Skip to main content

2012 | Buch

Multiple Access Communications

5th International Workshop, MACOM 2012, Maynooth, Ireland, November 19-20, 2012. Proceedings

herausgegeben von: Boris Bellalta, Alexey Vinel, Magnus Jonsson, Jaume Barcelo, Roman Maslennikov, Periklis Chatzimisios, David Malone

Verlag: Springer Berlin Heidelberg

Buchreihe : Lecture Notes in Computer Science

insite
SUCHEN

Über dieses Buch

This book constitutes the refereed proceedings of the 5th International Workshop on Multiple Access Communications, MACOM 2012, held in Maynooth, Ireland, in November 2012. The 13 full papers and 5 demo and poster papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections on network coding, handling interference and localization techniques at PHY/MAC layers, wireless access networks, and medium access control.

Inhaltsverzeichnis

Frontmatter

Network Coding

Network Coding as a WiMAX Link Reliability Mechanism
Abstract
We design and implement a network-coding-enabled reliability architecture for next generation wireless networks. Our network coding (NC) architecture uses a flexible thread-based design, with each encoder-decoder instance applying systematic intra-session random linear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments were conducted to compare the performance of the NC architecture to that of the Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ) mechanisms. In our scenarios, the proposed architecture is able to decrease packet loss from around 11-32% to nearly 0%; compared to HARQ and joint HARQ/ARQ mechanisms, the NC architecture offers up to 5.9 times gain in throughput and 5.5 times reduction in end-to-end file transfer delay. By establishing NC as a potential substitute for HARQ/ARQ, our experiments offer important insights into cross-layer designs of next generation wireless networks.
Surat Teerapittayanon, Kerim Fouli, Muriel Médard, Marie-José Montpetit, Xiaomeng Shi, Ivan Seskar, Abhimanyu Gosain
Initialization Procedure of Wireless Network Coding with Hierarchical Decode and Forward Strategy in Random Connectivity Networks
Abstract
A Wireless Network Coding (WNC) a.k.a. a Physical Layer Network Coding in multi-source multi-node scenarios has shown its potential to increase network throughput compared to a communication based on an orthogonal separation of individual transmissions. In this paper we analyse necessary steps that have to be done to initialize the WNC communication including mainly establishing of relay operations. In our set-up a core network (we named it a cloud), that provides the WNC capabilities of reliable source – destination communication, starts its operation with no system state (connectivity) knowledge. Our goal is to design an algorithm that is capable to gain this information directly from the received constellation that is formed by the superposition of unknown number of transmitting sources with random channel realization and provide it to any cloud node. The algorithm has to be designed to work with the minimum demands on source node cooperation, the most of the functionality is laid upon the cloud.
Tomas Hynek, Jan Sykora
Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks
Abstract
We investigate network coding (NC) in access point-to-multi-point (PMP) broadcast networks. Characterized by a shared unicast upstream channel and a time-shared broadcast downstream channel, PMP networks are widely deployed in optical and wireless access networks. We develop a queuing-theoretic model of NC at the medium access control (MAC) sublayer and analyze the impact of NC on packet delay. Our analysis is validated through discrete-event simulation and demonstrates significant delay advantages for NC under high loads and localized traffic.
Kerim Fouli, Jérôme Casse, Ivan Sergeev, Muriel Médard, Martin Maier

