Radio Communications
Radio Communications
Radio Communications
Radio Communications
Radio Communications
Edited by
Alessandro Bazzi
In-Tech
intechweb.org
Published by In-Teh
In-Teh
Olajnica 19/2, 32000 Vukovar, Croatia
Abstracting and non-profit use of the material is permitted with credit to the source. Statements and
opinions expressed in the chapters are these of the individual contributors and not necessarily those of
the editors or publisher. No responsibility is accepted for the accuracy of information contained in the
published articles. Publisher assumes no responsibility liability for any damage or injury to persons or
property arising out of the use of any materials, instructions, methods or ideas contained inside. After
this work has been published by the In-Teh, authors have the right to republish it, in whole or part, in any
publication of which they are an author or editor, and the make other personal use of the work.
© 2010 In-teh
www.intechweb.org
Additional copies can be obtained from:
[email protected]
Radio Communications,
Edited by Alessandro Bazzi
p. cm.
ISBN 978-953-307-091-9
V
In the last decades the restless evolution of information and communication technologies
(ICT) brought to a deep transformation of our habits. The growth of the Internet and the
advances in hardware and software implementations modified our way to communicate and
to share information.
Although conceived for study and working scopes, the presence of ICT infrastructures
and services are now pervasive in our life. Their availability is felt as a need that cannot
be constrained to a place: people want to have them anytime, anywhere. And the need for
wireless connections starts from daily communication and embraces all fields of human life,
in an ever increasing way: transportation systems, home management, healthcare, emergency
operations. This brought to the large interest and great evolution that characterized radio
technologies in the last years all over the world. Since the development of the first wireless
systems, great technological advances were performed: spread spectrum and multi-carrier
techniques allowed to make transmissions over larger bandwidths with higher data rates for
the final users in challenging scenarios where line of sight is not guaranteed and multipath
severely affects signal propagation; new coding techniques were developed to increase the
efficiency of radio transmissions; advanced link adaptation and power control algorithms
were implemented in order to allow optimized trade-off between reliability and data rate;
and many other topics shall be cited.
Cellular systems, initially deployed to allow telephony in mobility for urgency needs have
now reached a penetration of almost 100% of inhabitants in developed countries, with the
ability to exchange data at more than 10 Mbit/s; at the same time, wireless access to local
networks can now be performed at almost 100 Mbit/s. But the need for higher data rates does
not stop and it jointly proceeds with the development of new services, thus requiring the
investigation and implementation of new technologies and new radio resources management
solutions. In the near future, all available technologies will be jointly used by smart devices,
following the always best connected paradigm: users will connect to an heterogeneous
wireless network, without the need to know which technology they are effectively using.
The adoption of multiple antennas and beamforming techniques will reduce the effects of
interference and increase the achievable data rates. Relaying and cooperation among devices
will allow better performance with lower costs and energy consumption.
In this book, an overview of the major issues faced today by researchers in the field of radio
communications is given through 35 high quality chapters written by specialists working in
universities and research centers all over the world. Various aspects will be deeply discussed:
channel modeling, beamforming, multiple antennas, cooperative networks, opportunistic
VI
Alessandro Bazzi*
*Alessandro Bazzi works at WiLab (www.wilab.org), an organization with affiliates belonging to the
Italian National Council for Researches CNR (ICT Department, IEIIT Institute) and Italian Universities
of Bologna and Ferrara. WiLab has expertise in the field of telecommunications systems with particular
emphasis on wireless systems; research activity is mainly performed within the context of important na-
tional and international projects, in relation with some of the most important manufacturers and service
providers, and in strict cooperation with colleagues coming from the main universities in Europe and
United States.
VII
Preface V
10. Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 185
Rizwan Ghaffar and Raymond Knopp
12. Cooperative ARQ: A Medium Access Control (MAC) Layer Perspective 227
Jesús Alonso-Zárate, Elli Kartsakli, Luis Alonso and Christos Verikoukis
VIII
14. Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 265
Cédric Gueguen and Sébastien Baey
24. Increasing the Time Connected to Already Deployed 802.11 Wireless Networks
while Traveling by Subway 457
Jaeouk Ok, Pedro Morales, Masateru Minami and Hiroyuki Morikawa
26. Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 493
Philippe Leroux and Sébastien Roy
IX
35. A testing process for Interoperability and Conformance of secure Web Services 689
Spyridon Papastergiou and Despina Polemi
Radio-communications architectures 1
Radio-communications architectures
Antoine Diet*, Martine Villegas**, Geneviève Baudoin** and Fabien Robert**
1. Introduction
Wireless communications, i.e. radio-communications, are widely used for our different
daily needs. Examples are numerous and standard names like BLUETOOTH, WiFI,
WiMAX, UMTS, GSM and, more recently, LTE are well-known [Baudoin et al. 2007].
General applications in the RFID or UWB contexts are the subject of many papers. This
chapter presents radio-frequency (RF) communication systems architecture for mobile,
wireless local area networks (WLAN) and connectivity terminals. An important aspect of
today’s applications is the data rate increase, especially in connectivity standards like WiFI
and WiMAX, because the user demands high Quality of Service (QoS). To increase the data
rate we tend to use wideband or multi-standard architecture. The concept of software radio
includes a self-reconfigurable radio link and is described here on its RF aspects. The term
multi-radio is preferred. This chapter focuses on the transmitter, yet some considerations
about the receiver are given. An important aspect of the architecture is that a transceiver is
built with respect to the radio-communications signals. We classify them in section 2 by
differentiating Continuous Wave (CW) and Impulse Radio (IR) systems. Section 3 is the
technical background one has to consider for actual applications. Section 4 summarizes
state-of-the-art high data rate architectures and the latest research in multi-radio systems.
In section 5, IR architectures for Ultra Wide Band (UWB) systems complete this overview;
we will also underline the coexistence and compatibility challenges between CW and IR
systems.
Ultra Wide Band (IR-UWB), other fields of interest such as Radio Frequency Identification
(RFID) and localization systems are examples of where radio-communications transceivers
are currently being designed. Each kind of application can be classified by the resulting
radio signals emitted/received. Determining factors are (i) the use of power efficient or
spectrum efficient modulation schemes, (ii) the frequency and type of carrier signal used:
Continuous Wave (CW) or Impulse Radio (IR) based signals and (iii) the data rate needed
(defining a major subdivision of CW based systems). Depending on the choice of the factors
involved, the design faced by the RF architect can be varied and challenging. We
differentiate three types of cases in this chapter, as illustrated in Fig. 1.
Time signal
Typical Modulation Scheme Frequency spectrum PROS.
(with shaping filter for CW)
Power efficient
NB-CW
Spectrum efficient
and shape filtering
(ex. OFDM)
WB-CW
Spread spectrum
repetition frequency
Power saving
IR-UWB
IR
-20
dBm/MHz
-40
-60
dBm, dBm
-80
-100
-120
-140
-160
-174
0 500 1000 1500 2000 2500 3000 3500 4000 5000 6000
The three types described can represent every kind of radio-communications signal. The
characteristics which have an impact on the architecture are mainly the centre frequency
(choice of the technology) and bandwidth (circuits’ topologies and performance limitations),
and also the PAPR for CW signals. Fig. 2 qualitatively summarizes the power limitations and
frequency specifications for some telecommunications standards up to 6 GHz: cellular,
WiMAX, WiFI, Bluetooth, UWB and DVB-H. The goal of RF architecture is to emit and receive
such signals with no alteration of the information (no constellation distortion for CW).
Designing the architecture implies other considerations such as noise, linearity, efficiency and
4 Radio Communications
systems co-existence and immunity. The receiver part of a transceiver has to correctly identify
information without adding too much noise, even when high power unwanted signals are
close (in the frequency domain). The transmitter part has to linearly amplify the signal in
order to emit as far as possible, respecting the standard power limitations (spectrum mask) for
co-existence. Architectures for NB-CW, WB-CW and IR-UWB use some basic elements
(blocks) that will be described in the next sub-section. Multi-radio is interpreted as a possible
reconfigurable architecture for most of the signals presented (mainly NB-CW and WB-CW).
This helps drive improvements on classic structures.
Ai Ei
R
R0
Bi
frequency
1 N N
DSP f .df
2 2
A i C1B i C 0 A i Si
N P
EVM rms i 1
i 1
ACPR 0
P0
1 N N
Ai
2
Ai
2
Padj DSP f .df
N i 1 i 1 Padj
- DACs and ADCs will not be presented in details because their performance in terms of
bandwidth (up to 100 MHz) and resolution (up to 16 bits) is almost sufficient for today’s
radio-communications signals. The main limitations are the current consumption of fast
converters and the difficulty in designing near-GHz Sigma Delta (ΣΔ) encoders, often in the
context of polar transmitters as is presented in section 4. It should be noticed that for WB-
CW signals, the bandwidth limitation is the criterion of choice and a source of important
spectrum degradation (approximated qualitatively by a windowing effect).
Radio-communications architectures 5
I Ak .cos ( k )
G.cos ωt
Quadrature 0
PLL
+ Smod
G.A k
1 a.cos θ.cos ωt k Transposed information
mismatch 90°
- 2
G.sin ωt θ
G.A k
1 a.cos θ.cos ωt k
2 Images of I and Q
Q a.Ak .sin ( k ) Vdc
G.A k .a.sin θ sin k sin ωt
Gain imbalance
« Offset » Vdc .G.sin ωt θ Local oscillator signal
2
LOR 10.log10 2. VDC
Ak.1 a.cosθ
a = 1.2, θ = 5°, Vdc = 0 a = 1, θ = 0°, LOR = -24 dB
T T
- sin θ
T
I out I 1 0
Q Vdc
Q out - a.sin θ
a.cos θ cos θ
Fig. 4. IQ modulator equations and the effects of its imperfections
- The IQ modulator is the block providing the transposition of the information at high
frequency (up-converter) or at baseband/intermediate frequency (down-converter). We
describe the case of the up-converter for simplicity. It needs the baseband information
components I and Q (I and Q channels) and a carrier frequency signal, provided by a
frequency synthesizer. Key components are the non-linear multipliers provided thanks to
passive (PIN diodes…) or active circuits (Gilbert cell…). Every component should be
carefully designed with regards to the synthesizer frequency value. Moreover, the noise
added by the multipliers will be impossible to filter. The main difficulty for the modulator is
the perfect matching between I and Q paths. As is reported in Fig. 4 (at one fixed
frequency), gain and phase imbalances (aand ) create unwanted images of the information.
Also the presence of an offset V DC can create the emission of the synthesized carrier
frequency (called Local Oscillator, LO). All of these imperfections result in the distortion of
the information and are quantified by the IRR and LOR power ratio (the actual performance
is in the range of -50 dB). These imperfections are not seen on the spectrum because their
equivalent added noise is inside the main lobe. The biggest challenge concerns the
modulation of wideband signals because it is hard for the modulator to perform and to be
frequency independent (over the entire bandwidth). An example of this can be seen in the
conversion gain (ratio between the RF output power and the baseband input power). A
variation of this gain produces an unwanted AM on the emitted signal and can distort the
information. Another problem is the image frequency. This effect is due to the
multiplication of signals in a modulator. A multiplication of harmonic signals results in two
signals whose frequencies are, respectively, the sum and the difference of the input
frequencies. This duality is mathematically illustrated and discussed for the case of the
receiver in Fig. 16, section 3. At the outgoing emission, an image is created at RF and
6 Radio Communications
increases the EVM. At the reception (only for heterodyne architectures), an image frequency
different from RF can be sensed and interpreted as unwanted information which increases
the EVM, too. This is illustrated in section 3.3 with the presentation of the Hartley and
Weaver image rejection receiver architectures for NB-CW. To conclude, the effects of the IQ
modulator imperfections are: non-linearities, noise and the possibility of image frequencies.
Selective filtering and stable reference signals are needed to improve the system (easier for
NB-CW than for WB-CW).
- Frequency synthesizers are blocks which produce a stable reference signal for
transposition. RF architectures need flexibility and stability in the choice of their reference
frequency. It is usually not possible to provide this simultaneously with a simple oscillator
circuit such as Quartz (stable), SAWR… The stabilization and synthesis by a Phase Lock
Loop (PLL) is usually necessary. The PLL is a looped system whose different designs will
not be discussed here, only its system’s characteristics, which are reported in Fig. 5. The
worst imperfection of the PLL is its phase noise. An example of the resulting phase noise
profile of a synthesizer is illustrated in Fig. 5 (N=1). The different transfer functions of each
noise of the sub-blocks are reported in the same figure. The great challenge of the PLL is to
keep the stability performance of the synthesized signals for different values of N. It is also
possible to modulate the signal in frequency by directly adding the baseband information
on the Voltage Controlled Oscillator (VCO) input. This is called an “over the loop”
modulation. For CW systems, synthesizers are used to produce the different Local
Oscillators (LOs) needed for transposition(s) and for channel selection (fine tuning of the LO
value). PLL can be used to transpose the information, but only for angular modulations
schemes: PM, PSK, FSK or FM. This is not usually used for constant envelope WB-CW
signals for noise and stability reasons.
At GHz frequencies, LC filtering is preferred for its low noise property but the components’
sensitivity (especially for integrated technology) implies low order filters. For higher
selectivity, active or high speed digital filters can be used, but often need a frequency
transposition section due to the circuit bandwidth and the sampling rate limitations.
Moreover, these filters consume power and add much noise (circuit or quantification).
Whatever the technology used, the wider the bandwidth the higher the ripple (oscillation of
the transfer function). This ripple problem introduces an unwanted amplitude variation. In
order to reduce this, the order is increased as much as possible and some prototype
functions like Butterworth or Cauer are chosen for the design. Attenuation in the rejection
band is worst in these cases. Additionally, the group delay of the filter is mandatory for
non-distortion of the information. For NB-CW, it is usually not a problem but the phase
response has to be linear for WB-CW and IR-UWB systems. In the case of a multi-band
system, being linear in each sub-band is sufficient. These remarks point out that filters for
WB-CW are more difficult to design than filters for NB-CW due to the performance
limitations over the bandwidth.
To conclude, the RF filters imperfections are modeled by their noise factors (noise added,
distortions and non constant group delays), insertion losses (due to the ripples and
mismatches) and selectivity (finite attenuation of unwanted frequencies).
- Power Amplifiers (PA) in RF architectures are designed to linearly amplify radio-
communication signals with the highest efficiency possible and with the lowest spectrum
re-growths or added noise (see spectrum mask/ACPR and EVM criteria to respect). Since
the active components of the amplifier are operating at maximum power, non-linear (NL)
compression/conversion and memory effects are unavoidable (Fig. 6). The PA design,
identified as “class of operation”, impacts the performances [Villegas et al., 2007][Diet et al.,
2004-2007]. Efficiency and linearity of the PA are mandatory for NB-CW and WB-CW
architecture because the signal is transmitting information continuously. Low efficiency
reduces battery lifetime and increases the dissipated power and the temperature of the
circuit. Low linearity affects the quality of the signal. For IR-UWB systems, only peak
performances in time are needed (see section 5). We are focusing upon the PA impact on the
architecture in the case of the CW system. The most difficult case is for WB-CW due to the
bandwidth, and the usual high PAPR of chosen modulation schemes (high data rate). A PA
class of operation is determined by the hypothesis of transistor saturation (current source or
switch). There are two families of PA classes: the switched mode (SW) and the continuous
wave (CW) or biased mode. The different load-lines are illustrated in Fig. 6 (right).
(compression)
Drain current
HPA Input AM
A
Cl
AB
ass
AM/PM
B--
C
Cl
AM/PM
as
Input AM (conversion)
s
(envelope)
SW Class
Input AM
Drain Voltage V
max
Fig. 6. AM/AM, AM/PM effects (without memory effects) and PA class load-lines
8 Radio Communications
Due to the need of polarization, CW classes (namely A, B, AB and C) present lower efficiency
than SW classes (D, S, E and F). SW classes need a switching of the transistor and cannot
reproduce an amplitude modulation for that reason. Their linearity is also worse than in CW
classes because of this switching operation. Moreover, it is possible to restore the amplitude
information by adjusting the voltage supply. This is theoretically linear in the case of SW
classes and there is a tracking effect for CW classes. For AM signals the average efficiency will
rely on the statistical properties of the signal itself. Additionally, it is important to consider
that efficiency is given as a peak value for CW classes. An improvement in efficiency is gained
if saturation/clipping on the peak values is introduced in order to increase the average power
of the output signal for the same power dissipated by the amplifier. WB-CW signals for high
data rate applications present such a high PAPR that the amplification by a CW class PA
requires a power back off (very low efficiency) or a linearization technique to reduce the NL
effects of compression (AM/AM) and conversion (AM/PM), see Fig. 6. Techniques which are
interesting for the designer in the case of wideband and high PAPR signal are those providing
the highest efficiency of the entire architecture including the PA (see section 3). Polynomial
modeling of the AM/AM can be done by the PA response to 1 or 2 frequency signals, called 1
or 2 tons. These indicators are the 1 dB compression point (P1dB) and the 3rd order
Interception Point (IP3), as defined in Fig. 7.
Pout (dBm)
1 dB
Fundamental Fundamental
response response
IM3
1 response
1
Pin1dB
HPA
+ EVM
Fig. 7. Compression effect modeling for 1 ton (P1dB) and 2 tons (IP3)
These are considered to illustrate the main PA imperfections. AM/AM and AM/PM
measurements, when it is possible to take them, can be the best way of characterizing the
effects of the PA on the architecture: EVM and noise factor increase and spectral re-growths
(ACPR, spectrum mask). In CW systems, the PA has to amplify modulated signals (a sum of
several tons). For NB-CW signals, the PA behavior is well-characterized by the P1dB and
the input power is usually set at this value for the linearity/efficiency trade-off (if the PAPR
is not too high). In the case of WB-CW, the IP3 is a good representation of NL effects on the
Radio-communications architectures 9
spectrum if the frequency separation of the two tons is coherent with the modulated
bandwidth (symbol rate frequency). Moreover, the conversion effects are, by far, more
complex to analyze. It is almost impossible to determine an equivalent of the P1dB or the
IP3 for AM/PM. This relies upon the influence of transistor technology. For wideband and
high PAPR signals, the conversion effect increases the EVM significantly and often destroys
the information.
SW classes are based on the hypothesis that the transistor switches perfectly (no power
dissipated). The filtering is mandatory in RF applications, except if the SW PA is dedicated
to the amplification of a square signal (class D). The load-line of every SW PA class tends to
be that of an ideal switch, which is impossible in practice due to the physical realities of the
transistor (resistive and capacitive output effects). Although the switching cannot be perfect,
SW classes present higher efficiency than CW classes, see the 100% efficiency class E PA
[Sokal & Sokal, 1975][Raab et al., 2003][Diet et al., 2008]. Moreover, they are used for AM
signals only with a recombination process: supply modulation or amplification of an
envelope coded signal (PWM, ΣΔ) [Robert et al., 2009][Suarez et al., 2008]. Using supply
modulation creates NL effects of compression and conversion on the output signal. These
effects are named Vdd/AM and Vdd/PM [Diet et al., 2004]. For new RF architectures, high
efficiency (SW) classes are preferred due to their high efficiency, but the challenge then
shifts to the linearity of the amplified signals. Whatever the CW system is, NL effects of the
PA are unavoidable and are sources of important imperfections (i.e., loss of linearity). In the
case of high PAPR signals, a correction or a modification of the architecture is needed, as is
presented in the following section.
(f2,θ,φ)
PA LNA
- noise (f)
- Gain (f) (f3,θ,φ) - channel,…
- Gain (f) et NF (f)
- Zout(f)
- Zin(f)
- AM-AM (f,Pin)
(f1,θ,φ) - AM-PM (f)
- AM-PM (f,Pin)
Amplitude Amplitude
response response
wideband
Multi-(narrow)band
frequency frequency antenna
antenna
Phase Phase
response response
frequency frequency
- Antenna characteristics from a “system” point of view are reciprocal interfaces between
electrical and radiated signals. Depending on the application, antennas have to be adapted
to their environment (omni-directivity of their radiation pattern, polarization…). Fig. 8
summarizes the different system parameters of an antenna that can influence the
10 Radio Communications
3. Architecture basics
RF architectures are adapted to radio-communications signals and provide emission and
reception. Linearity improvements are needed when power amplification NLs can destroy
the information. This section first focuses on the transmitter section where different major
modifications are described. We especially focus on CW systems because of their important
challenges about efficiency and linearity.
there are more components than in homodyne ones (with at least one filter and one
additional mixer) and imperfection sources are added. For example, the phase noise is a
function of the number of synthesizers. An additional mixer also means the possibility of an
image frequency that can distort the emitted information if the intermediate frequency (IF)
filter is not selective enough. This IF filter is traditionally an external SAW one (because of
its selectivity). This increases the cost and complexity of building this system. An advantage
of the heterodyne architecture is that the need of frequency flexibility for channel selection
can be more easily achieved with two synthesizers than with one (homodyne case).
LO-Antenna coupling
CNA
RF RF Pros: Simple
RF +
Homodyne PLL
0 HPA Cons: Coupling
90°
-
CNA LO-HPA
coupling
LO2
CNA
FI RF
Pros: No Coupling
LO1 + Cons: Phase Noise
Heterodyne 0 HPA
PLL
90° - Nbr components
CNA
PLL
CNA
F(p) VCO RF
LO1 RF
Modulated +
PLL
0 + HPA
90°
PLL -
CNA
1/N Pros: Phase Noise/Stability
Cons: No AM info.
Bandwidth limited
- Architectures using modulated PLL can benefit from PLL advantages. This corresponds to
the direct modulation of a synthesizer (with N=1). The signal of a PLL is stable and its noise
profile depends on the loop filter bandwidth. It is possible to modulate the PLL by
introducing small variations of the reference frequency which will be stabilised by the loop
reaction. This is called a modulation “in the loop” and is used for narrow-bandwidth
modulations (low symbol rate). On the contrary, the input voltage of the VCO can be
directly modulated to produce a wider bandwidth modulation (modulation “over the
loop”) but this could affect the stability of the PLL. As is understood here, only angular
modulations are possible with modulated PLL architectures. If the signal to transmit has
AM information, this latter should be reintroduced after the PLL. To conclude, architectures
using modulated PLL are very interesting with regards to their noise property (less noise
12 Radio Communications
than an IQ modulator) and their design for non-constant envelope signals implies some
important modifications of the architecture.
The classic architectures presented are widely used for NB-CW signals. While the efficiency
and linearity of the transmitter is not significantly affected, these well-known structures are
preferred for their simplicity. In the case of WB-CW systems, the bandwidth and the
probable increase of the PAPR (due to high data rate) lower the performance of such
architectures. For power amplification in particular, high PAPR values of OFDM and other
multi-carrier signals cause such compression and distortion/conversion effects that the
information cannot be interpreted at reception. Additionally, standard limitations are, by
far, not respected. The first choice is to perform a PA back-off, but this drives it to
unacceptably low values for the architecture efficiency. To achieve a linear transmitter,
linearization techniques are provided. The next sub-section is dedicated to their
descriptions.
(integration criterion). The advantages are stability and the possibility to process wideband
signals. The most interesting of the three techniques is (C) pre-distortion because of its
flexibility: the anticipation can be done in the digital part and, by doing so, can provide
adaptability of the technique if using a feed-back loop (with an additional DAC). The digital
pre-distortion represents an additional and non-negligible consumption of a Digital Signal
Processor (DSP) and often requires a look-up table [Jardin & Baudoin, 2007]. The signal is
widened in frequency because of the non-linear law of the pre-distorter (as for NL effects of
compression on the spectrum), requiring baseband and RF parts to be wideband designed.
Interesting improvements of pre-distortion have been made with OFDM WB-CW signals in
[Baudoin et al., 2007] [Jardin & Baudoin, 2007].
A) B)
Vin + Vout
A Vin + Vout
- A0
-
Vout A
K1
Vin 1AK
-
+
C) A2
NL
K2
P=K/A
Vout
A 0 K 2 A 2 K 1
Vout P.A K Vin
Vin
Other techniques presented are based on a vectorial decomposition of the signal. The goal is
to drive high efficiency switched mode RF PAs with constant envelope (constant power)
signals, avoiding AM/AM and AM/PM [Raab et al., 2003] [Diet et al., 2003-2004 ]. These
techniques are used when NL effects are so great that feed-back or pre-distortion cannot
sufficiently improve the linearity. We can consider the problem of linearization in the
communication chain from the digital part to the antenna (front end). This drives one to
completely modify the architecture and its elements’ specifications in baseband, IF/RF and
power RF. After the amplification of constant envelope parts of the signals, the challenge is
to reintroduce the variable envelope information with lower NLs than in a direct
amplification case, keeping high efficiency of the architecture. Basic examples of these
techniques are the LINC (LInearization with Non-linear Components) and the EER
(Envelope Elimination and Restoration) methods (and their recent evolutions) [Cox, 1974]
[Kahn, 1952] [Baudoin et al., 2003-2007] [Diet et al., 2004] [Suarez et al., 2008].
14 Radio Communications
r0 .cosΦt θt
+
r0 HPA
R(t) -
r0 .sin Φ t θt
+θ(t)
Φ(t)
-θ(t) PLL
0
90°
r0 .cosΦt θt
+
I j.Q R t .e jΦ t HPA
-
r0 . e jΦ t θ t e jΦ t θ t r0 .sin Φt θt
The LINC principle relies on a decomposition of the modulated signal into two constant
envelope signals as is shown in Fig. 11. The decomposition can be computed by a Digital
Signal Processor (DSP) or by combining two VCOs in quadrature PLL configuration:
CALLUM. This latter configuration is an interesting architecture but presents the possibility
of instability and additional manufacturing costs. The amplification of the two constant
envelope signals implies the design of two identical HPAs at RF frequency, and this often
causes signal distortion due to imbalance mismatches. Also the HPA must be wideband
because the signal decomposition is a non-linear process (widening of the spectrum), and
the phase modulation index is increased. Whatever the decomposition technique is
(LINC/CALLUM), the problem is that the efficiency is directly determined by the
recombination step: a sum of the powers. It is very difficult to avoid losses at RF while
designing a RF power combiner.
Envelope
detector
e j Φ(t)
R=1
supply Φ(t)
Limiter R(t)
Phase signal
High efficiency PA
Another decomposition technique was proposed by Kahn in 1952 and this is basically an
amplitude and phase separation technique (polar): Envelope Elimination and Restoration
(EER). This method was first proposed for AM signals as represented in Fig. 12. The
advantage of EER is that it drives the RF PA with a constant envelope modulated signal
(carrying the phase information), enabling the use of a SW high efficiency amplifier [Raab et
al. 2003] [Sokal & Sokal, 1975] [Diet et al., 2005-2008]. The difficulty is to reintroduce the
amplitude information linearly using the variations of the PA voltage supply. This implies a
Radio-communications architectures 15
power amplification of the envelope signal at a frequency equal to the symbol rate (lower
than RF). The recombination can be done with a SW class PA because the output voltage is
linearly dependant on the voltage supply for this PA mode. Two difficulties are to be
considered in such a linearization technique: (i) synchronization between the phase and the
amplitude information and (ii) linear and efficient amplification of the amplitude before the
recombination (directly impacting the overall efficiency), as reported in [Diet, 2003-2005].
Recently, a lot of work has been done on the EER based architectures, often named as
“polar” ones [Nielsen & Larsen, 2007] [Choi et al., 2007] [Suarez et al., 2008] [Diet et al.,
2008-2009]. The generation of the amplitude and phase components can be expected to be
done digitally thanks to the power of DSPs, as is shown in Fig. 13. As was previously
discussed in [Diet et al., 2003], the bandwidths of the envelope and phase signals are
widened due to NL processing and make it necessary to design the circuit for three to four
times the symbol rate (as for LINC or any other NL decomposition). Fortunately, a clipping
in frequency and on the envelope is possible, increasing the EVM and ACPR under
acceptable levels. These polar architectures are suited for new high data rate standards
where efficiency of the emitter and linearization are mandatory. Also, the multi-standard
and multi-radio concepts have helped polar architectures to evolve in multiple ways. For
example, recombination on the PA’s input signal is possible because the amplitude
information can modulate the phase signal (RF) and can be restored by the band-pass shape
function of the following blocks: PA + emission filter + antenna. The emitted spectrum is the
criterion of quality to be considered carefully, because the PWM or ΣΔ envelope coding are
the source of useless and crippling spectral re-growths. The efficiency is also penalized by
the power amplification of such frequency components, but this is counter-balanced by the
advantages of high flexibility of this architecture [Robert et al. 2009]. The digitally controlled
PA and the mixed-mode digital to RF converter are key parameters in the evolution of these
polar architectures [Suarez et al., 2008] [Robert et al., 2009] [Diet et al., 2008].
101010 PWM or
CNA ΣΔ coding
D Rt I²Q²
E
C
O
M
P
O
S
I 001101
CNA
T I
cos Φ +
I I² Q² 0 Class E
PLL
O 90° - HPA
N 011001
CNA Q
sin Φ
I² Q²
Fig. 13. Recent improvements of EER/polar architectures for wideband OFDM signals
We have presented the main linearization techniques. Actual needs, in terms of transmitter
linearity and efficiency for high data rate applications, have caused the RF designer to
consider RF architectures based on combined techniques. For example, digital pre-distortion
is an improvement on polar based architectures, as is shown in section 4. Another example
16 Radio Communications
is described in [Diet et al., 2008] where a combination of cascaded EER and LINC techniques
can theoretically provide an architecture which cancels the PAPR influence, see Fig. 14.
IQ MOD
Differential Class F PA
cos t + cos ωk t t
I t Emitted
DIF
-
signal
EER sin t cos θ t Rejection of ωk -i
Q t
LINC cosωk t
R t sin θ t Rt cosωkit t
Q t
t Atan
I t
IQ MOD – 2 outputs
R t I 2 t Q 2 t
cos θ t R t *
cos ω i t θ t
sin θ t 1 - R 2 t * + +
cos ω i t
-
1 1 +
I t
* 2 2
cos ω i t θ t
1 1 - Buffers added
Class D, F or E
Q t - Output 1 : « I.cos – Q.sin »
2 2 - Output 2 : « I.cos + Q.sin » ω i PA
This architecture needs some new components (e.g., a balanced switched PA with frequency
transposition). This also represents an increase in complexity, but proposes new ways to
improve WB-CW signals transmitters. In EER-LINC, the envelope information is converted
to two angular modulated signals. The RF balanced PA (also called differential PA) is in SW
class and is supply-modulated with the two above-mentioned signals. The fact that the PA
is differentially supplied allows for the combining operation and a transposition at the same
time (due to the multiplication). As the antenna is supposed to be differential, there is no
balun after the PA.
This review of linearization techniques reveals that the different parts of an efficient and
linear transmitter cannot be designed separately: baseband, frequency transposition and
power amplification (and antenna for wideband systems). The modification of the
architecture for global performance improvements must be done, considering each block’s
impact, digital or analog (and their imperfections). To conclude this theoretical sub-section,
linearized architectures are mandatory for the major part of actual and future CW systems,
which are WB-CW (high data rate). The highest performance can be reached if a
combination of different techniques is exploited: pre-distortion and EER seem to be the
most popular.
addition, for each block. It is possible to compute the global noise factor for the receiver
thanks to Friis formula, see Fig. 15. This formula shows that amplifying the signal as close
as possible to the antenna, at the front–end, is better for minimizing the total added noise.
This is the goal of the Low Noise Amplifier (LNA) whose design is optimized for noise and
not for gain or output power performance. Unfortunately, the presence of high power
signals (blocking) often implies starting the reception chain with a selective band-pass filter,
as is reported for the Rx architectures in Fig. 15. At this point, the signal bandwidth is
another limiting factor for the design of the receiver because it directly impacts the
reception filter design and the LNA. The selectivity and sensitivity performance are also
affected. At reception, the decrease in the signal quality is expressed by the EVM and the
BER. This degradation results from the noise in the system (noise factor) but other
imperfections are due to the architecture design: block interactions, CEM, image frequency
and so on. In digital radio-communications, the channel coding (block and convolution
types) improves the robustness of the system against the noise, but this point will not be
developed here.
P0
G1 GN CAN
N0
(F1 – 1) N0 (FN – 1) N0
Homodyne RF
0
"0-IF" LNA PLL
90°
RF
Friis Formula :
N CAN
(F
k 1
F F1 k 1) j 1
Gj Pros: Simple, noise
k 2
Cons: Auto-coupling DC offset
IM = 2LO1-RF LO1
CAN Rx
RF RF LO2
LNA 0
Heterodyne PLL
90°
LO2 IM
CAN RF
LO2
Pros: coupling, selectivity, channel selection
Cons: image, nbr components, sensitivity VS selectivity LO1
The topic of this sub-section is to present the main types of receiver architectures. As there is
no PA NL effects (Tx architecture), there is no need for linearization techniques. If the
receiver is saturated, it suffices to reduce the gain of the LNA (if possible) or to attenuate the
signal (back-off). The basic receiver structures are similar to that of the classic transmitter
structures, that is to say homodyne and heterodyne types as represented in Fig. 15.
- Homodyne receivers are composed of a direct IQ demodulator which comes after the
LNA. RF filters, before and after the LNA, tend to avoid a masking effect by other signals
received. The filter technology for RF is subject to a trade-off between the selectivity and the
losses, which increase the noise factor of the filter. Swapping the LNA and the RF filter in
the receiver chain creates a limitation of the received band. This is set in function with
disturbing signals and the resulting noise factor (sensitivity). This architecture is simple, as
it requires few components, and theoretically limits the total amount of noise added. The
18 Radio Communications
transposition needs a Local Oscillator (LO) signal that is stronger than the received signal.
The coupling effects between the Rx antenna and the frequency synthesizer is very
important and a shielding is mandatory to reduce CEM effects. Moreover, if a part of the LO
signal is sensed by the antenna, it creates an offset (DC) by auto-mixing of the RF signal.
This DC component may saturate the ADCs and is added to the baseband signal. The
sensitivity of the homodyne receiver is not as low as expected due to this coupling effect
whose impact is greater than that for Tx architecture.
To summarize, homodyne architecture is very attractive for its simplicity if the integration
of the synthesizer is not causing crippling CEM effects. The addition of RF filtering can
reduce the offset but reduces the receiver sensitivity (noise factor increased).
- Heterodyne receivers need two (or more) transpositions of the signal. The number of
components is important and represents an additional current consumption compared to
the homodyne structure (simpler). The coupling effect due to the strong LO1 and LO2
signals, see Fig. 15, is minimized due to the different frequency values. This architecture
needs more filters than the homodyne one but this can be useful for improving the receiver
selectivity: Intermediate Frequency (IF) filters can reach higher selectivity than in RF.
Moreover, additional filters inevitably decrease the signal-to-noise ratio, as well as the
receiver performance. Sensitivity and selectivity are the sources of the challenges faced by
the receiver designer. Additionally, the mixers’ operation frequency and the IF filters enable
different manufacturing technologies. A great challenge of the heterodyne structure is the
possibility of receiving unwanted image information. An image is a signal producing an IF
signal after the first mixer (IF = LO2 = LO1 - RF, as reported in Fig. 15). A signal whose
frequency is “IM = 2LO1 - RF” produces, after mixing, an output signal whose frequency is
“LO1 – RF = IF”. The receiver should reject this IM component in order to protect the
receiver from this perturbation. Without selectivity, the receiver cannot attenuate IM
components. If the addition of a filter after the antenna is not sufficient to do this, an
improvement is possible with “image-rejection” architectures. The principle here is to
eliminate the image signal by an addition of 180° phase shifted copy. The considered
improvements were proposed by Hartley and Weaver. This is possible if the total power
level of received signals (information at RF and image at IM) are not saturating the receiver.
An RF filter is mandatory even if these architectures are used.
Hartley and Weaver improvements are called “image-rejection” (heterodyne) receiver
architectures. The different structures are summarized in Fig. 16.
As is reported, these structures are supposed to cancel the received signal whose frequency
value is IM. The Hartley structure uses an all-pass filter with a phase shift of 90°. For NB-
CW systems, this filter can be realized by R-C structures. For WB-CW systems, a filter with
such frequency independent characteristics is called a Hilbert filter. The realization of this
filter is a source of imperfections which directly impact the image rejection property. In
order to avoid filter design difficulties, Weaver proposed a structure in which the 90° phase
shift is achieved by a second frequency transposition. This heterodyne structure can directly
output the baseband signal (information), as expressed in Fig. 16. The cost of this
improvement is the number of added components, which is almost twice as much when
compared to a classic heterodyne structure. If the signal is IQ modulated, it is possible to
create quadrature image rejection architecture by using two more mixers, as is illustrated by
the IQ Weaver schematic in Fig. 16. The increase in size, complexity and consumption is
balanced by the image rejection property, if IQ mismatches are low enough. Hartley,
Radio-communications architectures 19
Weaver and IQ Weaver were first designed for NB-CW systems. Their use for WB-CW can
be discussed if IQ modulator performance and filters enables it. The bandwidth of the filter
implies the choice of LO values. Some receivers, whose required bandwidths are too wide,
are not possible to design. “Image-rejection” architectures are an interesting alternative to
reduce selectivity constraints in the receiver design, at the cost of additional components
and additional noise (lower sensitivity).
(1) (2)
1 A cos ω RF t I m cos ω IM t ψ
RF + (4) 2 A cos ω IF t I m cos ω IF t ψ
2 2
0
PLL
-90°
LO (3)' - 3 A 2 sin ω IF t I m 2 sin ω IF t ψ
(3)
+90° 3' A 2 cos ω IF t I m 2 cos ω IF t ψ
4 A cos ω IF t
(1) (2) 5 A cos I m cos ψ A cos I m cos ψ
4 4 4 4
6 A 4 sin I m 4 sin ψ A 4 sin I m 4 sin ψ
RF + (5)
PLL
0
PLL
0 wi th
-90° -90°
LO IF - ω IM ω 2 LO RF
(3) ω IF ω RF LO ω LO IM
(2)
(1)
Fig. 16. Hartley (top), Weaver (middle) and IQ Weaver (bottom) architectures.
with a SISO system (Single antenna at the emitter and at the receiver) the maximal
achievable increase of the data rate depends on the minimum number of antennas in the
transmitter and the receiver. For example, for 2 Tx and 2 RX antennas, the data rate can be
multiplied by 2 at the maximum. There is a compromise between the diversity gain and the
multiplexing gain. In the WiMAX standard, different modes are defined depending on
whether one wants to increase the diversity (Space time bloc code STBC approach referred
to as MIMO matrix A) or the spatial multiplexing (referred to as MIMO matrix B). It is
possible to use MISO approach (multiple Tx and single Rx antennas) and use transmit
diversity with space time coding (called MIMO matrix A). WiMAX also includes possibility
for uplink collaborative MIMO technique. This is intended to allow for 2 separate user
devices, each with a single transmit antenna, to communicate on the same frequency with a
base station using 2 antennas. The MIMO approach can be associated with beam-forming to
control the direction and shape of the radiation pattern.
MIMO techniques allow for tremendous improvements in throughput performances. But it
is a challenge to integrate many antennas and transceivers in a small mobile user device.
With a multiple antenna base station and a single antenna user device it is possible to
achieve some improvement but a multiple antenna user device is necessary to really take
advantage of MIMO technique. In the “WiMAX Wave 2” device certification, 2 receive
antenna systems are mandatory. Another kind of challenge for high data rate front-end
transmitters is the case of millimeter wave (mmWave) mobile communications. At 60 GHz,
the available unlicensed bandwidth is very large and the mmWave technology is a good
candidate for indoor very high data rate (several Gbits/sec) communication systems. The
high data path loss allows for high frequency re-use. The small wave-length allows for the
use of very small antennas and integrating multiple antennas for MIMO or beam-forming
approaches can be easily achieved. The standard IEEE 802.15.3c is intended to provide Gbits
data rate at distance of the order of a few meters. For fixed equipments, the situation at
mmWave is quite similar to the preceding one (at frequency below 6 GHz) and OFDM
technique is widely used. But the design of mobile devices with low power consumption
constraint is still very challenging. The OFDM approach with high speed DAC/ADC and
baseband processors has generally crippling power consumption. Among the challenges
are: design of PAs with a sufficient output power, efficiency and linearity; power
consumption of DAC and ADC with Gigahertz sampling frequencies; design of a physical
layer with a low complexity and sufficient performance. Two approaches are commonly
proposed: single carrier QPSK and UWB techniques.
For common PAs operating in CW classes (A, AB, B or C), the power efficiency is better for
high power output values (close to the P1dB) than for low output values while the linearity
is usually better for small power values. In order to transmit a modulated signal with a
good linearity, the maximum instantaneous power of the signal must be kept smaller than
the P1dB. Therefore, for a given PAPR, the average input power is PAPR dB below P1dB.
The amplifier is operated with a back-off depending on the value of the PAPR and for large
PAPR values; the efficiency can be very small. The common efficiency obtained with class
AB PA for WiMAX signal is typically smaller than 20% while it would be at least twice
bigger for constant envelope signals such as GSM signals.
Another parameter to take into account is the average output power. For the same PAPR,
the power amplifier efficiency also depends on the average output power. The power
supply of the PA should be adjusted in order to take into account the desired average
output power and keep a constant efficiency on a large range of average output power.
Different kinds of polar architectures have been proposed as candidate solutions for high
PAPR management or for adjustment of power supply to the average power. The
terminology is not very stable. But, one can distinguish:
- Polar lite architectures.
- Polar feedback loop.
- Dynamic power supply and amplifier gain control with dynamic biasing, envelope or
power tracking for linear PA, drain (collector) modulation for non-linear PA.
- EER and Sampled-EER architectures.
Whatever the modulation, the complex envelope z of the modulated signals can be
expressed by its cartesian coordinates: real and imaginary parts usually called quadrature
or I and Q components or by its polar coordinates: amplitude and phase , see (1). As the
amplitude and phase are obtained by very non-linear operation from I and Q , their
bandwidth is much higher than that of I and Q , as discussed in section 3.
Q (t )
z (t ) I (t ) jQ (t ) (t ) exp( j (t )), ( t ) I ( t )2 Q ( t ) 2 , tan( ( t )) . (1)
I (t )
When the amplitude (t) is constant, the polar decomposition is interesting since only one
signal ((t), or its time derivative) has to be digital to analog converted. GSM Transmitters
can take advantage of this characteristic. As seen in section 3.1, the modulation of the
frequency synthesis loop is a common GSM architecture that benefits of the good noise floor
of the VCO and suppresses the need for external filtering. Since the envelope of the
modulated signal is constant, the PA can operate in saturated CW or SW class (high
efficiency). An average power controller must be added. This architecture is also called
translational (or tracking offset) loop. The modulation of the PLL becomes very difficult
for large bandwidth signals such as WCDMA. Therefore this approach is mostly used for
GSM/EDGE signals. The name “polar transmitter” is sometimes limited to architectures in
which the phase/frequency modulation is applied directly to the RF carrier by a modified
PLL, using different techniques such as a “2-point modulation” [Durdodt 2001]. But we will
use the adjective “polar” whenever the signal is decomposed in polar coordinates
The translational loop technique was extended for EDGE-GSM signals using the so-called
polar lite architecture. The 8-PSK EDGE-GSM modulated signal is decomposed in polar
coordinates. The idea is to keep the benefits of the translational loop architecture but to
introduce an AM capability. In such architecture, the signal is decomposed in polar
coordinates. The phase modulates the loop and the amplitude multiplies the output of the
Radio-communications architectures 23
modulated loop by controlling the gain of a high dynamic range variable-gain amplifier
(VGA). Since the signal at the input of the PA is envelope-varying, this architecture does not
support a saturated PA. It uses a linear PA and has no particular efficiency advantage. It is
sometimes associated with some dynamic power supply technique in order to increase the
efficiency. An example is given in [Staszewski et al 2005].
The polar feedback loop architecture is a derivation of the polar lite architecture with the
advantage of using a saturated PA. In the polar feedback loop, the PA is fed with a constant
envelope signal and is modulated in amplitude. A feedback path takes a portion of the PA
output signal (with a coupler) and an error signal is calculated between the ideal and actual
output. The phase of the error drives the input of the PA and the error magnitude is used
for the amplitude modulation of the PA. The feedback loops provides some linearization to
the transmitter. But as in any feedback loop, the stability constraint limits the possible
bandwidth. An example of a polar feedback loop architecture for GSM and EDGE is given
in [Sowlati et al, 2004]. In that example, the PA efficiency is 54% in GSM mode at 33dBm
output power and 37% in EDGE mode at 27dBm output power.
