1.1 General: Wireless Networks
1.1 General: Wireless Networks
1.1 General: Wireless Networks
INTRODUCTION
1.1 GENERAL
Wireless Networks
A wireless local-area network (LAN) uses radio waves to connect devices such as laptops
to the Internet and to your business network and its applications. When you connect a laptop to a
WiFi hotspot at a cafe, hotel, airport lounge, or other public place, you're connecting to that
business's wireless network.
A wireless network is any type of computer network that uses wireless data connections
for connecting network nodes. Wireless networking is a method by which homes,
telecommunications networks and enterprise (business) installations avoid the costly process of
introducing cables into a building, or as a connection between various equipment locations.
Wireless telecommunications networks are generally implemented and administered using radio
communication. This implementation takes place at the physical level (layer) of the OSI model
network structure. Examples of wireless networks include cell phone networks, Wireless local
networks, wireless sensor networks, satellite communication networks, and terrestrial microwave
networks.
1
particular type of network. Traditional cell phones don't fall within the definition of a computer
device; however, newer phones and even audio headsets are beginning to incorporate computing
power and network adapters. Eventually, most electronics will offer wireless network
connections.
As with networks based on wire, or optical fiber, wireless networks convey information
between computer devices. The information can take the form of e-mail messages, web pages,
database records, streaming video or voice. In most cases, wireless networks transfer data, such
as e-mail messages and files, but advancements in the performance of wireless networks is
enabling support for video and voice communications as well.
A wired network connects devices to the Internet or other network using cables. The most
common wired networks use cables connected to Ethernet ports on the network router on one
end and to a computer or other device on the cable's opposite end.
The development of wireless networks is still in progress as the usage is rapidly growing.
Personal communications are made easy with the advent of cell phones where radio satellites are
used for networking between continents. Whether small or big, businesses uses wireless
networks for fast data sharing with economical means. Sometimes compatibility issues with new
devices might arise in these extremely vulnerable networks but the technology has made the
uploading and the downloading of huge data a piece of cake with least maintenance cost.
Small businesses can experience many benefits from a wireless network, including:
Convenience. Access your network resources from any location within your wireless
network's coverage area or from any WiFi hotspot.
2
Mobility. You're no longer tied to your desk, as you were with a wired connection. You
and your employees can go online in conference room meetings, for example.
Productivity. Wireless access to the Internet and to your company's key applications and
resources helps your staff get the job done and encourages collaboration.
Easy setup. You don't have to string cables, so installation can be quick and cost-
effective.
Expandable. You can easily expand wireless networks with existing equipment, while a
wired network might require additional wiring.
Security. Advances in wireless networks provide robust security protections.
Cost. Because wireless networks eliminate or reduce wiring costs, they can cost less to
operate than wired networks.
Cellular and PCS systems use several radio communications technologies. The systems
divide the region covered into multiple geographic areas. Each area has a low-power
transmitter or radio relay antenna device to relay calls from one area to the next area.
Radio and spread spectrum technologies – Wireless local area networks use a high-
frequency radio technology similar to digital cellular and a low-frequency radio
technology. Wireless LANs use spread spectrum technology to enable communication
3
between multiple devices in a limited area. IEEE 802.11 defines a common flavor of
open-standards wireless radio-wave technology known as Wifi.
A wireless local area network (WLAN) links two or more devices over a short distance
using a wireless distribution method, usually providing a connection through an access point for
internet access.
4
The use of spread-spectrum or OFDM technologies may allow users to move around
within a local coverage area, and still remain connected to the network. Products using the IEEE
802.11 WLAN standards are marketed under the Wi-Fi brand name.
Wireless personal area networks (WPANs) interconnect devices within a relatively small
area that is generally within a person's reach. For example, both Bluetooth radio and invisible
infrared light provides a WPAN for interconnecting a headset to a laptop. ZigBee also supports
WPAN applications. Wi-Fi PANs are becoming commonplace (2010) as equipment designers
start to integrate Wi-Fi into a variety of consumer electronic devices. Intel "My WiFi" and
Windows 7 "virtual Wi-Fi" capabilities have made Wi-Fi PANs simpler and easier to set up and
configure.