Handling Interference and Localization Techniques at PHY/MAC Layers

A Coded DHA FH OFDMA System with a Noncoherent ML Detector under Multitone Jamming
Abstract
In what follows an upper bound for the probability of erroneous decoding in a coded DHA FH OFDMA system with a noncoherent ML detector under multitone jamming is introduced.
Dmitry Osipov
Analysis of Inter-RSU Beaconing Interference in VANETs
Abstract
Vehicular ad Hoc Networks (VANETs) have emerged as a key technology serving community of peoples in various applications. Providing infotainment and safety services requires the existence of road-side units (RSU) to access to the desired resources. Ideally, the infrastructure should be deployed permeatively to provide continuous connectivity and optimal coverage. This deployment technique increases capacity and coverage at expenses of increasing interference that can severely degrade the performance of the VANET. Moreover, malicious vehicles could mimic the signals of RSUs causing significant performance degradation. In this paper we study the impact of the inter-RSU interference on the beacon broadcasting due to both inefficient deployment and potential RSU emulation attacks (REA). Extensive packet-level simulations have been performed to support the observations made.
Carlos Gañán, Jonathan Loo, Arindam Ghosh, Oscar Esparza, Sergi Reñé, Jose L. Muñoz
Survey of Energy Efficient Tracking and Localization Techniques in Buildings Using Optical and Wireless Communication Media
Abstract
This paper presents a survey of beamforming, beamsteering and mobile tracking techniques. The survey was made in the context of the SOWICI project. The aim of this project is to reduce power consumption of data exchanging devices within houses. An optical fiber network is used for data transport to and from rooms whereas wireless transceivers communicate with appliances within the rooms. Using this approach, the aim is to reduce power consumption and exposure to electromagnetic radiation. To realize this, beamforming will be used to only radiate energy in, and receive signals from, the direction of interest. Because appliances within households can move, some of them even relatively fast, the pointing direction of the beam should be steerable. The pointing direction can be deduced from the communication link (beamsteering) or via separate mobile tracking techniques.
Tom M. Bruintjes, André B. J. Kokkeler, Georgios Karagiannis, Gerard J. M. Smit

Demonstrations and Posters

Network Coding as a WiMAX Link Reliability Mechanism: An Experimental Demonstration
Abstract
Our demonstration showcases a network-coding (NC)– enabled reliability architecture for next generation wireless networks. Our NC architecture uses a flexible thread-based design, applying systematic intra-session random linear network coding as a packet erasure code at the IP layer. Using GENI WiMAX platforms, a series of point-to-point transmission experiments are conducted to compare NC with Automatic Repeated reQuest (ARQ) and Hybrid ARQ (HARQ). At the application layer, Iperf and UFTP are used to measure throughput, packet loss and file transfer delay. In our selected scenarios, NC offers up to 5.9 times gain in throughput and 5.5 times reduction in file transfer delay, compared to HARQ and joint HARQ/ARQ. Our demonstration hence illustrates that lower-layer redundancy mechanisms such as HARQ and ARQ incur high cost since they operate at the packet-level. Conversely, running NC at higher layers (e.g., IP) amortizes the cost of redundancy over several packets, thus leading to higher efficiency.
Surat Teerapittayanon, Kerim Fouli, Muriel Médard, Marie-José Montpetit, Xiaomeng Shi, Ivan Seskar, Abhimanyu Gosain
Spectrum Sensing with USRP-E110
Abstract
Spectrum sensing is one of the key topics towards the implementation of future wireless services like SuperWiFi. This new wireless proposal aims at using the freed spectrum resulting from the analog-to-digital transition of TV channels for wireless data transmission (UHF TV White Spaces). The benefits range from better building penetration to longer distances when compared to the set of IEEE 802.11 standards. Nevertheless, the effective use of the available spectrum is subject to strict regulation that prohibits unlicensed users to interfere with incumbents (like wireless microphones). Cognitive Radios (CR) and dynamic spectrum allocation are suggested to cope with this problem. These techniques consist on frequency sweeps of the TV-UHF band to detect White Spaces that could be used for SuperWiFi transmissions. In this paper we develop and implement algorithms from GNURadio in the Ettus USRP-E110 to build a standalone White Spaces detector that can be consulted from a centralized location via IP networks.
Luis Sanabria-Russo, Jaume Barcelo, Albert Domingo, Boris Bellalta
Power Control for Wireless Networks with a Limited Number of Channels
Abstract
In wireless networks, interferences from adjacent nodes that are concurrently transmitting can cause packet reception failures and thus result in significant throughput degradation. The interference can be simply avoided by assigning different orthogonal channel to each interfering node. However, if the number of orthogonal channels is smaller than that of adjacent nodes, this simple channel assignment method does not work. In this paper, we propose a vertex coloring based power control algorithm for wireless networks with a limited number of channels. In order to maintain high data transmission rate between two nodes, the transmission power is increased as long as different orthogonal channel is assigned to each adjacent node. We show that the proposed algorithm significantly improves the network throughput performance for various wireless network topologies with different number o f orthogonal channels.
Atuletye Burton Mwamila, Jaeseon Hwang, Taejin Ha, Hyuk Lim
A Measurement Study for Predicting Throughput from LQI and RSSI
Abstract
Wireless sensor networks (WSN) commonly use ZigBee to communicate, especially when low power consumption is demanded. ZigBee may however provide unpredictable throughput although transmission distances are short. This is especially evident in difficult environments with complicated reflections and various materials through which radio signals need to pass through. Distributed scheduling based on cognitive networking principles may improve both network predictability and overall throughput. This paper presents measurements of key parameters for such cognitive scheduling, and discusses their potential for predicting suitable per-node transmission rates. Results include variability of throughput, RSSI and LQI observed for different transmission powers, transmission ranges, and number of transmitting nodes.
Krzysztof Wolosz, Ulf Bodin, Laurynas Riliskis
Reality Considerations When Designing a TDMA-FDMA Based Link-Layer for Real-Time WSN
Abstract
In this article we elaborate on reality considerations when designing and implementing application tailored TDMA-FDMA medium access protocol with guaranteed end-to-end delay. We highlight importance of considering underlaying hardware and software components when designing communication protocols for resource constrained platforms. We also show that by combining medium access protocol, bootstrapping, and time synchronization mechanisms within the link-layer, we can limit on average clock drift in the network to 0.5 μs, as well as achieve 81% energy efficiency while keeping collision probability at its minimum of 1%. Finally, we conclude with challenges and lessons learned in real-world deployment of TDMA/FDMA based link-layer with guaranteed end-to-end delay in WSN.
Laurynas Riliskis, Jan Berdajs, Evgeny Osipov, Andrej Brodnik