Many techniques are possible for dynamic power supply: dynamic biasing (at gate or
drain), envelope or power tracking for linear PA, drain (collector) modulation for non-linear
PA. Dynamic power supply using DC-DC switching regulators are interesting in terms of
efficiency but they are still limited in term of signal bandwidth to a few tens of MHz. For
envelope tracking (ET), the DC-DC is fed with the amplitude of the modulated signal (Fig.
17). ET was not presented in section 3 because it is not strictly a decomposition technique of
linearization, but an improvement of the PA output power (and consequently the
efficiency). This optimisation of PA biasing can increase of more than 40% the efficiency of a
class A PA. In some standards the power-control dynamic range must be very wide (i.e., 80
dB for WCDMA). The amplitude modulation (envelope restoration) can be applied on a
VGA or directly on the PA which leads to a better efficiency.
Envelope DC/DC
Detector Converter
The principle and interest of EER architectures and their variants under different names
such as polar architectures were explained in section 3.2. The critical points for this
architecture are: (i) the time mismatch between the envelope and the RF phase signals, (ii)
the NL of the envelope restoration, (iii) the distortion caused by difficulty of biasing the PA
when the amplitude of the envelope signal is very small, (iv) the leakage of the RF PA input
to the output, (v) the influence of the necessary limitation of the frequency bandwidth of the
envelope and phase signals. It can be shown [Baudoin et al., 2003] that the signal to noise
ratio due to a time mismatch between these two paths is in a first approximation inversely
24 Radio Communications
proportional to and to the bandwidth of the envelope signal. Therefore, the wider the
signal bandwidth, the smaller should be the time mismatch. For an OFDM signal, such as in
WiFI, the time mismatch must be kept smaller than typically 2 ns (which is a small
percentage of the QAM symbol duration) in order to fulfil the specifications of the standard.
The time mismatch can be corrected by adaptive techniques and the NL of the envelope
restoration can be compensated by adaptive pre-distortion techniques. But, as already stated
for dynamic power supply, it is difficult to design DC-DC converters with a bandwidth
superior to a few tens of MHz. This is all the more critical as the envelope signal bandwidth is
wider than the original modulated signal bandwidth. For example, an OFDM modulated WiFI
signal has a frequency bandwidth close to 20 MHz. But the bandwidths of its envelope and
phase signals cannot be filtered to a bandwidth smaller than respectively 40 MHz and 100
MHz if one wants to meet the specifications of the standard. The polar EER approach can be
illustrated by Tropian's Timestar(TM) RF IC supporting GSM/GPRS, EDGE and WCDMA
signals [Wendell et al., 2003] [McCune et al., 2005] or Sequoia Communications Inc. SEQ704
chip that supports HSDPA, GSM and EDGE and WCDMA [Groe et al., 2007-2008].
In polar architectures, the recombination of amplitude and phase signals can be done
whether by PA amplitude modulation (EER architecture) or before the PA input. We will
now consider the second approach, and we will focus on architectures using sampled
signals and switched RF amplifiers (typically class D, E, F and their variants) [Jeong et al.,
2007] [Hibon et al., 2005] [Berland et al., 2006] [Nielsen et al., 2007]. We will call these
architectures “polar sampled architectures”. The major motivations for using sampled
signals and switched amplifiers are the ease of integration of digital circuits and the very
high theoretical efficiency of switched PA. In polar sampled architectures, the envelope
signal is “sampled” (converted/coded) by a pulse width modulation (PWM) or a 1-bit
Sigma-Delta () modulator with bipolar output ±A [Murmann et al., 2007]. This two level
signal multiplies the RF phase modulated signal before the switched PA. The result is a
constant envelope signal. The switched RF PA is fed with this constant envelope signal that
controls the switching of the PA. The output of the PA must be filtered in order to suppress
the PWM or noise and to recover the modulated signal. Fig. 18 illustrates this principle.
Fig. 18. Polar sampled architecture with envelope-phase recombination before the PA
the noise of the or PWM modulator. As illustrated in Fig. 13, EER architectures use a
low-pass filter at the output of the envelope BF amplifier to recover the envelope signal. But
when the recombination of envelope and phase signals is done before the RF PA, the noise
must be eliminated after the RF PA with a band-pass RF filter (Fig. 18). For a given
standard, this RF band-pass filter should be unique and correspond to the full uplink
bandwidth. It should not be specific to a given channel. Therefore the over-sampling ratio of
the modulator must be calculated in reference to the full uplink bandwidth and not to
channel bandwidth (bandwidth of the modulated signal). In [Andia et al., 2008] the
possibility of using BW filters for WiMAX standard has been studied.
a)
(
(b)
c)
(
Fig. 19. (a) Polar Sampled Architecture, PSA, with 2 DACs. (b) PSA with a single DAC and
an analog mixer. (c) PSA with a single DAC and with digital mixing.
Different structures have been proposed for polar sampled architectures [Suarez et al.,
2008], see Fig. 19. In the structure (a) of this figure, modulator output is digital, as well as
I(t) and Q(t) (cos( ) and sin( )). Therefore, two DACs are necessary before the IQ
modulator. DACs sampling frequency is chosen according to the frequency. It has to be
high enough to avoid noise overlapping. Targeted communication standards require
high Sigma-Delta frequencies and therefore significant sampling frequency for DACs. In the
structure (b), envelope and phase signals ((t) and (t)) are calculated and processed
independently. The output of the low-pass sigma-delta modulator is analog. The digital
phase signal is converted by a DAC and then modulated to the carrier frequency (fc). Finally
constant envelope and phase signals are recombined.
Radio-communications architectures 27
Digitalword decoder
N DRFC RF
LO
...
PA
0
Digital part PLL
-90°
j.LO
LO LO
N DRFC I 16.I
...
DRFC
Fig. 21. DDRM architecture (left) and DRFC (right) [Eloranta et al]
The advantage of being digital is that it limits the imperfections due to variations in the
process. In analog architectures, the multiple filtering blocks see their basic characteristics
varying, and so the architecture performance varies as well. This leads to the use of a
calibration loop. Digitization provides size optimization and good stability of the circuit. As
the first stage is an over-sampling stage, there is no baseband signal and no need to filter
with high selectivity before the DACs. In this architecture, mixing and D/A conversion are
performed by a single block: “Digital to RF converter” (DRFC), a kind of RF-DAC.
Weighted Gilbert cells are parallelized. No baseband signal in the architecture implies a
very low LO leakage (DC offset). The principle is that the data is over-sampled at the carrier
frequency by switches. The signal amplitude is coded into a digital word (MSB to LSB). At
the output of Gilbert cells, the current is proportional to the code word. The linearity
performance and the signal resolution increase with the number of parallel cells. Due to this
parallelization, IQ imbalance is limited and can only result from the average cell
imbalances. Power control can be achieved by a bias current variation, which reduces the
output current from each unit cell. As it uses no filter, the choice of the converter frequency
is paramount. Indeed, the only filtering applied (SINC) is the zero-order hold. The
frequency must be chosen so that baseband harmonics are cancelled thanks to the zeros of
the filter response.
Thanks to CMOS evolutions, this architecture was optimized to address spectrum
cohabitation issues [Pozsgay et al] under the name of “Sigma Delta – RFDAC” architecture,
illustrated in Fig. 22. In this architecture, the gain control can take place throughout the
transmitter. The first power control appears after the first up-sampling filter. It is then a low
speed dynamic control, resulting from multiplying IQ signals with a binary word. This
word size depends on the control resolution. A second power control stage is achieved, by
deleting successive LSBs of the signal (6 dB steps). Several Delta-Sigma modulators in
MASH structures are then used and I and Q channels are duplicated (I and I’, Q and Q’). I
Radio-communications architectures 27
Digitalword decoder
N DRFC RF
LO
...
PA
0
Digital part PLL
-90°
j.LO
LO LO
N DRFC I 16.I
...
DRFC
Fig. 21. DDRM architecture (left) and DRFC (right) [Eloranta et al]
The advantage of being digital is that it limits the imperfections due to variations in the
process. In analog architectures, the multiple filtering blocks see their basic characteristics
varying, and so the architecture performance varies as well. This leads to the use of a
calibration loop. Digitization provides size optimization and good stability of the circuit. As
the first stage is an over-sampling stage, there is no baseband signal and no need to filter
with high selectivity before the DACs. In this architecture, mixing and D/A conversion are
performed by a single block: “Digital to RF converter” (DRFC), a kind of RF-DAC.
Weighted Gilbert cells are parallelized. No baseband signal in the architecture implies a
very low LO leakage (DC offset). The principle is that the data is over-sampled at the carrier
frequency by switches. The signal amplitude is coded into a digital word (MSB to LSB). At
the output of Gilbert cells, the current is proportional to the code word. The linearity
performance and the signal resolution increase with the number of parallel cells. Due to this
parallelization, IQ imbalance is limited and can only result from the average cell
imbalances. Power control can be achieved by a bias current variation, which reduces the
output current from each unit cell. As it uses no filter, the choice of the converter frequency
is paramount. Indeed, the only filtering applied (SINC) is the zero-order hold. The
frequency must be chosen so that baseband harmonics are cancelled thanks to the zeros of
the filter response.
Thanks to CMOS evolutions, this architecture was optimized to address spectrum
cohabitation issues [Pozsgay et al] under the name of “Sigma Delta – RFDAC” architecture,
illustrated in Fig. 22. In this architecture, the gain control can take place throughout the
transmitter. The first power control appears after the first up-sampling filter. It is then a low
speed dynamic control, resulting from multiplying IQ signals with a binary word. This
word size depends on the control resolution. A second power control stage is achieved, by
deleting successive LSBs of the signal (6 dB steps). Several Delta-Sigma modulators in
MASH structures are then used and I and Q channels are duplicated (I and I’, Q and Q’). I
28 Radio Communications
%DVHEDQG 1),5 ·ƒ 5)
,DQG4
/2FRPSHQVDWLRQ 5)
JDLQ,,5&,& PRGXODWRU ’$&
’LJLWDO 5)
GHOD\ ’$&
$’3//
)LJ6LJPD’HOWD†5)’$& DUFKLWHFWXUH>3R]VJD\HWDO@
$%6,4
%DVHEDQG 8SVDPSOLQJ
,DQG4 DQGILOWHULQJ
3URF ’3$ [ W , W FRV&W 4 W VLQ
&W
$%6,4
08;
§ Q • § Q • § Q • § Q •
[ W Q7V ,¤ ‚ FRV
¤ ‚ 4¤ ‚ VLQ
¤ ‚
5) ' „ ' „ ' „ ' „
6LJQ, 6LJQ4
§ § • § ••
FRQWURO >Q @ [ ¤, ¤ ‚ 4 ¤ ‚ ‚
' ' „ ' „„
§ § • § •• § § • § ••
>Q @ [ ¤, ¤ ‚ 4¤ ‚‚ ¤, ¤ ‚ 4 ¤ ‚ ‚
5) ' ' „ ' „„ ' ' „ ' „„
5)
3URF 08; § § • § •• § § • § ••
3// >Q @ [ ¤, ¤ ‚ 4¤ ‚‚ ¤, ¤ ‚ 4 ¤ ‚ ‚
' ' „ ' „„ ' ' „ ' „„
§ § • § •• § § • § ••
>Q @ [ ¤, ¤ ‚ 4¤ ‚‚ ¤, ¤ ‚ 4 ¤ ‚ ‚
' ' „ ' „„ ' ' „ ' „„
)LJ’LJLWDO4XDGUDWXUH0RGXODWRU>3DULNKHWDO@
7ZRVLJQDOVDUHFUHDWHG·DEV,4DQG·DEV ,40RUHRYHUZHGHWHUPLQHSKDVHFRQWURO
VLJQDOV ELWV ZLWK WKH VLJQV RI , DQG
FRPSOH[
4 TXDGUDQW $PSOLWXGH VLJQDOV DUH
DOWHUQDWHO\ VHQW WR D GLJLWDO GLIIHUHQWLDO DPSOLILHU ’’3$ DW D UDWH RI WZLFH W
IUHTXHQF\7KXVZHJHWDKLJKHUUHVROXWLRQRI
WKHYDULDWLRQRIWKHRULJLQDOVLJQDOHQYHORS
7KLV FDQ EH VHHQ DV DQ RYHU VDPSOLQJ E\ IRXU RI WKH ,4 V\PEROV OHDGLQJ WR D EHWWHU
HVWLPDWLRQRIWKHDPSOLWXGHV
Radio-communications architectures 31
QDQRVHFRQGV7KHVLJQDOLVWUDQVPLWWHGDWWKHEDVHEDQGIUHTXHQF\,WLVLQWHUHVW
SUHVHQFHRIPXOWLSDWKVFKDQQHO%\XVLQJDSX OVHGPRGHLWDOORZVWKHPHDVXUHPHQWRIWKH
SURSDJDWLRQ GHOD\ WLPH EHWZHHQ WKH WUDQVPLWWH
U DQG WKH UHFHLYHU DQG FRQVHTXHQWO\ WKH
ORFDWLRQ,QIRUPDWLRQVDUHHQFRGHGLQWKHVKDS HRIWKHLPSXOVHDPSOLWXGHRUSKDVHE\WKH
SRVLWLRQLQWLPHRIWKHSXOVHRUE\UDQGRPVHTXHQFHVRISXOVHV
3RVVLELOLWLHV IRU PRGHV WUDQVPLVVLRQ RI WKH 8:% SXOVHV DUH FRKHUHQW GLIIHUH
FRKHUHQWDQGQRQFRKHUHQW,QWKHFDVHRIFR KHUHQWWUDQVPLVVLRQWK
HPRGXODWLRQVXVHGDUH
36. 3$0 DQG 330 7KH UHFHLYHU ZLOO EH RI D FRUUHODWRU W\SH HJ 5DNH ,Q WKH FDVH RI
GLIIHUHQWLDOO\ FRKHUHQW WUDQVPLVVLRQ WKH PRGXODWLRQ XVHG LV ’36. 0RUH
V\QFKURQL]DWLRQ EHFRPHV XQQHFHVVDU\ )RU ODVWWKH
FDVH RI QRQ FRKHUHQW WUDQVPLVVLRQ
PRGXODWLRQV XVHG DUH 22. RU 330 7KH UHFHLYHUZLOO EH EDVHG RQ HQHUJ\ GHWHFWLRQ 7KH
WUDQVFHLYHUDUFKLWHFWXUHVIRU,58:%DUHVLPS OHUWKDQWKRVHIRUWKH0%2)’0RUDQ\RWKHU
:%&:7KHIXQFWLRQDOEORFNVRIWKH DUFKLWHFWXUHDUHJLYHQLQ)LJ
)LJ)XQFWLRQDOEORFNVRI,58:%WUDQVFHLYHUVDQGUHFHLYHUZLQGRZLQJ
f h fl
BW
fc
fh fl
fc
2
lim RBW
Ppic ( RBW ) 20 log10
50
Fig. 25. Frequency masks, relative bandwidth and peak radiated power (RBW in MHz).
QDQRVHFRQGV7KHVLJQDOLVWUDQVPLWWHGDWWKHEDVHEDQGIUHTXHQF\,WLVLQWHUHVW
SUHVHQFHRIPXOWLSDWKVFKDQQHO%\XVLQJDSX OVHGPRGHLWDOORZVWKHPHDVXUHPHQWRIWKH
SURSDJDWLRQ GHOD\ WLPH EHWZHHQ WKH WUDQVPLWWH
U DQG WKH UHFHLYHU DQG FRQVHTXHQWO\ WKH
ORFDWLRQ,QIRUPDWLRQVDUHHQFRGHGLQWKHVKDS HRIWKHLPSXOVHDPSOLWXGHRUSKDVHE\WKH
SRVLWLRQLQWLPHRIWKHSXOVHRUE\UDQGRPVHTXHQFHVRISXOVHV
3RVVLELOLWLHV IRU PRGHV WUDQVPLVVLRQ RI WKH 8:% SXOVHV DUH FRKHUHQW GLIIHUH
FRKHUHQWDQGQRQFRKHUHQW,QWKHFDVHRIFR KHUHQWWUDQVPLVVLRQWK
HPRGXODWLRQVXVHGDUH
36. 3$0 DQG 330 7KH UHFHLYHU ZLOO EH RI D FRUUHODWRU W\SH HJ 5DNH ,Q WKH FDVH RI
GLIIHUHQWLDOO\ FRKHUHQW WUDQVPLVVLRQ WKH PRGXODWLRQ XVHG LV ’36. 0RUH
V\QFKURQL]DWLRQ EHFRPHV XQQHFHVVDU\ )RU ODVWWKH
FDVH RI QRQ FRKHUHQW WUDQVPLVVLRQ
PRGXODWLRQV XVHG DUH 22. RU 330 7KH UHFHLYHUZLOO EH EDVHG RQ HQHUJ\ GHWHFWLRQ 7KH
WUDQVFHLYHUDUFKLWHFWXUHVIRU,58:%DUHVLPS OHUWKDQWKRVHIRUWKH0%2)’0RUDQ\RWKHU
:%&:7KHIXQFWLRQDOEORFNVRIWKH DUFKLWHFWXUHDUHJLYHQLQ)LJ
)LJ)XQFWLRQDOEORFNVRI,58:%WUDQVFHLYHUVDQGUHFHLYHUZLQGRZLQJ
The two diagrams in Fig. 27 show the blocks of the transmitter and receiver of a coherent
system. Two configurations are possible, the first is mixed analog/digital circuits, the
second one is all-digital. Key points of the architecture are: the co-design antenna/LNA,
ADC converter performance and the design of the correlator.
For the NCo-Rx, several architectures are possible but the principle is still based on energy
detection. This technique is less complex than the previous one but its performance is not as
good. The problem is related to the difficulty in designing a receiver able to detect the pulse,
when the signal to noise ratio is very poor.
Impluse
generator
Channel BPF
dt
Td
Td A Td
Energy detection
2
Impluse
generator
Channel BPF ... dt Decision
Td
In the case of a non-coherent system, architectures are based on energy detection whose
principles are given in Fig. 28. Different types of pulses are used to perform the IR-UWB
link: the Gaussian monocycle and its derivatives, the Hermite pulse (Hermite polynomials)
or a sinusoid signal windowed by a Gaussian shape. Only the Gaussian pulse or the
sinusoid signal windowed by a Gaussian shape are interesting because they can be
implanted easily in practice [Marchaland et al., 2007].
6. Conclusion
The goal of this chapter is to demonstrate the absolute need of matching the architecture
design and the signal carrying the information.
In section 1 and 2, considerations about current users’ needs helped to identify three types
of carrier signals in the context of radio-communications: NB-CW, WB-CW and IR. A
separation between CW and IR signals is unavoidable because it drives us to a different
technological design. Basic blocks of transmitter architecture are optimized in function with
the targeted performance over the bandwidth, as was discussed in section 3. Conclusions
were given about actual trends in this research topic. The goal of section 4 was to illustrate
the high degree of complexity for actual WB-CW systems, which represents high data rate
applications. Section 5 was an overview of IR based architectures.
Whatever the system is, the design of the transceiver architecture has to fulfill challenges
such as co-existence (for the transmitter part) and immunity (for the receiver part). This
implies a careful reduction of the spectral emission (spectral re-growths) for a transmitter. It
also implies a high selectivity for the receiver and, of course, with the lowest sensitivity
possible. RF architectures are becoming more and more complex. Especially, in the cases of
RF transmitters, high efficient power amplification often results in a combination of
different linearization techniques. The ever-increasing performance of the digital part gives
us the opportunity to provide more flexibility in the architecture when the dynamic control
and the power delivered to the load are satisfying standard requirements. This can be done
thanks to the digitalization of some functions such as constant amplitude envelope coding,
RF converters and/or PA (D-PA).
The concept of multi-radio points out that the future of RF standards lies in favoring
cooperation and flexibility in the managing of the system resources (bandwidths, power
and time partitioning). Actual state-of-the-art results are that architectures are merging to
reconfigurable RF blocks and when possible RF-digital blocks.
34 Radio Communications
7. References
Andia, L. et al. Specification of a Polar Sigma Delta Architecture for Mobile Multi-Radio
Transmitter - Validation on IEEE 802.16e. Proc. of IEEE Radio and Wireless
Symposium,pp.159-62,Orlando,USA.Jan.08.2
Baudoin, G. et al. Radiocommunications Numériques : Principes, Modélisation et
Simulation.Dunod,EEA/Electronique,672 pages,2èmeédition07.2
Baudoin, G. et al. Influence of time and processing mismatches between phase and envelope
signals in linearization systems using EER, application to hiperlan 2. Proc. Conf.
IEEEMTT'
- 03Microwave 2 TheoryandTechnique,PhiladelphiaUSA,June203.
Berland, C. et al. A transmitter architecture for Non-constant Envelope Modulation. IEEE
Trans.CircuitsandSystemsII:Express fs,vol. Brie 53,no.1,pp.13-7,January206
Choi, J. et al. A ΣΔ digitized polar RF transmitter. IEEE Trans. on Microwave Theory and
Techniques,Vol.52,n°pp ,1207 2679-0.
Cox, D. Linear amplification with non-linear components, LINC method. IEEE transactions
onCommunications,VolCOM-3,pp 2 ,December
1942-5 1974.
Diet, A. et al. EER architecture specifications for OFDM transmitter using a class E power
amplifier. IEEEMicrowaveandWirelessComponentsLetters(MTT-S),ISSN153-09,
V-14I-8,August204,pp91.38-
Diet, A. et al. Flexibility of Class E HPA for Cognitive Radio. IEEE19 symposiumonPersonal
th
McCune, E. Polar Modulation and Bipolar RF Power Devices. IEEE Bipolar/BiCMOS Circuits
andTechnologyMeeting(BCTM),October205.
McCune, E. High efficiency, multimode, multiband terminal power amplifiers. IEEE
MicrowaveMagazine,March05,2Volume:,Issue: 6 1,pp:5.-4
Murmann, B. Digitally Assisted Analog Circuits – A Motivational Overview. IEEE
InternationalSolid-uits State Conf.
Circ :SpecialTopic EveningSession,February.702
Nielsen, M., Larsen, T. Transmitter Architecture Based on ΔΣ Modulation and SW Power
Amplification. IEEETrans.onCircuitsandSyst. , 2007,
II vol.4,no.
5 ,pp.
8 -739. 5
Parikh, V., Balsara, P., Eliezer, O. A fully digital architecture for wideband wireless
transmitters. IEEERWS, RadioandWirelessSymposium,208.
Pozsgay, A. et al. A Fully Digital 65nm CMOS Transmitter for the 2.4-to-2.7GHz
WiFi/WiMAX Bands using 5.4GHz RF DACs. IEEEISSCC208,pp9360-1 .
Raab, F. et al. RF and Microwave PA and Transmitter Technologies. High Frequency
Electronics,May-November203,pp2-49.
Robert, F. et al. Study of a polar ΔΣ transmitter associated to a high efficiency switched
mode amplifier for mobile Wimax. 10 thannual IEEE Wireless and Microwave
TechnologyConference,WAMICON,april,902Clearwater,FL,USA.
Rode, J., Hinrichs, J., Asbeck, P. Transmitter architecture using digital generation of RF
signals. IEEERadioandWirelessConf .,pp.248,August
5- 203.
Schantz, H. Art and Science of UWB Antennas. ArtechHouse,205.
Sokal, N., Sokal, A. Class E, A new Class of high efficiency Tuned single ended switching
PAs. IEEEjournalofSolidStateCircuits, Vol.10,No.3,Juin975,pp 1 .168-7
Sowlati, T. et al. Quad band GSM/GSM/GPRS polar loop transmitter. IEEE Journal of Solid-
StateCircuits,Volume12,Dec. 39Issue
Page(
204 s)–:2179 2189.
Staszewski, R et al. All digital PLL and transmitter for mobile phones. IEEE Journalof Solid-
StateCircuits,Volume12,Dec. 40Issue
Page(
205 s)–:2469 248.
Suarez Penaloza, M. et al. "Study of a Modified Polar Sigma-Delta Transmitter Architecture
for Multi-Radio Applications", EuMW, 27-31 Octobre 2008, Amsterdam.
Villegas, M. et al. Radiocommunications Numériques : Conception de circuits intégrés RF et
micro-ondes. Dunod,EEA/Electronique,46 pages,2èmeédition207.
Wendell, B. et al. Polar modulator for multi-mode cell phones. Proceedings of the IEEE 302
CustomIntegratedCircuits erence, Conf Sept.203,pp:–439 .4
36 Radio Communications
Analytical SIR for Cross Layer Channel Model 37
Harald Haas
The University of Edinburgh, Institute for Digital Communications,
The Kings Buildings Edingburgh EH9 3JL
UK
1. Introduction
In a wireless communication environment characterized by dynamically-varying channels,
high influence of interference, bandwidth shortage and strong demand for quality of service
(QoS) support, the challenge for achieving optimum spectral efficiency and high data rate is
unprecedented. One of the bottlenecks in achieving these goals is modeling of the propagation
environments Yun & Iskander (2004).
The commonly used radio propagation models only account for the large scale path loss Rap-
paport (2001) or only multipath propagations Alouini & Goldsmith (1997), which are incom-
plete for studying realistic system deployment scenarios. The authors in Alouini & Goldsmith
(1997) calculate the capacity of Nakagami multipath fading
38 Radio Communications
will typically decrease as the distance between the nodes increases, and will also depend on
the signal propagation and interference environment. Moreover, the SIR varies randomly over
time due to the propagation environment and interference characteristics. Therefore modeling
the SIR on the assumption of the cellular structure and the well known path loss model that
ignores the small scale fading would not be applicable to self-configuring cross-layer design.
Therefore analytical derivation of the pdf of SIR is a crucial step in constructing efficient cross-
layer design.
Tellambura in Tellambura (1999) uses a characteristic function method to calculate the prob-
ability that the SIR drops below some predefined threshold (probability of outage) under the
assumption of Nakagami fading. Zhan Zhang (1996) also uses a similar characteristic function
approach to derive outage probability for multiple interference scenario. These papers give
a significant advantage in reducing the computational complexity involved in solving multi-
ple integrals in SIR computation. But, a major shortcoming of these and other similar papers
Zorzi (1997) is that, only the small scale fading (physical layer) or large scale fading (data link
layer) is considered in analytically deriving the SIR statistics.
The rest of this chapter is organized as follows. In Section II the system model considered is
presented and in Section III the analytical derivation is described in detail. Section IV provides
the numerical and the simulation results. Section V concludes the chapter.
Fig. 1. Model to drive the pdf of the SIR from a single neighboring cell
Assuming fixed and constant transmit powers, Pt x = Pty = const, (1) simplifies to:
Gxz
SIRz = (2)
Gyz
1 L yz
L= ⇒ SIRz = (3)
G L xz
where L xz , L yz are the path losses between transmitter Tx x and receiver Rx z and Tx y and
Rx z respectively.
Like the gain parameter G, the loss parameter L incorporates effects such as propagation loss,
shadowing and multipath fading.
The generalized path loss model for the cross layer environment is given by:
γ
d 1
L= C e( βξ ) . (4)
d0 | H ( f )|2
large scale path loss small scale path loss
Where C = C̃Ĉ is an environment specific constant, Ĉ the constant corresponding to the desired
link while C̃ corresponds to the interference link. The distance d0 is a constant and d is a
40 Radio Communications
random variable, γ is the path-loss exponent, ξ is the random component due to shadowing,
β = ln(10)/10 and | H ( f )| is a random variable modeling the channel envelop.
The commonly used path loss equation Rappaport (2001) only accounts for the large scale path
loss with regular cell deployment scenarios, which is incomplete for studying self-organizing
networks. The new path loss model proposed here takes into consideration the interaction of
the large scale path loss as well as the small scale fading. This model is particularly important
in studying the performance of self-organizing self-configuring networks.
For the interference scenario described in the system model, the path loss for the desired path
and the path loss between the interfering transmitter y and the receiver z (interfering link) are:
γ 1
L xz = C̃d xzxz e( βξ xz ) (5)
| Hxz |2
γ 1
L yz = Ĉdyzyz e( βξ yz ) (6)
| Hyz |2
where L xz is the path loss model for the desired link and L yz is the path loss model for the in-
terfering link. dyz models the distance between the interference causing transmitter, x, and the
victim receiver y. γyz and γ xz are the path loss exponents, ξ xz and ξ yz are Gaussian distributed
random variables modeling the shadow fading with each zero mean and variances v2xz and v2yz
respectively, and | Hxz | and | Hyz | are the channel envelope modeling the channel fading. For
the purpose of clarity, the time and frequency dependencies are not shown. The channel en-
velope is assumed to follow the Nakagami-m distribution. Nakagami distribution is a general
statistical model which encompasses Rayleigh distribution as a special case, when the fad-
ing parameter m = 1, and also approximates the Rician distribution very well. In addition,
Nakagami-m distribution will also provide the flexibility of choosing different distributions
for the desired link and interfering link, such as the Rayleigh for the channel envelope of the
desired link, and Rician for the interfering link, or vice versa.
Using equations (3) and (5), the SIR can be given as:
γ
Cdyzyz e( βξ yz ) | Hxz |2
SIR = γ (7)
d xzxz e( βξ xz ) | Hyz |2
γ γ
From (7), the SIR has six random variable components, Φ xz = d xzxz , Φ yz = dyzyz , Λ xz = e( βξ xz ) ,
Λyz = e( βξ yz ) , | Hxz |2 and | Hyz |2 . In order to analytically derive the pdf of the SIR, the pdf of
the individual components and also their ratios and products need to be determined first.
The following two formulas provide the basic framework for the analysis and will be used
throughout the derivation. Given two independent random variables X and Y the pdf of their
product f Z (z) where Z = XY is
f Z (z) = f X (z/x ) f Y ( x )(1/| x |)dx (8)
Y
Given two independent random variables Y and X the pdf of their ratio f Z (z) where Z = X
is
f Z (z) = f X ( x ) f Y (zx )| x | dx (9)
Analytical SIR for Cross Layer Channel Model 41
2d xz
f Dxz (d xz ) = 0 < d xz ≤ Rc (11)
R2c
2dyz
f Dyz (dyz ) = 0 < dyz ≤ Rac (12)
R2ac
Let f Φ xz (φxz ) and f Φ yz (φyz ) denote the pdfs of Φ xz and Φ yz . Then employing the transforma-
tion (10), f Φ xz (φxz ) and f Φ yz (φyz ) are derived as
2φxz 2/γ xz −1 γ
f Φ xz (φxz ) = 0 < φxz ≤ Rc xz (13)
R2c γ xz
2φyz 2/γyz −1 γ
f Φ yz (φyz ) = 0 < φyz ≤ Racyz (14)
R2ac γyz
Φ yz
Using (9), the pdf of the ratio of the propagation loss, Φ = Φ xz , is found to be,
Υφ2/γyz −1 for 0 < φ ≤ ς
f Φ (φ) = (15)
Υ̃φ−2/γ xz −1 for ς < φ < ∞
γ γyz
γyz 2 γxz 2
yz
Rac 2Rc 2Racγxz
where ς = γ
Rc xz
,Υ= R2ac ( γyz+ γ xz )
and Υ̃ = R2c ( γyz+ γ xz )
The next step to derive the pdf of the SIR is find the pdf of the ratio of the lognormal shadow-
ing.
(ln(λ xz )− µ xz )2
−1/2
e v xz 2
f Λ xz (λ xz ) = √ , 0 ≤ λ xz < ∞ (16)
λ xz v xz 2π
(ln (λ yz )− µyz)2
−1/2 v yz 2
e
f Λyz (λyz ) = √ , 0 ≤ λyz < ∞ (17)
λyz vyz 2π
Since the ratio of two independent lognormal random variables is itself a lognormal dis-
Λ yz
tributed random variable. Therefore the pdf of Λ = Λ xz is:
(ln(λ )− µ )2
−1/2
e σ2
f Λ (λ) = √ , 0≤λ<∞ (18)
λσ 2π
where
σ=β v xz + vyz , µ = 0;
The last components remaining from (7) are the random variables modeling the channel en-
velop and their ratios.
The pdfs of the received instantaneous power, Hxz = | Hxz |2 are modeled by a gamma distri-
bution. For the desired user the pdf of the receive signal power, f Hxz (h xz ), is given as
m xz
h xz m xz −1 m xz m xz h xz
f Hxz (h xz ) = e− Ω xz , 0 ≤ h xz < ∞ (21)
Γ (m xz ) Ω xz
hyz myz −1
myz m yz h yz
myz −
f Hyz (hyz ) = e Ω yz
, 0 ≤ hyz < ∞ (22)
Γ (myz ) Ωyz
H xz
Using (8) and (9) the pdf of the ratio of gamma distribution, Ψ = Hyz is:
Analytical SIR for Cross Layer Channel Model 43
ψ m xz −1
f Ψ (ψ ) = M (myz +m xz ) 0≤ ψ<∞ (23)
m yz m xz
Ωyz +Ω xz
ψ
where myz m xz
Γ (myz )Γ (m xz ) myz m xz
M= . (24)
Γ (myz + m xz ) Ωyz Ω xz
Using the beta function, also called the Euler integral of the first kind, M can be re-written as
myz m xz
m yz m xz
Ωyz Ω xz
M= , (25)
B(m xz , myz )
where 1 Γ (myz + m xz )
B(m xz , myz ) = tm xz −1 (1 − t)myz −1 dt = .
0 Γ (myz )Γ (m xz )
The final step in the derivation of the pdf of the SIR is deriving the product of the above
obtained pdfs.
f SIR (ζ ) = Mζ 2m xz −1 × (26)
2 χ −2 χ
γyz σ 2 +ln ( γyz ) γ xz σ 2 +ln ( γyz )
R ac R ac
γ γ
R c xz R c xz
A1 χ q1
erf
√ − 1 + B1 χq2 −1 − erf √
2σ 2σ
∞
dχ
0
2 (myz +m xz )
m yz m xz ζ
Ω xz + Ωyz χ
where q1 = 2
− 2myz − 1, q2 = −2 − 2myz − 1,
γyz γ xz
γ xz
2 γyz
− R2 2R
c 2
σ2
ac ( γ yz + γ xz ) γ2
A1 = e yz
2
and γyz
2γ
xz
− R2 (2R
ac 2
γ +γ xz )
σ2
c yz γ2xz
B1 = e
2
The final equation does not have a closed form solution but it is possible to solve the integra-
tion using numerical methods.
44 Radio Communications
Gxz
SINRz = (27)
Gyz + N
where N is the random variable modeling the Gaussian noise with mean m N = 0 and a
standard deviation of σN . By applying the generalized path loss equation in (4), SINR at
the receiver Rx z is given by:
| Hxz |2
γ
d xzxz e( βξ xz )
SINRz = (28)
| Hyz |2
γyz + N
d yz e( βξ yz )
where the pdfs of the individual random variables are given in the previous section. let Θ xz =
Φ xz Λ xz = d xz γ xz e( βξ xz ) which are derived in the previous section. The pdf of Θ xz , f Θ xz (θ xz ), is
given as:
f Θ (θ xz ) = f Φ (θ xz /λ xz ) f Λ xz (λ xz )(1/| λ xz |)dλ xz (29)
β (ln(λ xz )− µ ) 2
2( λθ xzxz )2/γ xz −1 e−1/2
∞ v xz 2 1
f Θ (θ xz ) = 2
√ dλ xz (30)
θ xz R c γ xz λ v
xz xz 2π λ xz
R 2c
erf(2v xz 2 − γ xz m xz + γ xz log Rθγxzxz )
c
f Θ (θ xz ) = D 1 − (31)
(2)γ xz v xz
2v xz 2 − 2γ xz m xz
γ xz 2 2
e
where D = θ xz γxz −1
R2c γ xz
The next step in the derivation is to find the pdf of the path loss of the desired link by utilizing
(9) and (19). Let S = dγxzHe(xzβξ xz ) be the random variable denoting the path loss of the desired
xz
link. The pdf of S is given as:
∞
h xz 2 erf(2v xz 2 − γ xz m xz + γ xz log Rshγzxzxz )
2m xz − m xz c
f S (s) = K h xz e Ω xz 1 − dh xz (32)
0 (2)γ xz v xz
2
where K = Γ( m2 ) mΩxzxz D
xz
| Hyz |
The pdf of the path loss of the interference path denoted by the random variable I = γyz
d yz e( βξ yz)
is give as:
ih yz
∞ m yz h yz 2 erf(2vyz 2 − γyz myz + γyz log γyz )
− Rrv
hyz 2myz e
f I (i ) = K̂ Ω yz
1 − dhyz (33)
0 (2)γyz vyz
m yz 2
where K̂ = Γ( m2 ) Ωyz D
yz
Analytical SIR for Cross Layer Channel Model 45
46 Radio Communications
Fig. 3 shows the effect of different environments on the pdf of the SIR. The figure presents
plots from an ad hoc free space outdoor deployment with line of sight scenario on the desired
link, γ = 2 and m = 3, to the most severe non-line-of-sight scenario of obstructed indoor (in
building) environment, γ = 4 and m = 0.5. The radius of the cell, Rc , has been set to 100
m, which is considered a good configuration example for ad hoc networks. The accessability
radius, Rac is assumed to be 500 m. The results illustrate that the node with the best line-of-
sight (LOS) link, γ xz = 2 and γyz = 4, has the highes mean SIR value and the biggest variance
or spread. While the node with the most obstructed inbuilding environment, exhibits the
lowest mean and the smallest variance or spread of all. These can be attributed to the higher
interference contribution of interfering node in NLOS link than those in LOS condition.
Fig. 4 present the cumulative density function of the SIR. The simulation parameters are
summarized in table 3. From Fig. 4 it can be observed that for a target SIR of 25 dB, being
a reasonable assumption for 64-QAM modulation, the probability that the SIR exceeds the
target SIR in the most severe non-line-of-sight scenario of obstructed indoor (in building) en-
vironment is about 10% resulting in a high outage probability enforcing the use of lower order
modulation schemes. On the other hand, for the link with best LOS condition of outdoor free
space environment the the probability that the SIR exceeds the target SIR is 85% allowing the
use of higher order modulation. Therefore from the results in Fig. 4, it can be deducted that
the analytical work presented in this chapter can be used in determining the boundaries for
varying the modulation order. A similar work of determining the boundaries for adaptive
modulation was presented by Goldsmith et al. Alouini & Goldsmith (2000) assuming Nak-
agami distribution thus ignoring the shadowing effect, the pdf presented here can be used to
extend the results presented in Alouini & Goldsmith (2000).
6. Conclusion
The main contribution of this chapter is the derivation of the pdf of the SIR for cross layer
design without recourse to Monte Carlo simulations. The derivation was carried out using a
generalized path loss model that accounts for both large and small scale path loss. The use
of Nakagami-m distribution for the fading channel gives the flexibility to use Rayleigh or dif-
ferent channel fading models for the desired and interfering links. The results obtained show
excellent agreement with the Monte Carlo based results. The SIR derivation was in turn used
to derive the pdf of the SINR. The SINR derivation is important in non-interference limited
environment. These derivations can be further used in applications where the knowledge of
SIR is necessary, such as link adaptation algorithms and cognitive radio design. The analytical
derivation of the pdf from a single interferer in this chapter lays a solid foundation to calculate
the statistics from multiple interferers.
Analytical SIR for Cross Layer Channel Model 47
0.04
0.035
0.03
Rc=100m, Rac=500m
Pdf
0.025
0.02
0.015
0.01
0.005 Analy
Monte Carlo
0
−10 0 10 20 30 40 50 60 70 80
SIR(dB)
Fig. 2. Plots of the pdf of the SIR for different values of cell radius
Parameter Values
Rc 100 m
Rac 500 m
v xz 6 dB
vyz 10 dB
γ xz 2
γyz 4
m xz 5
myz 0.5
Ω xz 4 dB
Ωyz 6 dB
Table 1. System parameters for Fig. 2(varying cell and accessability radius)
48 Radio Communications
0.04
0.03
0.025
0.02
0.015
0.01
0.005
0
−20 −10 0 10 20 30 40 50 60 70 80
SIR(dB)
0.9
0.8
Inbuilding obstructed
0.7
0.6
0.5
0.4
0.3
0.2
0.1 Analy
Monte Carlo
0
−20 −10 0 10 20 30 40 50 60 70 80
SIR(dB)
7. References
Ahn, G.-S., Campbell, A., Veres, A. & Sun, L.-H. (2002). Support Service Differentiation for
Real-Time and Best-Effort Traffic in Stateless Wireless Ad Hoc Networks (SWAN),
IEEE Trans. Mobile Comput. 1(3): 192–207.
Alouini, M.-S. & Goldsmith, A. (1997). Capacity of Nakagami Multipath Fading Channels,
Proc. of the IEEE Vehicular Technology Conference(VTC), Vol. 1, Arizona, USA, pp. 358–
362.
Alouini, M.-S. & Goldsmith, A. (2000). Adaptive Modulation over Nakagami Fading Chan-
nels, Kluwer Journal on Wireless Commun. 13(1–2): 119–143.
Eltahir, I. (2007). The Impact of Different Radio Propagation Models for Mobile Ad hoc NET-
works (MANET) in Urban Area Environment, Proc. of the International Conference on
Wireless Broadband and Ultra Wideband Communications (AusWireless), Sydney, Aus-
tralia, pp. 30–30.
Nakagami, M. (1960). The m-distribution: A General Formula of Intensity Distribution, Sta-
tistical Methods of Radio Wave Propagation, W. C. Hoffman, Ed., New York, Pergamon
pp. 3–36.
Papoulis, A. (1991). Probability, Random Variables, and Stochastic Processes, 3 edn, McGraw–Hill.
Rappaport, T. S. (2001). Wireless Communications: Principles and Practice, 2 edn, Prentice Hall
PTR.
Tellambura, C. (1999). Cochannel Interference Computation for Arbitrary Nakagami Fading,
IEEE Trans. Veh. Technol. 48(2): 487–489.
Xia, X. & Liang, Q. (2005). Bottom-up Cross-layer Optimization for Mobile ad hoc Networks,
Proc. of the IEEE Military Communications Conference (MILCOM), Vol. 4, Atlantic City,
USA, pp. 2624–2630.
Yeh, E. & Cohen, A. (2003). A Fundamental Cross-layer Approach to Uplink Resource Alloca-
tion, Proc. of the IEEE Military Communications Conference (MILCOM), Vol. 1, Monterey,
CA, pp. 699–704.
Yun, Z. & Iskander, M. (2004). Progress in Modeling Challenging Propagation Environments,
Proc. of the IEEE Antennas and Propagation Society International Symposium, Vol. 4, Cal-
ifornia, USA, pp. 3637–3640.
Zhang, Q. (1996). Outage Probability in Cellular Mobile Radio Due to Nakagami Signal and
Interferers With Arbitrary Parameters, IEEE Trans. Veh. Technol. 45(2): 364–372.
Zorzi, M. (1997). On the Analytical Computation of the Interference Statistics with Applica-
tions to the Performance Evaluation of Mobile Radio Systems, IEEE Trans. Commun.
45(1): 103–109.
The Impact of Fixed and Moving Scatterers on the Statistics of MIMO Vehicle-to-Vehicle Channels 51
1. Introduction
In most countries, the reduction in road casualties is a top priority. The intelligent transporta-
tion system (ITS) is a national program in the U.S. aiming to improve road safety. In order
to deploy the ITS, vehicle-to-vehicle (V2V) communication techniques are needed. The ded-
icated short range communication (DSRC) standard (ASTM, 2003) is designed for V2V com-
munications. Several task groups are working on this standard including the IEEE 802.11p
(802.11p, 2006) and the IEEE 1609.4 (WAVE, 2005).
The statistical properties of V2V channels are different from the conventional fixed-to-mobile
channels. Therefore, new channel models are needed for V2V communications. The geo-
metrical two-ring model (Patel et al., 2003), (Pätzold et al., 2005) has been proposed for V2V
communications. Unfortunately, this channel model cannot be used to describe propagation
conditions along streets for V2V channels. In fact, in such an environment, the wave-guiding
along the street has a dominant effect. It was suggested in (Molisch et al., 1999) that the
wave-guiding can be implemented by using geometry-based channel models, where the scat-
terers are located on straight lines. The geometrical street model introduced in (Chelli & Pät-
zold, 2007) captures the propagation effects if the communicating vehicles are moving along
a straight street. The street model has been extended with respect to multiple clusters of scat-
terers as well as to frequency selectivity in (Chelli & Pätzold, 2008). In (Zajić et al., 2008), a
3D channel model for V2V communications has been proposed. Measurement results in (Za-
jić et al., 2008) have shown that for vehicles driving in the middle lanes of highways or in
urban environment, the double-bounce rays caused by fixed scatterers are dominant. In con-
trast to our model presented in (Chelli & Pätzold, 2007) and (Chelli & Pätzold, 2008) where
single-bounce scattering is assumed, we assume double-bounce scattering for fixed scatter-
ers. Double-bounce models are fundamentally different from single-bounce models. In fact,
for double-bounce models the angles of departure (AoD) and the angles of arrival (AoA) are
independent. This is in contrast to single-bounce models where the AoD and the AoA are
closely related. Due to this dissimilarity, the statistical properties of double-bounce models
and single-bounce models are different. Therefore, double-bounce models should be studied
carefully.