Wireless wide area networks are wireless networks that typically cover large areas, such
as between neighbouring towns and cities, or city and suburb. These networks can be used to
connect branch offices of business or as a public Internet access system. The wireless
connections between access points are usually point to point microwave links using paraboli
dishes on the 2.4 GHz band, rather than omnidirectional antennas used with smaller networks. A
typical system contains base station gateways, access points and wireless bridging relays. Other
5
configurations are mesh systems where each access point acts as a relay also. When combined
with renewable energy systems such as photovoltaic solar panels or wind systems they can be
stand alone systems.
Wireless metropolitan area networks are a type of wireless network that connects several
wireless LANs.
WiMAX is a type of Wireless MAN and is described by the IEEE 802.16 standard.
A global area network (GAN) is a network used for supporting mobile across an arbitrary
number of wireless LANs, satellite coverage areas, etc. The key challenge in mobile
communications is handing off user communications from one local coverage area to the next. In
IEEE Project 802, this involves a succession of terrestrial wireless LANs.
The Broadband Global Area Network (BGAN) is a global satellite internet network with
telephony using portable terminals. The terminals are normally used to connect a laptop
computer to broadband Internet in remote locations, although as long as line-of-sight to the
satellite exists, the terminal can be used anywhere. The value of BGAN terminals is that unlike
6
other satellite Internet services which require bulky and heavy satellite dishes to connect, a
BGAN terminal is about the size of a laptop and thus can be carried easily. The network is
provided by Inmarsat and uses three geostationary satellites called I-4 to provide almost global
coverage.
Some examples of usage include cellular phones which are part of everyday wireless
networks, allowing easy personal communications. Another example: Intercontinental network
systems, use radio satellites to communicate across the world. Emergency services such as the
police utilize wireless networks to communicate effectively as well. Individuals and businesses
use wireless networks to send and share data rapidly, whether it be in a small office building or
across the world.
1.5 PROPERTIES
1.5.1 General
In a general sense, wireless networks offer a vast variety of uses by both business and
home users. "Now, the industry accepts a handful of different wireless technologies. Each
7
wireless technology is defined by a standard that describes unique functions at both the Physical
and the Data Link layers of the OSI model. These standards differ in their specified signaling
methods, geographic ranges, and frequency usages, among other things. Such differences can
make certain technologies better suited to home networks and others better suited to network
larger organizations."
1.5.2 Performance
Each standard varies in geographical range, thus making one standard more ideal than the
next depending on what it is one is trying to accomplish with a wireless network. The
performance of wireless networks satisfies a variety of applications such as voice and video.
The use of this technology also gives room for expansions, such as from 2G to 3G and,
most recently, 4G technology, which stands for the fourth generation of cell phone mobile
communications standards. As wireless networking has become commonplace, sophistication
increases through configuration of network hardware and software, and greater capacity to send
and receive larger amounts of data, faster, is achieved.
1.5.3 Space
1.5.4 Home
8
installation of cable mediums, save time from physical installation, and also creates mobility for
devices connected to the network. Wireless networks are simple and require as few as one single
wireless access point connected directly to the Internet via a router.
Wireless NEs are the products and devices used by a wireless carrier to provide support
for the backhaul network as well as a mobile switching center (MSC). Reliable wireless service
depends on the network elements at the physical layer to be protected against all operational
environments and applications.
What are especially important are the NEs that are located on the cell tower to the base
station (BS) cabinet. The attachment hardware and the positioning of the antenna and associated
closures and cables are required to have adequate strength, robustness, corrosion resistance, and
resistance against wind, storms, icing, and other weather conditions. Requirements for individual
components, such as hardware, cables, connectors, and closures, shall take into consideration the
structure to which they are attached.
1.7 DIFFICULTIES
1.7.1 Interferences
9
Some materials cause absorption of electromagnetic waves, preventing it from reaching
the receiver, in other cases, particularly with metallic or conductive materials reflection occurs.
This can cause dead zones where no reception is available. Aluminium foiled thermal isolation in
modern homes can easily reduce indoor mobile signals by 10 dB frequently leading to
complaints about the bad reception of long-distance rural cell signals.
