TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks

Size: px
Start display at page:

Download "TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks"

Transcription

1 TSS: An Energy Efficient Communication Scheme for Low Power Wireless Networks Rabindranath Ghosh St.Thomas College of Engg. and Tech., Kolkata, India Koushik Sinha Honeywell Tech. Solutions Bangalore, India sinha Debasish Datta Dept. of EECE IIT Kharagpur, India Bhabani P. Sinha ACM Unit, Indian Statistical Institute, Kolkata, India Abstract Wireless sensor networks typically require low cost devices and low power operations. Hence, such networks usually employ radios with only simple modulation techniques such as ASK, OOK and FSK [10]. We propose a new energy efficient communication scheme for wireless sensor networks that is based on the ternary number system encoding of data. An efficient algorithm for conversion from binary to ternary and vice versa is used that does not involve any division or multiplication but only addition. Our Ternary with Silent Symbol (TSS) communication scheme is similar in concepts to the RBNSiZeComm protocol proposed in [1] [3]. However, in contrast to RBNSiZeComm, TSS simultaneously saves energy at both the transmitter and receiver due to shortening of the transmission duration. We also propose a transceiver design that uses a hybrid modulation scheme utilizing FSK and ASK so to keep the cost/complexity of the radio devices low. With a non-coherent detection based receiver and assuming equal likelihood of all possible binary strings of a given length, there is a savings of about 20% in energy on an average at the transmitter compared to binary FSK, for additive white gaussian noise (AWGN) channels. Simultaneously, there is a savings of 36.9% at the receiver too, due to the reduced length of ternary encoded transmitted data, compared to binary encoding. Coupled with the low cost and low complexity of the transceiver, these results establish the effectiveness of TSS as a suitable candidate for communication in low power wireless sensor networks. Index Terms Energy-efficient communication, wireless networks, ternary encoding, silent communication, sensor networks. I. INTRODUCTION Wireless sensor networks (WSNs) typically utilize highly energy constrained, low cost sensor devices that are deployed (often in an ad hoc manner) in areas that are difficult to access and with little or no network infrastructure. In most scenarios, such battery powered sensor devices are expected to operate over prolonged periods of time. Communication being a major source of power drain in such networks, energy efficient communication protocols that can be implemented with low hardware and software cost/complexity are thus of paramount importance in WSNs to reduce the device recharging cycle periods and hence provide connectivity for longer durations at a stretch. In practice, most existing transmission schemes not only utilize non-zero voltage levels for both 0 and 1 so as to distinguish between a silent and a busy channel, they also keep both the transmitter and the receiver switched on for the entire duration of the transmission of a data frame. Communication strategies that require energy expenditure for transmitting both 0 and 1 bit values are known as energy based transmission (EbT) schemes. In other words, if the energy required per bit transmitted is e b, the total energy consumed to transmit an n-bit data would be n e b. Most current research efforts on reducing energy consumption have focussed on the MAC layer design [11], [12], [18], [20], optimizing data transmissions by reducing collisions and retransmissions [13], [14], [21] and through intelligent selection of paths or special architectures for sending data [10], [12], [15] [17], [20]. In all such schemes, the underlying communication strategy of sending a string of binary bits is energy based transmission. In contrast to EbT based communication schemes, a new communication strategy called Communication through Silence (CtS) was proposed in [4] that involves the use of silent periods as opposed to energy based transmissions. CtS, however, suffers from the disadvantage of being exponential in communication time. An alternative strategy, called Variable- Base Tacit Communication (VarBaTaC) was proposed in [5] that uses a variable radix-based information coding coupled with CtS for communication. However, for an n-bit binary string, the duration of transmission is in general significantly longer than n. Neither [4] nor [5] talk about the amount of energy saved by CtS and VarBaTaC for noisy channels and considering real-life device characteristics. Borrowing from the concepts of CtS and VarBaTaC, [2], [3] proposed a new energy efficient scheme called RBNSiZeComm for wireless sensor networks that recodes a binary coded data using a redundant radix based number representation and then uses silent periods to communicate the bit value of 0. The authors in [2], [3] showed that by using the redundant binary number system (RBNS) that utilizes the digits from the set {-1,0,1} to represent a number with radix 2, it is possible to significantly reduce the number of non-zero digits that need to be transmitted. They showed that theoretically, for a noiseless channel RBNSiZeComm provides on an average, 1 n +2 4n savings in transmission energy. Considering different application data types, for noiseless channels and utilizing the device characteristics of some commercial radios used for low data rate, low power applications, their simulation results showed a savings of about 69% on an average at the transmitter. [1] presents a non-coherent detection based transceiver design for the RBNSiZeComm protocol and shows that the energy /08/$ IEEE 85

2 savings is about 41% on an average at the transmitter, for noisy channels. Their simulation results show that for different applications data types, RBNSiZeComm can extend the battery life of radio devices from about 33% to 61% on an average for noisy channels, with their proposed transceiver design. However, no savings is generated at the receiver by their proposed scheme. A. Our Contribution One interesting open issue related to the RBNSiZeComm protocol proposed in [2], [3] was whether a recoding of binary data to higher radix such as ternary and then using the silent symbol strategy from [2], [3] would yield comparable savings in energy. In this work, we propose a new communication scheme based on recoding data from binary to the ternary radix and the silent symbol strategy, with the aim of generating energy savings simultaneously at the transmitter and the receiver. An efficient algorithm for conversion from binary to ternary and vice versa is used that does not involve any division or multiplication but only addition. A comprehensive analysis of the energy-efficiency of a communication strategy needs to address the MAC protocols along with adequate physical layer awareness. However, we do not address the issues related to MAC protocols in this work and make an effort to improve the energy efficiency with physical-layer centric approach. We study the performance of the proposed ternary with silent symbol (TSS) protocol in the context of low power wireless networks for noisy channels with a new transceiver design. In order to understand the energy-efficiency aspect of the proposed scheme (TSS combined with ASK and PSK/FSK), we therefore examine first the candidate source coding scheme, i.e., TSS. Thereafter, we estimate the energy spent in the baseband electronic circuits (device consumption) followed by the evaluation of the energy consumed during RF transmission for a given BER specification with appropriate analytical models. While there are numerous coded modulation techniques in the literature [22], applications requiring low power and low cost radio devices (e.g., sensor networks) usually employ radios with only simple modulation techniques such as ASK, OOK and FSK [10]. Our proposed transceiver design uses a hybrid modulation scheme utilizing FSK and ASK to keep both the cost and complexity low. With a non-coherent detection based receiver and assuming equal likelihood of all possible binary strings of a given length, there is a 20% savings in energy on an average at the transmitter compared to binary FSK, for additive white gaussian noise (AWGN) channels. In addition, there is a savings of about 36.9% in battery energy at the receiver resulting from a reduction in the length of the transmitted data (and hence transmission duration) as a result of recoding to ternary radix from binary data. Thus, while the energy savings generated by TSS at the transmitter are inferior to that of RBNSiZeComm (which is around 41% on an average for noisy channels [1]), TSS scores over RBNSiZeComm in saving energy at the receiver too. These results hence demonstrate that TSS may be useful for low power wireless networks, particularly for multi-hop communications. II. BASIC IDEA AND ALGORITHM DESCRIPTIONS Let a given binary message B be represented by an n-bit binary string b n 1 b n 2...b 2 b 1 b 0. Let T be its equivalent m- digit ternary representation given by T = t m 1 t m 2...t 2 t 1 t 0. We assume that n is even, otherwise we pad the message with a 0 bit at the leftmost (msb) position. For conversion from binary to ternary, we successively scan every two bits of the binary message starting from its msb position and then convert the leftmost part of the binary message (starting from its msb to the currently scanned bit position) to its equivalent ternary representation. To do this, we replace the currently scanned two bits (bit-pair) by either a single ternary digit (0, 1 or 2 depending on whether the binary bit-pair is 00, 01 or 10), or by two ternary digits (10) 3 (if the binary bit-pair is 11), and then add it to four times the so far obtained ternary number T from all the previous bit positions (on the left of this bit-pair). Note that this addition will be in ternary number system, and the multiplying factor four is to adjust the weight of T with respect to the currently scanned bit-pair. Also, since this addition will be in ternary number system, the weight of four can be assigned to T by adding the two ternary numbers T 0 and 0T. Thus, the equivalent ternary representation of the part of the binary message from its msb to the currently scanned bit-pair will then be obtained as T 0 0T x, where represents a ternary addition operator, and x is the ternary number equal to 0, 1, or 2 (when the scanned bit-pair is 00, 01 or 10, respectively), or equal to (10) 3 (when the scanned bi-pair is 11). Example 1: Consider the binary number First, we get T =2from the leftmost two bits 10. Then, for the next two bits, the equivalent ternary digit is 1. So we add (in ternary) the three numbers (20) 3, (02) 3 and (1) 3 to get the changed value of T = (100) 3 (which is equal to 9 in decimal corresponding to the binary digits 1001 scanned so far). Then for the next two bits, we get the equivalent ternary representation as (10) 3, which is added to (1000) 3 (= T 0) and (0100) 3 (= 0T ) in ternary to get the changed value of T = (1110) 3 = (39) 10. Finally, for the bit-pair 00, we add (11100) 3 to (01110) 3 to get the equivalent ternary number as (12210) 3 = (156) 10. Algorithm Binary2Ternary outlines the steps required to convert a number from binary to ternary. In a similar manner, we can reconvert the received m- digit ternary message to its equivalent binary form by using algorithm Ternary2Binary, where again we scan the given ternary number from its most significant (leftmost) digit position in a digit by digit manner, and convert the part of the so far scanned ternary digits to its equivalent binary representation. In the algorithm, we denote a ternary digit by t i and the converted binary number by B. As in the previous Binary2Ternary algorithm, we need to adjust the weight of the binary representation of the previously scanned ternary digits, by attaching a weight of three to it, with respect to 86