Wireless Access Networks

Wireless Groupcast Routing with Palette of Transmission Methods
Abstract
We study the problem of wireless groupcast routing when multiple transmission methods are available. The paper is inspired by GroupCast with Retries (GCR) methods appeared in IEEE 802.11aa in 2012. The paper contributes with comparative analysis of GCR methods in a wireless multihop network from the groupcast routing perspective. It also addresses the issue of possible benefit for a routing protocol to account for this palette of transmission methods.
Alexander Safonov, Andrey Lyakhov, Anastasia Urgenson, Olga Sokolova
Concurrent Access Control Using Subcarrier Signature in Heterogeneous MIMO-Based WLAN
Abstract
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among different stations/users. In this paper, we study the MAC protocol in heterogeneous MIMO-based WLAN to effectively exploit the capability of concurrent transmission. We propose a novel subcarrier encoding method, which uses frequency signatures to perform the control message exchange between the AP and multiple stations simultaneously. Afterwards, a MAC protocol, HT-MIMO MAC, is presented to support concurrent transmission in both the uplink and downlink directions. HT-MIMO MAC supports link adaptation and is completely compatible with legacy stations. We evaluate the performance of the HT-MIMO MAC protocol and find that it outperforms the existing 802.11 MAC protocol with SU-MIMO and the downlink MU-MIMO MAC protocol in [9] with a remarkable throughput gains up to 86%.
Hu Shen, Shaohe Lv, Yanqiang Sun, Xuan Dong, Xiaodong Wang, Xingming Zhou
Investigation of Queueing System Suitable for Mathematical Modelling of TCP Short Transfer
Abstract
A single-server queueing system with stationary Poisson arrival process, finite buffer and impatient customers as a model of TCP Short Transfer is investigated. Service time of a customer by a server has an exponential distribution. If the server is busy and the buffer is full at a customer arrival epoch, the customer may leave the system forever or move to the orbit. Customers staying in the buffer exhibit signs of impatience: they can leave the buffer lying out of the service. Patience time of a customer has an exponential distribution. When this time expires the customer either leaves the system permanently or goes to the orbit of infinite size. Customers staying in the orbit repeat their attempts to get the service later on in a random amount of time. This time is exponentially distributed with the rate depending or independent of the current number of customers in the orbit.
Behavior of the system under study is described by two-dimensional asymptotically quasi-Toeplitz Markov chain. Stability conditions and the algorithms for calculating the stationary state distribution of the chain are obtained. Main performance measures of the system are calculated.
Alexander Dudin, Valentina Klimenok

