Cooperation in Random Access Wireless Networks

Similar documents
A Cross-Layer Cooperative Schema for Collision Resolution in Data Networks

Compressed Sensing for Multiple Access

Lecture LTE (4G) -Technologies used in 4G and 5G. Spread Spectrum Communications

M2M massive wireless access: challenges, research issues, and ways forward

DOPPLER SHIFT. Thus, the frequency of the received signal is

Cellular systems 02/10/06

A random access protocol assisted by retransmission diversity and energy reuse capabilities

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Lecture 8: Media Access Control

Technical Aspects of LTE Part I: OFDM

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Transmit Diversity Schemes for CDMA-2000

Local Area Networks NETW 901

Chapter 10. User Cooperative Communications

Lecture 8 Mul+user Systems

CS434/534: Topics in Networked (Networking) Systems

Wireless Networks (PHY): Design for Diversity

Interference management Within 3GPP LTE advanced

Multiple Access System

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

SourceSync. Exploiting Sender Diversity

Unit 8 - Week 7 - Computer simulation of Rayleigh fading, Antenna Diversity

Opportunistic Communications under Energy & Delay Constraints

LTE-Advanced and Release 10

The Long Range Wide Area Network - LoraWAN

Optimum Power Allocation in Cooperative Networks

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Background: Cellular network technology

Performance Analysis of Cooperative Communication System with a SISO system in Flat Fading Rayleigh channel

Opportunistic Communication in Wireless Networks

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

6.1 Multiple Access Communications

Smart Random Channel Access in OFDM Systems by Joint Signal Processing and Packet Scheduling

Multiple access techniques

Power Allocation based Hybrid Multihop Relaying Protocol for Sensor Networks

CROSS-LAYER DESIGN FOR QoS WIRELESS COMMUNICATIONS

Mobile Computing. Chapter 3: Medium Access Control

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

ECE 333: Introduction to Communication Networks Fall Lecture 15: Medium Access Control III

Professor Paulraj and Bringing MIMO to Practice

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

SNS COLLEGE OF ENGINEERING COIMBATORE DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing

Information Theory at the Extremes

Analysis and Improvements of Linear Multi-user user MIMO Precoding Techniques

ON THE USE OF MULTIPLE ACCESS CODING IN COOPERATIVE SPACE-TIME RELAY TRANSMISSION AND ITS MEASUREMENT DATA BASED PERFORMANCE VERIFICATION

On Distributed Space-Time Coding Techniques for Cooperative Wireless Networks and their Sensitivity to Frequency Offsets

Reliable and Efficient RFID Networks

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Medium Access Control Protocol for WBANS

Collaborative transmission in wireless sensor networks

Multiple Access Schemes

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Selected answers * Problem set 6

Technical Bulletin. DIFFERENT OPERATING MODES, SPECTRAL BEHAVIOUR & DATA THROUGHPUT Prepared by: Jack Van der Star, P.Eng.

FAQs about OFDMA-Enabled Wi-Fi backscatter

Wireless in the Real World. Principles

Research Letter Throughput of Type II HARQ-OFDM/TDM Using MMSE-FDE in a Multipath Channel

1 Interference Cancellation

Common Control Channel Allocation in Cognitive Radio Networks through UWB Multi-hop Communications

Wireless replacement for cables in CAN Network Pros and Cons. by Derek Sum

Qualcomm Research Dual-Cell HSDPA

Chapter 2 Overview - 1 -

Study of Performance Evaluation of Quasi Orthogonal Space Time Block Code MIMO-OFDM System in Rician Channel for Different Modulation Schemes

Outline. Wireless Networks (PHY): Design for Diversity. Admin. Outline. Page 1. Recap: Impact of Channel on Decisions. [hg(t) + w(t)]g(t)dt.