3 Algorithm 1 Algorithm Binary2Ternary 1: procedure BINARY2TERNARY(IN bit vector B, integer n, OUT ternary number T ) 2: /* Initialization */ 3: if b n 1b n 2 =00then 4: T 0; 5: end if 6: if b n 1b n 2 =01then 7: T 1; 8: end if 9: if b n 1b n 2 =10then 10: T 2; 11: end if 12: if b n 1b n 2 =11then 13: T 10; 14: end if 15: for i = n 3 downto 1 step -2 do 16: if b ib i 1 =00then 17: T T 0 0T ; this is a ternary addition 18: end if 19: if b ib i 1 =01then 20: T T 0 0T 1; ternary addition 21: end if 22: if b ib i 1 =10then 23: T T 0 0T 2; ternary addition 24: end if 25: if b ib i 1 =11then 26: T T 0 0T 10; ternary addition 27: end if 28: end for 29: end procedure the currently scanned ternary digit, and this is achieved by adding B0, 0B and the equivalent binary representation of the currently scanned ternary digit (note that, this time it is a binary addition). Example 2: Let the given ternary number T = The leftmost digit is 2 whose binary representation is 10. Sowe initially form the binary number as B =10. The next ternary digit is 1. We add the three binary numbers 100(= B0), 010(= 0B) and 1 to get the changed value of B = 111. The next scanned ternary digit is 0. So we add 1110 to 0111 to get the changed value of B as Finally, for the rightmost ternary digit 2, we add , and 10 to get as the equivalent binary representation B of the given ternary number T. Binary to ternary conversion of data provides us with the advantage of reduction in the total number of symbols to be transmitted and hence saves on the total transmission duration. As both the transmitter and the receiver consume energy proportional to the duration for which they are switched on, regardless of the symbol transmitted, this recoding to a higher radix will lead to a savings in energy at both the transmitter and the receiver simultaneously. Additional energy savings can be obtained at the transmitter by adopting the silent symbol strategy proposed in [2], [3] for one of the 3 possible ternary digits. Our proposed ternary with silent symbol (TSS) communication strategy combines these two strategies to derive an energy efficient communication scheme that saves energy at both the transmitter and the receiver. Assuming equal likelihood of all the three symbols, without any loss of generality we assume 0 to be our silent symbol. In practice however, the relative frequencies of the three symbols will depend on the nature of the data to be transmitted and hence a better strategy would be to assign the most frequent symbol as the silent symbol - the relative frequencies of the symbols determined either statistically or for each message to be transmitted. The transmission protocol of TSS thus consists of the following two steps: Protocol TransmitTSS Step 1: Recode the binary data to ternary using the Binary2Ternary protocol. Step 2: Transmit the ternary data symbol by symbol, obtained by the recoding process from step 1 using the following rules: Step 2.1: If the symbol to be transmitted is a 0, then switch off the transmitter for the symbol period. Step 2.2: Otherwise, switch on the transmitter and transmit the symbol (1 or 2) in the the time slot. The receiver side protocol would be the reverse of the transmitter: 87

4 Algorithm 2 Algorithm Ternary2Binary 1: procedure TERNARY2BINARY(IN ternary number T, integer m, OUT binary number B) 2: /* Initialization */ 3: if t m 1 =0then 4: B 00; 5: end if 6: if t m 1 =1then 7: B 01; 8: end if 9: if t m 1 =2then 10: B 10; 11: end if 12: for i = m 2 to 0 step -1 do 13: if t i =0then 14: B B0+0B; this is a binary addition 15: end if 16: if t i =1then 17: B B0+0B +1; binary addition 18: end if 19: if t i =2then 20: B B0+0B +10; binary addition 21: end if 22: end for 23: end procedure Protocol ReceiveTSS Step 1: Receive the ternary encoded data symbol by symbol as follows: Step 1.1: If a signal is received in the given time slot (symbol period), then the received symbol is either a 1 or a 2, depending on the predetermined received signal to symbol mapping. Step 1.2: Otherwise, if the channel is quiet, then the received symbol is a 0. Step 2: Convert the received ternary message to binary using the Ternary2Binary protocol. III. PROPOSED IMPLEMENTATION We consider the theoretical analysis of the energy savings generated at the transmitter for noisy channels. We assume that the channel noise is additive white gaussian noise (AWGN). Without any loss of generality, we assume that the transmitter uses FSK modulation with two frequencies - f c and f c +Δf corresponding to the symbols 1 and 2, respectively, and is switched off during the 0 s. Effectively this will be a hybrid modulation scheme involving FSK and ASK. As a representative example for showing the energy savings, we use here a non-coherent detection based receiver presented in [1] with a schematic structure as shown in figure 1. While combining ternary encoding with the silent symbol transmission strategy increases the total energy savings at the transmitter, for the detection of the silence of any carrier waveform in presence of bandpass noise, the instantaneous power levels of both non-silent symbols may have to be increased appropriately. This is because of the relatively inferior (higher) SNR requirements of ASK for the same BER value. Thus, although apparently some energy is saved during silent symbols, the detection of symbols in both non-silent and silent intervals with acceptable BER performance might increase the transmit power for the non-silent symbols employing PSK/FSK modulation scheme. Consequently, while one can indeed have some energy saving during silence transmission, there might as well be a need to increase the instantaneous power level for the non-silent intervals in order to achieve an overall energy savings for the system. For a successful strategy, the difference (in db) between the energy saved due to silence and the additional amount of energy needed for the increased instantaneous power for FSK needs to be positive. An analysis of the net savings in energy generated by TSS at the transmitter is given below. In figure 1, r is the signal received at the input of the receiver which consists of the transmitted signal s as well as the channel noise n, i.e, r = s + n. The received signal r is first passed through two bandpass filters (BPF) as shown in the figure, with center frequencies at f c and f c +Δf (corresponding to 1 and 2, respectively). Without any loss of generality, let q A and q B be the outputs of the threshold detectors corresponding to the symbols 1 and 2 respectively. q A and q B are ORed to get the value q. Ifthe transmitted symbol is 0 and if e th is correctly chosen, then the outputs of each of the threshold detectors will be zero, making q equal to 0. On the other hand, if the transmitted symbol is 1or2, and the threshold value e th is correctly chosen, it will generate the desired output symbol 1 or 2 at the output ŝ of the receiver. Thus, the desired output ŝ of the receiver is given as follows : i) If q =0, then ŝ =0, corresponding to s A = s B =0 ii) If q =1then, 88