In multipath fading two or more different routes taken by the signal, due to reflections,
can cause the signal to cancel out at certain locations, and to be stronger in other places (upfade).
The hidden node problem occurs in some types of network when a node is visible from a
wireless access point (AP), but not from other nodes communicating with that AP. This leads to
difficulties in media access control.
The wireless spectrum is a limited resource and shared by all nodes in the range of its
transmitters. Bandwidth allocation becomes complex with multiple participating users. Often
users are not aware that advertised numbers (e.g., for IEEE 802.11 equipment or LTE networks)
are not their capacity, but shared with all other users and thus the individual user rate is far
lower. With increasing demand, the capacity crunch is more and more likely to happen. User-in-
the-loop (UIL) may be an alternative solution to ever upgrading to newer technologies for over-
provisioning.
1.8 CAPACITY
1.8.1 Channel
Shannon's theorem can describe the maximum data rate of any single wireless link, which
relates to the bandwidth in hertz and to the noise on the channel. One can greatly increase
channel capacity by using MIMO techniques, where multiple aerials or multiple frequencies can
10
exploit multiple paths to the receiver to achieve much higher throughput – by a factor of the
product of the frequency and aerial diversity at each end. Under Linux, the Central Regulatory
Domain Agent (CRDA) controls the setting of channels.
1.8.2 Network
The total network bandwidth depends on how dispersive the medium is (more dispersive
medium generally has better total bandwidth because it minimises interference), how many
frequencies are available, how noisy those frequencies are, how many aerials are used and
whether a directional antenna is in use, whether nodes employ power control and so on.
Cellular wireless networks generally have good capacity, due to their use of directional
aerials, and their ability to reuse radio channels in non-adjacent cells. Additionally, cells can be
made very small using low power transmitters this is used in cities to give network capacity that
scales linearly with population density.
1.9 SAFETY
Wireless access points are also often close to humans, but the drop off in power over
distance is fast, following the inverse-square law. The position of the United Kingdom's Health
Protection Agency (HPA) is that “...radio frequency (RF) exposures from WiFi are likely to be
lower than those from mobile phones.” It also saw “...no reason why schools and others should
not use WiFi equipment.” In October 2007, the HPA launched a new “systematic” study into the
effects of WiFi networks on behalf of the UK government, in order to calm fears that had
appeared in the media in a recent period up to that time". Dr Michael Clark, of the HPA, says
published research on mobile phones and masts does not add up to an indictment of WiFi.
11
2003 by WPA, or Wi-Fi Protected Access. WPA was a quick alternative to improve security
over WEP. The current standard is WPA2; some hardware cannot support WPA2 without
firmware upgrade or replacement. WPA2 uses an encryption device that encrypts the network
with a 256-bit key; the longer key length improves security over WEP. The risks to users of
wireless technology have increased as the service has become more popular. There were
relatively few dangers when wireless technology was first introduced. Hackers had not yet had
time to latch on to the new technology, and wireless networks were not commonly found in the
work place.
12
CHAPTER 2
REVIEW OF LITERATURE
13
LIMITATIONS
The CFO problem in a wireless system occurs due to differences between transmitter and
receiver oscillators.
MU-MIMO schemes can benefit from the full number of antennas at the transmitter with
a high number of users.
14
optimum. An important service that should be supported by ad hoc networks is multicast.
Although there is an abundance of research on multicast in ad hoc networks, these results cannot
be applied to a CR ad hoc network due to the complexity associated with a CR node (e.g.,
difference in available bands from neighboring nodes). In addition, a single layer approach that is
solely focused on multicast connectivity is overly simplistic as it does not optimize network
resource. In this context, a cross-layer approach is usually necessary, which should include joint
consideration of lower layers, in addition to the network layer.
LIMITATIONS
There is a set of available frequency bands for communication at each node, depending
on its location.