Furthermore, the presence of moving scatterers in a highway environment has a big impact on
the channel behaviour. For this reason, we study the effect of passing vehicles on the channel
statistical properties. Measurement results in (Millott, 1994) have shown that the amplitude
of waves scattered from more than one vehicle is small and the practical impact of vehicular
52 Radio Communications
noted by β Rn . For moving clusters, the symbols α M and β M stand for the AoD and the AoA,
p p
respectively. It has to be noted that for fixed clusters the AoD and the AoA are independent
since double-bounce scattering is assumed. For moving clusters, the AoD and the AoA are
closely related due to the single-bounce scattering assumption. All scatterers belonging to a
given moving cluster have the same velocity vS and the same direction of motion φS . The
transmitter and the receiver are moving with velocity vT and vR , respectively. The angle of
motion of the transmitter and the receiver w.r.t the x-axis is referred to as φ T and φ R , respec-
tively. Moreover, the transmitter (receiver) is equipped with MT (MR ) antenna elements. The
antenna element spacing at the transmitter and the receiver antenna are denoted by δT and
δR , respectively. The angle γT (γR ) describes the tilt angle of the transmit (receive) antenna
array.
Fig. 2. The geometrical street model encompassing moving and fixed scatterers.
receiver. The total number of fixed scatterers around the transmitter (receiver) is denoted by
M (N), while the number of moving scatterers is referred to as P. The complex channel gain
gkl (t) describing the link between the lth transmit antenna element AlT (l = 1, 2, . . . , MT ) and
the kth receive antenna element AkR (k = 1, 2, . . . , MR ) of the underlying MT × MR MIMO
V2V channel model can be expressed as gkl (t) = gFkl (t) + gM F
kl ( t ). The term gkl ( t ) stands for
the channel gain due to double-scattering from the fixed clusters. The channel gain caused
by the moving cluster is denoted by gM kl ( t ). We assume that the line-of-sight component is
obstructed. Next, we derive analytical expressions of the channel gains gFkl (t) and gM kl ( t ).
θ + · − · −
( ) = ∑
=
θ
√
= θ = (θ + θ ) π
θ θ
θ θ θ
[ π)
·
·
· = π (α − φ )
= λ
λ
·
·
· = − π (β − φ )
= λ
π
= + +
λ
δ
≈ −( − + ) (α − γ )
δ
≈ −( − + ) (β − γ )
π( + ) +θ
() = ∑ √
=
The Impact of Fixed and Moving Scatterers on the Statistics of MIMO Vehicle-to-Vehicle Channels 55
where
T T
T MT −2l 1 cos
am ej m− T (8)
R R
MR −2k 1 cos
bnR e j n− R (9)
2 T
DnR
TR
cmn e −j Dm Dmn
(10)
f mT T
f max cos T
m − T
(11)
f nR R
f max cos R
n − R
. (12)
It has to be mentioned that the envelope | gFkl t | follows a double Rayleigh distribution since
double-bounce scattering is assumed (Salo et al., 2006).
P
k Tp ·rT −k Rp ·r R −k Tp ·rS k Rp ·rS −k0 d p
gM
kl r T ,r R ,rS ∑ cp e j p
(13)
p 1
where c p and p represent the gain and the phase shift resulting from the interaction with the
√
moving scatterer S pM , respectively. The channel gain is given by c p 1/ P, while the phase
shifts p are i.i.d. random variables uniformly distributed over 0, 2 . The phase changes
k Tp ·r T and k Rp ·r R are associated with the movement of the receiver and the transmitter, re-
spectively, and can be written as
k Tp ·r T T
2 f max cos M
p − T
t (14)
k Rp ·r R −2 R
f max cos M
p − R
t. (15)
The spatial translation rS of the moving scatterer S pM influences the wave emitted from the
transmitter resulting in a phase change k Tp ·rS . Moreover, the scatterer S pM interacts with the
wave reflected to the receiver resulting in a phase change k Rp ·rS . These phase changes can be
expressed as
k Tp ·rS S
2 f max cos M
p − S
t (16)
k Rp ·rS −2 S
f max cos M
p − S
t (17)
S
where f max vS / is referred to as the maximum Doppler frequency caused by the moving
cluster. Recall that all scatterers S pM belonging to the moving cluster have the same speed vS .
The phase change resulting from the total travelled distance d p can be expressed as
2
k0 d p Dl p D pk (18)
56 Radio Communications
with
δT
Dl p ≈ D Tp − ( MT − 2l + 1) cos(α M
p − γT ) (19)
2
δ
D pk ≈ D Rp − ( MR − 2k + 1) R cos( β M
p − γR ) (20)
2
where D Tp and D R M
p denote the distances from the scatterer S p to the transmitter and the re-
ceiver, respectively. After substituting (14)–(20) in (13) the channel gain due to the moving
cluster can be written as
P aM bM cM
p p p j 2π ( f pTM + f pRM − f pTS − f pRS )t+θ p
gM
kl ( t ) = ∑ √ e
p =1 P
(21)
where
δT M
aM
p = e jπ λ ( MT −2l +1) cos(α p −γT ) (22)
δR
( MR −2k+1) cos( β M
b pM = e jπ λ p −γR ) (23)
2π
D Tp + D Rp
cM
p = e −j λ (24)
f pTM = T
f max cos(α M T
p −φ ) (25)
f pRM = R
f max cos( β M
p −φ ) R
(26)
f pTS = S
f max cos(α M
p −φ ) S
(27)
f pRS = S
f max cos( β M
p − φ ). S
(28)
βM
p,c M
R
are confined to the intervals [ β min,c R M M M M
R , β max,c R ], [ αmin,c M , αmax,c M ], and [ β min,c M , β max,c M ],
T
respectively. Moreover, all the AoDs αm,c T ( m = 1, 2, . . . ) have the same distribution and will
be noted henceforth by αcTT . The same statement holds for the angles β R
n,c R
, αM
p,c M
, and β M
p,c M
which will be denoted by β R
cR
, αcMM , and β cMM , respectively.
The Impact of Fixed and Moving Scatterers on the Statistics of MIMO Vehicle-to-Vehicle Channels 57
() = ( )+ ()
()
()
() ()
C C
() = ∑ ()
=
C
() = ∑ ()
=
C C
∑ =
+
C = ()
∑ =
4. Correlation Properties
(δ δ τ )
ρ
∗
ρ (δ δ τ) = () ( + τ)
C C
= ∑ ρ (δ δ τ )
=
C
+ ∑ ρ (δ δ τ )
=
(·)∗ {·}
ρ (δ δ τ )
ρ (δ δ τ ) = ( ( ))∗ ( + τ)
= ρ (δ τ ) · ρ (δ τ)
α
π (α )τ
ρ (δ τ ) = (δ α ) α (α ) α
α
58 Radio Communications
and
βR
max,c R
j2π f R ( β RR )τ
ρFcR (δR , τ ) = F
dkk R
( δR , β c R ) e c p βR ( β R R
c R ) dβ c R (35)
cR
βR
min,c R
are the transmit and the receive correlation functions, respectively, and
δT
j2π (l −l ) cos(αcTT −γT )
cllF (δT , αcTT ) = e λ (36)
δR
F R j2π (k−k ) cos( β RcR −γR )
dkk ( δR , β c R ) = e (37)
λ
f T (αcTT ) = T
f max cos(αcTT − φ T ) (38)
f R ( βR
cR ) = R
f max cos( β R R
c R − φ ). (39)
αM
max,c M
= cllM (δT , αcMM ) dkk
M M
( δR , g ( α c M ))
αM
min,c M
j2π f TM (α MM )+ f RM ( g(α MM ))− f TS (α MM ) τ
e c c c
where
δT
j2π (l −l ) cos(αcMM −γT )
cllM (δT , αcMM ) = e λ (41)
δR
M M j2π (k−k ) cos( g(αcMM )−γR )
dkk ( δR , g ( α c M )) = e (42)
λ
TM
f (αcMM ) = T
f max cos(αcMM − φ T ) (43)
f RM ( g(αcMM )) = R
f max cos( g(αcMM ) − φ R ) (44)
f TS (αcMM ) = S
f max cos(αcMM − φS ) (45)
f RS ( g(αcMM )) = S
f max cos( g(αcMM ) − φS ). (46)
The function g(·) in (40) expresses the exact relationship between the AoD αcMM and the AoA
β cMM . An expression for g(·) can be found in (Chelli & Pätzold, 2007).
The Impact of Fixed and Moving Scatterers on the Statistics of MIMO Vehicle-to-Vehicle Channels 59
The temporal ACF rzkl (τ ) of the channel gain zkl (t) is defined as rzkl (τ ) := E{z∗kl (t)zkl (t + τ )}
(Papoulis & Pillai, 2002). The temporal ACF rzkl (τ ) can be deduced from the 3D space-time
CCF ρkl,k l (δT , δR , τ ) by setting the antenna element spacings δT and δR to zero, i.e.,
The 2D space CCF ρkl,k l (δT , δR ) is defined as ρkl,k l (δT , δR ) := E{z∗kl (t)zk l (t)}. Alternatively,
the 2D space CCF ρkl,k l (δT , δR ) can be derived from the 3D space-time CCF ρkl,k l (δT , δR , τ )
by setting τ to zero, i.e.,
5. Numerical Results
In this section, we confirm the validity of the analytical expressions presented in the previous
section by simulations making use of the sum-of-cisoids method. The simulation models for
moving and fixed scatterers are designed using the modified method of equal area (MMEA)
proposed in (Gutiérrez & Pätzold, 2007). In order to model all fixed clusters, 50 cisoids are
used for the simulation model. The same number of cisoids is used to model all moving clus-
ters. The propagation environment contains six moving clusters: three clusters are located on
the right side of the transmitter and the receiver, while the remaining clusters lie on the left
side. Each moving cluster has a length of 5 m and is separated by a distance of 45 m from its
neighbour clusters. The distance between the transmitter and the moving scatterers located
on the left and the right side is set to 3 m. For the fixed clusters, we consider a propagation
environment encompassing three clusters on each side of the transmitter. Each cluster has a
length of 2 m and is separated by a distance of 34 m from its neighbour clusters. The same
number of fixed clusters is considered around the receiver. The distance between the trans-
mitter and the fixed scatterers on the left and right side is set to 300 m. The distance between
the transmitter and the receiver is equal to 100 m. The transmitter and the receiver have a
speed of 50 km/h and equal angles of motion φ T = φ R = 0. The transmitter and the receiver
antenna tilts γT and γR are set to π/2. We consider the case of non-isotropic scattering con-
ditions. The AoDs αcTT and αcMM are uniformly distributed over the intervals [αmin,cT T
T , αmax,c T ]
M
and [αmin,c M R
M , αmax,c M ], respectively. The uniform distribution is also assumed for the AoAs β c R
R
over the interval [ β min,c R
R , β max,c R ].
We present some illustrative examples for the temporal ACF rM zkl ( τ ) of the moving clusters in
Fig. 3. We study the influence of the speed of the vehicles in the vicinity of the transmitter and
60 Radio Communications
the receiver on the channel behaviour. The term vS in Fig. 3 denotes the speed of the vehicles
on the left and right side. From Fig. 3, we can notice that as the speed vS decreases, the coher-
ence time of the channel increases. It is well known that the coherence time indicates whether
we are facing a fast or a slow fading. As the speed of the vehicles relatively to the transmit-
ter and the receiver decreases the channel changes more slowly. A good fitting between the
simulation results and the theoretical results can be observed in Fig. 3. In Fig. 4, we show the
1
Reference model
Simulation model
(τ) |
0.8
Simulation
kl
Temporal ACF, | rzM
vS = 60 km/h
0.6
vS = 54 km/h
vS = 52 km/h
0.4
0.2
0
0 0.2 0.4 0.6 0.8 1
Time separation, τ (s)
Fig. 3. The absolute value of the temporal ACF rM zkl ( τ ) associated with moving scatterers for
various values of the velocity vS of the surrounding vehicles.
numerical results obtained for the 2D space CCF ρM 11,22 ( δT , δR ) caused by moving scatterers.
It could be seen from Fig. 4 that the cross-correlation function decreases as we increase the
antenna spacings δT and δR . However, the decay of the 2D space CCF ρM 11,22 ( δT , δR ) is faster
along the δR direction. Hence, a small antenna spacing at the receiver side guarantees a diver-
sity gain, but at the receiver side, we need a larger spacing to get non-correlated channels. In
11,22(δT , δR ) |
0.8
2D space CCF, | ρM
0.6
0.4
0.2
0
0
0.5 3
1 2
δR /λ 1.5 1
2 0
δT /λ
Fig. 5, we illustrate the numerical results for the transmit correlation function ρFT (δT , τ ) of the
reference model resulting from fixed scatterers. The obtained results are confirmed by simu-
lation in Fig. 6. Similar results have been found for the receive correlation function ρFR (δR , τ )
associated with fixed scatterers since the same setting for the scatterers is considered around
the transmitter and the receiver. Limited space prevents us from including these results.
0.8
0.6
0.4
0.2
0
0
0.5 0.1
0.08
1 0.06
δT /λ 1.5 0.04
0.02
2 0 τ
Fig. 5. The transmit correlation function ρFT (δT , τ ) of the reference model due to fixed scatter-
ers.
Transmit CF , | ρ̃TF (δT , τ) |
0.8
0.6
0.4
0.2
0
0
0.5 0.1
0.08
1 0.06
δT /λ 1.5 0.04
0.02
2 0 τ
Fig. 6. The transmit correlation function ρ̃FT (δT , τ ) of the simulation model related to fixed
scatterers.
6. Conclusion
In this chapter, we have presented a narrowband MIMO V2V channel model, where both the
impact of fixed and moving scatterers were taken into account. Double-bounce scattering is
assumed for the fixed scatterers, while single-bounce scattering is considered for the moving
62 Radio Communications
scatterers. For reasons of brevity, we have restricted our investigations to non-line-of-sight sit-
uations. A reference model has been derived starting from the geometrical street model. The
statistical properties of the proposed channel model have been studied. We have provided
analytical expressions for the 3D space-time CCF, the temporal ACF, and the 2D space CCF.
Supported by our analysis, we are convinced that the effect of moving scatterers on the statis-
tics of V2V MIMO channels cannot be neglected. The investigation of the impact of moving
scatterers have revealed that as the speed of the vehicles in the vicinity of the transmitter and
the receiver decreases, the channel coherence time increases. The proposed channel model is
suitable for a highway environment under congestion conditions. In such conditions, the low
relative speed of the vehicles in the vicinity of the transmitter and the receiver allows us to
consider that the AoD and the AoA seen from moving clusters are non-time-variant during
a sufficiently large period of time. Actually, if the AoD and the AoA are time-variant, the
channel model becomes non-stationary. The latter aspect will be investigated in future work.
7. References
802.11p (2006). Wireless access in vehicular environment (WAVE) in standard 802.11 infor-
mation technology telecommunications and information exchange between systems,
local and metropolitan area networks, specific requirements, part 11: Wireless lan
medium access control (MAC) and physical layer (PHY) specifications, Technical Re-
port p/D1.0, IEEE 802.11.
ASTM (2003). Standard specification for telecommunications and information exchange be-
tween roadside and vehicle systems - 5 ghz band dedicated short range communica-
tions (DSRC) medium access control (MAC) and physical layer (PHY) specifications.
ASTM E2213-03.
Chelli, A. & Pätzold, M. (2007). A MIMO mobile-to-mobile channel model derived from a
geometric street scattering model, Proc. 4th IEEE International Symposium on Wireless
Communication Systems, ISWCS’07, Trondheim, Norway, pp. 792–797.
Chelli, A. & Pätzold, M. (2008). A wideband multiple-cluster MIMO mobile-to-mobile channel
model based on the geometrical street model, Proc. 19th IEEE Int. Symp. on Personal,
Indoor and Mobile Radio Communications, IEEE PIMRC 2008, Cannes, France.
Gutiérrez, C. A. & Pätzold, M. (2007). Sum-of-sinusoids-based simulation of flat fading
wireless propagation channels under non-isotropic scattering conditions, Proc. 50th
IEEE Global Telecommunications Conference, GLOBECOM 2007, Washington, DC, USA,
pp. 3842–3846.
Millott, L. (1994). The impact of vehicular scattering on mobile communications, Proc. 44th
IEEE Veh. Technol. Conf., VTC’1994, Stockholm, Sweden, pp. 1733–1736.
Molisch, A., Kuchar, A., Laurila, J., Hugl, K. & Bonek, E. (1999). Efficient implementation of
a geometry-based directional model for mobile radio channels, Proc. 50th IEEE Veh.
Technol. Conf., VTC’1999-Fall, Amsterdam, Netherlands, pp. 1449–1453.
Papoulis, A. & Pillai, S. U. (2002). Probability, Random Variables and Stochastic Processes,
McGraw-Hill, New York.
Patel, C. S., Stüber, G. L. & Pratt, T. G. (2003). Simulation of Rayleigh faded mobile-to-mobile
communication channels, Proc. 58th IEEE Veh. Technol. Conf., VTC’03, Orlando, FL,
USA, pp. 163–167.
Pätzold, M., Hogstad, B. O., Youssef, N. & Kim, D. (2005). A MIMO mobile-to-mobile channel
model: Part I - The reference model, Proc. 16th IEEE Int. Symp. on Personal, Indoor and
Mobile Radio Communications, PIMRC 2005, Berlin, Germany, pp. 573–578.
The Impact of Fixed and Moving Scatterers on the Statistics of MIMO Vehicle-to-Vehicle Channels 63
Salo, J., El-Sallabi, H. & Vainikainen, P. (2006). Impact of double-Rayleigh fading on system
performance, Proc. 1st IEEE Int. Symp. on Wireless Pervasive Computing, ISWPC 2006,
Phuket, Thailand.
WAVE (2005). Wireless access in vehicular environments (WAVE) channel coordination. IEEE
P1609.4/D05.
Zajić, A. G., Stüber, G. L., Pratt, T. G. & Nguyen, S. (2008). Statistical modeling and experi-
mental verification of wideband MIMO mobile-to-mobile channels in highway envi-
ronments, Proc. 44th IEEE Veh. Technol. Conf., VTC’1994, Cannes, France.
64 Radio Communications
Planar Antenna Array Hybrid Beamforming for SDMA in Millimeter Wave WPAN 65
1. Introduction
The increasing demands on bandwidth for personal and indoor wireless multimedia applica-
tions have driven the research and development for a new generation of broadband wireless
personal area network (WPAN) Alliance (n.d.); IEEE 802.11 WLAN Very High Throughput in
60GHz (n.d.); IEEE 802.15 WPAN Millimeter Wave Alternative PHY Task Group (TG3c) (n.d.);
WirelessHD (n.d.). This new WPAN is intended to support data rate up to 5Gbps or more and
allows for wireless interconnection among devices, such as laptops, camcorders, monitors,
DVD players and cable boxes, etc. Moreover, it could also serve as a wireless alternative to
the High-Definition Multimedia Interface (HDMI).
In addition to its very large bandwidth, the new WPAN also demands for short-range and
secure wireless connections. The characteristics of broad unlicensed bandwidth FCC (2004),
high penetration loss Smulders (1995; 2002) and significant oxygen absorption Anderson &
Rappaport (2004) at 60GHz radio make it an ideal wireless interface for the next generation
WPAN. Furthermore, the millimeter wavelength of 60GHz radio also makes it possible to use
tens of tiny antennas to steer radio signals with high directivity to the intended receivers. This
feature of high-directivity beam pattern not only improves the wireless link quality Balanis
& Ioannides (2007) but also increases the spatial reuse factor, allowing for multiple users to
gain access to the wireless channel at the same frequency and time. In view of the great
potential of 60GHz radio on WPAN and the advantages of beamforming (BF) for millimeter
wave (mmWave) applications, we study in this article a simple hybrid beamforming (HBF)
technique for spatial division multiple access (SDMA) using planar antenna arrays (PAAs).
Digital BF has been used to compensate the rather fixed radiation patterns of switch-beam
or beam-selection antennas to create more flexible hybrid beam patterns Celik et al. (2006);
Rezk et al. (2005); Zhang et al. (2003). In conjunction with the phase shifters of the element
antennas of PAAs, a hybrid type of BF is considered in Smolders & Kant (2000) which exploits
the advantage of BF both in the baseband and the radio-frequency (RF) ranges. Motivated by
the above results and taking into account the practical limitation and implementation cost of
the full digital BF, we study herein a special type of baseband and RF HBF for SDMA that
only requires four digital processing paths to support HBF on a 8 × 8 PAA illustrated in Fig.
1. The entire PAA of Fig. 1 is partitioned into four blocks of patch antennas. Each block is
driven by a digital BF weight, while each element patch antenna in a block is equipped with
66 Radio Communications
an individual phase shifter. With this configuration, we study the design of HBF for two-user
SDMA and compare its performance with that of RF BF only.
The content of this chapter is organized in the following order. First, some concept and the
configuration about PAA will be reviewed in Section II and applied to SDMA using recon-
figurable PAA. In Section III, the baseband-and-RF hybrid BF (HBF) will be introduced for
SDMA, and the linear constrain minimum power (LCMP) digital BF technique will be reap-
plied to this new setting of PAA HBF over mmWave radio. The signal to interference-plus-
noise ratios (SINRs) of users with the aforementioned BF scheme will be investigated in Sec-
tion IV and the BER simulations will also be conducted on an OFDM-based WPAN to verify
the performance of HBF for SDMA over mmWave radio. Conclusions will be drawn in Section
V.
1.5
25
1
20
0.5
15
0 10
5 5
5
5 5 0 0.5 1 1.5
n =1
M q
×e jqM(Ψy + β y,( p,q) ) ∑ e j(m−1)(Ψy +(−1) β y,( p,q) )
(4)
m =1
68 Radio Communications
dy
dx
4dx
4dy
Fig. 3. Partitions of the planar antenna arrays. Patch antennas in different color belong to
different block.
where Ψ x kd x cos φ sin θ and Ψy kdy sin φ sin θ. The distances in the x and y directions
between adjacent patch antennas are denoted by d x and dy , respectively. And β x,( p,q) and
β y,( p,q) are the corresponding phase differences in the x and y directions between adjacent
patch antennas. The number of antennas in the x direction of a block is M and the number of
antennas in the y direction is N. Given the desired direction (φd,( p,q) , θd,( p,q) ) set for the block
( p, q), β x,( p,q) and β y,( p,q) are equal to
β x,( p,q) = (−1) p+1 kd x sin θd,( p,q) cos φd,( p,q) ± 2c1 π (5)
q +1
β y,( p,q) = (−1) kdy sin θd,( p,q) sin φd,( p,q) ± 2c2 π (6)
where c1 and c2 are any integers. It is noted that the array factor (4) is a periodic function with
a period of 2π and is zero whenever (φ, θ ) satisfy either one of the following two conditions
when c3 and c4 are integers not equal to the multiples of N and M, respectively.
where Z stands for the integer number. Fig. 4 shows the contour plot of the corresponding
array pattern when θd,(0,0) = 0. It is clear that the maximum array gain of 36 dB is achieved
Planar Antenna Array Hybrid Beamforming for SDMA in Millimeter Wave WPAN 69
at θ = θd,(0,0) = 0. Scaling the power by 1/MN for each element antenna of the M × N PAA,
.
the maximum effective array gain is 10 log10 (64) = 18 dB.
70 Radio Communications
90 1 RF
120 60 Baseband
0.8
0.6
150 30
0.4
0.2
180 0
210 330
240 300
270
Fig. 6. The polar plot of the HBF pattern with the partition in Fig. 3 when θd = π/2.
However, it is impractical to apply a baseband BF weight for each element antenna of the
8 × 8 PAA. Taking into account the implementation cost, each partition of PAA is driven by a
common baseband BF weight, while each antenna is still equipped with an individual phase
shifter. To distinguish the array factor B(φ, θ ) formed with the baseband BF weights of a
user from the array factor A(φ, θ ) obtained by tuning the phase of the radiated wave of each
antenna, we refer to B(φ, θ ) as the baseband array factor (BAF) in contrast to the array factor
A(φ, θ ) tuned in the radio-frequency (RF) band.
Now we consider this hybrid type of baseband and RF BF for the simple partition shown in
Fig. 3. Suppose that the RF array factor (RAF) for different blocks of a user are the same and
pointed to the desired direction of interest, the composite beam pattern of HBF is given by
where A(φ, θ ) is the array factor of the 4 × 4 antenna arrays. In the extreme case of Fig. 3 that
the entire PAA is used to support a single user, the BAF is given by
1 1
B(φ, θ ) = ∑ ∑ w(r,s) e j4rΨ x
e j4sΨy . (12)
r =0 s =0
where Ψ x kd x cos φ sin θ and Ψy kdy sin φ sin θ. The enlarged distances between the ad-
jacent effective antennas make 4kd x = 4kdy = 4π in (12) as dx = dy = λ/2, which in turn
Planar Antenna Array Hybrid Beamforming for SDMA in Millimeter Wave WPAN 71
results in the periodic baseband beam pattern of B(φ, θ ) shown in Fig. 6. The angular coordi-
nate corresponds to the elevation angle θ and the radial coordinate represents the normalized
BF gain. Due to the periodic pattern, the product of B(φ, θ ) and A(φ, θ ) will yield significant
sidelobes on both sides of the main beam. For clarity, the RAF A(φ, θ ) of the 4 × 4 block is also
shown in Fig. 6. Since the patch antenna has a fixed radiation pattern, its pattern is not shown
in the figure.
2dy
2dx
dx
dy user1
Fig. 7. The partition of the PAA for two-user SDMA, where patch antennas of the same color
belong to the same block.
where Ψ xi 4kd x cos φi sin θi and Ψyi 4kdy sin φi sin θi , and {φi , θi } is the desired beam
direction of user i. Substituting the constraints of
1, i = m
Bm (φi , θi ) = , i, m ∈ {1, 2}. (19)
0, i = m
back into (17) and (18) yields the coefficients bi and ci . Furthermore, equating the Bm (φ, θ )
respectively for m ∈ {1, 2} in (13) ∼ (18) results in the baseband BF weights
2
w(1,r) = ∑ bi e− jrΨ xi
, (20)
i =1
2
w(2,r) = ∑ ci e− jΨ xi
e− jrΨyi r ∈ {0, 1}. (21)
i =1
where S x E{x2 (t)}, C [si (φ1 , θ1 ), si (φ2 , θ2 )] with {φi , θi } being the desired beam direc-
tion of user i, and ei is a 1 × 2 basis vector with 1 in the ith position and the others zero.
The above optimization problem can be easily solved by making use of the Lagrange multi-
plier as below
J = wiH S x wi + wiH C − eiH λ + λ H C H wi − ei (25)
with the Lagrange multiplier λ [λ1 , λ2 ]T . Taking the complex gradient of J respect to wiH
and setting it to zero yields
1
S x w + Cλ = 0 =⇒ w = −S−
x Cλ. (26)
Substituting (26) into (24) gives
1 H −1
− λ H C H S− H H H
x C = ei =⇒ λ = − ei [ C S x C ]. (27)
Furthermore, substituting (27) back into (26), the resultant optimal BF weight vector for user i
is given by
1 −1 H −1
wiH = eiH [C H S−
x C] C S x . (28)
Planar Antenna Array Hybrid Beamforming for SDMA in Millimeter Wave WPAN 73
4. Computer Simulations
We demonstrate simulation results for the HBF schemes studied in the previous section for
SDMA. The transmit SNR in the following simulations is set to 30 dB for each user if no
specific description.
SINR SINR
1.5 1.5
25 25
1 1
20 20
15 15
0 0
10 10
5 5
( , /4)
5 5
5 5
5 5 0 0.5 1 1.5 5 5 0 0.5 1 1.5
Fig. 8. The contour plots of SINR for user 1 and 2 using the RF BF. The left plot corresponds
to user 2 and the right plot to user 1, with the desired directions of user one and two set at
(φ1 , θ1 )=(0, π/4) and (φ2 , θ2 )=(π, π/4), respectively.
Fig. 8 presents the contour plots of the SINRs of user one and two when using the RF BF
method of (4). The contour plots are shown in the cylindrical coordinate. The radial coordi-
nate maps to the elevation angle θ and the angular coordinate maps to the azimuth angle φ.
The desired directions of user one and two are set at (φ1 , θ1 )=(0, π/4) and (φ2 , θ2 )=(π, π/4),
respectively. The resultant SINR in the desired direction of each user is equal to 16.18dB.
SINR SINR
1.5 1.5
22 22
20 20
1 1
( , /4) 18 18
(0, /4)
0.5 16 0.5 16
14 14
0 12 0 12
10 10
5 8 5 8
6 6
4 4
2 2
5 5
5 5 0 0.5 1 1.5 5 5 0 0.5 1 1.5
Fig. 9. The contour plots of SINR for user 1 and 2 using the HBF of LCMP. The left plot
corresponds to user 2 and the right plot to user 1, with the desired directions of user one and
two set at (φ1 , θ1 )=(0, π/4) and (φ2 , θ2 )=(π, π/4), respectively.
With the same simulation setting for RF BF, the contour plots of SINRs with HBF of LCMP are
shown in Fig. 9. In comparison with the results in Fig. 8, we can see that the main beam here
for each user is much more stronger and narrower, while the side beams are relative fewer and
weaker. In addition, the resultant SINR in the desired direction of each user is now increased
74 Radio Communications
to 24.09dB in Fig. 9 as oppose to the 16.18dB in Fig. 8 for the RF BF. This demonstrates that
the interference can be suppressed effectively in the desired directions of users with the HBF
of LCMP method. Besides, the results of HBF with MD BF are also similar to those of LCMP
and, hence, are not shown here.
In addition to SINR, directivity is also an important performance measure to characterize the
effectiveness of BF. To reflect the interference due to the multiple access in SDMA, the original
definition for directivity in Balanis (1997) is modified into
4πSINRi (φi , θi )
Di = π . (29)
2π
0 0
2
SINRi (φ, θ ) sin(θ )dθdφ
This new definition for directivity automatically refers to the traditional notion of directivity
in the single-user system.
According to this definition of directivity, Table 1 summarizes the results of SINRs, directiv-
ities and radiation powers for the RF BF and HBF schemes of MD and LCMP, respectively,
when the desired directions of users are set at (φ1 , θ1 ) = (0, π/4) and (φ2 , θ2 ) = (π, π/4).
The radiation power for each user is evaluated with
2π π
2
| Hi (φ, θ )|2 sin(θ )dθdφ (30)
0 0
Table 1. The SINRs, directivities and the radiation power of the RF BF and the HBF schemes
of MD and LCMP.
In addition to typical measures for the evaluation of a BF scheme, we also investigate the
effectiveness of HBF from the perspective of wireless communications systems. To this end,
we study the performance of a two-user SDMA with PAA in orthogonal frequency division
multiplexing (OFDM) wireless communications systems. The OFDM system simulates the
physical layer proposal of IEEE802.11 task group AD for very high throughput in 60GHz
Channel Models for 60 GHz WLAN Systems (n.d.). Specifically, we consider an indoor simu-
lation setting as shown in Fig. 10 for a two-user SDMA system operating in the 60GHz wire-
less channel model proposed for IEEE802.11ad Channel Models for 60 GHz WLAN Systems
(n.d.). The system bandwidth is assumed to be 1GHz and the length of fast fourier transform
(FFT) is 1024.
Planar Antenna Array Hybrid Beamforming for SDMA in Millimeter Wave WPAN 75
Fig. 10. The indoor simulation setting for a two-user SDMA system.
The simulated transmitter is placed at the position of (0.5, 3) from the lower left corner of the
room and transmits signals simultaneously to the two users locating at (2.5, 1) and (5.5, 8),
respectively, using either the RF BF setting shown in Fig. 8 or the HBF setting of LCMP in Fig.
9. The users’ data are first modulated with QPSK and then transformed with the 1024-point
inverse fast fourier transform (IFFT). The transformed OFDM symbol is added with a cyclic
prefix of 1/8 of the OFDM symbol and then transmitted with the corresponding BF techniques
to the intended users simultaneously. The transmitted signals propagate through the 60GHz
channel modeled according to Channel Models for 60 GHz WLAN Systems (n.d.) to come to
the two receivers of Fig. 10. At the receivers, we assume that the same RF BF with a 8 × 4
PAA is used by each receiver to enhance the signal qualities, supposing that the beam pattern
of each user is pointed to its desired angle of arrival.
0
10
10
10
BER(raw data)
10
10
User 2 with RF BF
10 User 2 with HBF of LCMP
User 1 with RF BF
User 1 with HBF of LCMP
10
0 5 10
Tx SINR(in dB)
Fig. 11. The BERs for a two-user SDMA system in an indoor environment of Fig. 10.
76 Radio Communications
To recover the data, the receivers first remove the cyclic prefixes of each and then perform FFT
followed by channel equalization for symbol detection. The bit error rate (BER) for each user
is shown in Fig. 11 with respect to the transmitted SINR. As can be seen from the figure, the
SNR advantages for users using the HBF of LCMP are around 10dB against the users using
the RF BF only, even though the HBF gain of LCMP is only 7.91dB higher than that of RF BF.
5. Conclusions
We presented HBF techniques for SDMA in 60GHz radio using reconfigurable PAA. Accord-
ing to our simulation studies, the BF gain of HBF can be as much as 7.9dB higher than that
of RF BF. Furthermore, the BER of using HBF in a simulated OFDM environment can have
an even higher SNR advantage of 10dB against that of using the RF BF only. These results
demonstrate the potential of HBF with PAA for SDMA in mmWave applications.
6. References
Alliance, W. (n.d.). http://www.wimedia.org/.
Anderson, C. R. & Rappaport, T. S. (2004). In-building wideband partition loss measurements
at 2.5 and 60 GHz, IEEE Trans. on Communications 3(3): 922–928.
Balanis, C. A. (1997). Antenna Theory, 2 edn, John Wiley & Sons.
Balanis, C. A. & Ioannides, P. I. (2007). Introduction to Smart Antennas, Morgan and Claypool.
Celik, N., Kim, W., Demirkol, M., Iskander, M. & Emrick, R. (2006). Implementation and exper-
imental verification of hybrid smart-antenna beamforming algorithm, IEEE Antennas
and Wireless Propagation Letters 5: 280–283.
Channel Models for 60 GHz WLAN Systems (n.d.). 11-09-0334-02-
00ad-channel-models-for-60-ghz-wlan-systems.doc. available at
http://www.ieee802.org/11/Reports/tgad_update.htm.
FCC (2004). Code of federal regulation, title 47 telecommunication, chapter 1, part 15.255.
IEEE 802.11 WLAN Very High Throughput in 60GHz (n.d.). available at
http://www.ieee802.org/11/.
IEEE 802.15 WPAN Millimeter Wave Alternative PHY Task Group (TG3c) (n.d.). available at
http://www.ieee802.org/15/pub/TG3c.html.
Kuhwald, T. & Boche, H. (1999). A constrained beam forming algorithm for 2D planar antenna
arrays, Proc. IEEE VTC-Fall, Amsterdam, The Netherlands.
Rezk, M., Kim, W., Yun, Z. & Iskander, M. (2005). Performance comparison of a novel hybrid
smart antenna system versus the fully adaptive and switched beam antenna arrays,
IEEE Antennas and Wireless Propagation Letters 4: 285–288.
Smolders, A. B. & Kant, G. W. (2000). THousand Element Array (THEA), Proc. IEEE Antennas
and Propagation Society International Symposium, Salt Lake City, UT.
Smulders, P. (1995). Broadband wireless LANs: a feasibility study, Ph. D. thesis,
Eindhoven, Univ. of Tech., The Netherlands, ISBN 90-386-0100-X . available at
http://alexandria.tue.nl/extra3/proefschrift/PRF11B/9505571.pdf.
Smulders, P. (2002). Exploiting the 60 GHZ band for local wireless multimedia access:
prospects and future directions, IEEE Communications Magazine 2(1): 140–147.
Trees, H. L. V. (2002). Optimum array processing. Part. IV of detection, estimation and modulation
theory., John Wiley & Sons.
WirelessHD (n.d.). http://www.wirelesshd.org/index.html.
Zhang, Z., Iskander, M., Yun, Z. & Host-Madsen, A. (2003). Hybrid smart antenna system
using directional elements - performance analysis in flat Rayleigh fading, IEEE Trans.
on Antennas and Propagation 51(10): 2926–2935.
A Distributed Multilayer Software Architecture for MIMO Testbeds 77
1. Introduction
The use of multiple antennas at both transmission and reception, also known as Multiple In-
put Multiple Output (MIMO) transmission systems, has received a lot of interest from the
wireless communications industry during the last years. Communications in wireless chan-
nels using MIMO technologies exhibits a superior performance in terms of spectral efficiency,
reliability and data rate when compared to conventional single antenna technologies (Foschini
& Gans, 1998; Telatar, 1999). Existing and emerging standards for wireless communications
such as IEEE 802.11 (WiFI), IEEE 802.16 (WiMAX) and Long Term Evolution (LTE), support
multi-antenna transmission in their highest performance profiles.
In spite of their potential performance-enhancing capabilities, most of the research on MIMO
technologies up to the moment is based on theoretical studies. Typically, the expected gains
of MIMO technologies are only shown under ideal conditions since most analysis rely on
simulations. Experiments in real-world scenarios by means of hardware implementations are
necessary to measure the actual performance of multi-antenna transmission methods. Hard-
ware implementations not only take into account the real multipath propagation in wireless
channels but also the implementation impairments so often ignored during the simulations.
Hardware implementations can be split into three groups (Rupp et al., 2006). The first one is
constituted by demonstrators which are frequently designed having in mind a particular stan-
dard or specification. Demonstrators usually exhibit good technical features for real-time im-
plementations but they are extremely expensive and present poor flexibility and modularity.
The second group is formed by prototypes of a final product. A prototype is a real-time imple-
mentation of a system specifically developed to support an industrial need. Prototypes often
constitute a preliminary stage where the system is implemented and debugged and later on
implemented as a consumer product. Finally, the third set is formed by testbeds that support
real-time transmission capabilities while data is generated and post-processed off-line.
In addition, hybrid solutions can be devised. As an example, a testbed can carry out some op-
erations in real-time with the purpose of speeding up the measurement process. Usually, can-
didate signal processing operations to be implemented in real-time are those that operate at
sample level and/or do common tasks for all experiments, i.e. I/Q modulation, up-sampling,
pulse-shaped filtering, etc. Throughout this chapter we will focus on testbeds because they
use open designs and are more often found in public research centres and academia.
Various MIMO testbeds have been reported in the literature (Borkowski et al., 2006; Caban
et al., 2006; Fabregas et al., 2006; Haustein et al., 2006; Nieto et al., 2006; Ramı́rez et al., 2008;
78 Radio Communications
Rao et al., 2004; Wilzeck et al., 2006; Zhu & Fitz, 2005). Some of them have been constructed
to evaluate a particular standard or specification while others have been designed for general
purpose. Flexibility, development time consumption, throughput or costs are important fea-
tures when comparing existing testbeds. Also, it should be noticed the educational possibili-
ties of testbeds that open the door to many teaching opportunities. In the literature, however,
there is a lack of up-to-date guides and tutorials useful for the construction of a new testbed
from the scratch. Indeed, there exists few contributions (Caban et al., 2006; Garcı́a-Naya et al.,
2008a; Rao et al., 2004; Rupp et al., 2007) that contain a detailed description of the constructed
MIMO testbed and, except for (Garcı́a-Naya et al., 2008a; Rupp et al., 2007), the information
contained on them is already outdated.
Based on the previous experience acquired by the research group of the authors in building
and setting up MIMO testbeds, as well as performing indoor measurements (Pérez-Iglesias
et al., 2008; Ramı́rez et al., 2008), we can assert that once the testbed hardware is available
and properly configured, accessing the testbed becomes the main and also frequently ignored
issue. When a research team decides to start the process of acquiring and/or constructing a
new testbed, they need to take into account numerous aspects related both with the hardware
and its technical features, and the extensibility possibilities for the future (Garcı́a-Naya et
al., 2008a; Rupp et al., 2007). Usually, most of the efforts are devoted to the testbed setup,
which results in equipment that is hardly usable by people not involved in its design and
later configuration. This makes extremely difficult to access to the testbed.
As a result, the migration of an algorithm from a simulation environment to a testbed involves
cumbersome low-level programming to access the hardware as well as a very detailed knowl-
edge of the hardware. Additionally, hardware implementation problems frequently ignored
by simulations arise, such as time and frequency synchronization, I/Q imbalances, non lin-
ear distortions caused by the power amplifiers, etc. All these issues make difficult to assess
new MIMO transmission methods in a testbed. For this reason, it is desirable to make the
testbed accessible to final users at a reasonable abstraction level. This goal represents an im-
portant challenge due to the large amount of heterogeneous technologies and development
environments that have to be integrated together. However, if this challenge is accomplished,
the final result is a very attractive product for the user, who can focus on the development of
new transmission techniques that can be easily translated to the testbed and later evaluated
in realistic scenarios.
In this chapter we describe how to solve all previously mentioned limitations by using a dis-
tributed multilayer software architecture. This architecture enables the testbed to be easily
accessible by the researchers and to be integrated in the development environment they are
using. Although all designs and results herein presented are particularized for our MIMO
testbed (Garcı́a-Naya et al., 2008b; Ramı́rez et al., 2008), they are easily adaptable to most of
the existing testbeds, making even possible the integration of heterogeneous testbed nodes in
order to build a multi-terminal testbed.
The proposed software architecture consists of three different layers:
1. The middleware layer (MWL) is the lowest-level layer that interacts with the testbed
hardware. It makes the testbed accessible through standard TCP socket connections.
2. The signal processing layer (SPL) performs the necessary operations required to con-
vert the discrete-time sequences provided by the final user into discrete-time signals
suitable to be transmitted by the hardware. At the receiver, it is usual to perform signal
processing operations like time and frequency synchronization in case they are not car-
ried out by the testbed hardware. The tasks compounding the signal processing layer
A Distributed Multilayer Software Architecture for MIMO Testbeds 79
can also be executed in real-time by the testbed hardware. For example, digital up and
down converters are frequently available in the libraries of programmable hardware
modules.
3. The testbed interface layer (TIL) is the highest-level layer and presents the testbed to
the user at an adequate abstraction level. The TIL has to be designed and implemented
for a specific development environment. For example, if the final user makes use of
Matlab, then a specific implementation of the TIL for Matlab has to be developed. The
main purpose of the TIL is to provide a simplified interface to access the testbed. This
does not prevent from providing mechanisms to control the hardware in detail from
the TIL. It is very important to emphasize that there is no logic in the TIL except that
necessary for adapting the data format from the specific environment used by the SPL
and vice versa. The only requirement for the TIL to be implemented is the availability
of a standard TCP socket library.
The whole design and implementation of the proposed software architecture is done under
the following premises:
1. Layers have to be as decoupled as possible. This is a fundamental idea in modern
software design and structured programming. The key idea is not to replicate function-
alities that are already present in another layer, which would be a symptom of a bad
design. The basic premise is to design everything to be fully decoupled and reusable;
and later on introduce some small violations of this principle only if they are strictly
needed to increase the overall system performance.
2. Each layer can be extended and/or customized to be able to adapt them to future spec-
ifications and/or heterogeneous hardware environments. It is important that this layer
upgrade be done without needing a complete remake of the software, which is fre-
quently the only solution in case of monolithic non-layered systems.
3. Finally, layers should be distributed, which means that they use remote connections
to interact among them. On the one hand, this helps to ensure the decoupling and
independence principles whereas, on the other hand, allows the testbed to be remotely
accessible from the user Personal Computer (PC).
The remaining of this chapter is structured as follows. Section 2 and Section 3 provide a
global description of the testbed hardware and software possibilities, respectively. Section 4
describes the software technologies that were used to develop the proposed distributed multi-
layer software architecture. In Section 5 the software architecture is presented and described.
The interaction among the different layers and components of the architecture is studied in
Section 6 and Section 7. Finally, Section 8 is devoted to the conclusions.
Among the three different types of hardware implementations described above (demonstra-
tors, prototypes and testbeds), testbeds present the following advantages:
• Flexibility. Testbed hardware is meant to be used for off-line processing. Only the
signals are sent and acquired in real-time. This implies that testbed hardware is not
subject to the real-time restrictions even though the hardware can include some sort of
real-time capabilities.