5 BPF(A) f c ED e A ê A s A r = s + n BPF(B) f c + Δf ED e B Comparator/ Estimator ê B s B q q A e th q B e th Fig. 1. Representative hybrid FSK/ASK receiver for TSS scheme ŝ = A. Error Analysis { 1 if e A >e B, (when s A =1, s B =0) 2 if e B >e A, (when s B =1, s A =0) The computation of the BER in AWGN channels for the TSS protocol is the same as for the RBNSiZeComm protocol proposed in [1]. We reproduce here the analysis from [1] for the sake of completeness and readability: Let P 0, P 1 and P 2 be the probabilities of occurrences of the symbols 0, 1 and 2, respectively in the transmitted ternary message. Hence, the bit error rate BER can be written as, BER = P 0 (1 P {q =0 0}) + P 1 [1 P {q =1and e A >e B, e A 1}] + P 2 [1 P {q =1and e B >e A, e B 2}] (2) where P {q =0 0} is the probability that the symbol 0 is detected at the receiver, given that 0 was transmitted. Now, (1) P {q =0 0} = P {q A =0 0} P {q B =0 0} =[P {q A =0 0}] 2 (by symmetry) (3) Note that P {q A = 0 0} follows Rayleigh distribution. Assuming a zero mean and standard deviation of σ, we can write, P {q A =0 0} = eth e A 0 σ 2 e e 2 A /2σ2 de A =(1 e e2 th /2σ2 ) u(e A ) Hence, we have P {q =0 0} =(1 e e2 th /2σ2 ) 2. Now, let X = P {q =1and e A >e B, e A 1}. Then we can say, X = P {q =1 1}P {e A >e B, e A 1}) = X 1 X 2 (say), where X 1 = P {q =1 1} and X 2 = P {e A >e B 1, e A 1}. From figure 1, it follows that X 1 can be written as, X 1 = 0 [1 P {q A =0 1}P {q B =0 1}]p 1 (e A ) de A, where P {q B =0 1} is governed by a Rayleigh distribution, while P {q A =0 1} by a Rician distribution. Thus, P {q A =0 1} = P {q B =0 1} = eth 0 ( ) e e 2 A σ 2 e A +s2 A sa e A 2σ 2 I 0 σ 2 de A and, eth e B 0 σ 2 e e =1 e e2 th /2σ2 Solving for X 1 and X 2 we get, X 1 = 0( eth e A 0 σ 2 e 2 B /2σ2 de B [ ) 1 (1 e e2th /2σ2 I 0 (s A e A σ 2 ) X 2 = 0 e 2 A +s2 A 2σ 2 ) (s A e A ) ea e 2 I 0 dea σ 2 σ 2 e A +s2 A 2σ 2 ] de A (4) [( 1 e e2 A /2σ2 ) ea ] (s A e A ) I 0 u(ea σ 2 ) e 2 σ 2 e A +s2 A 2σ 2 de A (5) [ and, BER = P 0 1 (1 e e 2 th /2σ2 ) 2] + P 1 (1 X 1 X 2 )+P 2 (1 X 1 X 2 ) (6) 89

6 Assuming P 0 =0.33 and P 1 + P 2 =0.67, wehave, BER =0.67 [ 1 (1 e e2 th /2σ2 ) 2] +0.33(1 X 1 X 2 ) (7) B. Energy Requirement Calculations To compute the bit error rate for different SNR values from the above equation, we set s A = 1, i.e., signal power = s 2 A /2=1/2 and SNR value = 1/2σ2. The computations to find the optimum value of threshold voltage e th that gives the minimum BER for a given SNR value were implemented in Matlab. The results of these computations are shown in table I. Note that from equation 7, we get the required peak transmitter power for a given BER when the transmitter is transmitting a symbol. The SNR values for binary FSK modulation are determined from the relation, BER = 1 2 e γ/2, (8) where SNR in db = 10 log 10 γ. It follows from table I that for a given BER in the range of 10 4 to 10 8, the peak transmitter power in TSS is about 2.83db higher than that in non-coherent binary FSK detection (figure 2). However, in our proposed TSS scheme, the transmitter will be ON only during the non-zero symbols (1 or 2), and switched off during the zero symbols in the ternary encoded message. Hence the required average transmitter power for a given BER will be less than the value as demanded by equation 7. We now consider a possible implementation scheme: C. TSS Implementation We consider that the symbol duration of the ternary encoded message in TSS is the same as that of binary FSK. Thus, the transmission duration of the ternary encoded message will smaller than the equivalent binary message by virtue of the encoding. The average transmitter power for TSS will thus be reduced from the above peak transmitter power values due to silent symbol based transmission of one of the 3 symbols with a probability of 1/3. Noting that 10 log 10 (1 1/3) db =1.76 db, the average transmitter power in TSS will be less by 1.76db than the corresponding SNR values given above in table I, so that the average transmitter power P 1 for TSS communication in this case will be higher than the corresponding average power P b for binary FSK by ( ) db = 1.07 db. Thus we have, 10 log 10 ( P1 P b )=1.07 Hence, P1 P b = = Figure 2 depicts the comparison of peak and average scaled transmitter power for a given BER, between TSS and binary FSK. However, noting that in our implementation scheme the transmission duration T 1 will be reduced from the transmission time T b in case of binary FSK transmission by a factor of log 3 log 2 =1.6, wehave T b T 1 =1.6. Thus, the total (scaled) energy E 1 in TSS is related to the energy E b in binary FSK as, E 1 = P 1 T 1 = E b P b T b 1.6 =0.799, (9) log 10 (BER) Fig. 2. BER 7 Peak and Average Transmitter Power Comparison Transmitter Power (scaled) in db Peak TSS Power Avg. TSS Power FSK Comparison of peak and average transmitter power (scaled) for given TABLE I COMPARISON OF PEAK TRANSMITTER POWERS Required SNR in db BER value Corresponding TSS Binary e th value (volts) Protocol FSK which translates to a savings of energy by an amount of 20%. Simultaneously, there is a savings of energy at the receiver too: Let n 1 = log 2 n and n 2 = log 3 n be the number of symbols required to transmit a value n represented in binary and ternary respectively. Thus, the fractional reduction in the transmission duration by encoding in ternary is given by, n 1 n 2 =1 n 2 n 1 n 1 =1 log e 2 = (10) log e 3 Due to the reduction in transmission duration, the receiver needs to be switched on for a shorter duration compared to a binary encoded message transmission. We hence have the following result: Theorem 1: The proposed implementation scheme of TSS will result in an energy savings of approximately 20% at the transmitter and 36.9% at the receiver simultaneously, compared to binary FSK. Observation 1: Alternatively, if the ternary symbols were stretched to have the same transmission time as that of the original binary message, then the required bandwidth of the bandpass filters of the receiver will be reduced by a factor 90