15
2.5 EXPERIMENTAL CHARACTERIZATION OF SECTORIZED
ANTENNAS IN DENSE 802.11 WIRELESS MESH NETWORKS
The primary goals of this paper are to characterize the performance of sectorized
antennas in real-world dense 802.11 wireless mesh networks and to derive practical design guide
lines for directional MAC protocols and topology control mechanisms that operate in this
environment. Sectorized antennas can increase wireless network capacity through greater spatial
reuse. Despite their increasing popularity, their real-world performance characteristics in dense
wireless mesh networks are not well understood. This paper conducts a systematic experimental
study on a mesh network testbed using commodity 802.11 hardware and multi sector antennas.
Our study results in the following main observations. (i) Sector selection should be based on
explicit measurement in all sectors, though the measurement overhead can be significantly
reduced by exploiting spatio-temporal characteristics of the best sector. (ii) Multi-sector
activation typically reduces the signal strength of a link compared to single sector activations due
to antenna design constraints. (iii) Spatial reuse is constrained by characteristics of antenna
radiation pattern in different sectors (iv) Physical layer capture reduces the effect of directional
hidden terminal problem. Finally, we discuss the implications of these observations on the design
of practical directional MAC and topology control protocols.
LIMITATION
Interference becomes a major problem for 802.11 wireless networks operating in this
environment.
Sector selection is challenging in environments characterized by non-line-of-sight,
multipath reflections and high angular spread.
Sectorization can limit the performance of the 802.11 CSMA MAC protocol due to
directional hidden terminals.
16
data communication device that is vastly more powerful than recently proposed multi-channel
multi-radio (MC-MR) technology. In this paper, investigate the important problem of multi-hop
networking with CR nodes. For such a network, each node has a pool of frequency bands
(typically of unequal size) that can be used for communication. The potential difference in the
bandwidth among the available frequency bands prompts the need to further divide these bands
into sub-bands for optimal spectrum sharing. the behavior and constraints for such a multi-hop
CR network from multiple layers, including modeling of spectrum sharing and sub-band
division, scheduling and interference constraints, and flow routing. Develop a mathematical
formulation with the objective of minimizing the required network-wide radio spectrum resource
for a set of user sessions. Since the formulated model is a mixed-integer non-linear program
(MINLP), which is NP-hard in general, a lower bound for the objective by relaxing the integer
variables and using a linearization technique. Subsequently, a near-optimal algorithm to solve
this MINLP problem. This algorithm is based on a novel sequential fixing procedure, where the
integer variables are determined iteratively via a sequence of linear programs. Simulation results
show that solutions obtained by this algorithm are very close to the lower bounds obtained via
the proposed relaxation, thus suggesting that the solution produced by the algorithm is near-
optimal.
LIMITATIONS
Due to the unequal size of spectrum bands, it is necessary to further divide each band into
sub-bands (likely of unequal size) to schedule transmission and reception.
There are many fundamental problems that can be posed for such a wireless network in
the context of rates and capacity.
17
simultaneously active in the network is to be formed. If the selected sub-topologies are of small
size, the delay between the transmission opportunities on a link increases. Thus, care should be
taken to form a limited number of sub-topologies. the problem of constructing the minimum
number of sub-topologies such that SIC decoding is successful with a desired probability
threshold, is NP-hard. Given this, It propose MUSIC, a framework that greedily forms and
activates sub-topologies, in a way that favors successful SIC decoding with a high probability.
MUSIC also ensures that the number of selected sub-topologies is kept small. It provide both a
centralized and a distributed version of our framework. We prove that our centralized version
approximates the optimal solution for the considered problem. It perform extensive simulations
to demonstrate that (i) MUSIC forms a small number of sub topologies that enable efficient SIC
operations; the number of sub-topologies formed is at most 17% larger than the optimum number
of topologies, discovered through exhaustive search (in small networks). (ii) MUSIC
outperforms approaches that simply consider the number of antennas as a measure for
determining the links that can be simultaneously active. Specifically, MUSIC provides
throughput improvements of up to 4 times, as compared to such an approach in various
topological settings. The improvements can be directly attributable to a significantly higher
probability of correct SIC based decoding with MUSIC.
LIMITATIONS
With SIC a weak target signal can be deciphered in the presence of stronger interfering
signals.