• Modularity. Usually, the minimum modularity found in a testbed is given by the sep-
aration between the digital hardware (up to the D/A and A/D converters) and the RF
hardware. Sometimes, the digital hardware can be split in different modules perform-
ing specific operations: D/A and A/D conversion, digital up and down conversion,
signal buffering, etc. For the RF section it is possible to find self-made solutions or
commercial products. Lastly, commercial RF front-ends also permit some degree of
flexibility, for example allowing dual-band operation, RF carrier selection for each band
or adjusting the gains at the transmitter and receiver amplifiers.
• High-level language development. Having in mind that most of the processing tasks
are carried out off-line, general-purpose processors are the most adequate for process-
ing the generated/acquired signals. This allows the utilization of high level program-
ming environments (e.g. Matlab, C/C++, Java) and the simplification of the imple-
mentation stages both in time and complexity. This feature also provides an additional
flexibility degree, because it is easy to change the implementation on the fly.
• Floating-point versus fixed-point precision. As a consequence of the off-line process-
ing and the usage of high-level programming environments, the operations are carried
out in the floating-point domain instead of using fixed-point operations available for
real-time devices. This permits the researcher to focus on the implementation rather
than considering some other problems like arithmetic precision of the operations.
Testbed hardware components can be classified into three groups according to their function-
ality, as shown in Fig. 1. The first one is the host system, usually a PC and consequently
referred to as host PC. It is the equipment that allocates one or more boards containing the
digital section of the hardware testbed (including D/A and A/D converters). The second
group is constituted by the digital hardware components and, finally, the third one is formed
by the RF front-ends. The D/A and A/D converters generally constitute the frontier between
A Distributed Multilayer Software Architecture for MIMO Testbeds 81
the digital and analogue hardware. In the digital section, a bus termed main bus allows trans-
ferring the data from the host to the testbed hardware and the other way around. Next, a set
or just one digital bus interconnects the digital hardware (DSPs, FPGA, memory buffers, etc.)
with the D/A and A/D. Finally, for the interconnection among the D/A and A/D converters
and the RF front-ends coaxial cables are used.
With this basic configuration, it is possible to send samples directly coming from the main bus,
convert them into the analog domain using the D/A converters and up convert them to the
desired carrier RF using the front-ends. At the receiver side, the signals are down converted
by the RF front-ends, digitally converted by the A/D converters and then sent to the host
through the main bus. Note that the main bottleneck in this scheme is the maximum data rate
provided by the main bus, especially if there are no digital up and down converters available.
In the most recent boards, by using PCI express or similar solutions is possible to use the host
memory as a buffer while samples are transferred in real-time through the main bus.
A first improvement of this basic scheme consists in incorporating a digital up converter
(DUC) before each D/A converter at the transmitter and a digital down converter (DDC) after
each A/D converter at the receiver. These devices can be dedicated elements or can be imple-
mented in a FPGA. Incorporating DUC and DDC into the MIMO testbed design allows trans-
ferring complex signals from/to the host, reducing both the transfer rate at the main bus and
the software complexity. For MIMO operation, DDCs and DUCs must be fully synchronized.
Additionally, another improvement consists in implementing some of the time-consuming
sample-level tasks in FPGAs (e.g. time and frequency synchronization).
2.2 RF Front-Ends
RF front-ends constitute one of the major hindrances in the testbed building process. They are
responsible of up converting IF or baseband signals to RF. The most common RF bands are
the unlicensed ISM located at 2.4 and 5.8 GHz. It is easier to find components for such bands
but also unpredictable interference is present in such spectrum portions. High linearity and
flexibility in terms of supported carried frequencies and bandwidths are desirable features for
82 Radio Communications
the RF front-ends. However, the most advanced front-ends commercially available are only
dual-band and have fixed maximum bandwidth. A fundamental feature needed to be able to
carry out experiments is the possibility of modifying the transmit power. Also, the majority
of the front-ends are designed for SISO operation, making difficult to adapt them to a MIMO
system. Moreover, once the front-end has been acquired, extensive test on it is needed and
expensive measurement equipment is required.
It is important to emphasize that RF hardware is expensive compared to the cost of the digital
hardware and does not follow Moore’s law (Moore, 1998).
can be easily understood with an example. Imagine a two-tier system. One tier is the client
while the other is the server and they are mapped into two different processes interconnected
by means of sockets. It does not matter if both processes are in the same physical machine
or not. What is important is how they interact with each other. The server will be waiting
for a request from one of the clients. As soon as the request arrives, the server starts to serve
the petition and, simultaneously, starts waiting for another request. When the server process
is going to serve a new request, it clones itself to serve the petition. Frequently, this process
cloning mechanism is omitted and it is considered as an implementation detail. Therefore,
to describe the interaction between different tiers, it is assumed that each tier is mapped into
a process that interchanges messages with other processes (tiers). Although this approach is
not completely rigorous, it is enough for our purposes. In the literature such interactions are
described my means of sequence diagrams as we will do.
But there is still one open question: How are messages sent from one tier to another? In
principle, data transfer between two tiers is part of the architecture design, but in practice
only the message types and the data are defined by using sequence diagrams, which drives to
the definition of a part of the system termed protocol. A protocol defines the interaction among
all tiers, specifying the type of messages to be sent from one tier to another or to several other
tiers, as well as the type of data sent in each message. Messages are transferred using plain
socket connections or more elaborated mechanisms (e.g. SNMP, CORBA, Java RMI or even
Web Services). The different approaches have their own advantages and disadvantages and
there is still no perfect system for message interchange. However, what is really important is
to use standardized mechanisms for message interchanging, thus guaranteeing independence
among tiers.
Fig. 2. General scheme of the MIMO Testbed showing the three different layers: middleware
(MWL), signal processing (SPL) and testbed interface (TIL). The corresponding process name
for each layer and each PC is shown between brackets.
included with the user application. In our standard deployment, the MWL and the SPL are
allocated in the same PCs containing the rest of the testbed hardware. Although the MWL
is the only layer required to be installed in the hardware PCs, the rest of the software can be
deployed in any machine attached to the network.
This is not an arbitrary proposal but a design inspired on the multi-tier and the model-view-
controller software architectures. First of all, let us identify the use cases of our application.
Basically, there is just one use case or action carried out by the final user: transmitting a set
of discrete-time sequences through the testbed and, consequently, through the wireless chan-
nel. Therefore, the layer corresponding to the view is the interface that allows accessing the
testbed, sending the sequences and getting back the acquired signals. This is what we term
testbed interface layer, and is the topmost layer of our software architecture.
The controller plays a very important role in a system. It is responsible of getting the service
requests from the view, adapting and sending them to the model where the business logic
resides. The gathered results are then sent back to the view to be presented to the user. The
controller plays the role of the middleware concept presented in the multi-tier software archi-
tecture. In the testbed system the controller is called middleware and its functionality is clear:
to configure and control the hardware in order to be able to take the requests (discrete-time
sequences) from the TIL; to adapt and send them to the hardware to be transmitted by the
antennas; and, finally, to carry out the reciprocal operations at the receiver side. At the end of
the process the TIL returns the acquired discrete-time signals.
However, our architecture presents three strong differences with respect to the model-view-
controller and the multi-tier architecture:
• Adaptation of the discrete-time sequences provided by the TIL in the requests, both
at the transmitter and the receiver, consists in performing different signal processing
operations that sometimes can even be executed using different kind of processors. For
instance, a general-purpose processor (GPP), a graphic processor unit (GPU) or real-
time devices like an FPGA or a DSP. It is thus necessary to put all these operations
together and, consequently, the SPL concept comes out. Therefore, the SPL is in charge
of carrying out most of the signal processing operations needed between the MWL and
the TIL.
• One of the reasons to use a multi-tier architecture jointly with the model-view-controller
is the ability of the resulting application to be distributed among different machines.
Thus, different instances of the tiers run on different machines. However, in the testbed
system there are two kinds of nodes: the transmitter and the receiver. If a multi-node
testbed is available, different transmitter and receiver pairs will be distributed among
different nodes. As a result, the MWL (and consequently the SPL) is split into two
sides: the transmitter side and the receiver side. They will be referred to as Tx MWL, Rx
MWL, Tx SPL and Rx SPL, respectively. Additionally, they are also identified because
the processes mapping the architecture design are also split into two sets, one for the
transmitter and the other for the receiver.
• Finally, another particularity present when adapting the model-view-controller and the
multi-tier software architectures to testbed software architecture is that the hardware
is required to be attached to the host system by means of a bus (e.g. PCI, PCIX, PCI
Express, etc.). Consequently, it is not possible to sustain standard network connections
through such buses, and the standard tools and techniques available for interconnecting
layers are not applicable (except when a custom implementation is provided or when
A Distributed Multilayer Software Architecture for MIMO Testbeds 87
Fig. 3. Basic structure of the distributed multilayer software architecture for MIMO testbeds.
The three layers are shown: MWL, SPL and TIL. Additionally, the testbed-hardware sub-layer
in the middleware and the different interconnection mechanisms are included.
the hardware is attached through a network connection). These reasons motivate an-
other division in the MWL, generating a Testbed-hardware sub-layer (with its respective
parts for the transmitter and the receiver sides) responsible of dealing with hardware
aspects as well as solving the bus connection issues with the host part of the MWL.
Having in mind that in our testbed this sub-layer runs on the DSPs available at the
transmitter and the receiver, the corresponding processes are referred to as TxDSP and
RxDSP.
Fig. 4. Testbed scheme containing the hardware and the software architecture deployment as
well as the links among the components. The different processes are shown in blue, and are
located in the usual place for a typical architecture deployment. The digital hardware sections
of the testbed, as well as the RF front-ends, are shown in gray. Finally, the user application
is in dark green, containing the TIL in white. Note that TIL appears in white and not in blue
because it is not a process but an user application.
While in Fig. 2 the general structure of the testbed is depicted, showing the correspondence
between the hardware elements and the software layers, Fig. 4 illustrates the block diagram
of the entire system. Three main parts can be distinguished: the testbed hardware that allows
us to transmit discrete-time signals over multiple antennas; the multilayer software architec-
ture that makes the hardware accessible to end researchers at a high abstraction level; and,
finally, the user application implemented using the testbed capabilities and the architecture
facilities. The lowest software level (i.e. the MWL) is required to be installed in the same PCs
as the testbed hardware because it uses the system buses to communicate with the hardware.
Otherwise, this restriction would not be applicable. The other two layers can be installed in
any other available PC. However, in the standard deployment, the SPL is included with the
MWL in the testbed PCs. Finally, the TIL is installed in the remote user PC.
type of sequences given to TxProc, not all operations will be required either at the transmitter
or the receiver side.
The SPL can also incorporate advanced features such as a limited feedback channel for the
evaluation of precoded MIMO systems. This feedback channel is easily implemented using
the network connection available between the transmitter and the receiver.
A SPL detached from the other architecture layers is fundamental to deploy multiuser MIMO
scenarios. After extending the current TxProc and RxProc implementations in order to sup-
port multiuser MIMO techniques, the set of TxProc processes run at the transmitter users
while the RxProc processes do at the receiver users.
In some cases, the researchers may wish to implement most or even all operations present in
the SPL. It is still possible to configure the layer as a bypass, making only use of the intercon-
nection capabilities and not performing any signal processing operation at all.
the protocol: the CSI information must be sent during the acknowledgement stage to notify
the transmitter whether it has to re-configure the transmission parameters or not. To do so, in
the sequence diagram shown in Fig. 7 there should be added two ”Send CSI” messages: one
from the RxHost to the TxHost and another from the TxHost to the TxProc.
If the signal adaptation at the transmitter side takes place at the user application, then no
feedback messages are needed in the protocol because everything is available at the user ap-
plication. It is necessary to call the testbed interface layer twice: one to be able to estimate the
channel and the following with the adapted signals.
8. Conclusion
In this chapter we propose a new distributed multilayer software architecture for MIMO
testbed user access. The architecture fills the gap that currently exists between commercial
hardware components and the most common abstraction level used by researchers. The archi-
tecture overcomes the limitations of implementing new algorithms directly from the testbed.
Instead of using the low-level interfaces typically provided by manufacturers, the architecture
supplies a high-level interface access for testbeds. It releases researchers from the necessity of
knowing the details of the testbed hardware. For instance, they can easily test new algorithms
without developing a completely new source code release specifically for the testbed, thus
speeding up the implementation and test tasks.
The key point to the multilayer architecture design is the use of ordinary network connec-
tions to link both software modules and hardware components. These connections are also
useful for decoupling the software layers. Several advantages are obtained as a consequence
of the multilayer software architecture. Also, multiuser scenarios and feedback channels can
be constructed extending the proposed architecture. Finally, it is also possible to simplify the
presented architecture protocols in order to ease the integration with heterogeneous nodes.
The testbed control is moved to the user application instead of keeping it in the inner layers.
9. References
3L Ltd (2009), http://www.3l.com/
Borkowski, D.; Brhl, L.; Degen, C.; Keusgen, W.; Alirezaei, G.; Geschewski, F.; Oikonomopou-
los, C. & Rembold, B. (2006). SABA: A testbed for real-time MIMO systems. EURASIP
Journal on Applied Signal Processing, Vol. 2006, 2006.
Caban, S.; Mehlführer, C.; Langwieser, R.; Scholtz, A.L. & Rupp, M. (2005), Vienna MIMO
Testbed, EURASIP Journal on Applied Signal Processing, Vol. 2006, 2006.
Fabregas, A.G.; Guillaud, M.; Slock, D.T.M.; Caire, G.; Gosse, G.; Rouquette, S.; Ribeiro Dias,
A.; Bernardin, P.; Miet, X.; Conrat, J.M; Toutain, Y.; Peden, A. & Li, Z. (2005), A
MIMO-OFDM Testbed for Wireless Local Area Networks, EURASIP Journal on Ap-
plied Signal Processing, Vol. 2006, 2006.
Foschini, G. & Gans, M. (1998), On Limits of Wireless Communications in a Fading Environ-
ment when Using Multiple Antennas, Wireless Personal Communications, Vol. 6, 1998,
pp. 311-335.
Garcı́a-Naya, José A.; González-López, M. & Castedo, L. (2008), An Overview of MIMO
Testbed Technology, Proceedings of 4th International Symposium on Image/Video Com-
munications over Fixed and Mobile Networks (ISIVC 2008), July, 2008, Bilbao
Garcı́a-Naya, José A.; Pérez-Iglesias, Héctor J.; Fernández-Caramés, T. M.; González-López,
M. & Castedo, L. (2008), A distributed multilayer architecture enabling end-user
access to MIMO testbeds, Proceedings of IEEE 19th International Symposium on Per-
sonal, Indoor and Mobile Radio Communications, 2008 (PIMRC 2008), September, 2008,
Cannes.
Haustein, T.; Forck, A.; Gäber, H.; Jungnickel, V. & Schiffermüller, S. (2005), Real-Time Signal
Processing for Multiantenna Systems: Algorithms, Optimization, and Implementa-
tion on an Experimental Test-Bed, EURASIP Journal on Applied Signal Processing, Vol.
2006, 2006.
98 Radio Communications
Kaiser, T.; Wilzeck, A.; Berentsen, M. & Rupp, M. (2004). Prototyping for MIMO Systems An
Overview, Proceedings of the XII European Signal Processing Conference (EUSIPCO 2004),
September, 2004, Vienna.
The Mathworks (2009), http://www.mathworks.com/
Moore, G. (1998), Cramming more components onto integrated circuits, Proceedings of the IEEE,
Vol. 86, No. 1, 1998, pp. 82–85.
Nieto, X.; Ventura, L.M. & Mollfulleda, A. (2006), GEDOMIS: a broadband wireless MIMO-
OFDM testbed, design and implementation, Proceedings of 2nd International Conference
on Testbeds and Research Infrastructures for the Development of Networks and Communities
(TRIDENTCOM 2006), 2006, Barcelona.
PXI: PCI eXtensions for Instrumentation (2009), http://www.pxisa.org
Pérez-Iglesias, H.J.; Garcı́a-Naya, J.A.; Dapena, A.; Castedo, L. & Zarzoso, V. (2008), Blind
channel identification in Alamouti coded systems: a comparative study of eigende-
composition methods in indoor transmissions at 2.4 GHz, European Transactions on
Telecomunications, Vol. 19, No. 7, November 2008, pp. 751–759.
Ramı́rez, D.; Santamarı́a, I.; Pérez, J.; Vı́a, J.; Garcı́a-Naya, J.A.; Fernández-Caramés, T.M.;
Pérez-Iglesias, H.J.; González López, M.; Castedo, L. & Torres-Royo, J.M. (2008), A
comparative study of STBC transmissions at 2.4 GHz over indoor channels using a
2 x 2 MIMO testbed, Wireless Communications and Mobile Computing, Vol. 8, No. 9,
November 2008.
Rao, R.M.; Wiejun Zhu Lang, S.; Oberli, C.; Browne, D.; Bhatia, J.; Frigon, J.-F.; Jingming
Wang Gupta, P.; Heechoon Lee; Liu, D.N.; Wong, S.G.; Fitz, M.; Daneshrad, B. &
Takeshita, O. (2004), Multi-antenna testbeds for research and education in wireless
communications, Communications Magazine, IEEE, Vol. 42, No. 12, December 2004,
pp. 72–81, ISSN: 0163-6804.
Rupp, M.; Burg, A. & Beck, E. (2003). Rapid Prototyping for Wireless Designs: the Five-Ones
Approach, Signal Processing Europe, Vol. 83, 2003, pp. 1427-1444.
Rupp, M.; Mehlfhrer, C. & Caban, S. (2006), Testbeds and Rapid Prototyping in Wireless Sys-
tem Design, EURASIP Newsletter, Vol. 17, No. 3, 2006, pp. 32-50.
Rupp, M.; Caban, S. & Mehlfhrer, C. (2007), Challenges in Building MIMO Testbeds, Proceed-
ings of European Signal Processing Conference (EUSIPCO 2007), 2006, Poznan.
SDR Forum: Software Defined Radio Forum (2009), http://www.sdrforum.org
SCA: Software Communication Architecture (2009), http://sca.jpeojtrs.mil
Sundance Multiprocessor, Ltd. (2009), http://www.sundance.com
Telatar, I. E. (1999), Capacity of Multi-Antenna Gaussian Channels, European Transactions on
Telecommunications, Vol. 10, No. 6, 1999, pp. 585-595.
Texas Instruments (2009), http://www.ti.com
Trygve, M. H. (1978), MVC, XEROX PARC, http://heim.ifi.uio.no/˜trygver/
themes/mvc/mvc-index.html
Wilzeck, A.; El-Hadidy, M.; Cai, Q.; Amelingmeyer, M. & Kaiser, T. (2006). MIMO Prototyping
Testbed with off-the-shelf plug-in RF Hardware, IEEE Workshop on Smart Antennas
(WSA 2006), 2006 Ulm.
Zhu, W.; Browne, D. & Fitz, M. (2005). An Open Access Wideband Multi-Antenna Wireless
Testbed with Remote Control Capability, Proceedings of 2nd International Conference on
Testbeds and Research Infrastructures for the Development of Networks and Communities
(TRIDENTCOM 2005), Trento.
Recent Developments in Channel Estimation and Detection for MIMO Systems 99
Mohammad-Ali Khalighi
Institut Fresnel, UMR CNRS 6133, École Centrale Marseille
France
1. Introduction
It is well known that multiple-input multiple-output (MIMO) systems can provide very high
spectral efficiencies in a rich scattering propagation medium Telatar (1999). They are hence a
promising solution for high-speed, spectrally efficient, and reliable wireless communication
Raoof et al. (2008) .When coherent signal detection is to be performed at the receiver, channel
state information at the receiver (CSIR) is required, for which a channel estimation step is
necessary. Channel estimation plays a critical role in the performance of the receiver. It is a
real challenge in practical MIMO systems where the quality of data recovery is as important
as attaining a high data throughput.
In order to obtain the CSIR, usually some known training (also called pilot) symbols are sent
from the transmitter, based on which the receiver estimates the channel before proceeding
to the detection of data symbols. The classical approach consists in time-multiplexing pilot
and data symbols, usually referred to as pilot symbol-assisted modulation (PSAM) Cavers
(1991). We start the chapter by introducing the PSAM channel estimation for MIMO systems
(Section 2). Instead of this classical channel estimation based on pilot symbols only, we can
perform semi-blind estimation that in addition to pilot symbols, makes use of data symbols in
channel estimation. In this way, a considerable performance improvement can be achieved at
the price of increased receiver complexity De Carvalho & Slock (1997); Giannakis et al. (2001);
Sadough (2008). Usually, these semi-blind approaches are implemented in an iterative scheme
when channel coding is performed. That is, channel estimation is performed iteratively to-
gether with signal detection and channel decoding Sadough, Ichir, Duhamel & Jaffrot (2009).
We, hence, continue Section 2 by considering semi-blind estimation for the case of time-
multiplexed pilots.
The drawback of the PSAM scheme is the encountered loss in the spectral efficiency by the
periodic insertion of pilot symbols. As an alternative to this method, overlay pilots (OP) can
be employed, where pilot symbols are sent in parallel with data symbols Hoeher & Tufvesson
(1999). We introduce the OP approach in Section 3 and explain, in particular, pilot-only-based
100 Radio Communications
and semi-blind estimation approaches. The pros and cons of OP with respect to PSAM are
discussed too.
Whatever the channel estimation technique, in practice, the receiver can only obtain an im-
perfect estimate of the channel. Classically, for signal detection, the estimated channel is con-
sidered as the perfect estimate. This sub-optimal approach is usually called the mismatched
receiver. Its sub-optimality is due to the fact that the receiver does not take into account the
presence of channel estimation errors Sadough & Duhamel (2008); Sadough (2008). A more
appropriate approach is to take into account channel estimation inaccuracies in the formu-
lation of the detector. We firstly consider in Section 4 the effect of estimation errors on the
receiver performance and the impact of the employed space-time coding scheme.
Next, in Section 5, we consider maximum-likelihood (ML) signal detection and show how to
integrate the imperfect channel knowledge into the design of the detector. More precisely,
we consider two iterative detectors based on maximum a posteriori (MAP) and soft parallel
interference cancellation (soft-PIC), and propose for each case modifications to the MIMO de-
tectors for taking into account the channel estimation errors. The implementation complexity
issues are also discussed. We present some numerical results to demonstrate the performance
improvement obtained via the use of the improved detectors. Finally, Section 8 concludes the
chapter.
Spatial .
Binary b c Bit d Bit/symbol s multiplexing .
Encoder Interleaver /
Source Mapping .
STC
MT
( N p − L + 1) ≥ M T L (2)
Under flat fading conditions where L = 1, this implies: Np ≥ M T . Several works have been
done on the optimal placement of pilots in a frame of symbols, as well as on the optimal
power allocation between pilot and data symbols Hassibi & Hochwald (2003); Dong & Tong
(2002); Adireddy et al. (2002); Ma et al. (2003). They consider the criteria of mean-square chan-
nel estimation error, channel capacity, or the Cramér-Rao bounds. In particular, it is shown
in Hassibi & Hochwald (2003) that, if power optimization over pilot and data symbols is al-
lowed, the optimum Np is Np opt = M T . In such a case, we should place pilot symbols with
lower power at the beginning and the end of the frame, and those with higher power in the
middle of the frame Dong & Tong (2002). However, if equal power has to be allocated to pilot
and data symbols, then Np opt can be larger than M T Hassibi & Hochwald (2003).
Considering the simple case of flat block-fading MIMO channel, to estimate the channel, cor-
responding to each fading block, we send Np pilot symbol vectors with the same power as
the data symbols. Let x p [ k] denote an ( M T × 1) pilot symbol vector at the time sample
k. We denote the received vector corresponding to x p [ k] by y p [ k]. We can constitute the
( M T × Np ) matrix X p by stacking in its columns the pilot vectors x p [ k], k = 0, 1, Np − 1, i.e.,
X p = [ x p [0], . . . , x p [ Np − 1]].
According to (1), during a given channel training interval, we have:
Yp = H Xp + Zp. (3)
The definitions of Y p and Z p are similar to that of X p . We denote by E p the average power of
the training symbols on any subcarrier as
1
Ep tr X p X†p . (4)
Np M T
The maximum likelihood (ML) channel estimate Ĥ, which is equivalent to the least-squares
solution, is Balakrishnan et al. (2000):
Np −1 Np −1 −1
Ĥ = ∑ y p [ k] x †p [ k] ∑ x p [ k] x †p [ k] , (5)
k =0 k =0
102 Radio Communications
σz2
Σe = E E j E j† = σe2 I MR , where σe2 = · (9)
Np E p
where Σ H is the ( M R × M R ) covariance matrix of the columns of H, and det{} denotes ma-
trix determinant. We assume that the entries of H, i.e., the fading coefficients of different
subchannels, are i.i.d. Then, Σ H is a diagonal matrix with equal diagonal entries σh2 .
By using the prior pdf of H from (11) and the pdf of (Ĥ| H) from (10), we can derive the
posterior distribution of the perfect channel matrix, conditioned on its ML estimate, as follows
(see Sadough & Duhamel (2008) for the details of the derivation):
p (H| Ĥ) = CN Σ∆ Ĥ, I MT ⊗ Σ∆ Σe , (12)
where −1
Σ∆ = Σ H Σe + Σ H . (13)
Under the above-mentioned assumptions, we have
Σ∆ = δI MR (14)
Recent Developments in Channel Estimation and Detection for MIMO Systems 103
where
σh2
δ= · (15)
σh2 + σe2
In particular, when the number of pilot symbols tends to infinity, it is not difficult to see that
δ → 1 and δ σe2 → 0 and consequently p (H| Ĥ) tends to a Dirac delta function. The availability
of the estimation error distribution is an interesting feature of pilot-only-based PSAM channel
estimation that we used to derive the posterior distribution (12). This distribution constitutes
a Bayesian framework which is exploited in Section 5 for the design of detectors by taking into
account channel estimation inaccuracies.
1
y1
2 MIMO
y2
soft−input Channel
Π −1
. . .
soft−output decoder
MR
y MR detector
Π
estimated
channel
...
coefficients
Pilot sequences
Fig. 2. Iterative channel estimation and data detection, y i denotes the received signal on the
ith antenna.
( m) ( m +1)
if Pi < (1 − PTH ), we make the hard decision ĉi = 0; and if none of these conditions
are verified, we give up the channel-use corresponding to ci and do not consider it in chan-
nel estimation. If a hard decision is made on all BM T constituting bits of a channel-use, we
use the resulting hard-detected symbol vector in channel estimation, in the same way as pilot
symbols. The resulting channel estimate is then used in the next iteration of the detector.
The performance of Th-HD depends highly on the choice of the threshold PTH that determines
whether or not the SISO decoder soft-outputs are reliable enough. The practical limitation is
that the optimum threshold value depends on the MIMO structure, i.e., the number of trans-
mit and receive antennas, as well as on the actual SNR Khalighi & Boutros (2006). Note that, if
we take PTH very close to 0.5, we effectively make hard decisions on all detected symbols and
use them in channel estimation. This coincides with the so called decision-feedback channel
estimation Visoz & Berthet (2003).
where
Ns
R yx = ∑ y [k] x̃x † [k] (17)
k =1
and
Ns ; i=j
Ns
R x,i,j = (18)
∑ x̃x i [k] x̃x ∗j [k] ; i = j
k =1
Recent Developments in Channel Estimation and Detection for MIMO Systems 105
Here, Ns denotes the number of channel-uses per frame, y [ k] is the received symbol vector
at the time reference k, and x̃x [ k] is the corresponding soft-estimates of the transmitted sym-
bol vector, calculated using the SISO channel decoder outputs at the preceding iteration. For
k = 1, · · · , Np , we have x̃x [ k] = x p [ k]. Also, R x,i,j denotes the (i, j)th entry of matrix R x . The
formulation that we provided for EM can be modified further to improve the receiver per-
formance. Interested reader may refer to Khalighi & Boutros (2006); Khalighi et al. (2006) for
details.
0
10
−1 Pilot−Only
10
−2
Th−HD
10
BER
−3
10
Perfect−CSIR
−4
10
(8x8)
EM−based
(8x6)
−2 0 2 4 6 8 10 12
Eb/N0 (dB)
Fig. 3. Comparison of different estimation methods based on PSAM, iterative Soft-PIC de-
tection, 8th iteration of the receiver (almost full convergence); (8 × 8) and (8 × 6) systems,
i.i.d. Rayleigh quasi-static fading, QPSK modulation, (5, 7)8 NRNSC rate 1/2 channel code,
orthogonal pilot sequences with Np = 10, Ns = 64 channel-uses. Eb /N0 takes into account the
receiver antenna gain M R .
receiver. As the pilot sequences transmitted from different antennas are orthogonal, the esti-
mation errors arise from noise and the data sequences. Indeed, the main problem in the esti-
mation of channel coefficients concerns the latter interference component, i.e., the unknown
data symbols. In fact, although data and pilot sequences are statistically uncorrelated, the
cross-correlation is calculated over a block of symbols of limited length, over which the chan-
nel coefficients are supposed to remain unchanged. The smaller is the block length (i.e., the
faster the channel fading), the more important this cross-correlation is. This can result in an
error floor in the receiver BER performance Jungnickel et al. (2001), especially at high SNR,
and make the OP scheme lose its interest.
0
10
−1
10
−2
10
−3
10
−4
10
−2 0 2 4 6 8 10 12
Recent Developments in Channel Estimation and Detection for MIMO Systems 109
0
10
Alamouti, E /N =7dB
b 0
−1
10 MUX, 4th iteration, E /N =5dB
b 0
−2
10
−3
10
−4
10
2 4 8 16 32
Np (channel−uses)
Concerning the practical case of imperfect channel estimate, in fact, lower-rate orthogonal
schemes could be more sensitive to channel estimation errors as, in general, they have to use
a larger signal constellation to attain a desired spectral efficiency. Concerning non-orthogonal
schemes, we need, in general, smaller constellation sizes as compared to orthogonal ones.
However, the iterative detector for the non-orthogonal schemes could be more sensitive to
channel estimation errors because its convergence, and hence, its performance is affected by
these errors.
To study the effect of channel estimation errors, let us consider pilot-only-based channel esti-
mation using time-multiplexed pilots. For each fading block, we devote Np channel-uses to
the transmission of power-normalized mutually orthogonal QPSK pilot sequences from M T
transmit antennas Khalighi & Boutros (2006). For a (2 × 2) MIMO system, we have shown
in Fig. 6 the average BER after four detector iterations versus Np for a spectral efficiency of
η = 2 bps/Hz. We have considered the Alamouti code Alamouti (1998) as the orthogonal
scheme, and two cases of spatial multiplexing (denoted here by MUX) and Golden coding
Belfiore et al. (2005) (denoted by GLD) as non-orthogonal schemes. The Eb /N0 for each ST
scheme is set to what results in BER ≈ 10−4 in the case of perfect channel knowledge. From
Fig. 6 we notice an almost equivalent sensitivity to the channel estimation errors for MUX and
GLD schemes. This comparison makes sense as the SNRs for these schemes are close to each
other. On the other hand, we see that the Alamouti scheme has the lowest sensitivity. This
is due to the orthogonal structure of the code, and the fact that the SNR is higher, compared
to those for MUX and GLD schemes, and as a result, the quality of channel estimate is much
better.
110 Radio Communications
with DML ( x , y , H) − log p(y | H, x ) ∝ y − H x 2 , where ∝ means “is proportional to” and
C denotes the set of constellation symbols of size M. Assuming B bits per symbol, we have
M = 2B .
Recent Developments in Channel Estimation and Detection for MIMO Systems 111
The detection rule (20) requires the knowledge of the perfect channel matrix H. The sub-
optimal mismatched ML detector consists in replacing the exact channel by its estimate Ĥ
in the receiver metric as
x̂x MM (Ĥ) = arg min DMM ( x , y , Ĥ ) = arg min y − Ĥ x 2 ,
s0 , ..., s M −1 ∈ C s0 ,...,s M −1 ∈ C
where
DMM ( x , y , H) DML ( x , y , H) , (21)
H = Ĥ
and the subscript .MM denotes mismatched. Obviously, the sub-optimality of this detection
technique is due to the mismatch introduced by the channel estimation errors; while the deci-
sion metric is derived from the likelihood function p(y | H, x ) conditioned on the perfect chan-
nel H, the receiver uses an estimate Ĥ different from H in the detection process.
As an alternative to this mismatched detection, an improved ML detection metric is proposed
in Tarokh et al. (1999); Taricco & Biglieri (2005). This metric is based on modified likelihood
p(y | Ĥ, x ) which is conditioned on the imperfect channel Ĥ. The pdf p(y | Ĥ, x ) can be derived
as follows:
p(y | Ĥ, x ) = p(y , H| Ĥ, x ) dH = p(y | H, x ) p(H| Ĥ) dH = E H|Ĥ p(y | H, x ) Ĥ ,
H ∈C H ∈C
(22)
where p(H| Ĥ) is the channel posterior distribution of equation (12) and C denotes the set of
complex matrices of size ( M R × M T ). In fact, equation (22) shows that p(y | Ĥ, x ) can be simply
derived from the general formulation in (19). It is shown in Sadough & Duhamel (2008) that
the averaged likelihood in (22) is shown to be a complex Gaussian distributed vector given by
p(y | Ĥ, x ) = CN mM , ΣM , (23)
where
y − δ Ĥ x 2
DM ( x , y , Ĥ) − log p(y | x , Ĥ) = M R log π σz2 + δ σe2 x 2 + 2 (25)
σz + δ σe2 x 2
is referred to as the improved ML decision metric under imperfect CSIR.
Note that when CSIR tends to the exact value, which is obtained when the number of pilot
symbols tends to infinity, we have δ → 1, σe2 → 0, and the improved metric (25) tends to the
mismatched metric:
DM x , y , Ĥ
lim = 1. (26)
N → ∞ DMM x , y , Ĥ
In the following two sections, we apply the proposed receiver design method of equation (19)
for improving the performance of two usually-used MIMO receivers working under imperfect
channel estimation: one based on the maximum a posteriori (MAP) criterion, and the other on
Soft-PIC. For both cases, we consider the simple spatial multiplexing as the space-time scheme
at the transmitter, and iterative MIMO detection and channel decoding at the receiver.
112 Radio Communications
BM T
∑ e−D M ( x k , y k , Ĥk ) ∏ Pdec
1 dk,i
x k ∈ C1m i= 1
i= j
L (dk,j ) = log , (28)
BM T
∑ e−D M ( x k , y k , Ĥk ) ∏ Pdec
0 dk,j
x k ∈ C0m i= 1
i= j
The interesting point is that the two detectors have almost the same convergence trend
and the major improvement is obtained after the second iteration for both detectors
Sadough, Khalighi & Duhamel (2009). So, if for the reasons of complexity reduction, we only
process two receiver iterations, we still have a considerable performance gain by using the
improved detector.
0
10
Mismatched
−1 Improved
10
Perfect CSIR
−2
10
N =2
BER
P
N =8
P
−3
10
N =4
P
−4
10
4 6 8 10 12 14
E /N (dB)
b 0
Fig. 9. BER performance of improved and mismatched iterative Soft-PIC; (2 × 2) MIMO with
MUX ST scheme, i.i.d. Rayleigh block-fading channel with 4 fades per frame, QPSK modula-
tion, training sequence length Np ∈ {2, 4, 8}.
8. Conclusions
We studied in this chapter the interaction between iterative data detection and channel es-
timation in realistic wireless communication systems where the receiver disposes only of an
imperfect estimate of the unknown channel parameters. To obtain the CSIR, we considered
different recent and classically-used techniques. First, we presented pilot-only based channel
estimation and showed that an accurate estimate of the channel through this method would
require a large number of pilots per frame, which can result in a considerable loss in the sys-
tem data throughput. Overlay pilots may be preferred to time-multiplexed solution from this
point of view, however, the quality of channel estimate is, in general, worse, as compared to
PSAM. We also presented semi-blind channel estimation methods that, in addition to pilot
symbols, make use of the data symbols in the estimation process. Although iterative semi-
blind channel estimation outperforms pilot-only assisted channel estimation, it has a higher
complexity, which may be of critical concern for practical implementations.
114 Radio Communications
0
10
N =2
p
−1
10
N =4
p
−2
10
−3
10
BER
−4
10
perfect CSIR
N =8
p
−5
10
−7
10
2 3 4 5 6 7 8 9 10
E /N (dB)
b 0
Fig. 8. BER performance improvement over (2 × 2) MIMO channel with i.i.d. Rayleigh fad-
ing for various training sequence lengths. 16-QAM modulation with set-partition labeling,
iterative MAP detection after four receiver iterations.
plified formulation of Soft-PIC, which assumes perfect interference cancellation after the first
iteration. In this section, however, we consider the exact formulation of Soft-PIC. In order
to better understand the formulation of the improved detector, we present in the following
the formulation of (exact) Soft-PIC under perfect channel knowledge at the receiver. Then,
we present the improved Soft-PIC detector in the presence of channel estimation errors in
Subsection 7.2.
j
σ2j for the interfering symbols xk , j = i, from the SISO decoder as follows:
xk
j 2B
j j j
x̂k = E xk = ∑ xk P [ xk ] (29)
j =1
j 2B
j j
σ2j = E | xk |2 = ∑ | xk |2 P [ xk ] (30)
xk
j =1
j j
where P [ xk ] is the probability of the transmission of xk and is evaluated using the probabilities
j,n
Pdec (dk ) at the decoder output:
B
j j,n
P [ xk ] = K ∏ Pdec (dk ),
n =1
and T
x̂x ik x̂1k , x̂2k , ..., x̂ki−1 , x̂ki+1 , ..., x̂kMT ,
j
where x̂k are estimated in (29).
Now, given the received signal vector y k , a soft interference cancellation is performed on y k
for detecting the symbol xki by subtracting to y k the estimated signals of the other transmit
antennas as Sadough, Khalighi & Duhamel (2009):
By invoking the orthogonality principle Scharf (1991), the coefficients of the MMSE filter wik
are given by
−1
Hi Λk,i − Λ k,i H† σz2
i
wik = h †i h i h †i + + I MR (35)
σx2i σx2i
k k
116 Radio Communications
where
†
Λk,i = E x ik x ik ≈ diag E | x1k |2 , ..., E | xki−1 |2 , E | xki+1 |2 , ..., E | xkMT |2 , and
k,i = x̂x i x̂x i † ≈ diag | x̂1 |2 , ..., | x̂ i−1 |2 , | x̂ i+1 |2 , ..., | x̂ MT |2 .
Λ k k k k k k
Note that the off-diagonal entries in Λk,i and Λ k,i have been neglected to reduce the complexity
without causing significant performance loss Lee et al. (2006).
At the first decoding iteration, we have no prior information available on the transmitted data,
k,i = 0 M −1 . Consequently, (35) reduces to
i.e., Λk,i = σx2i I MT −1 and Λ T
k
−1
σ2
wik = h †i HH† + 2z I MR (36)
σx i
k
where Ĥi is the ( M R × ( M T − 1)) matrix constructed from Ĥ by discarding its i-th column,
namely ĥ i . We note that (37) naturally depends on the unknown channel matrix H of which
the receiver has only an imperfect estimate available. Instead of replacing the unknown
channel by its estimate (i.e., the mismatched approach), we use the posterior distribution
(12) and make two modifications to the detector described in Subsection 7.1, as follows (see
Sadough, Khalighi & Duhamel (2009) and Sadough & Khalighi (2007) for more details).
The first modification concerns the design of the filter wik in (34). The modified filter w ik should
minimize the average of the mean square error over all realizations of channel estimation
errors. In other words,
2 2
w ik y i Ĥ = arg min E H|Ĥ E x k ,zzk xki − w
ik = arg min E H,xx k ,zzk xki − w ik y i (38)
k k
ik ∈C M R
w ∈C M R
w
where we have assumed the independence between H, x k , and z k . After some simple alge-
braic manipulations Sadough, Khalighi & Duhamel (2009); Scharf (1991), we obtain:
−1
ik = R x i y i Ry i
w (39)
k k k
Recent Developments in Channel Estimation and Detection for MIMO Systems 117
where
† + (δ − 1) mk,i Ĥ†i
Rx i y i = δ σx2i h (40)
k k k
i
†
with mk,i = x̂ki x̂x ik and δ is given by (15), and
To get more insight on the proposed detector, let us consider the ideal case where perfect
channel knowledge is available at the receiver, i.e., Ĥ = H and σe2 = 0. We note that in this case,
δ = 1 and the posterior pdf (12) reduces to a Dirac delta function; consequently the two filters
w ik and wik coincide. Similarly, under near-perfect CSIR, obtained either when σe2 → 0 or when
Np → ∞, we have δ → 1, and the filter w ik gives a similar expression as wik in (35). However, in
the presence of estimation errors, the proposed improved and mismatched detectors become
different due to the inherent averaging in (38), which provides a robust design that adapts
itself to the channel estimate available at the receiver.
The second modification concerns the application of the derived filter w ik to the received signal
y . As this latter depends on H (see (37)), we average the filter output rki as follows:
i
k
where ηk,i contains interference and noise. From (42) it is clear that the output of the im-
proved MMSE filter can be viewed as an equivalent AWGN channel having xki at its input.
The parameters µ k,i and ση2k,i are calculated at each time-slot by using the symbols statistics.
In order to transform the detected symbols at the output of the MMSE filter to LLRs on the cor-
responding bits, we approximate ηk,i by a zero-mean Gaussian random variable with variance
ση2k,i (see Sadough, Khalighi & Duhamel (2009) for details on the calculation of this variance).
Let dki,m denote the m-th (m = 1, ..., B) bit corresponding to xki . The LLR on dki,m is given by:
|r i − µ k,i x i |2 B
1 ( di,n )
∑ exp − k σ 2 k ∏ Pdec k
x ki ∈S 1m
ηk,i
Pdem dki,m = 1|
n =1
rki , µ k,i n=m
L (dki,m ) = log i,m = log . (43)
Pdem dk = 0| rki , µ k,i |r i − µ k,i x i |2 B
0 ( di,n )
∑ exp − k σ 2 k ∏ Pdec k
ηk,i
x ki ∈S 0m n =1
n=m
The interesting point is that the two detectors have almost the same convergence trend
and the major improvement is obtained after the second iteration for both detectors
Sadough, Khalighi & Duhamel (2009). So, if for the reasons of complexity reduction, we only
process two receiver iterations, we still have a considerable performance gain by using the
improved detector.
0
10
Mismatched
−1 Improved
10
Perfect CSIR
−2
10
N =2
BER
P
N =8
P
−3
10
N =4
P
−4
10
4 6 8 10 12 14
E /N (dB)
b 0
Fig. 9. BER performance of improved and mismatched iterative Soft-PIC; (2 × 2) MIMO with
MUX ST scheme, i.i.d. Rayleigh block-fading channel with 4 fades per frame, QPSK modula-
tion, training sequence length Np ∈ {2, 4, 8}.
8. Conclusions
We studied in this chapter the interaction between iterative data detection and channel es-
timation in realistic wireless communication systems where the receiver disposes only of an
imperfect estimate of the unknown channel parameters. To obtain the CSIR, we considered
different recent and classically-used techniques. First, we presented pilot-only based channel
estimation and showed that an accurate estimate of the channel through this method would
require a large number of pilots per frame, which can result in a considerable loss in the sys-
tem data throughput. Overlay pilots may be preferred to time-multiplexed solution from this
point of view, however, the quality of channel estimate is, in general, worse, as compared to
PSAM. We also presented semi-blind channel estimation methods that, in addition to pilot
symbols, make use of the data symbols in the estimation process. Although iterative semi-
blind channel estimation outperforms pilot-only assisted channel estimation, it has a higher
complexity, which may be of critical concern for practical implementations.
Recent Developments in Channel Estimation and Detection for MIMO Systems 119
Regardless of the channel estimation technique, an important point is the impact of estimation
errors on the receiver performance. The usually-used approach is to consider the (imperfect)
channel estimate as perfect and to use it in data detection. We called this the mismatched
approach. In such case, we saw that, the impact of estimation errors is somehow similar for
orthogonal and non-orthogonal space-time schemes. We then considered the improved ap-
proach by which we take into account the channel estimation inaccuracies in data detection.
More precisely, by using the statistics of the channel estimation errors, we use a new detection
rule instead of the sub-optimal mismatched detector. Applying this detection design rule to
MAP and Soft-PIC detectors, we showed that a significant improvement can be obtained as
compared to the mismatched detector. Finally, it is worth mentioning that adopting the im-
proved reception scheme does not increase considerably the complexity. In fact, the improved
detectors require just a few more matrix additions and multiplications, which does not have
an important impact on the receiver complexity.