7 of 1.6, reducing the gaussian noise power by the same factor, i.e., 10 log 10 (1.6) db =2.041 db. Thus, the required average transmitter power P 2 will be reduced from P 1 by db, i.e., P 2 will be less than P b by an amount of ( ) db =0.97 db. Thus, 10 log 10( P b P 2 ) = Hence, P b P 2 = = The transmission duration T 2 now is equal to T b. Hence, the transmitter energy E 2 in this case is related to E b as, E 2 E b = P 2 T 2 P b T b = =0.80, (11) which again means a savings of energy by an amount of 20%. However, no savings in energy would be generated at the receiver. IV. DEVICE ISSUES The discussions above assume that i) the time to turn on/off the radio is negligible compared to the time period of a transmitted pulse, ii) the underlying hardware supports the conversion and representation of binary number to ternary and vice versa and, iii) the energy spent on the conversion process is negligible compared to transmission/reception. Furthermore, there is the issue of maintaining receiver-transmitter synchronization for the duration of transmission of a data packet. A comprehensive study of the energy-efficiency of TSS will need to address the MAC protocols along with adequate physical-layer awareness. However, we do not address the issues related to MAC protocols in this work and make an effort to improve the energy efficiency with physical-layer centric approach. Given the simplicity of the Binary2Ternary and Ternary2Binary protocols, we believe that the energy consumed during the conversion process will not significantly impact the net energy savings generated by TSS. We present a discussion on some of the above mentioned issues below. A. Representation of Ternary Encoded Numbers In order to internally represent the three symbols (0, 1 and 2) at the MAC layer, we can use two bits to encode each ternary digit. As an example, the ternary digit 0 may be encoded using the bit-pair 00, while 1 and 2 using the bit-pairs 01 and 10 respectively. Thus, the MAC buffer for an n-bit binary data frame, would have to be 2n-bit wide to hold the equivalent ternary data. The system would read every bit pair to determine whether the corresponding transmitted ternary digit is to be a 0, 1 or a 2 and accordingly switch on/off the radio circuit. We also assume that the data in higher layers of the network stack are represented in binary only and a conversion of binary to ternary and vice versa occurs exclusively at the MAC layer. Only the digits 1 and 2 require transmissions, while the transmitter s radio circuit is switched off for the digit 0 and the receiver (assumed to have already been synchronized with the transmitter for this data packet transmission) interprets each silent symbol period as the ternary digit 0. B. Synchronization between Transmitter and Receiver We assume that the receiver and the transmitter are synchronized on the MAC packet header, similar to the protocol (which utilizes the preamble field in the MAC frame header for synchronization between the sender and the receiver). The transmission time of the payload of the packet is assumed to be small enough so as not to lose synchronization between the receiver and the transmitter. C. Effect of Device Characteristics For most devices, neither the time to switch on/off the radio nor the energy consumed by the device when the radio is switched off, is negligible. As such, the maximum data rate at which we can transmit using the TSS protocol is dependent on the time it takes to turn the radio circuit on or off. For most commercially available radio devices, the power drawn in the transmit or receive state is considerably more than the active state - i.e., when the radio is switched off [10]. However, the penalty paid for this low power operational state is the switching time from the active to transmit state and vice versa. In particular, the energy expenditure for transmitting the equivalent ternary data frame using the TSS can be represented as the sum of the following three terms, 1) A base energy value that exists throughout the duration of the transmission, which is equal to the energy required when the device is in the active state. 2) Extra energy in addition to the base energy required to transmit a 1 or 2 in TX state. 3) Extra energy in addition to the base energy required during the edge transitions between a symbol 0 and the symbols 1 and 2, which corresponds to switching from the active to TX state and vice versa. For the sake of simplicity of computation, we can consider the radio circuit as a single stage low pass RC circuit for the transition from the active state to transmit state and vice versa, given the fact that for most devices this transition time is of the order of microseconds. We assume that the radio is deactivated on the trailing edge of a 1 or 2 that is followed by a 0, while it is activated on the rising edge a 1 or 2 following a 0. Under these assumptions, it is not unreasonable to assume that the rise time of the RBN symbol pulse is almost equal to the fall time of the pulse and in turn to the turn-on time of the radio circuit from the active to the transmit state. It was shown in [2], [3] that under the above assumptions, the effect of the radio device characteristics on the performance of their RBNSiZeComm protocol can be neglected for several of the commercially available low cost, low power radios popularly used in wireless sensor networks. As our TSS protocol also uses 3 symbols similar to the RBNSiZeComm protocol, we can hence conclude that their results would also be applicable for TSS. V. DISCUSSION ON SOME POTENTIAL APPLICATION SCENARIOS The evolution of 3G enabled cellular telephony has lead to the enabling of many new applications, remote healthcare 91