If the selected sub-topologies are of small size, the delay between the transmission
opportunities on a link increases.
18
multi-hop wireless networks, we study a joint optimization problem of relay node assignment
and flow routing for a group of sessions. It develops a mathematical model and proposes a
solution procedure based on the branch-and-bound framework augmented with cutting planes
(BB-CP). It designs several novel components to speed-up the computational time of BB-CP.
Via numerical results. In this paper, CC in multi-hop wireless networks by investigating a joint
problem of relay node assignment and multi-hop flow routing. The objective of this problem is to
maximize the minimum rate among a group of sessions, where each session may need to traverse
multiple hops from its source to destination. The key problem will address includes (1) the
assignment of relay nodes (either for the purpose of CC or as a multihop relay) to each user
session, and (2) the coupling problem of multi-hop flow routing and relay node assignment.
LIMITATIONS
Most of the results are limited to single-hop wireless networks.
The coupling problem of multi-hop flow routing and relay node assignment.
19
code waveforms. The receiver is equipped with knowledge of the codes of some or all of the
users. It is then required to demodulate the information symbol sequences of these users, upon
reception of the sum of the transmitted signals of all the users in the presence of additive noise.
LIMITATION
The problem of estimating signal energies during a training period has been dealt with in.
It remains to be seen what performance gains can be achieved with the multistage
receiver over the conventional demodulator.
The near-far problem is therefore alleviated. The conventional receiver on the other hand,
degrades due to a strong interfering signal.
20
multiple-access channel in additive white Gaussian noise is also shown to be achievable in the
limit of arbitrarily long codes.
The rapid advances of MIMO to date have mainly stayed at the physical layer. Such fruits
have not fully benefited MIMO research at the network layer mainly due to the computational
complexity associated with the matrix-based model that MIMO involves. Recently, there have
been some efforts to simplify link layer model for MIMO so as to facilitate research at the upper
layers. These models only require simple numeric computations on MIMO’s degrees-of-freedom
(DoFs) to characterize spatial multiplexing (SM) and interference cancellation (IC). Thus, these
models are much simpler than the original matrix-based model from the communications world.
However, achievable DoF regions of these DoF-based models are not analyzed. In this paper, re-
visit this important problem of MIMO modeling. Based on accounting of how DoFs are
consumed for SM and IC, we develop a tractable link layer model for multi-hop MIMO
networks. That under common assumptions of DoF-based models and additional assumption of
no dependency cycle, this model includes all the feasible solutions by the matrix based model
under SM and IC for any network topology. This work offers an important building block for
theoretical research on multi-hop MIMO networks. The major technical barrier in this stagnation
is the lack of a tractable and accurate MIMO model that is amenable for cross-layer optimization.
Existing models for MIMO based on physical layer channel gain matrices, although accurate, are
cumbersome to handle, due to the computational complexity associated with matrix
manipulations. As a result, networking research based on these models has resulted in very
limited success.
LIMITATIONS
Recognizing that the maximum rate region by considering all possible MIMO schemes is
still an open problem, our investigation will be limited in the scope of SM and IC.
21
interference cancellation is a capacity enhancing technique that can be added to a NodeB
receiver without the need to modify user equipment (UE), 3GPP specifications or network
coverage. The uplink of WCDMA was significantly enhanced in 3GPP Release 6 with the
introduction of the enhanced uplink feature also referred to as HSUPA (High Speed Uplink
Packet Access). In particular, the feature introduced the capability to schedule packet data
transmissions on the uplink in a spectrally efficient manner. The key attribute of the enhanced
uplink feature was the Hybrid automatic repeat request (H-ARQ) method that introduces time
diversity in fading channel environments which in turn improves spectral efficiency as well as
facilitates delay critical applications by targeting early packet terminations. The WCDMA uplink
is a multiple access channel. A conventional single user matched filter receiver is strictly
suboptimal in terms of capacity. Receivers with advanced IC algorithms can significantly
improve the system performance. With uplink IC, cellular networks can operate at higher
interference level since the effective interference is reduced after IC.
LIMITATIONS
Such interference among users fundamentally limits the maximal data throughput of an
uplink cellular system, as well as the maximal number of co-existing users.