ISHIK UNIVERSITY Faculty of Science Department of Information Technology Fall Course Name: Wireless Networks

An Introduction to Wireless Technologies Part 2. F. Ricci

Boosting Microwave Capacity Using Line-of-Sight MIMO

TECHNOLOGY : MATLAB DOMAIN : COMMUNICATION

PERFORMANCE ANALYSIS OF COLLABORATIVE HYBRID-ARQ INCREMENTAL REDUNDANCY PROTOCOLS OVER FADING CHANNELS

Wireless TDMA Mesh Networks

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Smart Antenna Techniques and Their Application to Wireless Ad Hoc Networks. Plenary Talk at: Jack H. Winters. September 13, 2005

Next Generation Wireless LANs

RECOMMENDATION ITU-R F Characteristics of advanced digital high frequency (HF) radiocommunication systems

ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation

Randomized spatial multiplexing for distributed cooperative communications

Resource Allocation in Energy-constrained Cooperative Wireless Networks

IEEE ax / OFDMA

Investigation on Multiple Antenna Transmission Techniques in Evolved UTRA. OFDM-Based Radio Access in Downlink. Features of Evolved UTRA and UTRAN

Lecture 23: Media Access Control. CSE 123: Computer Networks Alex C. Snoeren

1. Introduction. 2. OFDM Primer

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

Ad hoc and Sensor Networks Chapter 4: Physical layer. Holger Karl

Performance Analysis and Improvements for the Future Aeronautical Mobile Airport Communications System. Candidate: Paola Pulini Advisor: Marco Chiani

Achieving Network Consistency. Octav Chipara

Multiple Access Methods

Project: IEEE P Working Group for Wireless Personal Area Networks N. WPANs) (WPANs( January doc.: IEEE 802.

Stochastic Modelling for Wireless Communication Networks-Multiple Access Methods.

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

On the Predictability of Underwater Acoustic Communications Performance: the KAM11 Data Set as a Case Study

Multiple Access (3) Required reading: Garcia 6.3, 6.4.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Chapter 2 Overview - 1 -

Communication Efficiency of Error Correction Mechanism Based on Retransmissions

White Rose Research Online URL for this paper: Version: Accepted Version

Randomized Channel Access Reduces Network Local Delay

Transcription:

Cooperation in Random Access Wireless Networks Presented by: Frank Prihoda Advisor: Dr. Athina Petropulu Communications and Signal Processing Laboratory (CSPL) Electrical and Computer Engineering Department Drexel University

Outline of Discussion Introduction/Background Random Access Methods ALOHA NDMA Proposed Cooperation Technique ALLIANCES Current Work Relay Selection Conclusion Questions

Background Multimedia sources require diverse bandwidth requirements. Fixed Allocation Schemes are insufficient for variable-bitrate applications. Simple random access schemes such as ALOHA suffer from limited throughput. The focus of previous multi-user research was to avoid collisions.

Random Access Methods ALOHA In random access methods such as ALOHA, each user transmits its packet when it has a packet to transmit. As the traffic load in the network increases, packets at the receiver will collide. In the ALOHA scheme, collided packets are discarded. C onsider a slotted-system User 1 slot n-4 slot n-3 slot n-2 slot n-1 Collision slot n User 2 User 3 User 4 User 5 User 6

Random Access Methods By introducing diversity to the wireless network approach, an advantage is provided over the original ALOHA scheme. Multi-user detection and source separation can be used at the receiver to detect collisions (and the collision order). In a recent method (NDMA) it was proposed that in a K fold collision, the packets from the collision time slot are saved in buffer, and using retransmissions during the following K-1 time slots, the originally collided packets can be resolved.

Random Access Methods NDMA Consider the three fold collision in time slot n (previous slide) 3 Fold Collision

Random Access Methods NDMA

Random Access Methods NDMA Collision can be resolved

Random Access Methods NDMA NDMA exploits time diversity in the wireless network through retransmission of collided packets. Usually, channel coefficients are correlated over adjacent time slots. If a certain channel is in deep fading, it will continue to be in deep fade during the following time slots. Deep Fading will reduce the rank of the channel coefficient matrix A. NDMA provides higher throughput than ALOHA, however, it is best suited for fast varying channels.

Random Access Methods ALLIANCES ALLow Improved Access in the Network via Cooperation and Energy Savings In addition to time diversity, we introduce spatial diversity through user cooperation. The additional diversity introduced provides us with a higher throughput without additional hardware or bandwidth expansion. View the wireless network as a spatially distributed antenna, with all elements linked via the wireless channel. A savings in network power efficiency can be observed.