8 systems being one of them. For example, smartphones are fast emerging as the platform of choice for wireless remote healthcare. Cheap medical sensors attached to the body to create a body area network can talk with such phones - Bluetooth being the communication protocol of choice [6]. The smartphones then relay this information over the cellular network to a central repository/processing center. Real time collection and transmission of physiological data however, imposes a huge burden on the energy constrained communication devices. As a typical example, at low data rates of 60 bytes/s and transmission frequency of about once every 0.5 1sec (the usual required data rate for transmitting physiological data like ECG signals and other vital body parameters), would result in a cell phone s battery being drained completely within hours - even while transmitting data over a strong connection [6]. In other words, this implies a recharge cycle of every half a day for a user. By using TSS, one can considerably improve upon this recharge cycle. Likewise, considering wireless sensor networks deployed in farms, vineyards, etc., the collected information through sensor networks include various climate data such as temperature, relative humidity, solar radiation and soil composition, etc. These data are typically transmitted as ASCII text messages [7] [9]. Considering a typical deployment scenario for a field of size 60m 60m, radio range of 0 80m with multi-hop communication, data rate of 300 packets/min = 0.5 packets/s and duty cycle of 15% at 20mA with a battery of 7.2Ah capacity, a radio battery will last for only 100 days [7] [9]. Given the difficulty in replacing the batteries of sensor devices deployed in such network deployment scenarios, using an energy efficient communication scheme such as TSS that provides savings in both transmission and reception of data would greatly benefit the farmer. VI. CONCLUSION We have presented in this paper a new low energy communication scheme that can generate energy savings simultaneously at the transmitter and the receiver, unlike the RBNSiZeComm protocol in [1] [3]. Using low cost and low complexity implementation scheme based on a hybrid modulation utilizing FSK and ASK for the TSS protocol proposed we show that for AWGN noisy channels, there is an average savings of 20% in battery energy at the transmitter for equal likelihood of all possible binary strings of a given length. Simultaneously, there is a savings of 36.9% energy at the receiver. An efficient algorithm involving only addition (and no multiplication or division) for conversion from binary to ternary and vice versa is used in order to keep the energy consumed for the radix conversion process low at both the transmitter and the receiver. Coupled with the low cost and low complexity of transceiver, these savings clearly demonstrate the usefulness of TSS for low power wireless sensor networks, particularly for multihop communications. REFERENCES [1] K. Sinha, An energy efficient communication scheme for applications based on low power wireless networks, to appear in Proc. 6th IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, USA, Jan , [2] K. Sinha, A new energy efficient MAC protocol based on redundant radix for wireless networks, Proc. Recent Trends in Information Systems (RETIS), Calcutta, pp , [3] K. Sinha and B. P. Sinha, A new energy-efficient wireless communication technique using redundant radix representation, Tech. Rep., Indian Stat. Inst., ISI/ACMU-07/01, [4] Y. Zhu and R. Sivakumar, Challenges: communication through silence in wireless sensor networks, Proc. Intl.Conf. on Mobile Comp. and Networking (MobiCom), pp , [5] Y. P. Chen, D. Wang and J. Zhang, Variable-base tacit communication: a new energy efficient communication scheme for sensor networks, Proc. 1st Int. Conf. on Integrated Internet Ad hoc and Sensor Networks (InterSense), Nice, France, [6] D. Jea, J. Liu, T. Schmid and M. Srivastava, Hassle free fitness monitoring, Intl. Workshop on Sys. and Networking Support for Healthcare and Assisted Living Environments (HealthNet), June, [7] J. Burrell, T. Brooke and R. Beckwith, Vineyard computing: sensor networks in agricultural production, IEEE Per. Comp., vol. 3(1), pp , [8] R. Beckwith, D. Teibel and P. Bowen, Report from the field: results from an agricultural wireless sensor network, Proc. IEEE Intl. Conf. Local Comp. Networks, [9] P. Mestre, E. Peres and C. Serôdio, Agricultural monitoring and control system using low-cost wireless sensors networks, Proc. 5th EFITA/WCCA, pp , [10] J. Polastre, R. Szewczyk and D. Culler, Telos: enabling ultralow power wireless research, Proc. Intl. Symp. on Inf. Processing in Sensor Networks, pp , [11] I. Demirkol, C. Ersoy and F. Alagoz, Mac protocols for wireless sensor networks, a survey, IEEE Comm. Mag., [12] W. B. Heinzelman, A. Chandrakasan and H. Balakrishnan, Energy efficient communication protocol for wireless microsensor networks, Proc. Intl. Conf. on Sys. Sc., [13] K. Sinha, S. Ghose and P. K. Srimani, Fast deterministic broadcast and gossiping algorithms for mobile ad hoc networks, J. of Par. & Dist. Comp. (JPDC), vol. 68(7), pp , [14] M. Cagalj, J.-P. Hubaux and C. C. Enz, Energy-efficient broadcasting in all-wireless networks, Wireless Networks, vol. 11, nos. 1/2, pp , [15] I. F. Akyilidiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, Wireless sensor networks: a survey, Computer Networks, vol. 38, no. 4, pp , March [16] J. N. Al-Karaki and A. E. Kamal, Routing techniques in wireless sensor networks: a survey, IEEE Wireless Communications, vol. 11, no. 6, December [17] C. Intanagonwiwat, R. Gonvindan, D. Estrin, J. S. Heidemann and F. Silva, Directed diffusion for wireless sensor networking, IEEE/ACM Trans. on Networking, vol. 11(1), pp. 2 16, [18] W. Ye, J. Heidemann and D. Estrin, An energy-efficient MAC Protocol for Wireless Sensor Networks, Proc. IEEE Infocom, pp , [19] Y. Li, W. Ye and J. Heidemann, Energy and latency control in low duty cycle MAC protocols, Proc. IEEE Wireless Communications and Networking Conference, pp. PHY 30 4, [20] C. Enz, A. El-Hoiydi, J.-D. Decotignie and V. Pereis, WiseNET: an ultralow-power wireless sensor network solution, IEEE Computer, vol. 37, no. 8, pp , [21] Y. P. Chen A. L. Liestman and J. Liu, Energy-efficient data aggregation hierarchy for wireless sensor networks, Proc. 2nd Int. Conf. on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 05), Orlando, Florida, [22] J. G. Proakis, Digital Communication, McGraw-Hill, 4th ed.,

ENERGY EFFICIENT DATA COMMUNICATION SYSTEM FOR WIRELESS SENSOR NETWORK USING BINARY TO GRAY CONVERSION

ENERGY EFFICIENT DATA COMMUNICATION SYSTEM FOR WIRELESS SENSOR NETWORK USING BINARY TO GRAY CONVERSION ENERGY EFFICIENT DATA COMMUNICATION SYSTEM FOR WIRELESS SENSOR NETWORK USING BINARY TO GRAY CONVERSION S.B. Jadhav 1, Prof. R.R. Bhambare 2 1,2 Electronics and Telecommunication Department, SVIT Chincholi,

More information

A New Energy Efficient MAC Protocol based on Redundant Radix for Wireless Networks

A New Energy Efficient MAC Protocol based on Redundant Radix for Wireless Networks 1 A New Energy Efficient MAC Protocol based on Redundant Radix for Wireless Networks Koushik Sinha Honeywell Technology Solutions, Bangalore, India Email: sinha kou@yahoo.com arxiv:16.4935v1 [cs.ni] 15

More information

Malarkodi K 1,Kannan V 2 IJSER

Malarkodi K 1,Kannan V 2 IJSER International Journal of Scientific & Engineering Research, Volume, Issue, April-0 ISSN 9-8 An Efficient RRBN Size Communication Based Power Saving Scheme for Wireless Sensor Networks Malarkodi K,Kannan

More information

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks

Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks Mobile Base Stations Placement and Energy Aware Routing in Wireless Sensor Networks A. P. Azad and A. Chockalingam Department of ECE, Indian Institute of Science, Bangalore 5612, India Abstract Increasing

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble

More information

An Energy-Division Multiple Access Scheme

An Energy-Division Multiple Access Scheme An Energy-Division Multiple Access Scheme P Salvo Rossi DIS, Università di Napoli Federico II Napoli, Italy salvoros@uninait D Mattera DIET, Università di Napoli Federico II Napoli, Italy mattera@uninait

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Energy Efficient Data Gathering with Mobile Element Path Planning and SDMA-MIMO in WSN

Energy Efficient Data Gathering with Mobile Element Path Planning and SDMA-MIMO in WSN Energy Efficient Data Gathering with Mobile Element Path Planning and SDMA-MIMO in WSN G.R.Divya M.E., Communication System ECE DMI College of engineering Chennai, India S.Rajkumar Assistant Professor,

More information

ON THE CONCEPT OF DISTRIBUTED DIGITAL SIGNAL PROCESSING IN WIRELESS SENSOR NETWORKS

ON THE CONCEPT OF DISTRIBUTED DIGITAL SIGNAL PROCESSING IN WIRELESS SENSOR NETWORKS ON THE CONCEPT OF DISTRIBUTED DIGITAL SIGNAL PROCESSING IN WIRELESS SENSOR NETWORKS Carla F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino Torino, Italy Ramesh R. Rao California Institute