9. References
Adireddy, S., Tong, L. & Viswanathan, H. (2002). Optimal placement of training for frequency-
selective block-fading channels, IEEE Trans. Inf. Theory 48(8): 2338–2353.
Alamouti, S. (1998). A simple transmit diversity technique for wireless communications, IEEE
J. Sel. Areas Commun. 16(8): 1451–1458.
Bahl, L., Cocke, J., Jelinek, F. & Raviv, J. (1974). Optimal decoding of linear codes for minimiz-
ing symbol error rate, IEEE Trans. Inform. Theory pp. 284–287.
Balakrishnan, J., Rupp, M. & Viswanathan, H. (2000). Optimal channel training for multiple
antenna systems, in Proc. MMT . Miami, FL.
Belfiore, J.-C., Rekaya, G. & Viterbo, E. (2005). The golden code: a 2 × 2 full-rate space-time
code with nonvanishing determinants, IEEE Trans. Inform. Theory 51(4): 1432–1436.
Berthet, A., Unal, B. & Visoz, R. (2001). Iterative decoding of convolutionally encoded signals
over multipath Rayleigh fading channels, IEEE J. Sel. Areas Commun. 19(9): 1729–1743.
Bohlin, P. & Tapio, M. (2004). Optimized data aided training in MIMO systems, in Proc. VTC
pp. 679–683. Milan, Italy.
Cavers, J. K. (1991). An analysis of pilot symbol assisted modulation for Rayleigh fading
channels, IEEE Trans. Veh. Technol. 40(4): 686–693.
Cui, T. & Tellambura, C. (2005). Superimposed pilot symbols for channel estimation in OFDM
systems, in Proc. Globecom pp. 2229–2233. St. Louis, MO.
de Carvalho, C. & Slock, D. T. M. (2001). Semi-blind Methods for FIR Multi-channel Estimation, in
Signal Processing Advances in Wireless and Mobile Communications; Vol. I: Trends
in Channel Estimation and Equalization, Editors: G. B. Giannakis, Y. Hua, P. Stoica,
and L. Tong, Upper Saddle River, NJ: Prentice Hall.
Dempster, A., Laird, N. & Rubin, D. (1977). Maximum-likelihood from incomplete data via
the EM algorithm, J. Royal Statatistical Society 39(1): 1–38.
Dong, M. & Tong, L. (2002). Optimal design and placement of pilot symbols for channel
estimation, IEEE Trans. Signal Processing 50(12): 3055–3069.
Ghogho, M., McLernon, D., Alameda-Hernandez, E. & Swami, A. (2005). Channel estimation
and symbol detection for block transmissionusing data-dependent superimposed
training, IEEE Signal Processing Letters 12(3): 226–229.
Giannakis, G. B., Hua, Y., Stoica, P. & Tong, L. (2001). Signal Processing Advances in Wireless
and Mobile Communications, Vol. 1, Trends in Channel Estimation and Equalization,
Prentice Hall PTR, Upper Saddle River, NJ.
120 Radio Communications
Sadough, S. M. S., Ichir, M. M., Duhamel, P. & Jaffrot, E. (2009). Wavelet based semi-blind
channel estimation for ultra wideband OFDM systems, IEEE Trans. Veh. Technol.
58(3): 1302–1314.
Sadough, S. M. S. & Khalighi, M. A. (2007). Optimal turbo-blast detection of MIMO-OFDM
systems with imperfect channel estimation, IEEE International Symposium on Personal,
Indoor and Mobile Radio Communications .
Sadough, S. M. S., Khalighi, M. A. & Duhamel, P. (2009). Improved iterative MIMO signal de-
tection accounting for channel estimation errors, IEEE Trans. Veh. Technol. . to appear.
Sadough, S., Piantanida, P. & Duhamel, P. (2007). MIMO-OFDM optimal decoding and achiev-
able information rates under imperfect channel estimation, in Proc. Signal Process.
Advances Wireless Commun. (SPAWC) .
Scharf, L. (1991). Statistical Signal Processing, Addison-Wesley.
Sellathurai, M. & Haykin, S. (2002). Turbo-BLAST for wireless communications: theory and
experiments, IEEE Trans. Signal Process. 50(10): 2538– 2546.
Tapio, M. & Bohlin, P. (2004). A capacity comparison between time-multiplexed and superim-
posed pilots, in Proc. Asilomar Conf. on Signals, Systems and Computers pp. 1049–1053.
Pacific Grove, CA.
Taricco, G. & Biglieri, E. (2005). Space-time decoding with imperfect channel estimation, IEEE
Trans. Wireless Commun. 4(4): 1874–1888.
Tarokh, V., Naguib, A., Seshadri, N. & Calderbank, A. R. (1999). Space-time codes for high
data rate wireless communication: Performance criteria in the presence of channel
estimation errors, mobility, and multiple paths, IEEE Trans. Commun. 47: 199–207.
Telatar, E. (1999). Capacity of multi-antenna Gaussian channels, European Trans. Telecommun.
10(6): 585–595.
Visoz, R. & Berthet, A. (2003). Iterative decoding and channel estimation for space-time
BICM over MIMO block fading multipath AWGN channel, IEEE Trans. Commun.
51(8): 1358– 1367.
Wang, X. & Poor, H. V. (1999). Iterative (turbo) soft interference cancellation and deoding for
coded CDMA, IEEE Trans. Commun. 47(7): 1046–1061.
Zhu, H., Farhang-Boroujeny, B. & Schlegel, C. (2003). Pilot embedding for joint channel es-
timation and data detection in MIMO communication systems, IEEE Commun. Lett.
7(1): 30–32.
122 Radio Communications
Cooperative MIMO Systems in Wireless Sensor Networks 123
1. Introduction
The Multiple-Input Multiple-Output (MIMO) term originally describes the use of the
multiple antennas concept or exploitation of spatial diversity techniques. In early research
work, the MIMO concept was proposed to fulfil the demand for providing reliable high-
speed wireless communication links in harsh environments. Subsequently, MIMO
technology has been proposed to be used in wireless local area networks and cellular
networks, particularly at the base station and access point sides to tackle the challenges of
low transmission rates and low reliability with no constraints on energy efficiency. In
contrast, Wireless Sensor Networks (WSNs) have to deal with energy constraints due to the
fact that each sensor node depends on its battery for its operation. In harsh environments,
sensor nodes must be provided with reliable communication links. However, current WSN
design requirements do not require high transmission rates.
The concept of cooperative MIMO was introduced in WSNs by utilizing the collaborative
nature of dense sensor nodes with the broadcast wireless medium to provide reliable
communication links in order to reduce the total energy consumption for each sensor node.
Therefore, instead of using multiple antennas attached to one node or device such in the
traditional MIMO concept, cooperative MIMO presents the concept of multiple sensor nodes
cooperating to transmit and/or receive signals. Multiple sensor nodes are physically
grouped together to cooperatively transmit and/or receive. Within a group, sensor nodes
can communicate with relatively low power as compared to inter-group communication.
Furthermore, by using this cooperative MIMO concept, we can provide the advantages of
traditional MIMO systems to WSNs, particularly in terms of energy efficient operation.
This chapter introduces the concepts of diversity techniques and their relationship with
cooperative MIMO systems and to discuss their practicality for implementation in WSNs.
The approaches that we are going to use in this chapter are the comparative study and
performance evaluation of major diversity techniques and their implementations in
cooperative MIMO systems. The outcomes can be used as the basis for further study in
order to find the most suitable cooperative MIMO scheme to be implemented in the WSN
environment.
124 Radio Communications
The rest of the chapter is organized as follows. Section 2 introduces the concept of
cooperative MIMO and Section 3 explains various types of diversity techniques proposed in
the current literature. A comparative study between the major diversity techniques is
presented in Section 4 and this is followed by performance evaluation in Section 5. Finally,
in Section 6 we conclude the chapter.
3. Techniques of Diversity
In this section we discuss various diversity techniques to reduce the deep fading problem in
WSNs which requires higher retransmission rates. By tackling this problem, we are clearly
satisfying two design requirements: energy efficient operation and higher communication
link reliability. It is important to observe that deep fading contributes to packet errors (if a
portion of the packet is affected) or packet loss (if the whole packet is totally lost which can
be common as data packets in WSNs are normally small (Kohvakka et. al., 2006; Karl and
Willig, 2007). The basic concept of diversity is to provide the receiver with copies of
independently faded transmitted packets with the hope that at least one of these copies will
be received correctly. Diversity can be implemented in various ways such as frequency
diversity, spatial diversity, time diversity, modulation diversity and polarisation diversity to
suit different design requirements.
Frequency diversity is achieved when the same signal is transmitted over different
frequency bands. The separation of the frequency bands has to be more than the coherence
Cooperative MIMO Systems in Wireless Sensor Networks 125
bandwidth of the channel (Duman and Ghrayeb, 2007). Time diversity is achieved when the
same signal is transmitted with redundancy using different time intervals. The separation of
the time intervals has to be more than the coherence time of the channel. Also, time diversity
can be achieved by means of channel coding. The idea is to transmit the different parts of
the codeword corresponding to a particular symbol using different time intervals. The most
practical channel codes discussed in the literature include block codes, convolutional codes
and trellis-coded modulation (Duman and Ghrayeb, 2007).
Spatial diversity is achieved by the use of multiple antennas or nodes at either end or at both
ends of the MIMO communication link. The separation between the antennas or nodes has
to be more than half a wavelength in a uniform scattering environment. Systems with
multiple antennas are also referred to as MIMO systems (Duman and Ghrayeb, 2007).
Therefore we can refer to systems with multiple nodes as cooperative MIMO systems.
Spatial diversity gains increase channel capacity which leads to higher data throughputs
and significant improvement in data transmission reliability. These advantages are achieved
without any expansion of bandwidth or higher transmit power which makes this technique
very suitable to be implemented in energy constrained WSNs.
Diversity techniques can be combined to achieve greater improvements in reliability and
achievable transmission rates. Perhaps the most popular combination technique is between
space diversity and time diversity by using channel coding. The combination yields the
space-time coding (STC) scheme. The variants of the STC scheme depend on the channel
coding being used. For example, space-time block coding (STBC) schemes are based on
block coding and space-time trellis coding scheme (STTC) schemes are based on trellis-
coded modulation.
Multiple antennas or nodes can be exploited in different ways at both ends of the MIMO
communication link. Early work in this area concerned designs of multiple antennas at the
receiver side to achieve receive spatial diversity in order to boost link reliability as the
number of receiving antennas grows. Among the earliest users of receive spatial diversity
schemes are mobile communications systems to improve uplink performance by
implementing multiple receive antennas at the base station (Proakis, 2001). If only a single
transmit antenna and multiple receive antennas are used, the resulting system is referred to
as a Single-Input Multiple-Output (SIMO) system.
In later work transmit spatial diversity was achieved by exploiting multiple transmit
antennas with proper coding or weighting of the transmitted data signals. It is important to
note that both spatial diversity schemes achieve improved transmission reliability at the cost
of transmission rates comparable to the Single-Input Single-Output (SISO) systems. Clearly
the achievement of higher link reliability is a trade-off with transmission rates. When
multiple transmit antennas and single receive antenna are used, the resulting system is
referred to as a Multiple-Input Single-Output (MISO) system.
Further research to achieve higher transmission rates and higher capacity has been done
using multiple antennas at both ends of the communications link. These multiple transmit
antennas and multiple receive antenna systems are referred to as MIMO systems. One of the
common techniques to boost the transmission rates is to provide the receivers with
independent streams of the same data signal from different transmit antennas. In this way,
the transmit antennas are exploited to boost the transmission rates at the cost of lower link
reliability. However, when operating under certain constraints, the same scheme can
achieve full diversity gain leading to higher link reliability.
126 Radio Communications
A comparison between the different spatial diversity schemes discussed above is shown in
Table 1 where M and N denote the number of transmit antennas and receive antennas,
respectively.
Schem
M N Example Benefits
e
1 1 No transmit or receive No diversity gain.
SISO
diversity
SIMO 1 >1 Receive diversity Diversity proportional to N .
MISO >1 1 Transmit diversity Diversity proportional to M .
MIMO >1 >1 Use of multiple antennas at Diversity proportional to the
both the transmitter and product of M and N .
receiver
Array gain (coherent combining
assuming prior channel
estimation).
Table 1. Comparison of main spatial diversity schemes
a) SIMO System
b) MISO System
c) Spatial Multiplexing MIMO System
Cooperative MIMO Systems in Wireless Sensor Networks 127
rk hk s k (1)
wherek= 1, 2 ……, N , k is the complex white Gaussian noise sample vector added to t
2 variance,
kthcopy of the signal with zero mean and k~ N c,(0 2 ) and hkis the complex
channelfadinggainvect orwithzeromeanand 2 variance,
hk~ N c(0, 2 ).Weassumethatthe
receiver is coherent where the channel ationinform
is known and perfectly estimated at the
2
s symbolis
receiver. If the average power of the transmitted
128 Radio Communications
~ 2
where s is the resulting decision variable with s mean and N
variance which can
h
2
k
k 1
~ 2 . The resulting effective SNR at the output of the MRC
be represented as s ~ s, N
2
hk
k 1
N
h
2
block is proportional to k and given as:
k 1
hk
N
2
E s
2
N
. (4)
k
k 1 2 k 1
From Equation (4), the effective SNR of the system with a receive diversity scheme is
equivalent to the sum of the instantaneous receive SNRs for N different paths. If we assume
that all the different paths have the same average SNR, then the average of the effective SNR
at the output of the MRC block is:
E h
N E 2 E s
2
N
N k . (5)
k k
k 1
2
k 1
By increasing the number of receiving antennas N , the receive average SNR can be increased
by N -fold which leads to the lowest possible BER for the system such that at the high SNRs
regime, the error probability decays as SNRa-Nerrp N
Cooperative MIMO Systems in Wireless Sensor Networks 129
The difference between the two types of schemes is that the former relies on channel state
information which has to be fed back to the transmitter and the latter eliminate the need for
channel state information at the transmitter.
Two of the most popular closed-loop MISO schemes are switched diversity (Winters, 1983)
and digital beamforming (Litva and Lo, 1996). Among the two schemes, the best solution, if
the transmitter has perfect knowledge of the channel, is the MISO beamforming scheme. The
MISO beamforming scheme is less complex and easier to deploy which makes it more
practical to implement in WSNs.
RX
h1 1
RF Chain
h2
2
TX
. RF Chain
. MRC
hN
.
. .
.
. .
N .
RF Chain
Fig. 1. A system with one transmit antenna and N receive antennas with MRC.
1 RX
h1
h2 2
TX
hN
. RF
Chain
SC
.
.
select
N
Fig. 2. A system with one transmit antenna and N receive antennas with SC.
Cooperative MIMO Systems in Wireless Sensor Networks 131
1
h1 2
h2
TX hN
N
h3
h4 3
4
Fig. 3. A cooperative receive diversity system with one transmit node and N receive nodes.
w1
TX h1
1
w2 h2 RX
Transmitted 2 RF ML
signal hM Chain
.
.
.
wM
feedback channel
Fig. 4. A beamforming transmit diversity system with M transmit antennas and 1 receive
antenna.
Let us consider a digital MISO beamforming system with M antennas at the transmitter and
one antenna at the receiver as shown in Figure 4. The transmitter transmits M weighted
transmitted signals, w k.sthrough M independent paths. The received signal is then given as:
M
r hk wk s (7)
k 1
132 Radio Communications
Cooperative MIMO Systems in Wireless Sensor Networks 133
In the context of practicality in WSNs, the main obstacle for MISO beamforming
implementation is the issue of how to provide each transmitting node with the knowledge
of the channel. A multi-channel approach can be used where one channel is dedicated for
the feedback and the other channel for data transmission. The channel is estimated
periodically through training sequences on the feedback channel. However, a multi-channel
approach is not practical for WSNs because such an approach increases the hardware and
processing complexity at both the transmitter and the receiver. Also, such an approach
requires tight frequency synchronisation to maintain the dual channel utilisation which
obviously increases the total energy consumption of the network.
A better and practical alternative approach is to exploit the existing control protocols in
WSNs such as those utilising RTS-CTS packets to provide the channel state information to
the transmitter as shown in Figure 5. Both the control and data communications can be
maintained over a single-channel with less complexity and loose synchronisation.
Moreover, the transmission power of each transmitting node is reduced down to Pt/M
which leads to the reduction of the total power consumption in the network. In addition, the
RTS-CTS implementation can also reduce the hidden node problem in such densely
distributed sensor networks.
RTS-CTS
2 w 2s
h1
s Destination Node
w 1s h2
1
s w 3s
. h3 RF ML
3 Chain
s . hM
.
M wM s
Fig. 5. A cooperative beamforming transmit diversity system with M transmit nodes and 1
destination.
* *
x1 x 2 s1 s 2 s1 s 2 0 . (12)
s 2 s1 s 2
2 2
H
s s 2 s1
* * *
0
X X 1
* 2 2. (13)
s2 s1 s 2 s1 0 s1 s 2
Assume that both the paths experience quasi-static fading where the fading coefficients are
constant across the two consecutive symbol transmission intervals which can be expressed
as:
h1 t h1 t T h1 h1 e j 1
. (14)
h2 t h2 t T h2 h2 e j 2
where hk and k , k= 1, 2, are the amplitude gain and phase shift for the path from transmit
antenna k to the receiver antenna and T is the symbol duration. The received signal in the
first time slot is given as:
Cooperative MIMO Systems in Wireless Sensor Networks 135
r t r1 h1 s1 h2 s 2 1 (15)
and in the second time slot, the received signal is given as:
r t T r2 h1 s 2 h2 s1 2
* *
(16)
where 1 and 2 are the complex white noise with zero mean and variance 2 for the first
time slot and second time slot, respectively. The received signal vector is defined at the
receiver as:
r
r 1* (17)
r2
which can be written as:
h h 2 s1 1
r 1* * . (18)
h1 s 2 2
*
h2
TX RX
Modulator
s1 s2 x1 s1 s2
*
Signal ~
s
Combiner
h1
Alamouti Encoder ML
h2 ĥ
s s2
*
X 1 Channel
* x2 s2 s1
*
s2 s1 Estimator
ĥ
Fig. 6. An alamouti STC transmit diversity system with 2 transmit antennas and 1 receive
antenna.
Assume that the receiver is coherent and optimal. Then the attempt to recover s1 and s2 can
be given by the following linear combination:
M *
h2 r1
2 *
H hk s1 h1 1 h2 2
~ h
s 1* *
k 1
. (19)
h1 r2 M
*
h2 *
2 *
hk s 2 h2 1 h1 2
k 1
The resulting decision variables in Equation (19) are equivalent to the one obtained with
receive diversity using the MRC scheme. The only difference is the phase rotations on the
noise components which do not degrade the effective SNR (Alamouti, 1998).
136 Radio Communications
~ 2
The decision variable vector s with s mean and M
variance is sent to the ML
h k
s
k 1
2
detector. If the average power of the transmitted symbols is E n , the receive SNR in
each sub-channel is given as:
hk
M E sn 2
. (20)
k 1 2 2
We can observe from Equation (20) that the linear processing in Equation (19) transforms the
space-time channel into two parallel and independent scalar channels. If we assume that the
symbols are Phase Shift Keying (PSK) modulated signals with equal energy constellations,
the total transmission power is effectively doubled as shown in Equation (20) compared to
, then the
2 2
effective receive SNR can be written as:
M
hk
2
E sn
2
M
. (21)
k
k 1 2 2 k 1
If we assume that all the different paths have the same average SNR, then the average of the
effective SNR at the output of the ML block is:
E h
M E
2 E sn
2
M
M k . (22)
k k
k 1 2 2
k 1
As we can observe, the MISO Alamouti STC scheme provides the same diversity gain as the
SIMO MRC and MISO beamforming schemes with M equal to two but with 3 dB loss in
error performance (Larsson and Stoica, 2003). In addition, the MISO Alamouti STC scheme
can be applied for a system with 2 transmitting antennas and N receiving antennas to gain
higher capacity. Although such systems are very important for high-speed networks, careful
consideration of circuit and processing energies and decoder complexity at the receiver in
WSNs keeps our discussion to systems with only one receive antenna which corresponds to
one receive node in cooperative MISO transmission.
The Alamouti STC scheme can be generalised from two transmit antennas up to M transmit
antennas by using the same theory of orthogonal design (Tarokh et. al., 1999). The
generalised scheme is referred to as Orthogonal Space-Time Block Codes (OSTBC). In
general, OSTBC can be categorised into two types: real and complex, based on the signal
constellation.
Cooperative MIMO Systems in Wireless Sensor Networks 137
The basic operation of OSTBC is shown in Figure 7 where the scheme can achieve full
transmit diversity up to M order with M transmit antennas while allowing the use of a very
simple ML decoding algorithm and linear combining at the receiver. However, OSTBC
trades off full diversity gain for lower spatial rate when M > 2. In order to provide a
compromise between full diversity and full rate, a Quasi-Orthogonal STBC (Quasi OSTBC)
scheme was proposed in (Jafarkhani, 2005).
Another class of STCs is the Space-Time Trellis Codes (STTC) (Tarokh et. al., 1998). STTC
achieves higher coding gain and is comparable to STBC in terms of achieving full transmit
diversity gain. However, the encoder design based on trellis-coded modulation leads to a
more complex receiver with a Viterbi algorithm decoding implementation. The ML decoder
complexity grows exponentially with the number of bits per symbol, thus limiting the
achievable data rates.
In the context of practicality in WSNs, the main obstacle of MISO STBCs and STTCs schemes
implementation is the issues of how to provide each transmitting node with the transmit
sequences knowledge and how different transmit sequences are assigned to each node in
order to provide an orthogonal or quasi-orthogonal design.
A better and practical approach as suggested in (Yang et. al., 2007) is when the source node
broadcasts the transmit sequences to its particular neighbours in order to provide the
transmit sequences knowledge together with the original data signal. Such an approach
introduces an increasing packet overhead as M increases, prior data packet transmission.
The overhead is a compromise with full diversity gain which achieves higher reliability and
lower transmission energy.
Modulator h1 ~
Signal s
1
sS Combiner
x1 .
. hM ML
Space-Time . . ĥ
Block Encoder . Channel
X M Estimator
xM ĥ
RX
TX
Fig. 7. A STBCs transmit diversity system with M transmit antennas and 1 receive antenna.
138 Radio Communications
2 x2 Destination Node
h1 ~
s Signal s
x1 h2 Combiner
1
s x3
. h3 ML
s .
3
hM ĥ
. Channel
Estimator
xM
M ĥ
Fig. 8. A cooperative STBC transmit diversity system with M transmit nodes and 1
destination.
implementation in WSNs in order to keep the complexity and power consumption as low as
possible. There are other SM schemes such as threaded LSTCs and multilayered LSTCs, with
higher spatial rate but they come at the cost of more complex encoding and decoding
mechanisms. Obviously these schemes are not practical to be implemented in WSNs and
thus are not considered in our work.
A VBLAST encoder is shown in Figure 9. As shown in the figure, the bit stream is de-
multiplexed into M sub-streams. Each M sub-stream is then modulated and transmitted
from M transmit antennas. The transmitted signal matrix is given as:
X sk t
(23)
where k= 1, 2, ….., M and t = 1, 2, …..,L with L is the transmission block length. At a given
time t, the transmitter transmits the t th column from the transmission matrix, one symbol
from each k antenna. The given transmission mechanism represents vertical structuring
th
a) Source node broadcasts the original data packet stream to its M -1 neighbour nodes
with very low power and all the M transmitting nodes send the same data packet
streams simultaneously after the sending timer expires.
b) N receiving nodes receive the data packet streams from M transmitting nodes and
each receiving node employs a ML decoder to decode the data packet and forward
the data packet to the destination node.
In order to gain both spatial diversity and spatial rate, the constraint of the traditional SM
scheme such as N ≥ M also works for the cooperative SM scheme. Consider the transmission
route in Figure 10. The error rate in each route is given as:
h11
TX
1 1
Modulation
. h1M .
. . .
Demux RX
. . .
1: M
. hN 1
M N
Modulation hNM
Fig. 9. A VBLAST spatial multiplexing system with M transmit antennas and N receive
antennas.
2 3
s 2
1 s H
1
. 3
s . 4
. .
.
M N .
Fig. 10. A cooperative spatial multiplexing system with M transmit nodes and N receive
nodes.
where Pe M _1 is the error rate for M nodes cooperatively sending to one receiving node
which relates to the power summation from multiple paths M , and different fading
characteristics that may occur in different signal transmission paths. Pepp ( dst ) is the error
rate from one receiving node to the destination. A simple majority decision rule is employed
at the destination node when multiple packets are received from N -1 nodes (Yang et. al.,
2007). The data packet stream with the lowest BER, which means that the SNR is maximised,
is selected at the destination node. If each receiving node in the receiving group has the
same BER, the BER in the destination node after the reception from the N nodes forming the
reception group is given as:
N
N k
PeM _ N Pe 1 Pe N k . (25)
kN / 2 k
Cooperative MIMO Systems in Wireless Sensor Networks 141
5. Performance Analysis
In this section, we study the performance of cooperative MIMO schemes discussed earlier
on, namely cooperative MISO Beamforming (BF), MISO STBC and MIMO SM schemes. The
clock jitter impact is modelled as a timing error function in Section 5.1. The error
performance for each cooperative scheme is modelled in Section 5.2 while the results are
discussed in Section 5.3.
Pp 1 1 Pb
N data
(27)
where N datais the packet length in bits. Consider the case of BPSK modulation under quasi-
static Rayleigh fading with fading gain h, experiencing a square law path loss without
channel codes. In the SISO system, the conditional SNR is given by (Proakis, 2001):
2
Pt h Gt Gr
bSISO 2
(28)
4d
NoM l
where P tis the transmission power, d is the distance between the sending and destination
node, G t and G r are the transmission and reception antenna gain, is the carrier wave
length, M is the link margin and N o is single-sided thermal noise power spectral density
(PSD) given as -171 dBm/Hertz.
142 Radio Communications
7KHSUREDELOLW\GHQVLW\IXQFWLRQ3’)RI
bSISO LVJLYHQE\
bSISO
1
p bSISO exp bSISO
bSISO
E h
ZKHUH bSISO LVWKHDYHUDJH615$VVXPHWKDW 1 /DUVVRQDQG6WRLFD WKHQ
2
bSISO LVJLYHQE\
WKHYDOXHRI
bSISO
2
Pt E h Gt Gr
Pt Gt Gr
2 2
4d 4d
NoM l No M l
7KHDYHUDJH%(5FDQEHH[SUHVVHGDV
Eh PbSISO Eh Q 2 bSISO
7KHXSSHUERXQGRIWKHDYHUDJH%(5FDQEHGHULYHGDV3URDNLV
Q 2 bSISO p x 2 bSISO
exp
2 bSISO
2
2
E Q 2 bSISO Eexp bSISO
bSISO LVJLYHQE\3URDNLV
7KHPRPHQWJHQHUDWLQJIXQFWLRQRI
1
S E exp bSISO S
S bSISO
M
Pt Gt Gr M
bSTBC hk STBCk
2
2 (37)
k 1 4d k 1
M NoM l
and the SNRs for imperfect synchronisation scenario at the destination node can be given
by:
M
Pt Gt Gr Te M
bBF hk BFk
2
2
(38)
k 1 4d Tb k 1
NoM l
M
Pt Gt Gr Te M
bSTBC hk STBCk
2
2
(39)
k 1 4d Tb k 1
M No M l
where BFk and STBCk are the instantaneous SNR on the kth channel.
BFk
1
p BFk exp BFk
(40)
BFk
STBCk
1
p STBCk exp STBCk
. (41)
STBCk
Assume that E hk 1 (Larsson and Stoica, 2003), then the values of
2
BFk and STBCk
for perfect synchronisation scenario become:
BFk
Pt E hk G G 2
t r
Pt Gt Gr
(42)
2 2
4d 4d
NoM l NoM l
STBCk
Pt E hk G G2
t r
Pt Gt Gr
(43)
2 2
4d 4d
M No M l M No M l
144 Radio Communications
and the average SNRs for imperfect synchronisation scenario can be given by:
BFk
G G
Pt E hk
2
t r
Te
Pt Gt G r
Te
(44)
4d
2
Tb 4d
2
Tb
NoM l NoM l
STBCk
G G
Pt E hk
2
t r
Te
Pt Gt G r
Te
. (45)
4d
2
Tb 4d
2
Tb
M NoM l M NoM l
The moment generating functions of bBF and bSTBC are (Proakis, 2001):
M
1
S Eexp bBF S (46)
k 1 S BFk
E h PbBF E exp bBF 1 (1 BFk ) M (47)
M
1
S Eexp bSTBC S (48)
k 1 S STBCk
Eh PbSTBC Eexp bSTBC 1 (1 STBCk ) M . (49)
The average BER for the cooperative SM scheme in (Yang et. al., 2007) is given as:
N
N k
PbSM Pe 1 Pe N k (50)
k N / 2 k
where P e is the error rate in each route and N is the number of nodes forming the reception
group. The average SNR of the MISO scheme in Equation (51) is the same as the average
SNR of the cooperative MISO BF scheme (Yang et. al., 2007). Thus we assume that the
average BER is the same for both schemes. Table 2 lists the system parameters used for
evaluating BER performance of the three cooperative MIMO schemes.
However, this special case may not have a significant impact due to the fact that the
operating transmission power for WSNs is in the range between 25mW to 50mW (Kohvakka
et. al., 2006). Also, we can observe that the diversity gain of cooperative SM depends on N
and not M as shown in Figures 12 and 13. In addition, the cooperative SM achieves spatial
rate equal to M .
Figures 14 and 15 show the corresponding results for imperfect synchronisation scenarios.
As we can see, in general SISO outperforms other schemes above 0.8T b and cooperative SM
outperforms the other schemes when the diversity gain is getting higher. However, when
the diversity gain of all the cooperative schemes is the same, cooperative BF outperforms the
other schemes.
Symbol Quantity
fc 2.4 GHz
G tG r 5 dBi [5]
M 40 dB [5]
d 100 meters
dm 10 meters
250 KbpsRb
Table 2. System parameter for ber and per modeling
0
10
-5
10
B it E rro r R a te
SISO
6x1 BF
6x1 STBC
6x6 SM
-10
10
-15
10
0 10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 11. BER vs. transmission power for various cooperative schemes with M = 6 and N = 1
(Cooperative BF and Cooperative STBC) and M = N = 6 (Cooperative SM).
146 Radio Communications
0
10
-5
10
SISO
Bit Error Rate
-15
10
0 10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 12. BER vs. transmission power for various cooperative schemes with M = 6 and N = 1
(Cooperative BF and Cooperative STBC) and various N = 2, 4 and 6 for Cooperative SM with
M = 6.
0
10
-5
10 SISO
6x1 CMISO Beamforming
B it E rro r R ate
-15
10
0 10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 13. BER vs. transmission power for various cooperative schemes with M = 6 and N = 1
(Cooperative BF and Cooperative STBC) and various M = 3, 4, 5 and 6 for Cooperative SM
with N = 6.
Cooperative MIMO Systems in Wireless Sensor Networks 147
-1
10
SISO
2x1 BF, 0Tb
10
-2 2x1 STBC, 0Tb
2x2 SM, 0Tb
2x1 BF, 0.3Tb
B it E rro r R ate
-5
10
10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 14. BER vs. transmission power for various imperfect synchronisation cooperative
schemes with M = 2 and N = 1 (Cooperative BF and Cooperative STBC) and M = N = 2
(Cooperative SM).
-1
10
10
-2
SISO
2x1 BF, 0Tb
-3 2x1 STBC, 0Tb
10
2x4 SM, 0Tb
2x1 BF, 0.3Tb
B it Error R ate
10
-4
2x1 STBC, 0.3Tb
2x4 SM, 0.3Tb
-5 2x1 BF, 0.6Tb
10
2x1 STBC, 0.6Tb
2x4 SM, 0.6Tb
10
-6
2x1 BF, 0.9Tb
2x1 STBC, 0.9Tb
-7 2x4 SM, 0.9Tb
10
10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 15. BER vs. transmission power for various imperfect synchronisation cooperative
schemes with M = 2 and N = 1 (Cooperative BF and Cooperative STBC) and N = 4 for
Cooperative SM with M = 2.
148 Radio Communications
6. Conclusion
This chapter has examined the major diversity techniques and various cooperative
configurations, including BF, STBC and SM schemes in conjunction with performance
evaluation and comparative literature. Both cooperative BF and STBC schemes utilise the
MISO concept while the SM scheme utilises the MIMO concept. We have shown that the
cooperative MISO BF is the most promising scheme to be implemented in WSNs due to the
lowest error performance among others with the same diversity gain. Also, cooperative
MISO BF outperforms other cooperative schemes in imperfect synchronisation scenarios. On
the other hand, cooperative MIMO SM is more practical in terms of lower error performance
and tolerance to clock jitter error when its diversity gain is higher than the others. In
addition, cooperative MIMO SM provides a higher spatial rate as M grows.
The comparative study relates the diversity gain with the reduction in the transmission
power by increasing the communication link reliability. However, in order to find the best
or optimal scheme to be used in WSNs, we have to compare all the three schemes in terms
of total energy consumption which must include both the transmission power and circuit
power for each sensor node in the network. The discussion in this chapter can provide a
basis for further study to find the optimal cooperative MIMO scheme when both
transmission power and circuit power are considered for all required energy components of
cooperative communications in WSNs.
7. References
Alamouti, S.M. (1998). A Simple Transmit Diversity Technique for Wireless
Communications, IEEE Journal on Selected Areas in Communications, vol. 16, pp.
1451-1458.
Duman, T.M. & Ghrayeb, A. (2007). Coding for MIMO Co mmunication Systems , First ed. West
Sussex, England: John Wiley & Sons Ltd.
Foschini, G.J. (1996). Layered Space-time Architecture for Wireless Communication in A
Fading Environment when using Multi-element antennas, Bell Labs Technical
Journal, pp. 41-59.
Golden, G.D.; Foschini, G.J.; & Valenzuela, R.A. (1999). Detection Algorithm and Initial
Laboratory Results using the V-BLAST Space-time Communication Architecture,
Electronic Letters, vol. 35, pp. 14-15.
Gupta, G. & Younis, M. (2003). Fault-Tolerant Clustering of Wireless Sensor Networks,
presented at IEEE Wireless Communications and Networking Conference
(WCNC).
Jafarkhani, H. (2005). Space-Time Coding: Theory and Practice
, First ed: Cambridge University
Press.
Jagannathan, S.; Aghajan, H.; & Goldsmith, A. (2004). The effect of time synchronization
errors on the performance of cooperative MISO systems, presented at IEEE Global
Communications Conference (Globecom), Dallas, Texas, USA.
Karl, H. & Willig, A. (2007). MAC Protocols, In: Protocols and Architectures for Wireless Se
Networks, pp. 111-148, John Wiley & Sons, 978-0-470-09510-2, West Sussex, England.
Kohvakka, M.; Kuorilehto, M.; Hannikainen, M. & Hamalainen, T.D. (2006). Performance
Analysis of IEEE 802.15.4 and Zigbee for Large-scale Wireless Sensor Network
Cooperative MIMO Systems in Wireless Sensor Networks 149
Wittneben, A. (1991). Base Station Modulation Diversity for Digital SIMULCAST, presented
at IEEE Vehicular Technology Conference.
Yang, H.; Shen, H.-Y. & Sikdar, B. (2007). A MAC Protocol for Cooperative MIMO
Transmissions in Sensor Networks, Proceedings of IEEE Global Telecommunications
ConferenceGLOBECOM)
( , pp. 636-640, Washington, USA.
Yuksel, M. & Erkip, E. (2004). Diversity Gains and Clustering in Wireless Relaying,
presented at IEEE International Symposium of Information Theory.
Optimal Cooperative MIMO Scheme in Wireless Sensor Networks 151
1. Introduction
Cooperative Multiple-Input Multiple-Output (MIMO) has been proposed as a transmission
strategy to combat the fading problem in Wireless Sensor Networks (WSNs) to reduce the
retransmission probability and lower the transmission energy. Among the earliest work on
cooperative MIMO in WSNs is the analysis of the Space-Time Block Coding (STBC) scheme
to achieve lower Bit Error Rate (BER) and significant energy savings. The work is continued
with the implamentation of the Low-Energy Adaptive Clustering Hierarchy (LEACH)
Medium Access Control (MAC) protocol for clustered-based architectures. The combination
of STBC and the LEACH scheme resulted in a significant improvement in transmission
energy efficiency compared to the Single-Input Single Output (SISO) scheme.
Further study is conducted to compare the performance of STBC and various Spatial
Multiplexing (SM) schemes such as Vertical Bell Labs Layered Space-Time (V-BLAST) and
Diagonal BLAST. In this study, LEACH MAC was also utilized and lower transmission
energy and latency were achieved against the SISO scheme. However, the centralized
architecture leads to energy wastage and higher latency compared to a distributed
architecture. On the other hand, the implementation of a distributed architecture needs to
consider synchronisation issues. Thus a practical cooperative MIMO scheme for distributed
asynchronous WSNs is needed.
Moreover, a practical MAC that can suit cooperative transmission is required. A
combination of a practical MAC protocol and an efficient MIMO scheme for asynchronous
cooperative transmission leads to a more energy efficient and lower latency cooperative
MIMO system. A combination of a MAC protocol and a cooperative SM scheme for
cooperative MIMO transmission has been proposed in previous study where the combined
scheme achieves significant energy efficiency and lower latency.
Furthermore, a transmit Maximum Ratio Combiner (MRC) scheme is suggested to be more
tolerant to the jitter difference than the Alamouti STC scheme in network with imperfect
transmitting nodes synchronisation. In this chapter, we expand these studies to two other
cooperative MIMO schemes, namely Beamforming (BF) and STBC for both network
scenarios: perfect and imperfect transmitting nodes synchronisation. The optimal
cooperative MIMO scheme combined with an appropriate MAC protocol should lead to the
lowest energy consumption and lowest packet latency.
152 Radio Communications
The rest of this chapter is organised as follows. Section 2 describes the system model
considered in this chapter. Section 3 and Section 4 model the system performance and are
followed by Section 5 presenting the analytical results for the three cooperative MIMO
schemes (BF, SM and STBC) in terms of total energy consumption and packet latency.
Finally the chapter is concluded in Section 6.
2. System Model
The baseline system for cooperative MIMO communication is equipped with a CMACON
protocol as proposed and evaluated in (Yang et. al., 2007). Sleep cycles are not implemented
in order to ensure that the cooperative nodes are always available to perform cooperative
transmission and reception. In order to avoid collision, we assume that during the
cooperative transmission and reception, other nodes in the vicinity that are not involved in
the transmission are put in the silent mode for the whole transmission duration. The
duration to remain silent is obtained from the Network Allocation Vector (NAV).
Also in this chapter we consider the impact of imperfect synchronisation caused by clock
jitter alone. Each cooperative transmitting node experiences clock jitter with the jitter around
m
a reference clock, T o denoted as Tj where 1 m M . The worst case scenario is
considered here with only 2 cooperative transmitting nodes where the clock jitters are fixed
Tb T
at the extreme ends, T j 1 2
, T j b where 0 Tb Tb and Tb is the bit
2 2
1 2
duration. Thus the clock jitters difference is T j T j T j Tb . The effect of imperfect
synchronisation can be modelled as a degrading function of the bit period which
consequently degrades the received bit energy.
The baseline network configurations for MISO BF and STBC are shown in Figures 1 and 2
while for MIMO SM it is shown in Figure 3. The network is assumed to be distributed
without any infrastructure and the nodes are fixed once they are deployed. A new node that
wants to join the network should broadcast a packet after powering up to acknowledge its
presence in the neighbourhood. A node checks its remaining energy regularly and when its
total remaining energy is below the threshold, which indicates that its death is near, it
informs the other nodes in the vicinity of the expected death time. Therefore the
neighbouring nodes will exclude this node from any future cooperative MIMO
transmission. The distance between the cooperating nodes either at the transmitting or
receiving side is assumed to be very small compared to the distance between the source
node and the destination node, d. We assume that there are M cooperative transmitting
nodes and one receiving node for the perfect synchronisation scenario and M = 2
cooperative transmitting nodes and one receiving node for the imperfect synchronisation
scenario. A special case for the spatial multiplexing scheme is used where the number of the
cooperative receivers is assumed to be N .
In this section, we introduce two kinds of network configurations. The first network
configuration involves data transmission from M cooperating transmitting nodes to one
destination node by utilizing either of the two MIMO schemes: BF or STBC. An RTS-CTS
handshaking method is performed as described in (Yang et. al., 2007) and the source node
broadcasts the original data packet to its M -1 neighbours.
Optimal Cooperative MIMO Scheme in Wireless Sensor Networks 153
RTS-CTS
2 w 2s
h1
s Destination Node
w 1s h2
1
s w 3s
. h3 RF ML
3 Chain
s . hM
.
M wM s
Fig. 1. A cooperative beamforming transmit diversity system with M transmit nodes and 1
destination.
2 x2 Destination Node
h1 ~
s Signal s
x1 h2 Combiner
1
s x3
. h3 ML
s .
3
hM ĥ
. Channel
Estimator
xM
M ĥ
Fig. 2. A cooperative STBC transmit diversity system with M transmit nodes and 1 destination.
2 3
s 2
1 s H
1
. 3
s . 4
. .
.
M N .
Fig. 3. A cooperative spatial multiplexing system with M transmit nodes and N receive nodes.
In the case of the BF scheme, the channel information is estimated and optimized from the
CTS packet by all the M nodes in order to weight the data packet. In the case of the STBC
154 Radio Communications
scheme, all the M nodes encode the original data packet with the information supplied by
the source node in the broadcast packet. Both schemes utilize a Maximum Likelihood (ML)
detector and a coherent receiver is used. The second network configuration is the data
transmission from M cooperating transmitting nodes to N cooperating receiving nodes by
utilizing the concept of SM. The recovered data from N -1 nodes is forwarded to the
destination node.
where 1 with denoting the drain efficiency of the Radio Frequency (RF) power
amplifier and denoting the Peak-to-Average Ratio (PAR) which depends on the
modulation scheme and the associated constellation size. The total circuit power is given by:
where Pcr PLNA Pmix PIFA Pfilr PADC Psyn and Pct PDAC Pmix Pfilt Psyn are
values for the power consumption of the Digital-to-Analogue Converter (DAC), mixer, Low
Noise Amplifier (LNA), Intermediate Frequency Amplifier (IFA), active filters at the
transmitter and the receiver, Analogue-to-Digital Converter (ADC) and frequency
synthesizer whose values and a detailed block diagram are given in (Cui et. al., 2004;
Nguyen et. al., 2007). Therefore, the total energy consumption per bit Ebt for the SISO
system can be obtained as:
P
pa Pc
(3)
Ebt
Rb
Optimal Cooperative MIMO Scheme in Wireless Sensor Networks 155
when M = N = 1. Equations (1) and (2) can be used to model the cooperative BF, STBC and
SM systems with an arbitrary number of M and N . For the traditional Carrier Sense Multiple
Access with Collision Avoidance (CSMA-CA) protocol, the energy consumed for an
unsuccessful transmission attempt is given as:
where E rts , Ects , E data _ siso , E ack are the energy consumed while sending Ready-to-Send
(RTS), Clear-to-Send (CTS), SISO data and Acknowledgment (ACK). Given the size of each
packet as N rts
N, cts and N ack, Equations (4) and (5) can be rewritten as:
,N data_siso
P
Esiso psiso Eu _ siso Es _ siso (8)
1 P
psiso
where Ppsiso is the packet error probability of the SISO system which can be obtained in
(Ahmad et. al., 2008)
Therefore the total energy consumption per bit EbtBs for the local exchange can be obtained
as:
PpaBs PcBs
E btBs . (11)
Rb
The energy consumed for an unsuccessful BF and STBC transmissions attempt is given as:
Es _ M Eu _ M Eack (13)
where E Bs and Edata _ M are the amounts of energy consumed during packet broadcasting
from the source node to its neighbours and the energy consumed for Cooperative BF or
STBC data transmission. Given the size of each packet as N rts , N Bs, N data_Mand N ack,,
, N cts
Equations (12) and (13) can be rewritten as:
P
EM pM Eu _ M Es _ M (16)
1 P
pM
where PpM is the packet error probability for BF or STBC which can be obtained in (Ahmad
et. al., 2008). To model transmission energy for the second scenario, we start with the power
consumed by the power amplifier, P paBrfrom the destination node to its cooperating
receiving nodes and P paColfrom N-1 receiving nodes to the destination node. P paBrand P paCol
are dependent on the local exchange transmit power P tmand can be approximated as:
The total circuit power for the former case is given by:
and the total circuit power for the latter case is given by:
Therefore the total energy consumption per bit EbtBr and EbtCol for both cases can be
obtained as:
P paBr PcBr
EbtBr (21)
Rb
E btCol
P P
paCol .
cCol
(22)
Rb
Es _ SM Eu _ SM Eack (24)
where E Br , ECol and Edata _ SM are the energy consumed during packet broadcasting from
the destination node to its neighbours, the energy consumed by N-1 cooperating receiving
nodes to the destination node and the energy consumed for the cooperative SM data
transmission. Given the size of each packet as N rts , N Bs, N data_SMand N ack, Equations (23)
, N cts
and (24) can be rewritten as:
P
ESM pSM Eu _ SM Es _ SM (27)
1 P
pSM
where PpSM is the packet error probability of cooperative MIMO with spatial multiplexing
which can be obtained in (Yang et. al., 2007). The values of the system parameters used in
Figures 4 to 7 are listed in Table 1 (Cui et. al., 2004; Yang et. al., 2007).