Random Access Methods ALLIANCES Assumptions: Small-scale multi-user slotted system Transmitters are synchronized and in half duplex mode Each node is equipped with one antenna Nodes will receive feedback from base station specifying if the transmission was successful Only non-regenerative relays will be used

Random Access Methods ALLIANCES When a collision is detected, the system will enter a cooperative transmission epoch (CTE). A control bit will be broadcast to all nodes indicating the start of CTE. Initially, the CTE will be of length K-1. If necessary, the base station will increase this length. Selection of relays during CTE Randomly SNR User Energy (Available Battery Power)

Random Access Methods ALLIANCES Consider the same collision during time slot n a 10 (n) y 0 (n) received at base station 3 Fold Collision a 20 (n) a 30 (n) Signal at BS/AP y 0 (n) = a 10 (n)x 1 (n) + a 20 (n)x 2 (n) + a 30 (n)x 3 (n) Signal at i th relay node y i (n) = a 1i (n)x 1 (n) + a 2i (n)x 2 (n) + a 3i (n)x 3 (n)

Random Access Methods ALLIANCES In the first time slot of the CTE, a chosen relay bounces the signal it received during the collision time slot a 40 (n+1) y 0 (n) received at base station Signals stored at BS/AP time slot n y 0 (n) = a 10 (n)x 1 (n) + a 20 (n)x 2 (n) + a 30 (n)x 3 (n) time slot n+1 y 0 (n+1) = a 40 (n)y 4 (n)

Random Access Methods ALLIANCES For the 3 Fold Collision example, the originally collided packets are resolved in time slot n+2 Collision can be resolved y 0 (n) received at base station a 30 (n+2) Y = AX + W Signals stored at BS/AP time slot n y 0 (n) = a 10 (n)x 1 (n) + a 20 (n)x 2 (n) + a 30 (n)x 3 (n) time slot n+1 time slot n+2 y 0 (n+1) = a 40 (n)y 4 (n) y 0 (n+2) = a 30 (n+2)x 3 (n) Note: In this situation, we show the special case where the selected relay is a source node. In this case (as shown), the user will simply retransmit its original packet.

Simulation We consider a wireless system with 32 users Orthogonal IDs were added to 4 QAM packets, with N = 424 bits. Symbols were recovered using a zero forcing function at the receiver If the packets were successfully detected at the receiver with an error probability.02, the transmission was considered successful Jake s model was used to simulate the fading channel. A bit rate of 256 kbps and Doppler frequency shift of 52 Hz. With a carrier frequency of 5.2GHz, this corresponds to a user speed of 3 m/s. The following results are simulations of the network to handle an aggregated traffic load (both new traffic and traffic from retransmissions).

Simulated Results

Application Advantage of Cooperation: Consider a military scenario, where we view the network nodes as soldiers carrying antennas. With cooperation, we can enable uninterrupted, high-bit rate (multimedia e.g. voice, data, video) communication, EVEN if the some of the users face poor channel conditions (i.e. poor SNR, no LOS etc.).

Selection of Relays In the originally proposed ALLIANCES scheme, relays were selected at random. For example, R i = mod(n + i, J) + 1. For this, J was the set of all users. To see an improved throughput, we can consider using different relay sets; with respect to set size and node choice. Relay selection may provide us with additional control overhead. This overhead can be justified, if an improvement in throughput is observed.

Selection of Relays Selection of relay via user location. Relay sets of size J/2 and K-1 Selection of relay from the joint set of user s location and user s available battery Relay set of size J/2 Compare the above with the original selection technique in the proposed method

Selection of Relays

Simulation

Conclusions Spatial diversity provided by the ALLIANCES scheme is robust in a wireless environment, with throughput improvement over both NDMA and ALOHA. ALLIANCES is suitable for a wireless network in which nodes are willing to cooperate. In addition to the cooperation advantage, ALLIANCES is advantageous for bursty sources. ALLIANCES only requires one node to transmit during the CTE, thus, when compared to NDMA, it provides us with a more energy efficient way of resolving collisions. Throughput performance can be increased with different relay selection techniques. However, we must make note that these additional techniques will add control overhead to the protocol.

Questions?