More information

SYSTEM LEVEL DESIGN CONSIDERATIONS FOR HSUPA USER EQUIPMENT

SYSTEM LEVEL DESIGN CONSIDERATIONS FOR HSUPA USER EQUIPMENT SYSTEM LEVEL DESIGN CONSIDERATIONS FOR HSUPA USER EQUIPMENT Moritz Harteneck UbiNetics Test Solutions An Aeroflex Company Cambridge Technology Center, Royston, Herts, SG8 6DP, United Kingdom email: moritz.harteneck@aeroflex.com

More information

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester

More information

Opportunistic Communications under Energy & Delay Constraints

Opportunistic Communications under Energy & Delay Constraints Opportunistic Communications under Energy & Delay Constraints Narayan Mandayam (joint work with Henry Wang) Opportunistic Communications Wireless Data on the Move Intermittent Connectivity Opportunities

More information

Combined Transmitter Diversity and Multi-Level Modulation Techniques

Combined Transmitter Diversity and Multi-Level Modulation Techniques SETIT 2005 3rd International Conference: Sciences of Electronic, Technologies of Information and Telecommunications March 27 3, 2005 TUNISIA Combined Transmitter Diversity and Multi-Level Modulation Techniques

More information

2-4 Research and Development on the Low-Energy Wireless Grid Technologies for Agricultural and Aquacultural Sensings

2-4 Research and Development on the Low-Energy Wireless Grid Technologies for Agricultural and Aquacultural Sensings 2 Terrestrial Communication Technology Research and Development 2-4 Research and Development on the Low-Energy Wireless Grid Technologies for Agricultural and Aquacultural Sensings Fumihide KOJIMA This

More information

A Forwarding Station Integrated the Low Energy Adaptive Clustering Hierarchy in Ad-hoc Wireless Sensor Networks

A Forwarding Station Integrated the Low Energy Adaptive Clustering Hierarchy in Ad-hoc Wireless Sensor Networks A Forwarding Station Integrated the Low Energy Adaptive Clustering Hierarchy in Ad-hoc Wireless Sensor Networks Chao-Shui Lin, Ching-Mu Chen, Tung-Jung Chan and Tsair-Rong Chen Department of Electrical

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS ENERGY EFFICIENT RELAY SELECTION SCHEMES FOR COOPERATIVE UNIFORMLY DISTRIBUTED WIRELESS SENSOR NETWORKS WAFIC W. ALAMEDDINE A THESIS IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING PRESENTED IN

More information

Hamming net based Low Complexity Successive Cancellation Polar Decoder

Hamming net based Low Complexity Successive Cancellation Polar Decoder Hamming net based Low Complexity Successive Cancellation Polar Decoder [1] Makarand Jadhav, [2] Dr. Ashok Sapkal, [3] Prof. Ram Patterkine [1] Ph.D. Student, [2] Professor, Government COE, Pune, [3] Ex-Head

More information

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks

An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks An Adaptable Energy-Efficient ium Access Control Protocol for Wireless Sensor Networks Justin T. Kautz 23 rd Information Operations Squadron, Lackland AFB TX Justin.Kautz@lackland.af.mil Barry E. Mullins,

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Performance study of node placement in sensor networks

Performance study of node placement in sensor networks Performance study of node placement in sensor networks Mika ISHIZUKA and Masaki AIDA NTT Information Sharing Platform Labs, NTT Corporation 3-9-, Midori-Cho Musashino-Shi Tokyo 8-8585 Japan {ishizuka.mika,

More information

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS

SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS SPLIT MLSE ADAPTIVE EQUALIZATION IN SEVERELY FADED RAYLEIGH MIMO CHANNELS RASHMI SABNUAM GUPTA 1 & KANDARPA KUMAR SARMA 2 1 Department of Electronics and Communication Engineering, Tezpur University-784028,

More information

DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS

DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS DYNAMIC BANDWIDTH ALLOCATION IN SCPC-BASED SATELLITE NETWORKS Mark Dale Comtech EF Data Tempe, AZ Abstract Dynamic Bandwidth Allocation is used in many current VSAT networks as a means of efficiently allocating

More information

BEING wideband, chaotic signals are well suited for

BEING wideband, chaotic signals are well suited for 680 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 51, NO. 12, DECEMBER 2004 Performance of Differential Chaos-Shift-Keying Digital Communication Systems Over a Multipath Fading Channel

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

Spread Spectrum (SS) is a means of transmission in which the signal occupies a

Spread Spectrum (SS) is a means of transmission in which the signal occupies a SPREAD-SPECTRUM SPECTRUM TECHNIQUES: A BRIEF OVERVIEW SS: AN OVERVIEW Spread Spectrum (SS) is a means of transmission in which the signal occupies a bandwidth in excess of the minimum necessary to send

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Energy Efficiency using Data Filtering Approach on Agricultural Wireless Sensor Network

Energy Efficiency using Data Filtering Approach on Agricultural Wireless Sensor Network International Journal of Computer Engineering and Information Technology VOL. 9, NO. 9, September 2017, 192 197 Available online at: www.ijceit.org E-ISSN 2412-8856 (Online) Energy Efficiency using Data

More information

Lecture 9: Spread Spectrum Modulation Techniques

Lecture 9: Spread Spectrum Modulation Techniques Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth

More information

IEEE Wireless Access Method and Physical Specification

IEEE Wireless Access Method and Physical Specification IEEE 802.11 Wireless Access Method and Physical Specification Title: The importance of Power Management provisions in the MAC. Presented by: Abstract: Wim Diepstraten NCR WCND-Utrecht NCR/AT&T Network

More information

Digital Modulation Schemes

Digital Modulation Schemes Digital Modulation Schemes 1. In binary data transmission DPSK is preferred to PSK because (a) a coherent carrier is not required to be generated at the receiver (b) for a given energy per bit, the probability

More information

Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks

Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networs Christian Müller*, Anja Klein*, Fran Wegner**, Martin Kuipers**, Bernhard Raaf** *Communications Engineering Lab, Technische Universität

More information

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY

PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY PERFORMANCE ANALYSIS OF DIFFERENT M-ARY MODULATION TECHNIQUES IN FADING CHANNELS USING DIFFERENT DIVERSITY 1 MOHAMMAD RIAZ AHMED, 1 MD.RUMEN AHMED, 1 MD.RUHUL AMIN ROBIN, 1 MD.ASADUZZAMAN, 2 MD.MAHBUB

More information

EE 382C Literature Survey. Adaptive Power Control Module in Cellular Radio System. Jianhua Gan. Abstract

EE 382C Literature Survey. Adaptive Power Control Module in Cellular Radio System. Jianhua Gan. Abstract EE 382C Literature Survey Adaptive Power Control Module in Cellular Radio System Jianhua Gan Abstract Several power control methods in cellular radio system are reviewed. Adaptive power control scheme

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Wireless Sensor Networks, PhD Postdoctoral Researcher DCS Research Group For classroom use only, no unauthorized distribution Wireless sensor networks:

More information

Combined Opportunistic Beamforming and Receive Antenna Selection

Combined Opportunistic Beamforming and Receive Antenna Selection Combined Opportunistic Beamforming and Receive Antenna Selection Lei Zan, Syed Ali Jafar University of California Irvine Irvine, CA 92697-262 Email: lzan@uci.edu, syed@ece.uci.edu Abstract Opportunistic

More information

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22.