Cancellation is not ideal and there will be residual interference remaining. Exactly how
much interference could be removed depends on many factors, such as channel
estimation quality, data decision quality.
22
CHAPTER 3
CHOICE OF TITLE
I have selected the paper titled as “Adaptive modulation and coding based frame work to
optimized interference cancellation on multi-hop wireless networks” with my full interest in
“Wireless Networks”.
Interference is widely regarded as the fundamental impediment to throughput
performance in wireless networks. In the wireless networking community, the classical and main
stream approach to handle interference is to employ certain interference avoidance scheme,
which can be done either through deterministic scheduling (e.g., TDMA, FDMA, or CDMA) or
random access based schemes (e.g., CSMA, CSMA/CA). The essence of an interference
avoidance scheme is to avoid any potential overlap among the transmitting signals. Although
natural and easy to implement, an interference avoidance scheme, in general, cannot offer a
performance close to network information theoretical limit. Recently, there is a growing interest
in exploiting interference (rather than avoiding it) to increase network throughput. In essence,
such an interference exploitation approach allows overlap among transmitting signals and relies
on some advanced physical (PHY) layer schemes to remove or cancel interference.
Under SIC, a receiver attempts to decode concurrent signals from multiple transmitters
iteratively, starting from the strongest signal. If the strongest signal can be decoded, it will be
subtracted from the aggregate signal so that the signal to interference and noise ratio (SINR) for
the remaining signals can be improved. Then the SIC receiver continues to decode the second
strongest signal and so forth, until all signals are decoded, or terminates if the remaining signals
are no longer decodable. The beauty of SIC resides in its simplicity. It is a purely received-based
interference management scheme and does not require sophisticated coordination with
transmitters of other nodes. Although SIC has been extensively studied as a PHY layer
technology, its performance and behavior in the context of multi-hop wireless networks remain
unknown.
In this project, Try to answer the following questions: (i) What are the fundamental
limitations of SIC in a multi-hop wireless network (ii) How to maximize the potential of SIC in a
multi-hop wireless network. The limitations of SIC come from its stringent constraints when
decoding multiple signals. Specifically, in order to decode aggregate signals successively, an SIC
receiver must meet a series of SINR constraints for its received signal powers. Further, due to
23
these constraints, there exists a decoding limit for SIC in its abilities for concurrent receptions or
interference rejection.
Due to this limit, SIC alone is inadequate to handle all concurrent interference in a multi-
hop wireless network. Judicious design of link layer scheduling remains critical to enable SIC to
work smoothly in a multi-hop wireless network. Due to the tight coupling of SIC with link layer
scheduling and network layer routing, it is important to consider these layers holistically so as to
optimize upper layer throughput performance. Such a cross-layer design approach is also
necessary to maximize the full potential of SIC in a multi-hop wireless network.
Interference Cancellation techniques are any technique or combination of techniques that
allow an existing receiver to operate with higher levels of co-channel interference. The
motivation of improving a receiver’s performance in co-channel interference is to increase the
spectrum efficiency of a system usually by allowing a greater geographical re-use of frequencies
(although in the case of CDMA systems improved spectrum efficiency usually comes by
allowing greater use of the orthogonal code space).
It is a general principle that a communication system should be designed to avoid
interference in the first place, either through network planning or with effective radio resource
management and medium access control. However, increasing use of license exempt spectrum
means that interference is unavoidable and so the radio system must not only avoid interference
but also mitigate against its presence.
A key point is that the strategies employed to mitigate interference are very dependent on
the source of the interference and its relationship to the wanted signal. The use of interference
cancellation techniques can also make systems more reliable, either by design or by
incorporating additional signal processing into existing systems, where a retro fitment is
practical. Interference cancellation techniques have long been applied to radio systems in
conjunction with adaptive arrays, primarily in military applications, but also in some civil
applications. Adaptive arrays exploit the spatial separation of the wanted and interfering signals
to spatially filter or cancel the interfering signals. In some applications the use of an antenna
array is prohibitive, for example in a mobile radio handset, and modifications to detection
techniques have been devised that permit interference cancellation using a single antenna.