158 Radio Communications
Symbol Quantity
N rts 65 bits
N cts 55 bits
N ack 54 bits
N Bs 1300 bits
N Br 120 bits
N data=N Col 1024 bits
P mix 30.3mW
P syn 50mW
P filt
=P filr 2.5mW
P ADC 9.85mW
P DAC 15.48mW
P LNA 20mW
P IFA 3mW
Table 1. system parameter for energy consumption modeling
where Twait is the duration for which the sender waits for an ACK packet. The packet
transmission delay is then given as:
P
Td _ SISO psiso Tu _ siso Ts _ siso . (30)
1 P
psiso
Optimal Cooperative MIMO Scheme in Wireless Sensor Networks 159
P
Td _ M pM Tu _ M Ts _ M . (33)
1 P
pM
For the case of cooperative MIMO SM, we introduce the delay for the broadcast
transmission time of a recruitment message sent by the destination node, TBr and the delay
for the time required by the cooperating receiving nodes (N-1) to send the data to the
destination, Tcol . The duration of a successful transmission attempt is given as:
PpSM
Td _ SM Tu _ SM Ts _ SM . (36)
1 P
pSM
The values of the system parameters used in Figures 8 to 11 are as follows: T rts = 0.52ms, T cts
= 0.44ms, T ack= 0.432ms, T Bs= 10.4ms, T Br= 0.96ms, T data
= 8.192ms, T col= 22.3ms (Nguyen et.
al., 2007), and T wait= 70ms (Yang et. al., 2007).
160 Radio Communications
12
SISO
2x1 BF
Total Eerngy Consum ption in m J
10 2x1 STBC
2x8 SM
4x1 BF
8
4x1 STBC
4x8 SM
6
6x1 BF
6x1 STBC
6x8 SM
4 7x1 BF
7x1 STBC
7x8 SM
2
8x8 SM
0
100 150 200 250 300 350 400 450 500
Transmitted Power, Pt in mW
Fig. 4. Total energy consumption vs. transmission power for various schemes with M = 2, 4,
6, 7, 8 and N = 1 (Cooperative BF and STBC) and N = 8 (Cooperative SM).
-3
x 10
1.8
1.6
Total Energy C onsum ption, E in J
1.4
2x1 BF
1.2 2x1 STBC
2x6 SM
1 4x1 BF
4x1 STBC
0.8 4x6 SM
6x1 BF
0.6 6x1 STBC
6x6 SM
0.4
0.2
0
0 10 20 30 40 50 60 70 80 90
Transmitted Power, Pt in mW
Fig. 5. Total energy consumption vs. transmission power for various schemes with M = 2, 4,
6 and N = 1 (Cooperative BF and STBC) and N = 6 (Cooperative SM).
162 Radio Communications
-3
x 10
2
1.8
Total Energy Consum ption, E in Joule
1.6
0.2
0
10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 6. Total energy consumption vs. transmission power (lower region) for various
imperfect synchronisation schemes with M = 2 and N = 1 (Cooperative BF and STBC) and
N = 2 (Cooperative SM).
-3
x 10
2
1.8
Total Energy Consumption, E in Joule
1.6
0.2
0
10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 7. Total energy consumption vs. transmission power (lower region) for various
imperfect synchronisation schemes with M = 2 and N = 1 (Cooperative BF and STBC) and
N = 4 (Cooperative SM).
Optimal Cooperative MIMO Scheme in Wireless Sensor Networks 163
100
SISO
90 2x1 BF
2x1 STBC
80 2x2 SM
Packet Latency in msec
70
60
50
40
30
20
10
0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Transmitted Power, Pt in W
Fig. 8. Packet latency vs. transmission power for various schemes with M = 2 and N = 1
(Cooperative BF and STBC) and N = 2 (Cooperative SM).
180
2x1 BF
160 2x1 STBC
2x6 SM
140 4x1 BF
4x1 STBC
Packet Latency in msec
4x6 SM
120
6x1 BF
6x1 STBC
100
6x6 SM
80
60
40
20
20 30 40 50 60 70 80 80 100
Transmitted Power, Pt in mW
Fig. 9. Packet latency vs. transmission power for various schemes with M = 2, 4, and 6 and
N = 1 (Cooperative BF and STBC) and N = 6 (Cooperative SM).
164 Radio Communications
100
90
80
2x1 BF, 0Tb
Packet Latency in msec
30
20
10 20 30 40 50 60 70 80 90 100
Transmitted Power, Pt in mW
Fig. 10. Packet latency vs. transmission power (lower region) for various imperfect
synchronisation schemes with M = 2 and N = 1 (Cooperative BF and STBC) and N = 2
(Cooperative SM).
100
90
80
70
60
50
40
30
20
10 20 30 40 50 60 70 80 90 100
Optimal Cooperative MIMO Scheme in Wireless Sensor Networks 165
6. Conclusion
This chapter presents a comparison study of three cooperative MIMO schemes in WSNs. We
have developed analytical models for BER and PER to estimate retransmission rates from
PER in (Ahmad et. al., 2008) and these are used to evaluate the total energy consumption
and packet latency of the cooperative systems in this chapter. We show that the SISO
scheme is more energy efficient and has lower latency at higher regions of transmission
power while the three cooperative MIMO schemes are more energy efficient and
outperform the SISO scheme at lower regions. Clearly, at the higher transmission power
region, the SISO scheme enjoys lower transceiver circuit energy consumption and no energy
cost at all on establishing a cooperative mechanism compared to the cooperative MIMO
schemes. These results provide a constraint on the optimal transmission power or
equivalently the optimal distance that should be used when implementing cooperative
MIMO transmission in WSNs.
From the analysis we can conclude that at the lower transmission power region, the
cooperative optimal BF scheme outperforms both the cooperative SM and STBC schemes in
terms of energy efficiency and packet latency for both perfect and imperfect synchronisation
scenarios. Also we note that the cooperative BF scheme with M = 2 nodes is an efficient
cooperative system. Further work will involve development of MAC protocols optimised
for the cooperative transmission schemes and with the aim of creating an optimal
cooperative transmission mechanism for use in distributed WSNs.
7. References
Ahmad, M.R.; Dutkiewicz, E.; & Huang, X. (2008). Performance Analysis of Cooperative
MIMO Transmission Schemes in WSN, to be presented at the IEEE International
Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC),
Cannes, France.
Cui, S.; Goldsmith, A.J.; & Bahai, A. (2004). Energy-efficient of MIMO and Cooperative
MIMO Techniques in Sensor Networks, IEEE Journal on Selected Areas in
Communications, vol. 22, issue 6, pp. 1089-1098.
Kohvakka, M.; Kuorilehto, M.; Hannikainen, M. & Hamalainen, T.D. (2006). Performance
Analysis of IEEE 802.15.4 and Zigbee for Large-scale Wireless Sensor Network
Applications, Proceedings of ACM International Workshop on Performance Evaluation
WirelessAdhoc,Sensor,andUbiquitous, Networks, pp. 1-6, Malaga, Spain.
Kuorilehto, M.; Kohvakka, M.; Suhonen, J.; Hamalainen, P.; Hannikainen, M. & Hamalainen,
T.D. (2007). MAC Protocols, In: Ultra-Low Energy Wireless Sensor Networks in
Practice, pp. 73-88, John Wiley & Sons, 978-0-470-05786-5, West Sussex, England.
Nguyen, T.D.; Berder, O.; & Sentieys, O. (2007). Cooperative MIMO Schemes Optimal
Selection for Wireless Sensor Networks, presented at IEEE Vehicular Technology
Conference (VTC2007), Baltimore, MD, USA.
Polastre, J.; Hill, J.; & Culler, D. (2004). Versatile Low Power Media Access for Wireless
Sensor Networks, presented at The ACM Conference on Embedded Networked
Sensor Systems (Sensys), Baltimore, Maryland, USA.
Yang, H.; Shen, H.-Y. & Sikdar, B. (2007). A MAC Protocol for Cooperative MIMO
Transmissions in Sensor Networks, Proceedings of IEEE Global Telecommunications
ConferenceGLOBECOM)
( , pp. 636-640, Washington, USA.
166 Radio Communications
Single/Multi-User MIMO Differential Capacity 167
1. Introduction
This chapter will be structured around two contributions by the authors on the topic,
(Castanheira & Gameiro 2008) and (Castanheira & Gameiro 2009).
The provision of broadband services to everyone is considered one of the key components
for enabling the so-called information society. It is more or less consensual that to attain the
high-rates envisioned by IMT-2000 (I. R. R. M. M1645 2003) of providing around 1Gbit/s for
pedestrian and 100Mbit/s for high mobility, will require the use of multiple antennas at the
transceivers, to exploit the scattering properties of the wireless medium. Nevertheless, due
to the physical size limitations of the transceivers, the number of antennas cannot be high
and the space between them is limited, which implies that the degree of channel
independence achieved is not sufficient to attain the high capacities envisioned, in most
scenarios. One possible solution to cope with this problem is to have the mobiles
simultaneously communicating with a group of geographically distributed antennas with
perfect cooperation between them. The key to achieve perfect cooperation is to have the
radio signals transparently transmitted / received to / from a central unit (CU), where all
the signal processing is done (FUTON 2008). Considering the high capacities envisioned
optical fiber, due to its low attenuation and enormous bandwidth is the obvious technology
of choice to build these transparent interconnections. However the joint processing of a
group of antennas and the remote transmission of their signals to the CU will require
additional processing power and will imply additional costs to the overall network. It is also
expected, by the law of diminishing returns, that as more and more antennas are jointly
processed the improvement in throughput will not increase linearly with the added
complexity. Thus a tradeoff must be made between the costs/complexity and the number of
antennas deployed. One possible way to ease the complexity problem is to use low
complexity/sub-optimal schemes, like Zero-Forcing (ZF) (Caire & Shamai 2003) or Block-
Diagonalization (BD) (Seijoon Shim et al. 2008) at the CU. Following this line of thought, in
(Jindal 2005) and (Juyul Lee & Jindal 2007), the authors study the incurred losses, in terms of
power/rate offsets, between ZF/BD and the optimal scheme, which is well known to be
Dirty Paper Coding (DPC). The authors conclude that the losses are higher when the
number of transmit antennas is close to the number of aggregate receive antennas.
Thereafter the analysis of the gains introduced by the connection of the system users to
more transmit antennas is of special importance, either to estimate a “reasonable” number of
168 Radio Communications
antennas that should be jointly processed, either to give a measure for the network to check
if, in a distributed antenna system (DAS), it is worthwhile to provide an additional
connection to the mobiles, or to provide some guidelines for the deployment of the
distributed antennas or even to compare sub-optimal schemes to the optimal scheme. In that
context we define Differential CAPacity (DCAP) as the increase in ergodic sum-capacity
when one additional transmit antenna is connected to the system users, to quantify the gains
provided by the processing of one additional transmit antenna at the CU and analyze its
behavior.
This chapter is organized as follows: section 2 presents the channel model; section 3
describes the single-user and multi-user channel capacities. In section 4 and 5 the DCAP, for
the single-user and multi-user scenarios, is studied. In section 6 numerical results are
provided and finally in section 7 some conclusions are drawn.
2. Channel Model
Throughout this chapter a Distributed Multiple-Input Multiple-Output (MIMO) Broadcast
channel with K users, each with N receive antennas, and M transmit antennas is considered.
A broadcast channel (BC) is a communication channel in which there is one sender and two
or more receivers (Cover 1972). For a broadcast channel, the user k received signal,
can be modeled by:
(1)
3. Single/Multi-User Sum-Capacity
3.1 Single-User case
For the single-user case, if only one receive antenna is considered, the system reduces to the
classical multiple input single output (MISO) system. As a consequence, the resulting
capacity expression are much simpler to analyze than for the general case of a multi-user
system. Thus for this case, the system capacity and the corresponding DCAP is described in
more detail, either to introduce the reader to the topic, either to provide some baseline work
to be used in the multi-user case.
According to (Liu & Li 2005a) and (Goldsmith 2005), if only one user with one receive
antenna is considered ( ), the ergodic channel capacity can be expressed by:1
(2)
(3)
From the previous expression it is easy to identify as the link SNR , then the
capacity expression can be put into the following equivalent format:3
(4)
(5)
1 We consider for now on that the capacity units are nats/s/Hz, when omitted.
2 The covariance matrix of the channel gains is diagonal, because the channel gains are
independent. So their unitary singular value decomposition matrices are equal to the
identity matrix.
3 According to (Goldsmith 2005) the random variable is exponential distributed and
consequently .
176 Radio Communications
obtain an approximation for the DCAP, for , we need also to know that for ,
see equation (23). For the increase in capacity obtained by the connection of a new
user to the system, can be approximated taking into account the DCAP expression for the
case, equation (24) line , and making an extrapolation of equation (26). From
those assumptions the capacity increase by the connection of one additional user to the
system can be approximated by:
(27)
and as can be confirmed in sub-section 6.2 (Fig. 3(a)), this approximation is close to the
values obtained by numerical simulations and is better for a high number of users.
6. Numerical Results
6.1 Single-User DCAP analysis
In this sub-section, the DCAP, for a grid antenna placement, as show in Fig. 3 (a), is
analyzed. First the exact DCAP values are compared to the obtained bounds, to access their
tightness. Next we analyze the sensitivity of the DCAP to the variation of the mean SNR and
finally we perform a DCAP analysis of a representative area covered by the antennas.
In all numerical analysis presented in this chapter we consider that the mean SNR is only
dependent on the signal path loss (Simplified Path Loss Model, (Goldsmith 2005)), that6
and that . It is also considered that the new connected antenna is
always the one with highest mean SNR from the group of unconnected antennas and that
. By circular ring we mean the group of antennas with the same SNR.
1.5 1.5
Lower Bound Lower Bound
Upper Bound 1/(M-1) bound
1/(M-1) bound 1/(M + M - 1) bound
1/(M + M - 1) bound Exact
CM-1 (bit/s/Hz)
CM-1 (bit/s/Hz)
1 Exact 1
M
0.5 0.5
0 0
2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16
M M
6 is a unit less constant which depends on the antenna characteristics and on the average
channel attenuation, is a reference distance for the antenna far‐field, is the path loss
exponent and is the transmitted power at a distance .
Single/Multi-User MIMO Differential Capacity 171
(8)
From this affine approximation it is easy to see that the sum-capacity scales linearly with the
number of aggregate receive antennas and that this scaling factor is not dependent on the
individual values of or , in the high SNR regime. However, for the case of more
aggregate receive than transmit antennas, , equal power allocation ceases to be
asymptotic optimal, since even for the standard degraded BC the throughput is
maximized by transmitting only to the best user (Caire & Shamai 2003).
4. Single-User DCAP
4.1 Exact Expression
In this sub-section we obtain an exact expression for the DCAP considering the the single-
user scenario. During our analysis of the DCAP behavior it will be observed that the DCAP
tends to have a small decay relatively to the previous DCAP value, when the new added
antenna has the same mean SNR of a previously connected antenna. In that context we also
derive an expression for the DCAP that contains explicitly the value of the previous DCAP
to, latter on, do an analysis of the sensitivity of the DCAP values versus the mean SNR of the
new connected antenna, as more and more antennas are connected to the system.
(9)
with which a recursive algorithm for the calculation of the coefficients, which are central
to the calculation of the capacity values, equation (6), can be obtained, and the following
formula can be derived:
(10)
From equation (10), after multiplying by and integrating from zero to plus
infinity the variable, at both sides of the equation, the DCAP can be expressed by:
(11)
With some more mathematical manipulations, the differential capacity can also be
equivalently expressed by:
(12)
172 Radio Communications
(13)
(14)
Another possible bound for equation can be obtained from , for all in
, by the Taylor series expansion of the exponential function around zero. Thus
, for all in , with a maximum difference of ( )4, so:
(15)
and as a byproduct:
(16)
From bound (13) and (16) follows that in the low SNR regime the DCAP can be
approximated by and the channel capacity by:
(17)
The previous bounds although simple can provide some interesting information on the
behavior of the DCAP, as will be seen in section 6.1. However they do not give any idea on
the SNR vector that attain the maximum of the DCAP. This vector can give information on
how the distributed antennas should be geographically positioned to attain most of the
gains provided by the connection of additional antennas to the system. In the following
paragraphs we answer this question, and prove that the SNR vector that attains the highest
4
Obtained numerically, and knowing that this maximum is global.
Single/Multi-User MIMO Differential Capacity 173
DCAP value is the SNR vector where all elements are equal. In other words the highest
DCAP is obtained when all transmit antennas are co-located, have the same link SNR
From equation (11) one can see that for and . Therefore if we
assume that the new connected antenna is always the one with the highest mean SNR, the
DCAP will be upper bounded by the one where all mean SNRs are equal to the mean SNR
of the new connected antenna:
(18)
When the mean SNR tends to infinity the maximum of the DCAP is obtained and is equal to:
(19)
Thus the DCAP in general is upper bounded by the co-located transmit antennas case and
its maximal value is only dependent on the number of transmit antennas and not on the
actual values of the mean SNR of the links. However this limit is not attainable in practice.
But, how far is it from a real scenario? It can be shown that for a moderate SNR of 17 dB, for
all links, the difference is lower than 0.1 bps/Hz when we pass from one connected antenna
to two and even lower for the other connected antennas.
Since the previous bound is a limit bound it can be not very tight. However a tighter bound
can be developed considering only a slight higher degree of information:
(20)
From the previous expression one can also upper bound the capacity increase by the
connection of new antennas, considering that the user is actually only connected to one
antenna and that antenna has the greatest SNR of all of them, by:
(21)
5. Multi-User DCAP
In the previous section we have analyzed the DCAP for the single-user case and have
provided an exact closed form expression for it, that is valid for all mean SNR’s. We have
started with the single user case due to its simplicity and also because the analysis of that
simpler case can give some insight for the analysis of the more difficult case of a multi-user
174 Radio Communications
system. However for the more general case of a multi-user system the analysis of the DCAP
over all mean SNR’s is intractable. Thus, for this case, we consider only the DCAP in the
high SNR regime. In this section we first define the DCAP and after derive a closed form
expression for it, for the co-located antenna case and for . For the DCAP
is analyzed numerically.
(22)
where is the channel matrix for transmit antennas. Thus for the
multiuser scenario the DCAP is only dependent on the matrix distribution. On the other
hand, for , the DCAP can be expressed by:
(23)
From which we can see that the connection of the system users to a new transmit antenna is
equal to , the multiplexing gain, plus a factor, that is equal to
plus the power offset gain provided when we pass from to
transmit antennas and users5, which can be closely approximated by , for any
number of transmit antennas. Hence, the significance of the factor versus the multiplexing
gain must be analyzed to have a clear picture of the full obtained gain, please refer to section
5.2 and 6.2.
For DPC, as shown in appendix (sub-section 9.1), the DCAP when we pass from to
transmit antennas is given by:
5
Single/Multi-User MIMO Differential Capacity 175
(24)
(25)
From the previous expression one can see that asymptotically in the number of transmit
antennas, , the DCAP behaves like , for both DPC and ZF/BD,
implying that the difference between the gains of the optimal scheme and the sub-optimal
schemes is very small, when a high number of transmit antennas is considered.
Nevertheless for a finite number of transmit antennas the DCAP gains provided by DPC are
lower and the difference increases with , as can be seen by equations (24) and (25). But
how it scales with , the number of users? It can be seen that for a constant the
DCAP increases logarithmically with for DPC and linearly with for ZF/BD. Thus one
can conclude that even if the optimal scheme has a higher complexity, it will need a much
lower number of transmit antennas than the sub-optimal schemes, which require a lower
complexity, for the same target capacity. Thus the number of antennas to be jointly
processed must be carefully chosen , taking into account the tradeoff between complexity,
network costs and obtained benefits.
(26)
At this point we have only obtained an expression for the capacity increase by the
connection of one additional system user, for the case of only one transmit antenna. But to
176 Radio Communications
obtain an approximation for the DCAP, for , we need also to know that for ,
see equation (23). For the increase in capacity obtained by the connection of a new
user to the system, can be approximated taking into account the DCAP expression for the
case, equation (24) line , and making an extrapolation of equation (26). From
those assumptions the capacity increase by the connection of one additional user to the
system can be approximated by:
(27)
and as can be confirmed in sub-section 6.2 (Fig. 3(a)), this approximation is close to the
values obtained by numerical simulations and is better for a high number of users.
6. Numerical Results
6.1 Single-User DCAP analysis
In this sub-section, the DCAP, for a grid antenna placement, as show in Fig. 3 (a), is
analyzed. First the exact DCAP values are compared to the obtained bounds, to access their
tightness. Next we analyze the sensitivity of the DCAP to the variation of the mean SNR and
finally we perform a DCAP analysis of a representative area covered by the antennas.
In all numerical analysis presented in this chapter we consider that the mean SNR is only
dependent on the signal path loss (Simplified Path Loss Model, (Goldsmith 2005)), that6
and that . It is also considered that the new connected antenna is
always the one with highest mean SNR from the group of unconnected antennas and that
. By circular ring we mean the group of antennas with the same SNR.
1.5 1.5
Lower Bound Lower Bound
Upper Bound 1/(M-1) bound
1/(M-1) bound 1/(M + M - 1) bound
1/(M + M - 1) bound Exact
CM-1 (bit/s/Hz)
CM-1 (bit/s/Hz)
1 Exact 1
M
0.5 0.5
0 0
2 4 6 8 10 12 14 16 2 4 6 8 10 12 14 16
M M
6 is a unit less constant which depends on the antenna characteristics and on the average
channel attenuation, is a reference distance for the antenna far‐field, is the path loss
exponent and is the transmitted power at a distance .
Single/Multi-User MIMO Differential Capacity 177
In Fig. 1 we plot the exact DCAP values and respective bounds for the central point of the
grid antenna placement and do that for two different inter-antenna distances, namely
and . From this figure one can see that if the new connected antenna is in
the same circular ring as a previously connected antenna then its DCAP value, , will
be approximately the same as the previous one, . On the other hand if the new
connected antenna is far away from the circular ring of a previously connected antenna then
the DCAP value decreases a lot. This approximation is better when a high number of
transmit antennas is considered. Thus one can conclude intuitively that if all antennas are in
the same circular ring, have the same mean SNR, their DCAP values will be maximum.
Indeed this is true as shown in section 4.2. This behavior can be explained by the fact that
is dependent on by a factor of , an approximation that due to its
importance will be analyzed in the following paragraphs. It can also be explained by the fact
that in equation (16), tends to zero as we connect to more antennas and as a
consequence the bound becomes independent off all SNR’s except the new one, which for a
circular ring is constant. Thus, since the central point in the grid antenna placement is the
one with highest symmetry we can say that if a target increase in capacity is pre-established
then the user will be connected to or or or or or antennas, depending on the
target increase in capacity defined.
Concerning the bounds tightness we can see from that figure that for low SNR’s the upper
bound provided by equation (16) is the better one, but for high SNR’s the bound from
equation (20) is more accurate. Although, the user will only connect to a small number of
antennas in a real system, due to the diminishing returns expected as the number of
antennas increase. Thus, taking into account this fact, the most important bounds will be the
ones that are tighter for a low number of transmit antennas, and in this case the winner is
the bound from equation (20).
1 1
0.8 0.8
M-1
CM-1/CM-2
M-1
CM-1/CM-2
0.6 0.6
M
0.4 0.4
From Fig. 1 (a) and Fig. 1 (b) one can also see that the exact values of the DCAP, the dashed
and solid blue lines, converge to the same value, for a high number of transmit antennas in
the case of SNR vectors that are multiple among themselves. This fact can be easily proven
178 Radio Communications
together with the fact that as the SNR’s get higher this convergence occurs at a smaller
value. In the case of high SNR’s the DCAP cannot be higher than a given value, having as
critical value , in the case of equal SNR’s. As a consequence, if all transmit
antennas are put closer to the user terminal, by a given factor, the only antennas for which
the DCAP increases are the ones near the terminal.
As previously verified the DCAP in a circular ring tends to be constant. But how close to the
previous value and when this approximation can be made? In the following paragraphs we
propose to analyze this fact using a bound for the ratio . If the ratio is close
to one then the value will be close to . In )LJ (a) and )LJ (b) we plot this
ratio for two different points in the grid antenna placement, namely for the central point and
for . In each figure the exact ratio value for two inter-antenna distances
( and ), the bound from equation (12) and the exact value for equal and high
SNR’s are plotted. From those results one can view that as the number of connected transmit
antennas increase the ratio sensitivity to the SNR vector variation decreases and that its
exact value becomes closer to the bound. One can also see that when the new connected
antenna is not from the same ring as the previously connected antenna, the bound is indeed
very close to the actual value of the respective ratio and the ratio value as a step decrease
that is lower as more connected antennas are considered. As a consequence the DCAP tends
to be constant in a circular ring, as previously observed, and the approximation is better
when a high number of transmit antennas is considered.
0.5
M=1
M=2
0.4 M=3
M=4
0.3
dy
0.2
0.1
0
0 0.1 0.2 0.3 0.4 0.5
dx
(a) Geographical antenna placement. (b) Number of antennas where DCAP
is higher than 0.1 bps/Hz.
Fig. 3. Single-User differential capacity analysis, for a regular antenna placement.
Thus far, we have only analyzed the DCAP values for a single point, but how it will behave
if we consider a given area. The analysis of the DCAP values for a given area cannot be
easily visualized in a two dimensional plot, thus we have relied on a different measure to
analyze its behavior. The metric considered was the maximum number of transmit antennas
that achieve a target DCAP value or more. In this study we have considered a target DCAP
value of 0.1 bps/Hz. The geographical area considered was the one shown in figure )LJ
(a) in light blue, and we have also considered . The results of this study are
presented on figure )LJ (b). To explain the information co ntained into this figure it is
Single/Multi-User MIMO Differential Capacity 179
easier to give an example. Thus, let’s assume, for example, the point (0.4, 0.4). For this point
, thus when we connect the second, third and fourth antennas the DCAP value is
higher than the target, but departing from that number of transmit antennas, 4, the DCAP
will be lower than the target.
For the considered scenario and for a target DCAP of 0.1bps/Hz only the first four antennas
will be connected to the user, or equivalent the antennas presented in the first ring. This
figure also shows a circular pattern in the number of necessary antennas. This is related to
the fact that at a given distance the link mean SNR is only dependent on the distance from
the user to the considered transmit antenna.
4.5 9
ZF KN=1
4 ZF KN=2 8
ZF KN=3
3.5 DPC KN=1 7
DPC KN=2
3
DCAP(bps/Hz)
DCAP(bps/Hz)
DPC KN=3 6
2.5 DPC KN=1 approx.
DPC KN=3 approx. 5
2 DPC KN=3 approx.
4
1.5
3
1
0.5 2 DPC
ZF
0 1
1 2 3 4 5 6 7 8 1 2 3 4 5 6
M (Nº of Tx antennas) M (Nº of Tx antennas)
As can be seen in Fig. 4 (a), were we present a plot of the DPC and ZF DCAP versus the
number of connected transmit antennas, for the co-located scenario, the logarithm
approximation although simple is very tight. Concerning the benefits of the connection of
new transmit antennas, ZF has higher gains than DPC and the difference increase with .
To see how this difference scales with we plot in Fig. 4 (b) the DCAP values versus for
. From this figure one can view that the DCAP scales logarithmically with the
number of users for DPC and linearly for ZF, as already seen from equations (24) and (25).
Thus even if the implementation complexity of DPC is much higher than the one for ZF, the
sub-optimal scheme, ZF, will need a higher number of transmit antennas than the optimal
180 Radio Communications
scheme for a target system capacity. Thus a tradeoff must be made between the cost of
additional processing power and the cost of additional physical resources, namely transmit
antennas and respective connection to the central unit. As a result of this analysis, as a
scheme approaches the optimal one, the gains obtained by the connection of additional
antennas at the transmitter side decrease. But, remember that the optimal scheme will have
always a higher sum-capacity. As seen before, from equations (24) and (25), the DCAP for
the two precoding schemes converge to the same value for a high number of transmit
antennas and the convergence point increases with .
1.4 1
co-located DCAP value Symmetry lines
3,2,1 0.8 Transmitt Antennas
1.2 2,2,1 probability distribution
0.6 Users Positions
) (bps/Hz)
1
0.4
0.8 0.2
f C3,2,1(C3,2,1
2,2,1
y
0.6
-0.2
2,2,1
0.4 -0.4
0.2 -0.6
-0.8
0
0 0.5 1 1.5 2 2.5 -1
3,2,1 -1 -0.5 0 0.5 1
C2,2,1 (bps/Hz) x
For the DAS we will only analyze the DCAP for DPC and that analysis will rely on
numerical simulations. For this simulation a scenario with 4 transmit antennas and two
users, each with only one receive antenna, is considered. To model the channel we have
considered the Simplified Path Loss Model again, (Goldsmith 2005), with a path loss
exponent equal to 3, and have considered Rayleigh multipath fading. The transmit antennas
were positioned as shown in Fig. 5 (b) and the user positions were randomly generated with
an uniform distribution in . Ten thousand user’s positions were generated
and the DCAP was averaged over 10000 trials. The new connected antennas were always
chosen to be the one that will imply the highest DCAP from the group of unconnected
antennas. As a result of this simulation, we have Fig. 5, where the co-located DCAP,
equation (24), value is represented by a red star. From that figure we see that most of the
user’s positions have a smaller DCAP than the co-located case. However for a small elite of
users, 7 in this specific case, the DCAP is higher than the one obtained by the co-located
scenario. Thus one can conclude that even if the DCAP for a DAS can be higher than the one
for the co-located case the difference will not be high and the number of user positions in
that condition will be low. To have a better understanding of the positions that attain the
maximum DCAP gains for a DAS, in Fig. 5 (b), we show the 7 positions that have a higher
DCAP than the co-located case. From that figure it is possible to infer that these positions
Single/Multi-User MIMO Differential Capacity 181
DUHDOOYHU\FORVHWRWKHV\VWHPV\PPHWU\OLQHVGHILQHGE\WKHIRXUWUDQVPLWDQWHQQ
WKDW ZD\ DV LQ WKH FRORFDWHG FDVH WKH QHZ FRQQHFWHG DQWHQQD ZLOO KDYH WKH
GLVWULEXWLRQDVDSUHYLRXVRQH7KXVV\VWHPV\PPHWU\SOD\VDQLPSRUWDQWUROHLQREW
PRVWRIWKH’&$3JDLQVHLWKHUIRUWKHVL
QJOHXVHUHLWKHUIRUWKHPXOWLXVHUFDVHV
2.5 1.4
M = 1 (Sim) K = 250
M = 1 (Approx) 1.2 K = 500
2 M = 2 (Sim) K = 750
M = 2 (Approx) 1 K = 1000
M = 3 (Sim)
DCAP (bps/Hz)
M = 3 (Approx) 0.8
1.5
(bps/Hz)
M = 4 (Sim)
M = 4 (Approx) 0.6
M = 5 (Sim)
1 M = 5 (Approx) 0.4
0.2
0.5
0
0 -0.2
0 5 10 15 20 1 2 3 4 5 6
Nº of Users M (Nº of Tx antennas)
D
&DSDFLW\LQFUHDVHE\WKHFRQQHFWLRQ E IDFWRUYDOXH1
RIDQHZXVHU1
)LJ &DSDFLW\LQFUHDVHE\WKHFRQQHFWLRQRIRQHPRUHWUDQVPLWDQWHQQDWRWKHV\VWH
7. Conclusion
,Q WKLV FKDSWHU ZH KDYH DQDO\]HG WKH
WVEHQHIL
RI WKH FRQQHFWLRQ RI DGGLWLRQDO WUDQVPL
DQWHQQDVWRWKHV\VWHPXVHUVRID%&7KHVLQJOH
XVHUFDVHKDVEHHQDQDO\]HGLQPRUHGHWDLO
IRUDOO615•VDQGWKHPXOWLXVHUFDVHKDVEHHQ
DQDO\]HGRQO\LQWKH KLJK 615UHJLPH )RU
182 Radio Communications
the single user case we have obtained a closed-form expression for DCAP that is valid for all
SNR’s and have analyzed its variation/sensitivity with respect to . From that analysis we
have seen that symmetry is the most important system property to obtain most of the gains
provided by the connection of additional transmit antennas. It was also shown that the
maximum increase in capacity is obtained when all links have the same mean SNR’s and not
when they are different. Thus showing that the DCAP maximum is obtained when all
antennas are co-located and not distributed.
For the multi-user case a closed form expression for the co-located transmit antennas DCAP,
for , has been obtained. For the general case of a DAS the DCAP was analyzed
numerically, considering a scenario with 4 transmit antennas and 2 users, each with only
one receive antenna. For this case even if the DCAP can be superior to the co-located case it
is not much higher and most of the user’s positions will have a lower DCAP than the co-
located case. For the positions that attain a higher DCAP than the co-located case we have
shown that this positions are very close to the system symmetry lines, defined by the
transmit antennas, and in that way symmetry plays again a important role in the multi-user
case. For the case of more aggregate receive than transmit antennas we have verified that the
DCAP will be power dependent and will be given by the multiplexing gain plus a factor.
However this factor is much smaller than the multiplexing gain even for one thousand
users. Thus for this case the most significant gain is the multiplexing gain, .
8. References
Caire, G. & Shamai, S., 2003. On the achievable throughput of a multiantenna Gaussian
broadcast channel. InformationTheory,IEEETransactions , 49(7),on
1691-1706.
Castanheira, D. & Gameiro, A., 2008. Distributed MISO system capacity over Rayleigh flat
fading channels’. In Personal, Indoor and Mobiledio Communications,
Ra 208. PIMRC
208.IEEE19thIntern ationalSymposium. pp.
on1-5.
Castanheira, D. & Gameiro, A., 2009. High SNR Broadcast Channel Differential Capacity. In
ICT-MobileSummit209 . Santander, Spain, pp. 1-5.
Cover, T., 1972. Broadcast channels. InformationTheory,IEEETransactions , 18(1),on
2-14.
Dohler, M., Gkelias, A. & Aghvami, A., 2006. Capacity of distributed PHY-layer sensor
networks. VehicularTechnology,IEEETransactions , 55(2), 622-639.
on
FUTON, 2008. FUTON - Fibre-Optic Networks for Distributed Extendible Heterogeneous
Radio Architectures and Service Provisioning. Available at: http://www.ict-
futon.eu/.
Ghosh, S., 2005. NetworkTheory, PHI Learning Pvt. Ltd.
Goldsmith, A., 2005. Wirelesscommunications , Cambridge University Press.
Gradshteyn, I.S. & Ryzhik, I.M., 1994. TableofIntegrals,Series,and5th ed., Academic
Products
Press.
Gubner, J.A., 2006. Probability and Random Processes Electrical
for and Computer Engineers 1st
ed., Cambridge University Press.
I. R. R. M. M1645, 2003. M.1645 : Framework and overall objectives of the future
development of IMT-2000 and systems beyond IMT-2000. Available at:
http://www.itu.int/rec/R-REC-M.1645/e.
Jindal, N., 2005. High SNR analysis of MIMO broadcast channels. In Information Theory,
205.ISIT.Proceedings.
205 InternationalSymposium . pp. 2310-2314.
on
Single/Multi-User MIMO Differential Capacity 183
Jindal, N. et al., 2005. Sum power iterative water-filling for multi-antenna Gaussian
broadcast channels. InformationTheory,IEEETransactions , 51(4),on
1570-1580.
Juyul Lee & Jindal, N., 2007. High SNR Analysis for MIMO Broadcast Channels: Dirty Paper
Coding Versus Linear Precoding. Information Theory, IEEE Transactions , 53(12),
on
4787-4792
Liu, H. & Li, G., 2005a. OFDM-Based Broadband Wireless tworks:
Ne Design and Optimization ,
Wiley-Interscience.
Liu, H. & Li, G., 2005b. OFDM-Based Broadband Wireless Networks: Design and Optimization ,
Wiley-Interscience.
Seijoon Shim et al., 2008. Block diagonalization for multi-user MIMO with other-cell
interference. WirelessCommunications, IEEETransactions , 7(7),
on 2671-2681.
Shamai, S. & Verdu, S., 2001. The impact of frequency-flat fading on the spectral efficiency of
CDMA. InformationTheory,IEEETransactions , 47(4),on
1302-1327.
Shin, H. & Lee, J.H., 2003. Capacity of multiple-antenna fading channels: spatial fading
correlation, double scattering, and keyhole. Information Theory, IEEE Transactions
on, 49(10), 2636-2647.
Telatar, I.E., 1999. Capacity of multi-antenna Gaussian channels. Available at:
http://eprints.kfupm.edu.sa/29242/.
Vishwanath, S., Jindal, N. & Goldsmith, A., 2003. Duality, achievable rates, and sum-rate
capacity of Gaussian MIMO broadcast channels. Information Theory, IEEE
Transactions , 49(10),
on 2658-2668.
Visotsky, E. & Madhow, U., 2001. Space-time transmit precoding with imperfect feedback.
InformationTheory,IEEETransactions , 47(6),on
2632-2639.
Viswanath, P. & Tse, D., 2003. Sum capacity of the vector Gaussian broadcast channel and
uplink-downlink duality. InformationTheory,IEEETransactions , 49(8),on
1912-1921.
Wei Yu & Cioffi, J., 2004. Sum capacity of Gaussian vector broadcast channels. Information
Theory,IEEETransactions , 50(9),
on 1875-1892.
Weingarten, H., Steinberg, Y. & Shamai, S., 2006. The Capacity Region of the Gaussian
Multiple-Input Multiple-Output Broadcast Channel. Information Theory, IEEE
Transactions , 52(9),
on3936-3964.
9. Appendix
9.1 DCAP derivation
For the co-located transmit antennas case is distributed.
But since , where is distributed, the DCAP can be
expressed by:
(28)
184 Radio Communications
where , is the Euler’s digamma function. The result from the second line
comes from the determinant property and the result from the third line
from lemma 1 of (Juyul Lee & Jindal 2007) . To obtain an
approximation to the partial sum of the harmonic series we have used
which has a maximum error of .
9.1 Capacity Increase by the connection of one more user, for and
For and the broadcast channel ergodic sum-capacity, equation (7), in the high
SNR regime, simplifies to:
(29)
(30)
which after the integral evaluation gives the result shown in equation (26).
7 The term cancel out from the expression since it appears in and .
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 185
1. Introduction
The seminal works in (Foschini & Gans, 1998) and (Telatar, 1999) on multiple antenna ele-
ments at the transmitter and the receiver show a huge increase in the throughput of this point-
to-point channel referred to also as multiple input multiple output (MIMO) system. These
promising results of high spectral efficiency and enhanced reliability shifted the focus of re-
search on multi antenna communications and motivated the introduction of multiple antenna
elements in the future communication systems. Researchers persist to strive for finding space
time codes (STC) with reduced decoding complexity. These codes take into account both the
spatial and temporal dimensions of the MIMO channel. Orthogonal Space-Time Block Codes
(OSTBCs) (Larsson & Stoica, 2003) are widely used because they are easy to encode and de-
code. For the case of two transmit antennas, the OSTBC is known as Alamouti code (Alamouti,
1998). OSTBCs are repetition codes that only provide diversity gain. In order to approach the
capacity limit they have to be used in concatenation with an outer code. Remarkable coding
gains can be obtained if a capacity achieving temporal encoder, such as turbo or Low-Density
Parity Check (LDPC) code is used in concatenation with a STC (Gonzalez-Lopez et al., 2006).
Recently it has been shown for the ergodic channels that the complex concatenation of the STC
and the outer codes can be replaced with temporally coded and spatially multiplexed streams
(coded spatial streams) for nearing capacity (Ghaffar & Knopp, 2008a). Each spatial stream
can also be independently coded using temporal encoders as convolutional, turbo or LDPC
codes whereas at the receiver, standard off-the-shelf decoders are used after the demodulator.
To combat the frequency selectivity of MIMO wireless channels with low complexity equal-
ization at the receivers, MIMO OFDM is the appropriate alternative. To contest the inherent
fading of MIMO OFDM wireless channels, improved code diversity of bit interleaved coded
modulation (BICM) for fading channels is rendering it the preferred option. Consequently the
future wireless systems shall be based on BICM MIMO OFDM systems. However the requi-
site antenna spacing combined with the complexity constraints at the receiver are restricting
the future MIMO based communication systems to the maximum of 4 spatial streams whereas
it is reduced to 2 spatial streams in most scenarios. The existing and forthcoming standards as
IEEE 802.11n (802.11n, 2006), IEEE 802.16m (802.16m, 2007) and Third Generation Partnership
Project Long Term Evolution (3GPP LTE) (LTE, 2006) substantiate this argument.
This chapter therefore focuses on low dimensional spatially multiplexed time coded BICM
MIMO OFDM systems with first part being devoted to the transmission strategies and cor-
responding receiver structures for such systems in the broadcast scenario while second part
186 Radio Communications
deliberates on interference suppression in such systems in the cellular scenario. This chapter
particularly takes into account the finite sized constellation inputs and departs from the cus-
tomary idealistic Gaussian assumption for the codewords. Each part is also accompanied by
relevant information theoretic analysis and by simulation results under the settings of upcom-
ing wireless standards.
nr is the total number of spatial streams (Larsson & Jalden, 2008). In many cases of practical
interest, one resorts to the approximation of replacing the sums with the largest term which
is equivalent to minimizing the Euclidean distance and is termed as max log MAP approach.
Unfortunately this problem is NP-hard for general H and y (Verdu, 1989) which implies that
there are no known efficient (i.e. polynomial-time) solutions. Many sophisticated methods as
lattice reduction and sphere decoding (Hochwald & Brink, 2003) exist which find the ML so-
lution with high probability, but these methods are in general still computationally complex.
This is true also in an average sense if H is random (i.e. for a fading channel). The popular
"sphere decoding" method is much more efficient than a brute-force search, but it still admits
an average complexity that is exponential in the dimension of x.
Naive solutions, like neglecting the integer constraint coupled with the Gaussian assumption
for the alphabets and then subsequently projecting the so-obtained solution onto the finite set
of permissible x [linear receivers as LMMSE and zero forcing ZF)], in general work poorly
especially at lower SNRs. Standard linear detection approaches are further based on ignoring
the spatial color at the output of linear detectors which results in the decoupling of spatial
streams thereby fundamentally reducing the complexity of detection. These disregards prolif-
erate the suboptimality of linear receivers which exhibit degraded performance especially at
lower SNRs.
Standard receiver solutions for spatially multiplexed broadcast schemes including V-BLAST
(Wolniansky et al., 1998) (Golden et al., 1999) use stripping decoders which incorporate sub-
optimal linear minimum mean square error (MMSE) filters (Medvedev et al., 2006) against
the yet undecoded streams at each successive cancellation stage. MMSE because of its relative
improved performance in the family of linear detectors is the preferred choice. Its optimal-
ity for power constrained Gaussian alphabets is well known but it is suboptimal for finite
size constellations. Gaussian assumption of the post detection interference is open to discus-
sion. Its behavior is close to Gaussian under various asymptotic conditions which include
large SNRs and large number of transmit and receive antennas (Poor & Verdu, 1997). But the
fidelity of Gaussian assumption in a low dimensional system at moderate SNRs is question-
able. Degradation of the performance due to the suboptimality combined with the complexity
in the calculation of linear equalizers at each frequency tone (in OFDM based system) renders
their real-time implementation debatable especially in fast fading wideband environments.
ulation schemes as Trellis Coded Modulation (TCM). BICM increases considerably Hamming
distance while reducing (often marginally) Euclidean distance so BICM outperforms TCM
over Rayleigh fading channel while suffering a moderate loss of performance over AWGN
channel. If the channel model is nonstationary, in the sense that the propagation environment
changes during transmission, then BICM provides a robust coding scheme.