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 22. FIBER OPTICS Prof. R.K. Shevgaonkar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture: 22 Optical Receivers Fiber Optics, Prof. R.K. Shevgaonkar, Dept. of Electrical Engineering,

More information

THE EFFECT of multipath fading in wireless systems can

THE EFFECT of multipath fading in wireless systems can IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 47, NO. 1, FEBRUARY 1998 119 The Diversity Gain of Transmit Diversity in Wireless Systems with Rayleigh Fading Jack H. Winters, Fellow, IEEE Abstract In

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks

Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks Comparison between Preamble Sampling and Wake-Up Receivers in Wireless Sensor Networks Richard Su, Thomas Watteyne, Kristofer S. J. Pister BSAC, University of California, Berkeley, USA {yukuwan,watteyne,pister}@eecs.berkeley.edu

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

Frequency-Hopped Spread-Spectrum

Frequency-Hopped Spread-Spectrum Chapter Frequency-Hopped Spread-Spectrum In this chapter we discuss frequency-hopped spread-spectrum. We first describe the antijam capability, then the multiple-access capability and finally the fading

More information

Wireless Communication Systems: Implementation perspective

Wireless Communication Systems: Implementation perspective Wireless Communication Systems: Implementation perspective Course aims To provide an introduction to wireless communications models with an emphasis on real-life systems To investigate a major wireless

More information

Study of Turbo Coded OFDM over Fading Channel

Study of Turbo Coded OFDM over Fading Channel International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 54-58 Study of Turbo Coded OFDM over Fading Channel

More information

The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks

The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks 3 IEEE Wireless Communications and Networking Conference (WCNC): NETWORKS The Use of A Mobile Sink for Quality Data Collection in Energy Harvesting Sensor Networks Xiaojiang Ren Weifa Liang Research School

More information

An Improved MAC Model for Critical Applications in Wireless Sensor Networks

An Improved MAC Model for Critical Applications in Wireless Sensor Networks An Improved MAC Model for Critical Applications in Wireless Sensor Networks Gayatri Sakya Vidushi Sharma Trisha Sawhney JSSATE, Noida GBU, Greater Noida JSSATE, Noida, ABSTRACT The wireless sensor networks

More information

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment

IEEE Wireless Access Method and Physical Layer Specification. Proposal For the Use of Packet Detection in Clear Channel Assessment IEEE 802.11 Wireless Access Method and Physical Layer Specification Title: Author: Proposal For the Use of Packet Detection in Clear Channel Assessment Jim McDonald Motorola, Inc. 50 E. Commerce Drive

More information

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel Sara Viqar 1, Shoab Ahmed 2, Zaka ul Mustafa 3 and Waleed Ejaz 4 1, 2, 3 National University

More information

A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network

A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 78-661, p- ISSN: 78-877Volume 14, Issue 4 (Sep. - Oct. 13), PP 55-6 A Grid Based Approach to Detect Mobile Target in Wireless Sensor Network B. Anil

More information

Energy Efficient Source Coding and Modulation for Wireless Applications

Energy Efficient Source Coding and Modulation for Wireless Applications Energy Efficient Source Coding and Modulation for Wireless Applications Y. Prakash S. K. S. Gupta Dept. of Electrical Engineering Dept. of Computer Science and Engineering yashwanth.prakash@asu.edu sandeep.gupta@asu.edu

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Module 3: Physical Layer

Module 3: Physical Layer Module 3: Physical Layer Dr. Associate Professor of Computer Science Jackson State University Jackson, MS 39217 Phone: 601-979-3661 E-mail: natarajan.meghanathan@jsums.edu 1 Topics 3.1 Signal Levels: Baud

More information

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 10 - LTE (4G) -Technologies used in 4G and 5G The Need for LTE Long Term Evolution (LTE) With the growth of mobile data and mobile users, it becomes essential

More information

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang Wireless Communication: Concepts, Techniques, and Models Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Digital communication over radio channels Channel capacity MIMO: diversity and parallel channels

More information

Active RFID System with Wireless Sensor Network for Power

Active RFID System with Wireless Sensor Network for Power 38 Active RFID System with Wireless Sensor Network for Power Raed Abdulla 1 and Sathish Kumar Selvaperumal 2 1,2 School of Engineering, Asia Pacific University of Technology & Innovation, 57 Kuala Lumpur,

More information

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics:

In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: In this lecture, we will look at how different electronic modules communicate with each other. We will consider the following topics: Links between Digital and Analogue Serial vs Parallel links Flow control

More information

Power Control Optimization of Code Division Multiple Access (CDMA) Systems Using the Knowledge of Battery Capacity Of the Mobile.

Power Control Optimization of Code Division Multiple Access (CDMA) Systems Using the Knowledge of Battery Capacity Of the Mobile. Power Control Optimization of Code Division Multiple Access (CDMA) Systems Using the Knowledge of Battery Capacity Of the Mobile. Rojalin Mishra * Department of Electronics & Communication Engg, OEC,Bhubaneswar,Odisha

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Building versatile network upon new waveforms

Building versatile network upon new waveforms Security Level: Building versatile network upon new waveforms Chan Zhou, Malte Schellmann, Egon Schulz, Alexandros Kaloxylos Huawei Technologies Duesseldorf GmbH 5G networks: A complex ecosystem 5G service

More information

Announcements : Wireless Networks Lecture 3: Physical Layer. Bird s Eye View. Outline. Page 1

Announcements : Wireless Networks Lecture 3: Physical Layer. Bird s Eye View. Outline. Page 1 Announcements 18-759: Wireless Networks Lecture 3: Physical Layer Please start to form project teams» Updated project handout is available on the web site Also start to form teams for surveys» Send mail

More information

An Efficient Forward Error Correction Scheme for Wireless Sensor Network

An Efficient Forward Error Correction Scheme for Wireless Sensor Network Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 737 742 C3IT-2012 An Efficient Forward Error Correction Scheme for Wireless Sensor Network M.P.Singh a, Prabhat Kumar b a Computer

More information

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS)

International Journal of Emerging Technologies in Computational and Applied Sciences(IJETCAS) International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks

On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks On the problem of energy efficiency of multi-hop vs one-hop routing in Wireless Sensor Networks Symon Fedor and Martin Collier Research Institute for Networks and Communications Engineering (RINCE), Dublin

More information

Multirate schemes for multimedia applications in DS/CDMA Systems

Multirate schemes for multimedia applications in DS/CDMA Systems Multirate schemes for multimedia applications in DS/CDMA Systems Tony Ottosson and Arne Svensson Dept. of Information Theory, Chalmers University of Technology, S-412 96 Göteborg, Sweden phone: +46 31

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 24. Optical Receivers-

FIBER OPTICS. Prof. R.K. Shevgaonkar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture: 24. Optical Receivers- FIBER OPTICS Prof. R.K. Shevgaonkar Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture: 24 Optical Receivers- Receiver Sensitivity Degradation Fiber Optics, Prof. R.K.