Recently so called Single Antenna Interference Cancellation (SAIC) techniques have
been introduced into the GSM standard where modified handsets can operate at lower signal to
24
interference ratios than unmodified handsets, permitting greater frequency re-use and hence
greater capacity for a fixed amount of spectrum.
Carrier sense, the deferral of transmission while a device senses another in progress, is
the dominant mechanism used in wireless LANs (802.11) to share the spectrum between bursty
traffic sources. Its use derives from the signal-to-interference-plus-noise ratio (SINR) model of
communications theory, which states that wireless data can be successfully received when the
signal power (S) sufficiently exceeds the combined power of all interfering transmissions (I) and
noise (N). By eliminating interfering transmissions, data will be received over as large a range as
possible, with higher SINR permitting the reception of higher rate transmissions. Thus sources
can send on demand and as rapidly as feasible. But carrier sense is inherently wasteful because it
discourages spatial reuse. Receivers typically have a large dynamic range, upwards of 60dB in
most production systems, and so a single transmission can be detected over a large area. This
causes a widespread communication blackout whenever anyone is sending, the equivalent of
allowing only a single person to speak at a time in a crowded room.
25
CHAPTER 4
EXECUTION OF PHASE II
4.1 SIGNAL TO-INTERFERENCE-PLUS-NOISE RATIO (SINR) MODEL
At the physical layer, under the classical SINR model, a receiving node treats all the
other concurrent (unintended) interfering transmissions as noise when deciding whether or not
the underlying intended transmission is successful. This is not a trivial problem as the set of
interfering transmissions is usually coupled with upper layer scheduling and routing algorithms.
In the context of SIC, not only one needs to deal with such coupling with upper layer algorithms,
one also has to deal with multiple transmissions, in the sense that one has to decode those
stronger signals before decoding its own signal (in a sequential order). This sequential decoding
imposes significant difficulty in developing a tractable model for mathematical programming.
In general terms, throughput is the maximum rate of production or the maximum rate
at which something can be processed. When used in the context of communication networks,
such as Ethernet or packet radio, throughput or network throughput is the rate of successful
message delivery over a communication channel. The data these messages belong to may be
delivered over a physical or logical link, or it can pass through a certain network node.
Throughput is usually measured in bits per second (bit/s or bps), and sometimes in data packets
per second (p/s or pps) or data packets per time slot.
26
4.3 DISTRIBUTED RESOURCE ALLOCATION
27
CHAPTER 5
RESULT
5.1 SCREEN SHOTS
28
29
30
31
32
33
34
35
36
37
38
5.2 CODING
#------------------------Environmental Settings-----------------
$ns_ trace-all $f
$ns_ use-newtrace
create-god $val(nn)
39
$ns_ node-config -adhocRouting AODV \
-llType LL \
-macType Mac/802_11 \
-ifqType Queue/DropTail/PriQueue \
-ifqLen 500 \
-antType Antenna/OmniAntenna \
-propType Propagation/TwoRayGround \
-phyType Phy/WirelessPhy \
-channelType Channel/WirelessChannel \
-topoInstance $topo \
-agentTrace ON \
-routerTrace ON \
-macTrace ON \
-movementTrace ON \
-idlePower 1.2 \
-rxPower 1.0 \
-txPower 1.5 \
-sleepPower 0.000015
40
$node_($i) set X_ 565.0
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~Node
Deploy~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
41
$ns_ at 0.05 "$node_(12) setdest 1170.030 915.895 923.259384636290"
42
$ns_ at 0.05 "$node_(33) setdest 450.951 355.829 935.010925490007"
43
proc mobility { tm } {
44
rand()*10]"
45
rand()*10]"
46
$ns_ at $tm "$node_(43) setdest [expr (rand()*50)+020.267 ] [expr (rand()*50)+075.847 ] [expr
rand()*10]"
$ns_ at $tm "$node_(49) setdest [expr rand()*950] [expr rand()*950] [expr rand()*50]"
$ns_ at $tm "$node_(50) setdest [expr rand()*950] [expr rand()*950] [expr rand()*50]"
47
for {set i 0} {$i<$val(nn)} {incr i} {
return $cbr
proc nnode { } {
48
global node_ ns_
puts $r "----------------------------------------------------------"
puts $r "----------------------------------------------------------"
puts $r "$i\t\t
$j\t\t$x2\t$y2\t$dis" } }
close $r
CHAPTER 6
REFERENCES
49
1. J.G. Andrews, “Interference cancellation for cellular systems: A contemporary
overview,” IEEE Wireless Commun. Magazine, vol. 12, no. 2,pp. 19–29, April 2005.
