes for Fadin-R-LS, with O(g(L)), O(g(L)), and O(1) performance guarantee for packet latency, where g(L) is the number of length magnitudes of link set L. Furthermore, we propose a completely distributed approach based on game theory, which has O(g(L)^2\alpha) performance guarantee. Furthermore, we incorporate a cooperative communication (CC) technique, e.g., maximum ratio combining (MRC), into our system to further improve the throughput, in which receivers are allowed to combine messages from different senders to combat transmission errors. In particular, we formulate two problems named cooperative link scheduling problem (CLS) and one-shot cooperative link scheduling problem (OCLS). The first problem aims to find a schedule of links that uses the minimum number of time slots to inform all the receivers. The second problem aims to find a set of links that can inform the maximum number of receivers in one time slot. We prove both problems to be NP-hard. As a solution, we propose an algorithm for both CLS and OCLS with g(K) approximation ratio, where g(K) is so called the diversity of key links. In addition, we propose a greedy algorithm with O(1) approximation ratio for OCLS when the number of links for each receiver is upper bounded by a constant. In addition, we consider a special case for the link scheduling problem, where there is a group of vehicles forming a platoon and each vehicle in the platoon needs to communicate with the leader vehicle to get the leader vehicle\u27s velocity and location. By leveraging a typical feature of a platoon, we devise a link scheduling algorithm, called the Fast and Lightweight Autonomous link scheduling algorithm (FLA), in which each vehicle determines its own time slot simply based on its distance to the leader vehicle. Finally, we conduct a simulation on Matlab to evaluate the performance of our proposed methods. The experimental results demonstrate the superior performance of our link scheduling methods over the previous methods

    Joint Source Channel Decoding Exploiting 2D Source Correlation with Parameter Estimation for Image Transmission over Rayleigh Fading Channels

    Get PDF
    This  paper  investigates  the  performance  of  a  2- Dimensional  (2D)  Joint  Source  Channel  Coding  (JSCC)  system assisted  with  parameter  estimation  for  2D  image  transmission over  an  Additive  White  Gaussian  Noise  (AWGN)  channel  and a  Rayleigh  fading  channel.  Baum-Welsh  Algorithm  (BWA)  is employed  in  the  proposed  2D  JSCC  system  to  estimate  the source correlation statistics during channel decoding. The source correlation is then exploited during channel decoding using a Modified Bahl-Cocke-Jelinek-Raviv (BCJR) algorithm. The performance of the 2D JSCC system with the BWA-based parameter estimation technique (2D-JSCC-PET1) is evaluated via image transmission simulations.  Two  images,  each  exhibits  strong  and weak  source  correlation  are  considered  in  the  evaluation  by measuring the Peak Signal Noise Ratio of the decoded images at the  receiver.  The proposed 2D-JSCC-PET1 system is compared with various benchmark systems. Simulation results reveal that the 2D-JSCC-PET1 system outperforms the other benchmark systems (performance gain of 4.23 dB over the 2D-JSCC-PET2 system and 6.10 dB over the 2D JSCC system).  The proposed system also can perform very close to the ideal 2D JSCC system relying on the assumption of perfect source correlation knowledge at the receiver that shown only 0.88 dB difference in performance gain
    • …
    corecore