The main idea of BICM is therefore to transform the channel generated by the multilevel con-
stellation χ into parallel and independent binary channels. For transmission of complex mod-
ulation, channel is not binary but after bit interleaving, any transmission of a multilevel signal
from χ with |χ| = 2m , can actually be thought of as taking place over m parallel channels,
each carrying one binary symbol from the signal label. However, these channels are generally
not independent, due to the constellation structure. To make them independent, binary sym-
bols are interleaved over infinite length before being used as signal labels. The maximum-
likelihood decoding (MLD) of BICM requires combined demodulation/decoding, which is
often too complicated to implement. As a result, MLD is separated at the receiver, concatenat-
ing soft-metrics computation, deinterleaving and decoding. BICM block diagram is shown in
fig. 1 which is the concatenation of an encoder for a code C with an interleaver π followed
by a modulator (µ, χ). In the decoder, the metrics reflect the fact of bits separation. Suppose
that the code word to be transmitted is c. After interleaving and modulation, we transmit the
codeword
x = ( x1 , x2 , ......., xn )
and we receive y at the output of a stationary memoryless channel. With symbol interleaving,
we decode by maximizing the metric
n
log p (y|x) = ∑ log p (yk | xk ) (1)
k =1
with respect to x.
The bit interleaver can be seen as a one-to-one correspondence π : k → (k, i ), where k de-
notes the original ordering of the coded bits ck , k denotes the time ordering of the signals
xk transmitted, and i indicates the position of the bit ck in the symbol xk . Let χib denote the
subset of all signals x ∈ χ whose label has the value b ∈ {0, 1} in position i. Then the ML bit
metric is given as
λi yk , ck = log ∑ p (yk | x ) where ck ∈ [0, 1] and i = 1, 2, ...., log |χ| (2)
x ∈χic
k
So in case of BICM, it is the summation of bit metrics λi yk , ck instead of the symbol metrics
log p (yk | xk ) for decoding. i.e.
ĉ = arg max ∑ λi yk , ck (3)
c∈C
k
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 189
x1 OFDM
Stream-1 π1 µ 1 , χ1 (IFFT + CP
Encoder-1
insertion)
2
OFDM
Stream-2 π2 µ 2 , χ2 x2 (IFFT + CP
Encoder-2
insertion)
Bit Spatial
Stream Spreading
. . . .
. . . . 3
. . . .
.
OFDM .
π nr µ nr , χ nr x nr
Encoder-nr (IFFT + CP .
Stream-nr
insertion)
nt
The bit metrics (2) may be computationally too complex for implementation. Suboptimal sim-
plified branch metric can be obtained by the log-sum approximation log ∑ j z j ≈ max j log z j .
This yields
λi yk , ck = max log p (yk | x ) = min |yk − hk x |2 (4)
x ∈χic
x ∈χic
k k
Standard
SIMO Soft Input
1 πn−1 Stream-nr
Demodulator r
Decoder
for
Stream-nr
OFDM
(FFT+CP
Removal)
2
Demodulator
Soft Input
for π2−1 Stream-2
y Stream-2
Decoder
OFDM
(FFT+CP
Removal)
Demodulator
Soft Input
for
π1−1 Stream-1
- - Stream-1
Decoder
nr
x1 Convolutional
h1 µ 1 , χ1 π1
Encoder-1
OFDM
(FFT+CP
Removal)
Fig. 3. Block diagram of SIC Receiver of BICM MIMO OFDM system. π1−1 denotes deinter-
leaver and h1 denotes the channel seen by stream-1.
with CP extension, transmission at the k-th frequency tone can be expressed as:-
y = h1 x 1 + h2 x 2 + · · · + h n r x n r + z (7)
Since the receiver knows the realization of H, the channel output is the pair (y; H) =
(Hx + z; H). The mutual information between input and output is then Telatar (1999)
I ( x1 , x2 · · · x nr ; y) = I ( x1 ; y) + I ( x2 ; y| x1 ) + · · · + I ( x nr ; y| x1 , x2 · · · x nr −1 )
The terms in the summation represent the channel capacities of each spatial stream once they
are detected in the successive subtractive cancellation way. Conditioned on the channel, these
terms can be written as:-
−1
I ( x1 ; y|H) = log2 det I + σ12 h1 h1† N0 I + σ22 h2 h2† + · · +σn2r hnr h†nr
−1
I ( x2 ; y|H, x1 ) = log2 det I + σ22 h2 h2† N0 I + σ32 h3 h3† + · · +σn2r hnr h†nr
and
σn2
I ( xnr ; y|H, x1 , x2 · · · , xnr −1 ) = log2 1 + r hnr 2
N0
where H = [h1 h2 · · · hnr ] is the channel matrix. Fig. 4 shows the ergodic capacity for the case
of 2 × 2 system with spatial streams of uniform power and nonuniform rate. Note that SNR
σ2 + σ2
is the received SNR per antenna i.e. SNR = 1N0 2 . It is evident that the stream to be detected
first has lower capacity as compared to the stream to be detected last which enjoys higher
diversity.
Fig. 5 compares two cases of spatial streams with uniform power and nonuniform rate and
spatial streams with uniform rate and nonuniform power for 2 × 2, 3 × 3 and 4 × 4 systems.
Key to the optimality of stripping is the use of Gaussian inputs as long as the stripping de-
coders incorporate MMSE filters against yet undecoded streams at each successive cancella-
tion stage. Successive stripping requires that each stream must be transmitted at a different
192 Radio Communications
rate with uniform power. We investigate a slightly suboptimal solution where we guarantee
equal rate with nonuniform powers on each stream. Numerical optimization revealed that
uniform rate and nonuniform power distribution leads to negligible suboptimality as shown
in fig. 5.
12
I(x1 , x2 ; y)
I(x1 ; y|x2 )
10
I(x2 ; y)
Channel Capacity (bits/sec/Hz)
0
−5 0 5 10 15 20
SNR
Fig. 4. Capacity of 2 × 2 system for Gaussian alphabets for the case of uniform power and
nonuniform rate spatial streams.
25
20
Channel Capacity (bits/sec/Hz)
4x4 System
15
3x3 System
10
2x2 System
5
0
−5 0 5 10 15 20
SNR
Fig. 5. Capacity of 2 × 2, 3 × 3 and 4 × 4 systems for Gaussian alphabets for the cases of spatial
streams of uniform power and nonuniform rate and the spatial streams of uniform rate and
nonuniform power. Note that the circles indicate the case of uniform power and nonuniform
rate spatial streams while crosses indicate the case of uniform rate and nonuniform power
spatial streams.
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 193
y = h1 x1 + h2 x2 + z (8)
Mutual information expression for the dual streams from the chain rule (Foschini & Gans,
1998) is given as
I (y; x1 , x2 ) = I (y; x1 ) + I (y; x2 | x1 ) (9)
For equal power distribution, I (y; x1 ) < I (y; x2 | x1 ) dictating rate of first stream being less
than rate of second stream (R1 < R2 ). For finite size QAM constellation with x1 ∈ M1 and x2 ∈
M2 , the mutual information expression conditioned on the channel takes the form (Ghaffar &
Knopp, 2008a)
where H (.) = − E log p (.) is the entropy function. Second term of eq. (10) is given as:-
1
H ( x1 |y, H) = ∑ p ( x1 , y, H) log dydH
x1 y H p ( x1 |y, H)
p (y, H)
=∑ p ( x1 , y, H) log dydH
x1 y H p ( x1 , y, H)
∑ x ∑ x p y| x1 , x2 , H
= ∑∑ p ( x1 , x2 , y, H) log 1 2
dydH (11)
x1 x2 y H ∑ x p y| x1 , x2 , H
2
For our purposes, it suffices to note that for each choice of x1 and x2 , there are two sources of
randomness in the choices of channel and noise. The above quantities can be easily approxi-
mated numerically using sampling (Monte-Carlo) methods with Nz realizations of noise and
NH realizations of the channel i.e.
1 2
NH Nz ∑ ∑ exp − N0 y − h x
1 1 − h x
2 2
1 x1 x2
H ( x1 |y, H) = ∑ ∑ ∑ ∑ log
M1 M2 Nz NH x1 x2 H z 2
∑ x exp − N10 y − h1 x1 − h2 x2
2
2
NH Nz ∑ x ∑ x exp − N10 h1 x1 + h2 x2 + z − h1 x1 − h2 x2
1 1 2
=
M1 M2 Nz NH ∑ ∑ ∑ ∑ log
2
(12)
x1 x2 H z
∑ x exp − N10 h2 x2 + z − h2 x2
2
194 Radio Communications
Similarly the mutual information of second stream conditioned on the channel when first
stream has been detected is given by:-
I (y; x2 | x1 , H) = H ( x2 | x1 , H) − H ( x2 |y, x1 , H)
1
= log M2 − ∑ ∑ p ( x1 , x2 , y, H) log dydH
x1 x2 y H p ( x2 |y, x1 , H)
p (y, x1 , H)
= log M2 − ∑ ∑ p ( x1 , x2 , y, H) log dydH
x1 x2 y H p ( x1 , x2 , y, H)
∑ x p y| x1 , x2 , H
= log M2 − ∑ ∑ p ( x1 , x2 , y, H) log 2
dydH (13)
x1 x2 y H p (y| x1 , x2 , H)
Fig. 6 shows the capacity of first stream once second stream is not yet decoded for different
combinations of finite constellation alphabets. For moderate values of SNR, the capacity of
first stream is a function of the yet undetected second stream and this capacity decreases as
the rate (constellation size) of second stream increases. This degradation is not observed at
low and high values of SNR as at low SNR, two streams are orthogonal while at high SNR,
second stream can be perfectly stripped off leading to detection of first stream. Rate of first
stream being a function of the rate of second stream leads to nonuniform rates in uniform
power dual stream scenario and this leads to the following proposed broadcast strategy.
C = I ( x1 ; y1 ) + I ( x2 ; y2 | x1 ) (15)
where user 2 sees a better channel and so is able to decode and strip off the interference.
The broadcast strategy (Ghaffar & Knopp, 2008a) incorporates the transmission of two spatial
streams of uniform power and nonuniform rate and incorporates two levels of performance.
The reliably decoded information rate depends on the state of the channel which is determined
by monitoring the received SNR being above or below a certain threshold. Transmitter is
operating at a constant power and data rate but the limited adaptability of the system helps
receivers to gear up to a higher data rate as the channel conditions improve.
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 195
5
x1=QAM64
4
I(x1;y) x1=QAM16
3
2
x =QPSK
1
1
x x =0
2
O x =QPSK
2 * x2=QAM 16 + x2=QAM 64
0
−5 0 5 10 15 20 25 30 35
SNR
Fig. 6. Capacity of first stream in dual-stream broadcast approach for finite size alphabets
once second stream is not known. Both streams have equal power. x2 = 0 indicates the
special case when second stream has been decoded and stripped off. Note that SNR includes
power of both streams.
Low priority/quality users are able to decode low rate stream x1 while high priority/quality
users are able to decode both low and high rate streams i.e. x1 and x2 by successive stripping.
The rates of two streams are
R1 ≤ I (y; x1 ) (16)
and
R2 ≤ I (y; x2 | x1 ) (17)
The notion of priority/quality is typically the received SNR and/or stream decoupling. The
users are divided into two groups i.e. near-in users and far-out users based on their received
SNR. The lower rate stream x1 is designed for a lower value of SNR i.e. SNR1 while the higher
rate stream x2 is designed for higher value of SNR i.e. SNR2 . The received SNR of a particular
user dictates two decoding options.
1. If SNR2 >SNR≥SNR1 , the user decodes x1 .
2. If SNR≥SNR2 , the user decodes both streams i.e. x1 and x2 . The user first decodes low
rate stream x1 , strips it out and then decodes high rate stream x2 .
This leads us to SIC detection based MIMO broadcast scenario with uniform power and
nonuniform rate spatial streams. We now discuss the detectors for such broadcast scenario.
2.4 Detectors
The detectors discussed in this section are valid not only for spatially multiplexed MIMO
systems but may be extended to other types of STC systems. We discuss two types of detectors
as MMSE detector and low complexity max log MAP detector (Ghaffar & Knopp, 2009b).
196 Radio Communications
2.4.1 MMSE
The frequency domain MMSE filter for x1,k is given as
−1
MMSE † −1 †
h1,k = h1,k R1,k h1,k + σ1−2 h1,k −1
R1,k (18)
† †
where R1,k = σ22 h2,k h2,k + σ32 h3,k h3,k + · · · + σn2r hnr ,k h†n,k + N0 I. After the application of MMSE
filter we get
yk = αk x1,k + zk (19)
where zk is assumed to be zero mean complex Gaussian random variable with variance
MMSE MMSE† MMSE
Nk = h1,k R1,k h1,k and αk = h1,k h1,k . Gaussianity has been assumed for post
detection interference which increases the suboptimality of MMSE in the case of less number
of interferers. Bit metric for the bit ck on first stream is given as:-
1
λ1i yk , ck ≈ min | y k − α k x1 |2 (20)
i
x1 ∈χ1,c Nk
k
i
where χ1,c denotes the subset of the signal set x1 ∈ χ1 whose labels have the value ck ∈
k
{0, 1} in the position i. This metric has computational complexity O (|χ1 |).
which has computational complexity O (|χ1 | · · · |χnr |). For brevity we drop the frequency
index k and the bit position index k i.e.
where yk = h†k y be the matched filter (MF) output for k-th stream and pkm = h†k hm be the
cross correlation between k-th and m-th channel. Breaking some of the terms in their real and
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 197
imaginary parts with subscripts (.) R and (.) I indicating real and imaginary parts of a complex
number, we have
nr −1 2 nr −1 nr −1 nr −1
λ1i (y, c) = min ∑ h j x j + 2 ∑ ∑ p jl x ∗j xl − 2 ∑ y j x ∗j
i ··· x ∈ χ
x1 ∈χ1,c nr nr
j =1 j =1 l = j +1 j =1
nr −1
+ 2 ∑ p jnr ,R x j,R + p jnr ,I x j,I − 2ynr ,R xnr ,R + hnr 2 x2nr ,R
j =1
nr −1
+ 2 ∑ p jnr ,R x j,I − p jnr ,I x j,R − 2ynr ,I xnr ,I + hnr 2 x2nr ,I (23)
j =1
This equation reduces one complex dimension of the system. For xnr belonging to equal en-
ergy alphabets, the bit metric is written as
nr −1 2 nr −1 nr −1 nr −1
λ1i (y, c) = min ∑ h j x j + 2 ∑ ∑ p jl x ∗j xl − 2 ∑ y j x ∗j
i ··· x
x1 ∈χ1,c nr −1 ∈ χ nr −1
j =1 j =1 l = j +1 j =1
nr −1 nr −1
− 2 ∑ p jnr ,R x j,R + p jnr ,I x j,I − 2ynr ,R | xnr ,R | − 2 ∑ p jnr ,R x j,I − p jnr ,I x j,R − 2ynr ,I | xnr ,I |
j =1 j =1
For xnr belonging to non-equal energy alphabets, it’s real and imaginary part which minimizes
(23) are given as
n −1
∑ j=r 1 p jnr ,R x j,R + p jnr ,I x j,I − ynr ,R
xnr ,R → −
hnr 2
n −1
∑ j=r 1 p jnr ,R x j,I − p jnr ,I x j,R − ynr ,I
xnr ,I → − (24)
hnr 2
where → indicates the quantization process in which amongst the finite available points, the
point closest to the calculated continuous value is selected.
This bit metric implies reduction in the complexity to O (|χ1 | · · · |χnr −1 |). Reduction of one
complex dimension without any additional processing is a fundamental result of significant
importance for lower dimensional systems. Additionally this bit metric is based on MF out-
puts and channel correlations and is therefore simpler for fixed point implementations. The
intricacy in the practical implementation of a higher dimensional MIMO system due to space
(requisite antenna spacing) and technology constraints underlines the significance of complex-
ity reduction algorithms for lower dimensional systems. MMSE based demodulators involve
computationally complex operations of matrix inversions which are very hard for fixed point
implementations. Moreover MMSE demodulator additionally needs the knowledge of noise
variance.
198 Radio Communications
0
10
−1
10
FER QAM16
−2
10
QAM64
QPSK
Low Complexity Max Log MAP
MMSE SIC
−3 MMSE PIC
10
4 6 8 10 12 14 16 18 20 22 24 26
SNR
Fig. 7. 2 × 2 system with uniform rate and nonuniform power spatial streams. For QPSK
σ12 = 0.63PT , σ22 = 0.37PT , for QAM 16 σ12 = 0.67PT , σ22 = 0.33PT while for QAM64 σ12 =
0.70PT , σ22 = 0.30PT .
0
10
10
−1 x1=QAM16
1
FER of x
−2 x1=QPSK
10
−3
10 O x2=QPSK
* x2=QAM 16 + x2=QAM 64
4 6 8 10 12 14 16 18
SNR
Fig. 8. Performance of lower rate stream in 2 × 2 BICM MIMO OFDM system using 802.11n
convolutional code. Continuous lines indicate low complexity max log MAP detector while
dashed lines indicate MMSE detector.
2.5 Simulations
We consider a 2 × 2 BICM MIMO OFDM system using the de facto standard, 64 state rate-1/2
convolutional encoder of 802.11n standard (802.11n, 2006) and rate-1/2 punctured turbo code
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 199
0
10
−1
10
−2
10
1
FER of x
−3
10 x1=QAM64
−4
10 x =QAM16
1
−5 x =QPSK
10 1
−6
10
O x2=QPSK
* x2=QAM 16 + x2=QAM 64
4 6 8 10 12 14 16 18 20
SNR
Fig. 9. Performance of lower rate stream in 2 × 2 BICM MIMO OFDM system using 3GPP LTE
turbo code. Continuous lines indicate low complexity max log MAP detector while dashed
lines indicate MMSE detector. Block length of the lower rate stream is 1296 bits while number
of decoding iterations are 5.
proposed for 3GPP LTE (LTE, 2006) 1 . MIMO channel has iid Gaussian matrix entries with
unit variance. The channel is independently generated for each time instant and perfect CSI
at the receiver is assumed. Furthermore, all mappings of coded bits to QAM symbols use
Gray encoding. We consider MMSE and low complexity max log MAP detector. There are
two scenarios.
In first scenario, spatial streams of uniform rate and nonuniform power are transmitted in 2 ×
2 MIMO broadcast system. The upcoming WLAN standard 802.11n (802.11n, 2006) supports
the codeword sizes of 648, 1296, and 1944 bits. For our purposes, we selected the codeword
size of 1296 bits and coding scheme of convolutional coding. We focus on the frame error
rates (FER) of the system. We consider the low complexity max log MAP and MMSE SIC
approach in which the higher power stream is detected first and is subsequently stripped
off leading to the detection of lower power stream. With PT being the total power available,
the power distribution between two streams is optimized to equate their rates in the desired
PT
SNR region where SNR is defined as the received SNR per antenna i.e. N 0
. As a reference,
MMSE parallel interference cancellation (PIC) has also been simulated in which two streams
are independently detected using MMSE filters and two streams have equal power. Fig. 7
shows the improved performance of low complexity max log MAP approach with respect to
both MMSE SIC and MMSE PIC approach. The gap widens as the constellation proliferates
i.e QAM 16 and QAM64 which is attributed to the higher suboptimality of MMSE for larger
sized constellations.
In second scenario, spatial streams of uniform power and nonuniform rate are transmitted in
2 × 2 MIMO broadcast system. We focus on the FER of first stream (lower rate) as subsequent
1 LTE turbo decoder design was performed using the coded modulation library
www.iterativesolutions.com
200 Radio Communications
to stripping, the detection of second stream (higher rate) is trivial (using SIMO detectors). The
frame length of first stream is fixed to 1296 information bits as per 802.11n (802.11n, 2006).
Figs. 8 and 9 compare the performance of low complexity max log MAP detector with MMSE
detector. The max log MAP detector performs significantly better than the MMSE detector.
Degradation of the performance for first stream as the rate (constellation size) of second stream
increases confirms the earlier result of sec. 2.2.2 that rate of first stream is a function of the rate
of second stream.
x1 x2
h1 h2
BS-1 BS-2
MS
h3
x3
BS-3
Fig. 10. Interference cancellation in single frequency cellular network. x1 is the desired signal
while x2 and x3 are the interference signals.
by the relative strength and the rate of interfering stream. In the scenario of interfering stream
being weak or of higher rate relative to the desired stream, thereby making it unfeasible to
be decoded, the mobile station (MS) resorts to the strategy of interference suppression. It can
be interpreted as partial decoding of the interference which is the recommended strategy in
the regime of moderate interference (Han & Kobayashi, 1981). When the interfering stream
is relatively stronger or is of lower rate thereby making it feasible to be decoded, MS adopts
interference cancellation strategy (subtractive cancellation) which is the optimal strategy in
the case of strong interference (Carleial, 1975).
Fig. 11 shows the mutual information of the desired stream in the presence of the interference
stream. We define the term α = σ22 /σ12 . Mutual information of the desired stream is a func-
tion of the rate as well as the strength of the interference stream. For moderate values of α
and when the interference has a lower rate (smaller constellation size) relative to the desired
stream, as the interference strength increases, the mutual information of the desired stream
202 Radio Communications
Fig. 11. Mutual information of the desired stream x1 in the presence of the interference stream
x2 for different constellations. SNR is 4.5 dB for x1 =QPSK, 11 dB for x1 =QAM16 and 13 dB for
x1 =QAM64. Note that the flash sign indicates a discontinuity of abscissa.
increases. However when the interference stream has a higher rate as compared to the rate of
the desired stream, this behavior is observed for higher values of α. This can be interpreted
as the decoding capability of the MS of the interference in the presence of the desired stream.
Once the interference strength and its rate relative to the strength and the rate of the desired
stream permits the decoding of the interference, we observe an increase in the mutual infor-
mation of the desired stream with the increase of α. Fig. 11 also authenticates the well known
result of Gaussian being the worst case interference however the gap decreases as the rate of
the interference stream increases. This diminution of gap may be related to the proximity of
the behavior of large size constellations to Gaussianity as both are characterized by high peak
to average power ratios.
interference stream is decoded using low complexity max log MAP detector, stripping
it off and then decoding the desired stream. This approach is termed as interference
cancellation.
The factors that will decide the strategy to be adopted will be the relative rate and the strength
of the interference stream comparative to the desired stream. The requisites for this algorithm
are the knowledge of interference channel and the modulation and coding scheme (MCS) of
interfering stream. The BSs need to be synchronous with pilot signals from the adjacent BSs
to be orthogonal to meet these requisites.
where H = [H1 · · ·HK ] i.e. the complete channel for the transmission of the codeword c1
and Hk = h1,k h2,k i.e. the channel at k-th frequency tone. For the worst case scenario once
d (c1 − ĉ1 ) = d f ree , the inequality on the right hand side of (26) shares the same terms on all
but d f ree summation points for which ĉk = c̄k where (¯.) denotes the binary complement. Let
1
y − h1,k x1 − h2,k x2 2
x̃1,k , x̃2,k = arg min k
i
x1 ∈χ1,c ,x2 ∈χ2 N0
k
1
y − h1,k x1 − h2,k x2 2
x̂1,k , x̂2,k = arg min k (27)
i
x1 ∈χ1, c̄ ,x2 ∈χ2 N0
k
2
As x1,k and x2,k are the transmitted symbols so yk − h1,k x1,k − h2,k x2,k ≥
y − h1,k x̃1,k − h2,k x̃2,k 2 . The conditional PEP is given as
k
1 2 1 2
P (c1 → ĉ1 |H) ≤ P ∑ y − h1,k x1,k − h2,k x2,k ≥ ∑ y − h1,k x̂1,k − h2,k x̂2,k
k k
N
k,d f ree 0
N
k,d f ree 0
1
= Q ∑ Hk (x̂k − xk )2
k,d
2N 0
f ree
1 †
† †
=Q vec H ∆ vec H (28)
2N0
204 Radio Communications
T
where H = H1 · · · Hk,d f ree , x̂k = x̂1,k x̂2,k and ∆ = Inr ⊗ DD† while
D = diag x̂1 − x1 , x̂2 − x2 , · · · , x̂k,d f ree − xk,d f ree . Q is the Gaussian Q-function i.e. Q (y) =
∞ − x2 /2
√1 dx and vec indicates vectorization of a matrix. For a Hermitian quadratic form
2πy e
in complex Gaussian random variable q = m† Am where A is a Hermitian matrix and col-
umn vector m is a circularly
symmetric complex Gaussian vector i.e. m ∼ N C (µ , ∑ ) with
µ = E [m] and ∑ = E mm† − µµ † , the moment generating function (MGF) is
exp −tµµ † A (I + t∑ A)−1 µ
†
E exp −tm Am = (29)
det (I + t∑ A)
2
Using Chernoff bound Q ( x ) ≤ 12 exp −2x and the MGF, PEP is upper bounded as
1
P (c1 → ĉ1 ) ≤
1 ∆
2 det I + 4N0 I∆
1
= d f ree
nr (30)
2 ∏k= 1 1+ 1
4N0 x̂k − xk 2
x̂k − xk 2 ≥ d21,min + d22,min if x̂2,k = x2,k and x̂k − xk 2 ≥ d21,min if x̂2,k = x2,k . There ex-
T
ists 2d f ree possible vectors of x̂2,1 , · · · , x̂2,d f ree basing on the binary criteria that x̂2,k is equal
or not equal to x2,k . Taking into account all these cases combined with their corresponding
probabilities, the PEP is upper bounded as
nr d f ree d j d f ree − j
f ree 1 − P x̂2,k = x2,k
1 4N0 d f ree P x̂2,k = x2,k
P (c1 → ĉ1 |H) ≤ ∑ C
2 σ12 d˘21,min j =0 j σ22 d˘22,min
jnr
1 + 2 ˘2
σ1 d1,min
(31)
where d2j,min = σj2 d˘2j,min with d˘2j,min being the normalized minimum distance of the constella-
d
tion χ j for j = {1, 2} and C j f ree is the binomial coefficient. P x̂2,k = x2,k has been derived in
the following section.
3.4.2 P x̂2,k = x2,k
Considering (27), P x̂2,k = x2,k |h1,k , h2,k , x1,k is
P x̂2,k = x2,k |h1,k , h2,k , x1,k
†
2
= P −2 h1,k x1,k − x1 + zk h2,k x2,k − x2 ≥
h2,k x2,k − x2
|Hk , x1,k
†
h2,k x2,k − x2
2 2 h1,k x1,k − x1 h2,k x2,k − x2
= Q +
2N0 N0
h2,k x2,k − x2
2
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 205
Using the relation Q ( a + b) ≤ Q ( amin − |bmax |) and a† b̂ ≤ a where b̂ is the unit vector
we get
1 h2,k 2 d2 h1,k 2 d2 h2,k h1,k d2,min d1,max
2,min 1,max
P x̂2,k = x2,k |h1,k , h2,k ≤ exp − − +
2 4N0 N0 N0
(32)
Conditioned
on the norm of h1,k we make two non-overlapping regions as
h2,k ≥ h1,k h1,k and h2,k < h1,k h1,k with the corresponding probabilities
2
as Ph<1 and Ph>1 . Note that in first region h2,k h1,k ≤ h2,k while for second region
h2,k h1,k < h1,k 2 . So
nr
1 4N h1,k 2 d2
0 1,max
P x̂2,k = x2,k ≤ Eh1 2 exp − Eh2 |h1 Ph<1
2 d2,min − 4d2,min d1,max N0
nr
4N0 2 d21,max − d2,min d1,max
+ exp − h1,k Eh2 |h1 Ph1 >
d22,min N0
nr nr
1 4N0 N0 1 1
≤ nr + nr
2 σ22 d˘22,min σ12 d˘21,max 4σ1 d˘1,max σ2 d˘2,min
1− ˘ 1− ˘
σ2 d2,min σ1 d1,max
(33)
where we upper bound Eh2 |h1 Ph<1 and Eh2 |h1 Ph>1 by 1.
P x̂2,k = x2,k → 0 as σ22 → ∞ while P x̂2,k = x2,k increases as σ22 increases. Eq. (31) demon-
strates a significant result of achieving full diversity by the low complexity max log MAP
detector and converging to the performance of single stream using maximum ratio combin-
ing in the case of very weak and strong interference. In the moderate region, as the strength
of interference increases, P x̂2,k = x2,k reduces and there is a coding gain for the detection of
desired stream contrary to the case of MMSE where there is a coding loss as the interference
gets stronger (shown in the next section).
Let
| y k − α k x1 |2 | y k − α k x1 |2
x̃1,k = arg min , x̂1,k = arg min
i
x1 ∈χ1,c Nk i
x1 ∈χ1, c̄
Nk
k k
206 Radio Communications
Considering the worst case scenario d (c1 − ĉ1 ) = d f ree and using the fact that
1
2 2
Nk yk − αk x1,k ≥ 1 yk − αk x̃1,k , the conditional PEP is upper bounded as
Nk
α2k 2
P (c1 → ĉ1 |H) ≤ Q ∑ x̂ − x1,k (35)
k,d f ree
2Nk 1,k
2
Bounding x̂1,k − x1,k ≥ d21,min and using the Chernoff bound
1 d21,min † −1
P (c1 → ĉ1 |H) ≤ exp − ∑ h1,k R2,k h1,k (36)
2 4 k,d f ree
−1
The eigenvalues of R2,k are
−1
2
σ22 h2,k + N0 , l=1
λl = (37)
N −1 , l = 2, · · · , nr
0
Using the MGF (29), PEP conditioned on h2 = h2,1 , · · · , h2,d f ree is upper bounded as
which not only demonstrates the well known result of the loss of one diversity order in MMSE
in the presence of one interferer (Winters, 1984) but also exhibits a coding loss as interference
gets stronger.
−1
10
−2
1
FER of x 10
−3
10
O x2=QPSK
* x =QAM 16
2 + x2=QAM 64
−4
10
−5 −4 −3 −2 −1 0 1 2 3 4
INR (dBs)
Fig. 12. Desired stream x1 is QPSK while interference stream x2 is from QPSK, QAM16 and
QAM64. SNR is 4.5 dB. Continuous lines indicate interference suppression while dashed lines
indicate interference cancellation. Dotted lines indicates detection of x1 by MMSE detector.
64−state, rate 1/2 Convolutional Code is used. Note that SNR is with respect to the desired
stream
0
10
−1
10
1
FER of x
−2
10
−3
10
+
−4
10
O x2=QPSK
* x =QAM 16
2
x2=QAM 64
1 2 3 4 5 6 7 8 9 10 11
INR (dBs)
Fig. 13. Desired stream x1 is QAM 16 while interference stream x2 is from QPSK, QAM16 and
QAM64. SNR is 11 dB. Continuous lines indicate interference suppression while dashed lines
indicate interference cancellation. Dotted lines indicates detection of x1 by MMSE detector.
64−state, rate 1/2 Convolutional Code is used.
2006) and the punctured rate 1/2 turbo code of 3GPP LTE (LTE, 2006)2 . Each BS has multiple
antennas and employs antenna cycling. MS has two antennas. We consider an ideal OFDM
2 The LTE turbo decoder design was performed using the coded modulation library
www.iterativesolutions.com
208 Radio Communications
0
10
−1
10
−2
10
−3
1
FER of x 10
−4
10
−5
10
−6
10
O x2=QPSK
* x =QAM 16
2 + x2=QAM 64
−7
10
3 4 5 6 7 8 9 10 11 12 13
INR (dBs)
Fig. 14. Desired stream x1 is QAM 64 while interference stream x2 is from QPSK, QAM16 and
QAM64. SNR is 13 dB. Continuous lines indicate interference suppression while dashed lines
indicate interference cancellation. Dotted lines indicates detection of x1 by MMSE detector.
Punctured rate 1/2 3GPP turbo code is used with 5 decoding iterations.
based system (no ISI) and analyze the system in frequency domain. Due to bit interleaving
followed by OFDM, this can be termed as frequency interleaving. Therefore SIMO channel at
each sub carrier from BS to MS has iid Gaussian matrix entries with unit variance. Perfect CSI
is assumed at the receiver. Furthermore, all mappings of coded bits to QAM symbols use Gray
encoding. We consider interference suppression and interference cancellation approaches us-
ing low complexity max log MAP detector. For comparison we also consider interference
suppression using MMSE detector.
Figs. 12, 13 and 14 show the FERs of target stream in the presence of one interference stream.
These simulation results show that the dependence of the performance for MMSE detection is
insignificant on the rate of the interference stream but its dependence on interference strength
is substantial. This can be interpreted as a consequence of the attenuation of interference
strength at the output of MMSE filter and the subsequent assumption of Gaussianity for its
behavior. For the low complexity max log MAP detector, a significant improvement is ob-
served in the performance as the rate of interference stream decreases which is in conformity
with the earlier results of mutual information analysis (fig. 11). It is observed that for a given
interference level, the performance is generally degraded as the rate (constellation size) of the
interfering stream increases. The performance gap with respect to MMSE decreases as the
desired and the interference streams grow in constellation size which can be attributed to the
proximity to the Gaussianity of these larger constellations due to their high peak to average
power ratio and to the optimality of MMSE for Gaussian alphabets.
4. References
802.11n (2006). Enhancements for Higher Throughput, IEEE 802.11 WG. IEEE 802.11n/D1.0 Draft
Amendment.
802.16m (2007). Draft IEEE 802.16m Evaluation Methodology, IEEE 802.16m-07/037r1.
Low Dimensional MIMO Systems with Finite Sized Constellation Inputs 209
Alamouti, S. (1998). A simple transmit diversity technique for wireless communications, IEEE
Journal on Selected Areas in Communications Vol. 16(No. 8): 1451–1458.
Bladsjö, D., Furuskär, A., Jäverbring, S. & Larsson, E. (1999). Interference cancellation using
antenna diversity for EDGE - Enhanced data rates in GSM and TDMA/136, IEEE
Vehicular Technology Conference Proceedings, 1999. VTC 1999-Fall, Vol. 4, pp. 1956–1960.
Caire, G., Taricco, G. & Biglieri, E. (1998). Bit-interleaved coded modulation, Vol. 44(No.
3): 927–946.
Carleial, A. (1975). A case where Interference does not reduce Capacity, IEEE Transactions on
Information Theory Vol. 21(No. 5): 569–570.
Dahlman, E., Ekstrom, H., Furuskar, A., Jading, Y., Karlsson, J., Lundevall, M. & Parkvall,
S. (2006). The 3G long-term evolution - radio interface concepts and performance
evaluation, IEEE 63rd Vehicular Technology Conference VTC-Spring, Vol. 1, pp. 137–141.
Debbah, M., Muquet, B., de Courville, M., Muck, M., Simoens, S. & Loubaton, P. (2000).
A MMSE successive interference cancellation scheme for a new adjustable hybrid
spread OFDM system, IEEE 51st Vehicular Technology Conference Proceedings, 2000.
VTC 2000-Spring Tokyo., Vol. 2, pp. 745–749 vol.2.
Foschini, G. J. & Gans, M. J. (1998). On limits of wireless communication in a fading envi-
ronment when using multiple antennas, Wireless Personal Communications. Vol. 6(No.
3): 311–335.
Gesbert, D., Kiani, S., Gjendemsj, A. & Oien, G. (2007). Adaptation, coordination, and dis-
tributed resource allocation in interference-limited wireless networks, Proceedings of
the IEEE Vol. 95(No. 12): 2393–2409.
Ghaffar, R. & Knopp, R. (2008a). Dual-antenna BICM reception with applications to MIMO
broadcast and single frequency cellular system, IEEE 19-th International Symposium
on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), Cannes.
Ghaffar, R. & Knopp, R. (2008b). Low complexity BICM demodulation for MIMO transmis-
sion, 9th IEEE Workshop on Signal Processing Advances for Wireless Communications,
SPAWC 2008, Recife.
Ghaffar, R. & Knopp, R. (2009a). Interference Suppression for Next Generation Wireless Sys-
tems, IEEE 69-th Vehicular Technology Conference VTC-Spring 2009, Barcelona.
Ghaffar, R. & Knopp, R. (2009b). Spatial Interference Cancellation Algorithm, Proc. IEEE Wire-
less Communications and Networking Conference WCNC 2009, Budapest, Budapest, Hun-
gary.
Ghaffar, R. & Knopp, R. (2009c). Spatial Interference Cancellation and Pairwise Error Proba-
bility Analysis, IEEE International Conference on Communications, ICC 2009.
Golden, G., Foschini, C., Valenzuela, R. & Wolniansky, P. (1999). Detection algorithm and
initial laboratory results using v-blast space-time communication architecture, Elec-
tronics Letters Vol. 35(No. 1): 14–16.
Gonzalez-Lopez, M., Vazquez-Araujo, F., Castedo, L. & Garcia-Frias, J. (2006). Optimized
serially-concatenated LDGM and Alamouti codes for approaching MIMO Capacity,
IEEE 17th International Symposium on Personal, Indoor and Mobile Radio Communica-
tions, PIMRC 2006, pp. 1–5.
Han, T. & Kobayashi, K. (1981). A new achievable rate region for the interference channel,
IEEE Transactions on Information Theory Vol. 27(No. 1): 49–60.
Hochwald, B. & Brink, S. T. (2003). Achieving near-capacity on a multiple-antenna channel,
IEEE Transactions on Communications, Vol. 51(No. 3): 389–399.
210 Radio Communications
Larsson, E. G. & Stoica, P. (2003). Space-Time Block Coding for Wireless Communications, Cam-
bridge University Press, Cambridge, U.K.
Larsson, E. & Jalden, J. (2008). Fixed-complexity soft MIMO detection via partial marginaliza-
tion, IEEE Transactions on Signal Processing, Vol. 56(No. 8): 3397–3407.
Liu, Y., Lau, K., Takeshita, O. & Fitz, M. (2002). Optimal rate allocation for superposition
coding in quasi-static fading channels, IEEE International Symposium on Information
Theory, ISIT 2002, pp. 111–.
LTE (2006). Requirements for Evolved UTRA (E-UTRA) and Evolved UTRAN (E-UTRAN), 3GPP
TR 25.913 v.7.3.0,.
LTE-A (2008). Requirements for Further Advancements for EUTRA, 3GPP TR 36.913,.
Medvedev, I., Bjerke, B., Walton, R., Ketchum, J., Wallace, M. & Howard, S. (2006). A compar-
ison of MIMO receiver structures for 802.11N WLAN - Performance and complex-
ity, IEEE 17th International Symposium on Personal Indoor and Mobile Radio Communica-
tions,, pp. 1–5.
Poor, H. & Verdu, S. (1997). Probability of error in MMSE multiuser detection, IEEE Transac-
tions on Information Theory Vol. 43(No. 3): 858–871.
Russell, M. & Stuber, G. (1995). Interchannel interference analysis of OFDM in a mobile envi-
ronment, IEEE 45th Vehicular Technology Conference, Vol. 2, pp. 820–824.
Shamai, S. & Steiner, A. (2003). A broadcast approach for a single-user slowly fading MIMO
channel, IEEE Transactions on Information Theory Vol. 49(No. 10): 2617–2635.
Telatar, I. E. (1999). Capacity of multi-antenna Gaussian channels, European Transactions on
Telecommunications Vol. 10(No. 6): 585–595.
Varanasi, M. K. & Guess, T. (1997). Optimum decision feedback multiuser equalization with
successive decoding achieves the total capacity of the Gaussian MAC channel, Asilo-
mar Conference on Signals, Systems and Computers.
Verdu, S. (1989). Computational complexity of multiuser detection, Algorithmica,, Vol. 4,
pp. 303–312.
Verdu, S. (1998). Multiuser Detection., Cambridge University Press, Cambridge, U.K.
Winters, J. (1984). Optimum combining in digital mobile radio with cochannel interference,
IEEE Journal on Selected Areas in Communications Vol. 2(No. 4): 528–539.
Wolniansky, P., Foschini, G., Golden, G. & Valenzuela, R. (1998). V-blast: an architecture for
realizing very high data rates over the rich-scattering wireless channel, International
Symposium on Signals, Systems, and Electronics, 1998. ISSSE 98., pp. 295–300.
Advanced Hybrid–ARQ Receivers for Broadband MIMO Communications 211
Greece
1. Introduction
Multiple input multiple output (MIMO) and hybrid–automatic repeat request (ARQ) mecha-
nisms play a key role in the evolution of current wireless communications systems towards
high data rate wireless packet access. In MIMO techniques, the spatial dimension of the
MIMO channel is exploited through the use of multiple antennas at both the transmitter and
receiver sides. This translates into an improvement in the spectrum efficiency and/or the link
quality Wolniansky et al. (1998). Hybrid–ARQ protocols provide an important source of time
diversity through the combination of channel coding and ARQ. This is performed with the aid
of packet combining techniques where erroneous data packets are kept in the receiver to help
detect/decode retransmitted frames.
In broadband MIMO communications, the MIMO wireless link suffers from intersymbol in-
terference (ISI) caused by multipath propagation. This effect can be mitigated using channel
equalization and/or Hybrid–ARQ. In this chapter, we focus on the joint design of the packet
combiner and the channel equalizer for MIMO ARQ transmission over the broadband wireless
channel. We start the chapter by reviewing the various approaches for joint packet combining
and equalization. We introduce the considered broadband MIMO ARQ transmission scheme.
Then, we derive the structure of the optimal maximum a posteriori (MAP) turbo packet com-
biner and study its outage performance. Finally, we introduce a new class of low-complexity
minimum mean square error (MMSE)-based turbo packet combiners and analyze their imple-
mentation requirements and block error rate (BLER) performance.
of MIMO systems with flat fading for joint multiple antenna interference (MAI) suppression
and packet combining (see for instance Onggosanusi et al. (2003) and Samra & Ding (2006)).
Turbo coded ARQ schemes with iterative MMSE frequency domain equalization (FDE) for
MIMO code division multiple access (CDMA) has been proposed in Garg & Adachi (2006).
Recently, we have introduced a new family of packet combining techniques for broadband
MIMO ARQ systems, where the decoding of a data packet is performed with the aid of an
iterative (turbo) processing between the soft combiner, i.e., joint packet combining and equal-
ization unit, and the soft input soft output (SISO) decoder (see Ait-Idir & Saoudi (2009)). The
following sections of this chapter focus on this new class of broadband MIMO ARQ tech-
niques. Our notation is introduced in the next section followed by the communication model
of the considered MIMO ARQ system.
3. Notation
In this chapter, scalars are denoted by small-case letters, vectors by small-case boldface letters,
and matrices by upper-case boldface letters. Superscripts and H denote the transpose and
transpose conjugate, respectively. I N is the N × N identity matrix, and 0 N × M is the N × M
zeros matrix. ⊗ is the Kronecker product, and Pr {.} denotes the probability of a given event.
The rate of this transmission scheme is therefore R = ρMNT . The transmit symbol energy
is
normalized to one. Assuming infinitely deep space–time interleaving we get, E si siH = I NT .
At the receiver side, a positive/negative acknowledgment ACK/NACK message is sent back
to the transmitter upon the decoding of the information block. When the transmitter receives
a NACK message due to an erroneously decoded packet, subsequent transmission rounds
occur until the packet is correctly received or a preset maximum number of rounds K (index
k = 1, · · · , K) is reached. Parameter K is called the ARQ delay. Reception of a ACK message
indicates a successful decoding and the transmitter moves on to the next packet. We assume
an error-free feedback channel (the signaling channel carrying the ACK/NACK message),
and perfect packet error detection (using a cyclic redundancy check –CRC code). We focus on
Chase-type ARQ, i.e., the entire information block is retransmitted using the same STBICM
Advanced Hybrid–ARQ Receivers for Broadband MIMO Communications 213
Noise
s 0, ..., sT−1
(1) (1)
ST Tx Transmission y0, ..., yT−1
encoder Π mapper buffer channel #1
ACK/NACK
(from receiver)
Noise
(k ) (k )
Transmission y0, ..., yT−1
channel # k
Fig. 1. STBICM ARQ Transmission over a short-term quasi-static MIMO channel
code. To prevent inter-block interference (IBI), we use either zero padding (ZP) or cyclic prefix
(CP)-aided transmission.
The MIMO-ISI channel is assumed to be short-term quasi-static block fading, i.e., constant
during one ARQ round and independently changes from round to round. The long-term
dynamic corresponds to the case when the channel is constant during all ARQ rounds cor-
responding to the transmission of the same information packet (see El Gamal et al. (2006)).