5. C. Gao, Y. Shi, Y.T. Hou, H.D. Sherali, and H. Zhou, “Multicast communications in
multihop cognitive radio networks,” IEEE Journal on Selected Areas in Commun., vol.
29, no. 4, pp. 784–793, April 2011.
6. M.R. Garey and D.S. Johnson, Computers and Intractability: A Guide to the Theory of
NP-Completeness, W.H. Freeman and Company, New York, 1979.
8. T.R. Giallorenzi and S.G. Wilson, “Suboptimum multiuser receivers for convolutionally
coded asynchronous DS-CDMA systems,” IEEE Trans. on Commun., vol. 44, no. 9, pp.
1183–1196, Sept. 1996.
50
9. D. Halperin, T. Anderson, and D. Wetherall, “Taking the sting out of carrier sense:
Interference cancellation for wireless LANs,” in Proc.ACM MobiCom, pp. 339–350, San
Francisco, CA, Sept. 14–19, 2008.
10. Y.T. Hou, Y. Shi, and H.D. Sherali, “Spectrum sharing for multi-hop networking with
cognitive radios,” IEEE Journal on Selected Areas in Commun., vol. 26, no. 1, pp. 146–
155, Jan. 2008.
11. Y.T. Hou, Y. Shi, and H.D. Sherali, “Optimal base station selection for any cast routing
in wireless sensor networks,” IEEE Trans. on Vehicular Technology, vol. 55, issue 3, pp.
813–821, May 2006.
12. P. Jung and M. Nasshan, “Results on Turbo-codes for speech transmission in a joint
detection CDMA mobile radio system with coherent receiver antenna diversity,” IEEE
Trans. On Vehicular Technology, vol. 46, no. 4, pp. 862–870, April 1997.
13. S. Katti, S. Gollakota, and D. Katabi, “Embracing wireless interference: Analog network
coding,” in Proc. ACM SIGCOMM, pp. 397–408, Kyoto, Japan, Aug. 27–31, 2007.
15. S. Lv, X. Wang, and X. Zhou, “Scheduling under SINR model in adhoc networks with
successive interference cancellation,” in Proc. IEEE GLOBECOM, 5 pages, Miami, FL,
Dec. 6–10, 2010.
16. S. Lv, W. Zhuang, X. Wang, and X. Zhou, “Scheduling in wireless ad hoc networks with
successive interference cancellation,” in Proc. IEEE INFOCOM, pp. 1282–1290,
Shanghai, hina, April 10–15, 2011.
51
17. S. Lv, W. Zhuang, X. Wang, and X. Zhou, “Link scheduling in wireless networks with
successive interference cancellation,” Elsevier Computer Networks, vol. 55, no. 13, pp.
2929–2941, Sept. 2011.
18. S. Gollakota and D. Katabi, “Zigzag decoding: Combating hidden terminals in wireless
networks,” in Proc. ACM SIGCOMM, pp. 159–170, Seattle, WA, Aug. 17–22, 2008.
19. X. Qin, X. Yuan, Y. Shi, Y.T. Hou, W. Lou, and S.F. Midkiff, “On Throughput
Maximization for a Multihop MIMO Network,” in Proc.IEEE International Conference
on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2013), pp. 37–45, Hangzhou,
China, Oct. 14–16, 2013.
20. L. Qu, J. He, and C. Assi, “Understanding the benefits of successive interference
cancellation in multi-rate multi-hop wireless networks,” IEEE Transactions on
Communications, vol. 62, no. 7, pp. 2465–2477, July 2014.
52