Medium Access Control

Dependable MAC Layer Architecture Based on Holographic Data Representation Using Hyper-Dimensional Binary Spatter Codes
Abstract
In this article we propose the usage of binary spatter codes and distributed data representation for communicating loss and delay sensitive data in event-driven sensor and actuator networks. Using the proposed data representation technique along with the medium access control protocol the mission critical control information can be transmitted with assured constant delay in deployments exposing below 0 dB signal-to-noise ratio figures.
Denis Kleyko, Nikita Lyamin, Evgeny Osipov, Laurynas Riliskis
Addressing Slot Drift in Decentralized Collision Free Access Schemes for WLANs
Abstract
Decentralized Collision-Free Access (DCFA) schemes are an appealing family of MAC mechanisms in WLANs due to their good system throughput and decentralized nature. In this paper we consider the problem of slot drift for these schemes and provide evidence that DCFA can be vulnerable to such problems. We propose two schemes to enhance DCFA in this regard: Global View Synchronization (GVS) and Smart Collision Free (SCF). GVS aims to provide slot indexing, which helps stations correct their counters after drift. SCF accelerates the convergence process to the collision-free state for WLANs, and so reduces the impact of drift. Simulation results show that both GVS and SCF improve the system performance in the presence of slot drift.
Wunan Gong, David Malone
Exploiting Short MAC Superframe Cycles for Fast Bit Synchronization in IEEE 802.15.4 UWB-IR
Abstract
Ultra-Wideband Impulse Radio is a promising technology for industrial automation applications due to its inherent multipath robustness and coexistence features. The ultra-wideband impulse radio PHY standardized in IEEE 802.15.4, however, is optimized for low duty cycles and not optimized for real-time communication. Especially the long preambles that are needed for synchronization cause a large overhead that might not be necessary in systems with a high duty cycle. We propose an efficient synchronization scheme, which is a cross-layer improvement and which combines this PHY layer with a MAC layer for wireless real-time communication in low latency deterministic networks based on draft IEEE 802.15.4e. This scheme splits synchronization into a network-wide frame synchronization via a broadcast beacon with a standard preamble and bit-level synchronization using just very short preambles per data frame. To achieve this, we exploit the short communication cycles and the centralized communication flow common in factory automation networks. We present and discuss simulation results of our proposed scheme that verify its higher efficiency.
Johannes Hund, Michael Bahr, Christian Schwingenschlögl, Rolf Kraemer, Sonom Olonbayar
Intra-cluster Contention Resolution in Wireless Sensor Networks
Abstract
Contention resolution plays an important role in designing medium access control protocols. Owing to technical constraints of wireless sensor networks, the task of efficiently resolving contention poses several challenges. In clustered wireless sensor networks, many-to-one communication is the dominant pattern, which is also applicable to the star topology. This paper surveys the state-of-the-art contention-resolution techniques designed for this communication pattern with a discussion of their features and limitations. We closely examine several contention-resolution schemes, including our recently proposed BSTCR algorithm, with performance evaluation in multiple aspects.
Vahid Salmani, Pai H. Chou
Backmatter
Metadaten
Titel
Multiple Access Communications
herausgegeben von
Boris Bellalta
Alexey Vinel
Magnus Jonsson
Jaume Barcelo
Roman Maslennikov
Periklis Chatzimisios
David Malone
Copyright-Jahr
2012
Verlag
Springer Berlin Heidelberg
Electronic ISBN
978-3-642-34976-8
Print ISBN
978-3-642-34975-1
DOI
https://doi.org/10.1007/978-3-642-34976-8

Premium Partner