More information

Optimized Asynchronous Multi-channel Neighbor Discovery

Optimized Asynchronous Multi-channel Neighbor Discovery Optimized Asynchronous Multi-channel Neighbor Discovery Niels Karowski TKN/TU-Berlin niels.karowski@tu-berlin.de Aline Carneiro Viana INRIA and TKN/TU-Berlin aline.viana@inria.fr Adam Wolisz TKN/TU-Berlin

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems

An Alamouti-based Hybrid-ARQ Scheme for MIMO Systems An Alamouti-based Hybrid-ARQ Scheme MIMO Systems Kodzovi Acolatse Center Communication and Signal Processing Research Department, New Jersey Institute of Technology University Heights, Newark, NJ 07102

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

Automatic Gain Control Scheme for Bursty Point-to- Multipoint Wireless Communication System

Automatic Gain Control Scheme for Bursty Point-to- Multipoint Wireless Communication System Automatic Gain Control Scheme for Bursty Point-to- Multipoint Wireless Communication System Peter John Green, Goh Lee Kee, Syed Naveen Altaf Ahmed Advanced Communication Department Communication and Network

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

FTSP Power Characterization

FTSP Power Characterization 1. Introduction FTSP Power Characterization Chris Trezzo Tyler Netherland Over the last few decades, advancements in technology have allowed for small lowpowered devices that can accomplish a multitude

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Universitas Sumatera Utara

Universitas Sumatera Utara Amplitude Shift Keying & Frequency Shift Keying Aim: To generate and demodulate an amplitude shift keyed (ASK) signal and a binary FSK signal. Intro to Generation of ASK Amplitude shift keying - ASK -

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder

Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder Residual Channel Coding in Low-Power WSNs Using Minimum Hamming Distance Decoder Bafrin Zarei, Vallipuram Muthukkumarasamy, and Xin-Wen Wu Abstract Forward Error Correction is an essential requirement

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /ICCE.2012. Zhu, X., Doufexi, A., & Koçak, T. (2012). A performance enhancement for 60 GHz wireless indoor applications. In ICCE 2012, Las Vegas Institute of Electrical and Electronics Engineers (IEEE). DOI: 10.1109/ICCE.2012.6161865

More information

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding

SNR Estimation in Nakagami-m Fading With Diversity Combining and Its Application to Turbo Decoding IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 50, NO. 11, NOVEMBER 2002 1719 SNR Estimation in Nakagami-m Fading With Diversity Combining Its Application to Turbo Decoding A. Ramesh, A. Chockalingam, Laurence

More information

Fast and efficient randomized flooding on lattice sensor networks

Fast and efficient randomized flooding on lattice sensor networks Fast and efficient randomized flooding on lattice sensor networks Ananth Kini, Vilas Veeraraghavan, Steven Weber Department of Electrical and Computer Engineering Drexel University November 19, 2004 presentation

More information

Packet Error Probability for Decode-and-Forward Cooperative Networks of Selfish Users

Packet Error Probability for Decode-and-Forward Cooperative Networks of Selfish Users Packet Error Probability for Decode-and-Forward Cooperative Networks of Selfish Users Ioannis Chatzigeorgiou 1, Weisi Guo 1, Ian J. Wassell 1 and Rolando Carrasco 2 1 Computer Laboratory, University of

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA

Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA Performance of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA By Hamed D. AlSharari College of Engineering, Aljouf University, Sakaka, Aljouf 2014, Kingdom of Saudi Arabia, hamed_100@hotmail.com

More information

Gray shades in LCDs using Amplitude Modulation

Gray shades in LCDs using Amplitude Modulation Gray shades in LCDs using Amplitude Modulation M. Govind * and T.. Ruckmongathan Raman Research Institute, C. V. Raman Avenue, Sadashivnagar, Bangalore-560080, IDIA ABSTRACT Gray shades are essential to

More information

two computers. 2- Providing a channel between them for transmitting and receiving the signals through it.

two computers. 2- Providing a channel between them for transmitting and receiving the signals through it. 1. Introduction: Communication is the process of transmitting the messages that carrying information, where the two computers can be communicated with each other if the two conditions are available: 1-

More information

Bottleneck Zone Analysis in WSN Using Low Duty Cycle in Wireless Micro Sensor Network

Bottleneck Zone Analysis in WSN Using Low Duty Cycle in Wireless Micro Sensor Network Bottleneck Zone Analysis in WSN Using Low Duty Cycle in Wireless Micro Sensor Network 16 1 Punam Dhawad, 2 Hemlata Dakhore 1 Department of Computer Science and Engineering, G.H. Raisoni Institute of Engineering

More information

A review paper on Software Defined Radio

A review paper on Software Defined Radio A review paper on Software Defined Radio 1 Priyanka S. Kamble, 2 Bhalchandra B. Godbole Department of Electronics Engineering K.B.P.College of Engineering, Satara, India. Abstract -In this paper, we summarize

More information

Modelling the Localization Scheme Integrated with a MAC Protocol in a Wireless Sensor Network

Modelling the Localization Scheme Integrated with a MAC Protocol in a Wireless Sensor Network Modelling the Localization Scheme Integrated with a MAC Protocol in a Wireless Sensor Network Suman Pandey Assistant Professor KNIT Sultanpur Sultanpur ABSTRACT Node localization is one of the major issues

More information

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Abhishek Thakur 1 1Student, Dept. of Electronics & Communication Engineering, IIIT Manipur ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary

Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary Implementation and Comparative analysis of Orthogonal Frequency Division Multiplexing (OFDM) Signaling Rashmi Choudhary M.Tech Scholar, ECE Department,SKIT, Jaipur, Abstract Orthogonal Frequency Division

More information

MSP430 and nrf24l01 based Wireless Sensor Network Design with Adaptive Power Control

MSP430 and nrf24l01 based Wireless Sensor Network Design with Adaptive Power Control MSP430 and nrf24l01 based Wireless Sensor Network Design with Adaptive Power Control S. S. Sonavane 1, V. Kumar 1, B. P. Patil 2 1 Department of Electronics & Instrumentation Indian School of Mines University,

More information

Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes

Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes Application-Specific Node Clustering of IR-UWB Sensor Networks with Two Classes of Nodes Daniel Bielefeld 1, Gernot Fabeck 2, Rudolf Mathar 3 Institute for Theoretical Information Technology, RWTH Aachen

More information

Dynamic Spectrum Access in Cognitive Radio Wireless Sensor Networks Using Different Spectrum Sensing Techniques

Dynamic Spectrum Access in Cognitive Radio Wireless Sensor Networks Using Different Spectrum Sensing Techniques Dynamic Spectrum Access in Cognitive Radio Wireless Sensor Networks Using Different Spectrum Sensing Techniques S. Anusha M. E., Research Scholar, Sona College of Technology, Salem-636005, Tamil Nadu,

More information

MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN

MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN MAC Protocol with Regression based Dynamic Duty Cycle Feature for Mission Critical Applications in WSN Gayatri Sakya Department of Electronics and Communication Engineering JSS Academy of Technical Education,

More information

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing

Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Performance Analysis of Cognitive Radio based on Cooperative Spectrum Sensing Sai kiran pudi 1, T. Syama Sundara 2, Dr. Nimmagadda Padmaja 3 Department of Electronics and Communication Engineering, Sree

More information

Multiple Antenna Processing for WiMAX

Multiple Antenna Processing for WiMAX Multiple Antenna Processing for WiMAX Overview Wireless operators face a myriad of obstacles, but fundamental to the performance of any system are the propagation characteristics that restrict delivery

More information

Project: IEEE P Working Group for Wireless Personal Area Networks N

Project: IEEE P Working Group for Wireless Personal Area Networks N Project: IEEE P802.15 Working Group for Wireless Personal Area Networks N (WPANs( WPANs) Title: [IMEC UWB PHY Proposal] Date Submitted: [4 May, 2009] Source: Dries Neirynck, Olivier Rousseaux (Stichting

More information