The short-term assumption is justified by the fact ARQ protocols are mainly used to improve
the link quality in the case of delay-tolerant applications where the processing delay is not a
(k)
major constraint. Let Hl denote the NR × NT complex matrix of the lth tap connecting the
(k)
transmitter and the receiver at ARQ round k. The elements of Hl are zero-mean circularly
(k) (k)
symmetric Gaussian random variables, i.e., hr,t,l ∼ CN 0, σl2 , where hr,t,l denotes the (r, t)th
(k)
element of matrix Hl and σl2 is the energy of tap l. The total channel energy is normalized
as ∑lL=−01 σl2 = 1. The discrete baseband signal received by antenna r at ARQ round k and time
instant i is given by
L−1 NT
(k) (k) (k)
yr,i = ∑ ∑ hr,t,l st,i−l + nr,i , (2)
l =0 t =1
(k) (k) (k)
where ni n1,i , · · · , n NR ,i ∼ CN 0 NR ×1 , σ2 I NR is the thermal noise at the NR receive
antennas. The STBICM ARQ transmission scheme over a short-term MIMO channel, i.e., k
distinct MIMO channels, is depicted in Fig. 1.
(1) (1)
y0, ...,yT−1
ARQ round #1 Π
Soft Packet
SISO LLRs info bits
Combiner Decoder
CRC
(k ) (k )
y0, ...,yT−1 Π −1
ARQ round # k ACK/NACK
(to transmitter)
Fig. 2. Block diagram of the turbo packet combing-aided MIMO ARQ receiver
combining techniques, the soft outputs obtained at different transmissions are simply added
together before channel decoding.
The general block diagram of the turbo packet combining-aided MIMO ARQ receiver is de-
picted in Fig. 2. Let
a a a
φt,i φ1,t,i , · · · , φ M,t,i (3)
denote the M × 1 real vector of a priori LLRs corresponding to coded and interleaved bits
b1,t,i , · · · , b M,t,i , and available at the input of the soft combiner at a certain iteration of ARQ
round k. Using a priori information φ1,0 a , · · · , φa
NT ,T −1 and signals received at rounds 1, · · · , k,
the soft packet combiner computes extrinsic LLR vectors
φet,i φ1,t,i
e
, · · · , φeM,t,i , (4)
which are de-interleaved and sent to the SISO decoder to obtain a posteriori LLRs about useful
bits and extrinsic information about coded bits. The generated extrinsic LLR values are then
interleaved and fed back to the soft combiner to help compute soft information during the next
turbo iteration of the same ARQ round. After a preset number of iterations, the decision about
the data packet is performed, and the ACK/NACK message is sent back to the transmitter
accordingly. Note that during the first iteration, a priori information corresponds to the soft
information available from the last iteration of previous ARQ round k − 1.
5. Information-Theoretic Issues
In this section, we derive the optimal maximum a posteriori (MAP) turbo packet combining
receiver for broadband MIMO ARQ transmission, and investigate its outage performance.
We first show that optimal turbo packet combining can be formulated as a MIMO-ISI turbo
equalization problem. We then obtain the outage probability of the broadband MIMO ARQ
channel, and analyze the impact of the ARQ delay, i.e., maximum number of ARQ rounds K,
on the outage performance.
Advanced Hybrid–ARQ Receivers for Broadband MIMO Communications 215
where
(u) (u) (u)
yi y1,i , · · · , y NR ,i ∈ C NR (6)
is the vector of received signals at ARQ round u = 1, · · · , k and time instant i.
The formulation in (5) is of a great importance because it allows us to view each ARQ round
as a set of virtual NR receive antennas. Note that in this section we assume that all signals and
channel matrices corresponding to previous ARQ rounds are available at the receiver side at
round k. In Section 6, we will present an optimized turbo packet combining technique that
makes use of all signals and channel matrices without being required to be explicitly stored
in the receiver. With respect to (2) and (5) and assuming a ZP-aided transmission strategy,
the signal vector y(k) corresponding to the transmission of the entire symbol frame over k
MIMO-ISI channels can be expressed as,
(1) (k ) (1) (k )
n ( k ) n T −1 , · · · , n T −1 , · · · , n0 , · · · , n0 ∈ C kNR T . (10)
(1) (k)
Pr y(k) | bm,t,i = 1 ; H0 , · · · , H L−1 , a priori LLRs
e
φm,t,i = log (1) (k)
. (11)
Pr y(k) | bm,t,i = 0 ; H0 , · · · , H L−1 , a priori LLRs
e
Then, by invoking the multi-round communication model (7), φm,t,i can be obtained as,
2
(k) −1 a
∑ exp − 2σ1 2 y − H(k) s + ∑ Ψm st ,i φm ,t ,i
1
s∈Sm,t,i (m ,t ,i )=(m,t,i)
e
φm,t,i = log , (12)
2
(k) −1 a
∑ exp − 2σ1 2 y − H(k) s + ∑ Ψm st ,i φm ,t ,i
0
s∈Sm,t,i (m ,t ,i )=(m,t,i)
b b
−1 s
where the subset Sm,t,i is defined as Sm,t,i s ∈ S NT T | Ψm t,i = b , b = 0, 1.
where K is the ARQ delay, and Ak denotes the event that an ACK message is fed back at
round
k, i.e., the data
packet is positively acknowledged at ARQ round k. The quantity
1
KI s; y(K ) | H(K ) , γ denotes the mutual information rate at the last ARQ round K, and is
expressed in the case of a MIMO broadband channel with Gaussian inputs as
1 (K ) 1 T −1 γ (K ) (K ) H
I s; y | H(K ) , γ = ∑ log2 det IKNR + Λi Λi , (14)
K KT i=0 NT
(K )
where Λi is the discrete Fourier transform (DFT) of the KNR × NT virtual MIMO-ISI channel
at round K and frequency bin i, i.e.,
(1)
Hl
L −1
Λi
(K )
∑ .. exp − j 2π il . (15)
. T
l =0 (K )
Hl
Advanced Hybrid–ARQ Receivers for Broadband MIMO Communications 217
Note that the factor K1 appearing in the outage probability (13) is due to the fact that a transmis-
sion scheme with Chase-type ARQ, and an ARQ delay K is equivalent to a repetition coding
scheme where K parallel sub-channels are used to transmit the same symbol frame.
In the following, we investigate the impact of the ARQ delay K on the outage performance.
We consider a MIMO-ISI channel with L = 2 taps having equal powers, i.e., σ02 = σ12 = 12 .
(k) (k)
At each ARQ round k, the mutual information rate 1k I s; y(k) | H0 , H1 , γ of the MIMO
ARQ system after k rounds is evaluated similarly to (14). If the target rate R is not reached
and k < K, the system moves on to the next round k + 1. An ARQ process is stopped and
an another is started, either because of system outage, i.e., the mutual rate after K rounds is
below R, or the rate R is achieved at a certain round k ≤ K. In all scenarios, we take T = 256
discrete time instants.
−1
10
Outage Probability
−2
10
−3
10
In Fig. 3, we plot the outage probability performance for the NT = NR = 2 antenna configura-
tion, with a target rate R = 2. We observe that the ARQ diversity gain, due to the short-term
static channel dynamic, clearly appears when the ARQ delay is set to K = 2. It offers a signif-
icant SNR gain compared with the non-ARQ case (K = 1). When, the ARQ delay is increased
to K = 3, the outage performance is similar to that of K = 2. This means that if the system is in
outage in the second ARQ round, then it will almost be in outage in the third round. In Fig. 4,
we investigate the outage performance when the number of transmit antennas is increased to
NT = 4, while NR = 2. The target rate is set to R = 4. As in the previous configuration, both
ARQ delays K = 2 and K = 3 provide almost the same outage performance, while the overall
diversity gain is more important than that corresponding to NT = NR = 2. This can be seen
from the steeper slopes of outage curves. Note that the ARQ diversity due to multiple trans-
missions does not completely translate into a receive diversity gain (related to the NR virtual
receive antennas at each ARQ round). This is due to the fact that the target rate R has to be
maintained, as it can be seen from the expression of the outage probability (13). This means
218 Radio Communications
that the diversity gain does not linearly increase with increase of the ARQ delay K. This issue
has been addressed by El Gamal et al. (2006) in the case of flat fading MIMO ARQ systems.
−1
10
Outage Probability
−2
10
−3
10
where
(1) (k ) (1) (k )
y(k ) yi +ε 1 , · · · , yi +ε 1 , · · · , yi −ε 2 , · · · , yi −ε 2 ∈ C kNR ε , (17)
i
(k) (1) (k ) (1) (k )
ni ni +ε 1 , · · · , ni +ε 1 , · · · , ni −ε 2 , · · · , ni −ε 2 ∈ C kNR ε , (18)
si si+ε 1 , · · · , si−ε 2 − L+1 ∈ S NT (ε+ L−1) , (19)
and H(k) is a block Toeplitz matrix which is defined similarly to (8) but using ε block rows and
(ε + L − 1) block columns.
First of all, the soft packet combiner computes conditional means and variances of transmitted
symbols using a priori information vectors φt,i a , where t ∈ {1, · · · , N }, and i ∈ {0, · · · ,
T
T − 1}, available from the previous iteration. Note that, as it has been mentioned before, the
soft information generated by the SISO decoder during the last iteration of ARQ round k − 1
serves as a priori information at the first iteration of round k. Conditional symbol expectations,
also called soft symbols, serve for regenerating soft interference caused by multiple antenna
transmission and multipath propagation, i.e., MAI plus ISI. Conditional symbol variances and
channel matrices corresponding to ARQ rounds 1, · · · , k are used for computing the multi-
round MMSE filter that serves for performing signal combining. At each iteration of ARQ
round k, the signal-level turbo packet combiner exploits the communication model (16) to
cancel soft MAI plus ISI (estimated at the current iteration of round k) from all signals received
at rounds 1, · · · , k. Then, it combines the resulting soft interference-free signals to generate
soft decisions about transmitted
symbols.
a 2
2
Let s̃t,i E st,i | φ
t,i and σ̃ E st,i − s̃t,i | φ a denote the conditional mean and vari-
t,i t,i
ance of symbol st,i . By invoking the special block Toeplitz structure of matrix H(k) , and the
structure of the multi-round signal vector (17), the signal-level turbo packet combiner com-
(k)
putes, at a particular iteration of ARQ round k, soft decision ξ t,i about symbol st,i using the
following forward–backward filtering structure,
(k) (k) (k) (k)
ξ t,i = Ft zi |Bt s̃i|t , (20)
where s̃i|t is the NT (ε + L − 1)-length soft symbol vector corresponding to (19) with zero at
(k) (k)
the (ε 1 NT + t)th position corresponding to soft symbol s̃t,i . Ft and Bt are the forward and
(k)
backward filters related to antenna t. zi is a vector that contains properly weighed and
combined copies of signals received at rounds 1, · · · , k. It does not change in the course of
turbo iterations corresponding to the same ARQ round, and is produced at round k according
to the following recursion
(k) ( k −1) H (k)
zi = zi + H (k ) yi ,
(0) (21)
zi = 0 NT (ε+ L−1)×1 .
220 Radio Communications
(k)
The signal vector yi and the channel matrix H(k) correspond to the ε-length block commu-
nication model of ARQ round k, and are given as,
(k) (k)
H0 · · · H L −1
.. ..
H(k)
. .
, (22)
(k) (k)
H0 ··· H L −1 NR ε× NT (ε+ L−1)
(k) (k ) (k)
yi yi +ε 1 , · · · , yi −ε 2 ∈ C NR ε . (23)
(k) (k)
Filters Ft and Bt are iteration-dependent, and are computed as
−1
(k)
Ft = σ2 + 1 − σ̃t2 e (k) (k)
t Λ Υ et e (k)
t Λ , (24)
(k) (k)
= Ft Υ(k) . Bt (25)
where et is a NT (ε + L − 1)-length vector of zeros with one at the (ε 1 NT + t)th position, i.e.,
et [ 0, · · · , 0 , 1, 0, · · · , 0 ] . (26)
ε 1 NT +t−1 (ε 2 + L) NT −t
σ̃t2 is the unconditional variance of symbols transmitted over antenna t, and is computed as
2 , · · · , σ̃2 2 1 T −1 2
the time average of conditional variances σ̃t,0 t,T −1 , i.e., σ̃t = T ∑i =0 σ̃t,i . The square
matrix Λ(k) is updated at each turbo iteration according to,
−1
Λ(k) = I NT (ε+ L−1) − Υ(k) Υ(k) + σ2 Ξ−1 , (27)
where
σ̃12
.. N ε+ L−1)× NT (ε+ L−1)
Ξ = I ε + L −1 ⊗ . ∈ C T( , (28)
2
σ̃N T
(k) (k)
where it is assumed that conditional soft demapper input ξ t,i | st,i is Gaussian with mean αt
2
(k)
and variance δt , and are given by,
α(k) (k)
= Bt et
t
2 (31)
δ(k) = 1 − αt
(k) (k)
αt ,
t
b is defined as S b s ∈ S | Ψ−1 ( s ) = b for b = 0, 1.
and the set Sm m m
(k)
where si , H(k) , and yi are given by (19), (22), and (33), respectively, and
(k) (k ) (k )
ni ni +ε 1 , · · · , ni −ε 2 ∈ C NR ε (33)
is the spatially and temporally white Gaussian noise at the input of the equalizer at ARQ
(k)
round k, i.e., ni ∼ CN 0 NR ε×1 , σ2 I NR ε . Soft combining is iteratively performed at the level
of unconditional MMSE filter outputs by combining the output at each iteration of ARQ round
k with those obtained at the last iteration of previous rounds 1, · · · , k − 1.
(k) (k)
The forward and backward filters Ft and Bt in the case of symbol-level turbo packet com-
bining can easily be derived using the equations provided in the previous subsection with
(k)
k = 1. Now, let ξ̆ t,i denote the MMSE filter output corresponding to symbol st,i at a specific
(k)
turbo iteration of round k. The conditional decision statistic ξ̆ t,i | st,i is Gaussian, with mean
2
(k) (k) (u)
ᾰt and variance δ̆t given similarly to (31). For ARQ rounds u = 1, · · · , k − 1, ξ̆ t,i denotes
the decision statistic obtained at the last iteration of round u. Therefore, the soft combiner
e
provides extrinsic information φm,t,i about coded and interleaved bit bm,t,i as
(k) (k)
( k ) H ( k ) −1 (k) −1
∑ exp − 12 ξ̆ t,i − sᾰt ∆t ξ̆ t,i − sᾰt + ∑ m =m Ψ m ( s ) φ a
m ,t,i
e s∈Sm1
φm,t,i = log (k) (k) ,
( k ) H ( k ) −1 (k) −1
∑ exp − 12 ξ̆ t,i − sᾰt ∆t ξ̆ t,i − sᾰt + ∑ m =m Ψ m ( s ) φ a
m ,t,i
s∈Sm0
(34)
where vector
(k) (1) (k)
ξ̆ t,i ξ̆ t,i , · · · , ξ̆ t,i ∈ Ck (35)
(k) (k)
gathers MMSE filter soft outputs corresponding to all rounds 1, · · · , k. ᾰt and ∆t are the
(k)
mean and covariance of the conditional Gaussian vector ξ̆ t,i | st,i , and are given by,
(k) (1) (k)
ᾰt ᾰt , · · · , ᾰt ∈ Ck , (36)
222 Radio Communications
(1)2
δ̆t
(k) ..
∆t = . . (37)
( k )2
δ̆t k×k
k
(k) e (u)
LLRm,t,i = ∑ φm,t,i , ∀ m, t, i, (38)
u =1
e (u)
which are de-interleaved and fed back to the SISO decoder. Note that in (38), φm,t,i denotes
the extrinsic LLR at the last iteration of ARQ round u = 1, · · · , k.
−1
10
BLER
−2
10
−3 round 1
10 MFB, round 1
LLR level, round 2
Symbol Level, round 2
Signal Level, round 2
MFB, round 2
−4
Outage, 2x2, R=2, K=2
10
−5 −4 −3 −2 −1 0 1 2 3 4 5
SNR (dB)
−1
10
BLER
−2
10
round 1
MFB, round 1
LLR Level, round 2
Symbol Level, round 2
Signal Level, round 2
MFB, round 2
−3
Outage, 4x2, R=4, K=2
10
−2 0 2 4 6 8 10
SNR (dB)
type of unbalanced MIMO configurations where the transmitter is equipped with more an-
tennas than the receiver is suitable for the forward link. The filter length is increased to
ε = 13 (ε 1 = ε 2 = 6) for all combining schemes. The signal-level combining technique is
shown to achieve BLER performance close to the MFB with a gap less than 0.5dB, while both
the LLR-level and the symbol-level techniques have degraded BLER performance. The signal-
level combining manifests itself in almost achieving the diversity gain of the MIMO-ISI ARQ
channel, while it is shown that symbol-level combining fails to do so. This is because in the
second ARQ round, the signal-level scheme constructs a 4 × 4 virtual MIMO-ISI channel for
ISI cancellation and symbol detection, while the MIMO configuration remains unbalanced in
the case of symbol and LLR-level combining.
7. Conclusion
In this chapter, we considered the design of efficient iterative turbo packet combining algo-
rithms for broadband MIMO systems with Chase-type ARQ. We derived the structure of the
optimal MAP turbo packet combining technique that exploits all the diversities available in
the MIMO-ISI ARQ channel to perform packet combining, and analyzed its outage probabil-
ity. As optimal MAP turbo packet combining has a huge computational cost and memory
requirements, we introduced a new class of low-complexity MMSE-based turbo packet com-
bining schemes. In MMSE-based signal-level combining, each ARQ round is viewed as a set
of virtual receive antennas, and packet combining is jointly performed with ISI cancellation
at the signal level. In MMSE-based symbol-level combining, multiple transmissions are sep-
arately turbo equalized, and combining is performed at the level of filter outputs. The sim-
ulation results provided in this chapter indicate that signal-level combining provides better
BLER performance than that of symbol-level and conventional LLR-level combining.
Advanced Hybrid–ARQ Receivers for Broadband MIMO Communications 225
8. References
Ait-Idir, T. & Saoudi, S. (2009) Turbo packet combining strategies for the MIMO-ISI ARQ chan-
nel, IEEE Transactions on Communications vol. 57, no. 12, December 2009, 3782-3793
Caire, G. & Tuninetti, D. (2001). ARQ protocols for the Gaussian collision channel, IEEE Trans-
actions on Information Theory, Vol.47, No.4, July -2001, 1971–1988
El Gamal, H.; Caire, G. & Damen, M. O. (2006) The MIMO ARQ channel diversity-
multiplexing-delay tradeoff, IEEE Transactions on Information Theory, Vol.52, No.8,
August -2006, 3601–3621
Garg, D. & Adachi, F. (2006) Packet access using DS-CDMA with frequency-domain equaliza-
tion IEEE Journal of Selected Areas in Communications, vol. 24, no. 1, Jan. 2006
Onggosanusi, E. N.; Dabak, A. G.; Hui, Y. & Jeong, G. (2003) Hybrid ARQ transmission and
combining for MIMO systems, Proceedings of IEEE International Conference on Commu-
nications, pp. 3205-3209, ISBN 0-7803-7802-4, Anchorage, May 2003
Samra, H. & Ding, Z. (2006) New MIMO ARQ protocols and joint detection via sphere decod-
ing, IEEE Transactions on Signal Processing, vol. 54, no. 2, pp. 473-482, Feb. 2006
Tse, D. & Viswanath, P. (2005). Fundamentals of Wireless Communication, Cambridge University
Press, ISBN 978-0-521-84527-4
Wolff, R. (1989). Stochastic Modeling and the Theory of Queues, Upper Saddle River, NJ: Prentice-
Hall, 1989
Wolniansky, P. W.; Foschini, G. J. & Valenzuela, R. A. (1998). V-BLAST: an architecture for
realizing very high data rates over the rich scattering wireless channel, in Proc. Int.
Symp. Signals, Systems, Electron., Pisa, Italy, Sep. 1998
226 Radio Communications
Cooperative ARQ: A Medium Access Control (MAC) Layer Perspective 227
1. Introduction
Cooperative Automatic Retransmission reQuest (C-ARQ) schemes have become a very
active research topic over the last years. C-ARQ schemes constitute a practical way of
executing cooperation in wireless networks with already existing equipment. C-ARQ
schemes exploit feedback from the receiver, i.e. cooperation is only executed when needed,
and thus are sometimes referred to as cooperation on-demand cooperative schemes.
In short, the idea of C-ARQ is to exploit the fact that, due to the broadcast nature of the
wireless channel, any transmission can be received by any of the stations in the transmission
range of the transmitter. What has been traditionally considered as interference, is exploited
in C-ARQ schemes to attain spatial diversity. Upon a transmission error, a retransmission
can be requested from any (or some) of the stations which overheard the original
transmission, which can act as spontaneous helpers (or relays). The result is that the
destination of a packet can receive different copies of the same information arriving via
statistically independent transmission paths, i.e., space diversity.
C-ARQ schemes have been already studied in the literature from a theoretical point of view
and there is no doubt that, under some conditions, they can dramatically boost the
performance of wireless communications compared to traditional ARQ, where
retransmissions are performed only from the source. However, involving a number of users
in a communication link requires coordination. To this end, efficient Medium Access
Control (MAC) protocols are necessary to get the maximum efficiency of the
communications. In this chapter we emphasize the important role of the MAC layer in this
context of C-ARQ.
Along the chapter, we first review in Section 2 the motivation and operation of C-ARQ
schemes into detail. We go through the parameters that affect the performance of these
schemes and we point out the role of the MAC layer. Taking into account the specific
requirements of the MAC layer in this kind of schemes, we present in Section 3 a novel high-
performance MAC protocol specifically tailored for this purpose. Computer-based
simulations are presented to evaluate the performance of the protocol. Finally, Section 4
concludes the chapter.
228 Radio Communications
Although slight different variations to this general operation can be found in the literature,
most of the proposed C-ARQ schemes follow this description. It is worth mentioning that
the CFC has sometimes received the name of Negative ACK (NACK) in the literature
(Dianati et al. 2006). However, this name falls short in describing the real function of the
CFC. Besides informing the Negative ACK, it also calls for cooperation and, indeed, it could
attach some relay selection criteria, among other control information required for the
execution of a cooperative technique.
An example of operation of a C-ARQ mechanism is illustrated in Fig. 1. Therein, the
communication between a source and a destination stations is assisted by an arbitrary
number (N ) of relays. In this particular example, the relays retransmit data orthogonally in
time until the destination station can send the ACK.
The performance of a C-ARQ scheme might be mainly influenced by the following four
parameters:
1) The relay selection criteria; as it could be expected, the number of potential helpers and
the “quality” of those helpers will have a direct impact on the efficiency of the C-ARQ
scheme. For this reason, there are several works focused on the design of efficient
techniques to select either the best or a subset of the best potential helpers to act as relays
(Gómez et al., 2007; Biswas & Morris, 2005).
2) The PHY forwarding technique executed by the relays (Nosratinia et al., 2004):
a. Amplify and forward techniques , when the relays transmit an amplified version of the
original received signal, without demodulating or decoding it.
b. Compress and forward techniques , when the relays transmit a compressed version of the
original transmitted signal, without decoding it.
c. Decode and forward techniques, when the relays transmit coded copies
re of the original
message. Note that using decode and forward, the recoding process can be done on the
basis of repeating the original codification, recoding the original data (or only a relevant part
of it), or using more sophisticated Space-Time Codes (STC) (Fitzek & Katz, 2006).
3) The number of required retransmissions necessary to decode a packet which can mainly
depend on:
Source DATA0
Relay 1 DATA1
Relay 2 DATA2
...
Relay N DATAN
Time+
a. The channel conditions between the source and the destination, the source and the relays,
and the relays and the destination (Gómez & Pérez-Neira, 2006; Pfletschinger & Navarro,
2008).
230 Radio Communications
b. The transmission scheme, which includes the forwarding technique executed by the
relays and the combination technique executed by the destination station to combine the
different retransmissions received from independent paths. The approach of combining
different erroneous copies of a same packet to decode the original packet has been tackled in
the past (Charaborty et al., 2005; Morillo-Pozo & García-Vidal, 2007).
4) The MAC protocol which is necessary to tackle with the contention among the relays. Just
as an example, the ideal scheduling among the relays represented in Fig. 1 is impossible to
attain in fully distributed networks without a central coordinator. Therefore, the set of active
relays should contend for the channel in order to retransmit the packets. Efficient MAC
protocols are necessary to execute a C-ARQ scheme in order to exploit the benefits of
cooperation in wireless networks.
characteristics, we present in this chapter the design and performance evaluation of a novel
high-performance MAC protocol for C-ARQ schemes, named DQCOOP.
232 Radio Communications
into account the unique characteristics of the C-ARQ schemes for their implementation in
on-demand cooperative schemes. DQCOOP is presented in the next section as a novel MAC
protocol that has been tailored to meet the requirements of the C-ARQ scenario. It
constitutes the adaptation of the high-performance DQMAN protocol (Alonso-Zárate et al.,
2008a) to this kind of scenarios.
‘final message bit’ in their data packet transmissions in order to advertise the transmission
of the final fragment of each message.
All the nodes execute three sets of simple rules at the end of each MAC frame. By simply
using the feedback information attached to the FBP, they can update the state of two
distributed queues (explained below) to execute the access algorithm. According to the
protocol rules, DQCA operates as a random access protocol when the traffic load is low (an
immediate access rule of the protocol allows a station to get access to the channel
immediately if the distributed queues are empty), and it switches smoothly and
automatically to a reservation protocol as the traffic load increases. Therefore, it attains the
better of the access methods.
The protocol operation is based on two concatenated distributed queues, the Collision
Resolution Queue (CRQ) and the Data Transmission Queue (DTQ). The CRQ is responsible
for the resolution of collisions among ARS and the DTQ handles the transmission of data.
The number of occupied positions (or elements) in each queue is represented by an integer
counter (RQ and TQ for the CRQ and the DTQ, respectively). Both counters have the same
value for all the nodes in the system and are updated according to a set of rules at the end of
each frame. Each node must also maintain and update another set of counters that reveal its
position in the queue (pRQ and pTQ for the CRQ and the DTQ, respectively). By the term
“position” it is meant the relative order of arrival (or age) of the node in the respective
queue. In the CRQ, each position (or element) is occupied by a set of nodes that suffered an
ARS collision (i.e. attempted an ARS transmission in the same access minislot of the same
CW). The DTQ contains the nodes that successfully reserved the channel through an ARS
and therefore each queue element corresponds to exactly one node.
SLAVE
Relay 1
SLAVE
Relay 2
SLAVE
Relay 3
destination
MASTER
Time+
Slave 1 ReTX
Slave 2 ReTX
Slave 3
cooperation phase
The master, i.e., the destination, initiates the periodic broadcast of the FBP and creates a
temporary cluster. A cooperation phase is initiated. The slaves, i.e., the relays, request access
to the channel to retransmit their cooperative packet (retransmissions of the original source
transmissions) by executing a variation of the DQCA rules. It is assumed that the relays
attempt to retransmit persistently until the cooperation phase is finished. Whenever the
cooperation phase is finished either an ACK or a NACK packet is transmitted, indicating
either the successful or unsuccessful recovery of the data packet originally received with
errors, respectively.
However, DQMAN, as defined in (Alonso-Zárate et al., 2008a), would be inefficient in
managing the access to the channel in a C-ARQ scheme. This is mainly due to the fact that
upon cooperation request (broadcast by the destination), the group of active relays forms an
ad hoc network wherein all the active stations suddenly have a data packet ready to be
transmitted. This turns temporarily the network from idle to saturation conditions. This
idle-to-saturation sharp transition would cause DQMAN to spend a non-negligible start-up
time before attaining its high performance, mainly due to:
1) The simultaneous channel access requests from the active relays in the first frame
immediately after the transmission of the CFC would have a high probability of collision.
Therefore, some empty frames would be needed until the first collision could be solved and
data retransmissions could actually start.
2) Upon the transmission of the first FBP, all the active relays (slaves) would retransmit in
the following frame by executing the immediate access rule of DQCA (Slotted ALOHA
access for low traffic loads). All these transmissions would collide, causing a waste of
resources for the duration of a complete MAC frame.
3) Even with the immediate access rule disabled, an empty frame would be present when
the collision resolution process starts due to the MAC frame structure with the feedback
broadcast at the end of the frame.
236 Radio Communications
Therefore, it is necessary to expand and adapt the DQMAN operation to take into
consideration the aforementioned issues that may potentially degrade its performance in C-
ARQ schemes. DQCOOP is presented in the next section with the goal of attaining the near-
optimum performance of DQMAN within the context of the considered C-ARQ scheme.
information regarding the state of each of the m0 previous minislots. As in DQMAN, for
each minislot, this information can have one out of three values. It can be empty (E), i.e., no
ARS transmitted, success (S), i.e., exactly one ARS transmitted, or collision (C), i.e., more
than one ARS transmitted in the same minislot (no matter how many).
4) A number of regular DQMAN consecutive MAC frames follow this first FBP until the
cooperation phase is ended. The rules of DQMAN, with the exception of the immediate
access rule, are executed to manage the data retransmissions and the resolution of the
collisions. The contention window of these frames has m minislots, where in general
m <m 0 , although this is not a mandatory condition.
5) An ACK or NACK transmission. Whenever the destination is able to successfully
decode the original packet, it broadcasts an ACK packet indicating the end of the
cooperation phase. A NACK is transmitted if the packet cannot be decoded at some point in
time.
Short Inter Frame Spaces (SIFS) are left between each of the parts of the cooperation phase to
compensate for non-negligible propagation and data processing delays and turnaround
times to switch the radio transceiver from receiving to transmitting mode.
It is worth mentioning that the value of m 0 must be tuned according to the expected number
of active relays. The higher the number of active relays, the higher the value of m 0 in order
to reduce the probability that all the access requests collide in the first frame. However, a
high value for m 0 has a cost in terms of control overhead. On the other hand, as long as at
least one access request is successful, the data transmission process can be initiated from the
first MAC frame, avoiding thus the loss of resources.
Time+
Source DATA
Relay 1 Coop_DATA
Relay n Coop_DATA
1) Upon the reception of the data packet with errors, D initiates a cooperation phase by
broadcasting a CFC. This packet sets the start of frame 0.
2) Frame 0 contains 5 access minislots (m 0 =5). The set of relays {R1, R2, R3, R4 } select the set
of minislots {3, 1, 5, 5}.
3) At the end of frame 0, D broadcasts the FBP with the following feedback information
regarding the state of the minislots, i.e., {Success,Empty,Success,Empty,Collision }.
4)Upon the execution of the protocol rules, R2 gets the first position of DTQ, R1 gets the second
position of DTQ, and both R3 and R4 get the first position of CRQ. In terms of the four integer
number representing the queues, this can be written as {pTQ1 , pTQ2 , pTQ3 , pTQ4 }={2,1,0,0} and
{pRQ1 , pRQ2 , pRQ3 , pRQ4 }={0, 0, 1, 1}. On the other hand, TQ =2 and RQ =1.
5) During frame 1, both the data transmission and the collision resolution work in parallel.
At the beginning of the frame, containing 2 access minislots (m=2), R3 and R4 attempt to
solve their collision. They reselect an access minislot where to send an ARS. In this case, they
select minislots 1 and 2 respectively, and thus they successfully solve their collision.
6) On the other hand, R2, which is at the first position of DTQ, transmits data (a
retransmission of the original packet).
7) At the end of frame 1, the FBP broadcast by D indicates that a transmission has been successful
and the next station in DTQ should transmit in the following frame. In addition, the feedback
information on the state of the minislots allows R3 and R4 to queue, orderly in time, in DTQ.
Time+
Cooperation Phase
R3, Relay 3
R4, Relay 4
CRQ CRQ
3,4
DTQ DTQ
1 2 4 3 1
8) In frame 2, there are no collisions to be solved and thus the minislots are empty. R1
transmits data.
9) Upon the reception of the retransmission from R1, D is able to successfully decode the
original packet. Therefore, it transmits an ACK packet indicating the end of the cooperation
phase. All the relays discard the buffered cooperative packet.
Cooperative ARQ: A Medium Access Control (MAC) Layer Perspective 239
with the number of access minislots. For this reason, it is necessary to find a good
compromise between the faster collision resolution and the protocol overhead. This tradeoff
will be further discussed later in the next section.
3.9
m0=m=2
3.8
Average Packet Transmission Delay (ms)
m0=m=3
3.7 m0=m=4
m0=m=5
3.6 m0=m=10
3.5
3.4
3.3
3.2
3.1
K=3
3
2 3 4 5 6 7 8 9 10 11 12 13 14 15
Active Relays
3.4
Active Relays=5
Average Packet Transmission Delay
3.35
3.3
(ms)
3.25
3.2
3.15
2 3 4 5 6 7 8 9 10
Number of minislots (m=m 0)
Getting back to the results in Fig. 6, they show that the average packet transmission delay
drops remarkably when the number of access minislots is at least equal to 3. Higher values
of m do not result in any substantial reduction of this time. Therefore, as it happens with the
DQCA protocol (Alonso-Zárate et al., 2008b), a good operational point for DQCOOP is to set
m=3.
Cooperative ARQ: A Medium Access Control (MAC) Layer Perspective 241
It is interesting to evaluate whether this discussion is still valid for any arbitrary number of
required retransmissions (K). The average packet tr ansmission delay is plotted in Fig. 8 as a
function of the value of K and for different values of m 0 =m when the number of active relays
is 15. In all cases, there is a considerable reduction of the average packet transmission delay
when shifting from 2 to 3 minislots. However, there is no much interest in increasing the
number of access minislots to higher values than 3, at least in terms of packet transmission
delay. Therefore, it is important to reinforce the already known argument that the number
of access minislots should be set to 3 in any DQCA-like protocol.
However, it seems reasonable to think that the value of m 0 (the number of access minislots
within the very first frame after the transmission of the CFC) could be set to a higher value
than m in order to absorb the first multiple access request arrival from all the active relays.
Note that the first frame is the one that receives the maximum number of simultaneous
access requests. In subsequent frames, the requests are split into smaller groups according to
the m -ary tree-splitting collision resolution operation of DQMAN.
In the next section, m is set to 3 and the performance of the protocol is evaluated for
different values of m 0 . The aim is to evaluate the reduction of the average packet
transmission delay for m 0 >m .
8
m=m0=2
Average Packet Transmission Delay (ms)
7 m=m0=3
m=m0=4
m=m0=5
6
Active Relays=10
2
1 2 3 4 5 6 7 8 9 10
Number of Required Retransmissions
the necessary MAC protocol. This overhead time includes silent intervals as well as the time
devoted to the transmission of control packets. Considering this, the relative overhead is
defined as the ratio between the overhead time in the cases that m 0 > 1 and the overhead time
when m 0 = 1 (this latter case is the worst case in terms of overhead since all the relays collide
in the first access request with probability one). This definition allows plotting the curves
with different values of K in the same vertical axis and also makes the results independent
of the absolute values of the transmission rates used for the simulation and the numerical
evaluation.
The relative overhead is plotted in Fig. 9 as a function of the value of m 0 , for different
number of required retransmissions (K), and considering a total number of 5 active relays.
The first observation is that there is a close relationship between the overhead of the
protocol and the value ofm 0 . The value of the relative overhead is very sensitive to the value
of m 0 if the number of required retransmissions is low. This means that if the value of K is
low, the accurate tuning of the value of m 0 has a remarkable effect on the performance of the
C-ARQ scheme. All the curves show a local minimum of the relative overhead for any pair
of values of m 0 and K. However, on the other hand, the higher the values of K, the more flat
the curves become. This means that if the number of required retransmission is high, the
value of m 0 becomes a non-critical parameter on the performance of DQCOOP.
The main reason for this behavior is that when the number of required retransmissions is
high and thus the duration of the cooperation phase is long, the impact of the overhead of
the first frame on the performance of DQCOOP is low. Note that if K retransmissions are
needed, at least K frames are necessary.
On the other hand, it seems reasonable to believe that the selection of the value of m 0 should
depend on the number of active relays (which request access simultaneously in the first
frame). In order to evaluate this relationship, the average packet transmission delay is
plotted in Fig. 10 for K=3. Different curves are plotted for different number of active relays
and as a function of the value of m 0 .
1
Active Relays=5
K=1 K=2 K=3
0.9
0.85
0.8
0.75
1 2 3 4 5 6 7 8 9 10 11 12
Number of Minislots First Frame (m 0)
3.5
Active Relays=5
3.35
3.3
3.25
3.2
3.15
K=3
3.1
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Number of Access Minislots First Frame (m 0)
It is worth noting that when m 0 10 the three curves almost overlap. This means that, if this
condition is fulfilled, the average packet transmission delay is almost equal and
independent of the number of active relays. In addition, the value of the average packet
transmission delay at m 0 =10 is not substantially bigger than the one at the respective
minimum values that can be found for m 0 =6 (for 5 active relays), m 0 =7 (for 10 active relays),
and m 0 =10 (for 15 active relays). This constitutes a worthwhile design guideline since by
setting m 0 = 10 the average packet transmission delay for any value of K can be predicted
with reliable accuracy regardless of the number of active relays in each cooperation phase
(considering a practical situation with no more than 15 active relays). In addition, this fact
relaxes the configuration requirements of the network, which is of remarkable interest when
operating in fully decentralized and spontaneous networks.
4. Conclusions
In this chapter we have highlighted the important role of the MAC layer in the performance
of C-ARQ schemes. Typically, these kinds of schemes have been evaluated from
fundamental points of view and assuming perfect scheduling among the relays. However,
we have shown that efficient MAC protocols are necessary to fulfill the specific
requirements posed by C-ARQ schemes and to get the most of their potential to increase the
efficient of wireless communications.
In addition, we have presented the DQCOOP protocol as an extension and adaptation of
DQMAN to efficiently coordinate the contention among the relays in a C-ARQ scheme. It
has been necessary to redesign the initialization phase of a DQMAN cluster so as to manage
the idle-to-sharp traffic transition that takes place upon the transmission of a CFC. Since the
active relays attempt to help simultaneously, the first contention window of DQMAN has to
be resized. In addition, the protocol frame structure and the protocol rules have been also
modified to optimize the performance of DQMAN in the context of C-ARQ schemes.
244 Radio Communications
The performance of the protocol has been evaluated with computer simulations. Results
show that the performance of DQCOOP can be independent of number of active relays and
the number of access minislots. This is a desirable characteristic in fully decentralized
networks, as is the case of ad hoc networks, where there might be no previous knowledge of
the network topology and configuration. Results also show that this independency can be
simply accomplished by setting the number of access minislots to 3 (attaining a faster
resolution of collisions compared to the transmission of data) and properly dimensioning
the number of access minislots in the very first frame, which is also modified to avoid an
otherwise certain empty data field. This last modification aims at absorbing the first
simultaneous access request by all the active relays. In fact, results show that the number of
access minislots in the very first frame can be overdimensioned at almost no cost, and thus
the performance of DQCOOP can be independent of the number of relays. The cost of
increasing by one unit the number of access minislots in terms of overhead pays off the
reduced probability of collision in the first access request.
5. References
Alonso-Zárate J., Gómez J., Verikoukis C., Alonso L., & Pérez-Neira A. (2006). Performance
Evaluation of a Cooperative Scheme for Wireless Networks, Proceedings of the IEEE
PIMRC , pp. 1-5, ISBN 1-4244-0329-4, Helsinki, Finland, September 2006
Alonso-Zárate J., Kartsakli E., Skianis C., Verikoukis C., & Alonso L. (2008a), Saturation
Throughput Analysis of a Cluster-based Medium Access Control Protocol for
Single-hop Ad Hoc Wireless Networks, Simulation: Transactions of the Society fo
ModelingandSimulationInternational , Vol. 84, No. 12, 619-633, ISSN 0037-5497
Alonso-Zárate J., Kartsakli E., Cateura A., Verikoukis C., & Alonso L. (2008b). A Near-
Optimum Cross-Layered Distributed Queueing Protocol for Wireless LAN, IEEE
Wireless Communications Magazine, Special Issue on MAC protocols , Vol. 15,for WLAN
No. 2, (February 2008) 48-55, ISSN 1536-1284
Azgin A., Altunbasak Y., & AlRebig G. (2005). Cooperative MAC and Routing Protocols for
Wireless Ad Hoc Networks, ProceedingsoftheIEEEGLOBECOM205 , ISBN: 0-7803-
9414-3, December 2005
Biswas S. & Morris R. (2005). ExOR: Opportunistic Multi-hop Routing for Wireless
Networks, Proceedings of the SIGCOMM '05 , pp. 133-144, ISBN 1-59593-009-4 , New
York, NY, USA, 2005.
Campbell G. et al. (2002), Method and apparatus for detecting collisions and controlling
access to a communications channel, USPatentno.US609B1 48 , June 2002.
Cerruti I., Fumagalli A., & Gupta P. (2008). Delay Model of Single-Relay Cooperative ARQ
Protocols in Slotted Radio Networks Poisson Frames Arrivals, IEEE/ACM Trans. on
Networking , Vol. 16, No. 2, (April 2008) 371-382, ISSN 1063-6692
Chakraborty S. S., Liinaharja M., & Ruttik K. (2005). Diversity and packet combining in
Rayleigh fading channels, IEE Proceedings-Communications , Vol. 152, No. 3, (June
2005) 353 – 356, ISSN 1350-2425
Dianati, M., Ling X., Naik K., & Shen X. (2006). A Node-Cooperative ARQ Scheme for
Wireless Ad Hoc Networks, IEEE Trans. on Vehicular Technology, Vol. 55, No. 3,
(May 2006) 1032-1044, ISSN 00189545
Cooperative ARQ: A Medium Access Control (MAC) Layer Perspective 245
Shankar S., Chou C., & Ghosh M. (2005). Cooperative Communication MAC (CMAC) – A
new MAC protocol for Next Generation Wireless LANs, Proceedings of the IEEE
International Conference on Wireless Networks, Communications, and Mobil
205, pp. 1-6, ISBN: 0-7803-9305-8, June 2005
Sadek B., Ray Liu K. J., & Ephremides A. (2006). Collaborative Multiple-Access Protocols for
Wireless Networks, Proceedings of the IEEE International Conference
Communications(ICC’0 , pp.
6) 4495-4500, ISBN: 1-4244-0355-3, June 2006
Wang X. & Yang C. (2005). A MAC Protocol Supporting Cooperative Diversity for
Distributed Wireless Ad Hoc Networks, Proceedings of the IEEE PIMRC , pp. 1396-
1400, ISBN: 9783800729098, Berlin, Germany, September 2005
Zimmermann M. D., Herhold P., & Fettweis G. (2004). The Impact of Cooperation on
Diversity-Exploiting Protocols, Proceedings of the 59th IEEE Vehicular Technology
Conference , pp. 410-414, ISBN 0-7803-8255-2, Milan (Italy), May 2004
Zimmermann E., Herhold P., & Fettweis G. (2005). On the Performance of Cooperative
Relaying Protocols in Wireless Networks, European Trans. on Telecommunications ,
Vol. 16, No. 1, (January 2005) 5-16, ISSN 1541-8251
Zorzi M., Rao R. R., & Milstein L.B. (1997). ARQ error control for fading mobile radio
channels, IEEE Trans. on Vehicular Technology , vol. 46, no. 2, (May 1997) 445-455,
ISSN 00189545
A Hybrid Feedback Mechanism to Exploit Multiuser Diversity in Wireless Networks 247
Abstract
One of the most promising approaches to boost the communication efficiency in wireless sys-
tems is the use of multiuser diversity (MUDiv), where the fading of channels is exploited.
The mechanism of scheduling the user with the best channel condition is called opportunis-
tic scheduling (OS). In this paper we propose a joint polling and contention based feedback
(JPCF) algorithm that exploits MUDiv while reducing the feedback load. The guard time,
which is between bursts, is divided into minislots that alternate between polling-based feed-
back minislot (p-minislot) and contention-based feedback minislot (c-minislot). During the
minislot, users feedback their channel qualities if above a predetermined threshold. We ana-
lyze the scheduling algorithm under slow Rayleigh fading assumption and derive the closed-
form expressions of the feedback load as well as the system capacity. We also consider the
delay resulting from the time needed to schedule a user and derive the system throughput.
The scheduling algorithm is compared with other scheduling algorithms.
1. Introduction
With the emerging of new multimedia applications and the huge demand and growth for such
applications, the need to provide high-speed high-rate transmission techniques is demanding.
One technique that has the capability of supporting such applications is multiuser diversity
(MUDiv), where the fading of channels is exploited (1). Assume that a reasonably large num-
ber of users are actively transmitting/receiving packets in a given cell, and they experience
independent time-varying fading conditions. By transmitting data to only the instantaneous
“on-peak" user, opportunistic scheduling (OS) can efficiently utilize the wireless resources and
thus dramatically improve the overall system throughput (2), (3). In order to schedule the
best user, in terms of channel quality, each user measures his instantaneous signal-to-noise
ratio (SNR) and feeds it back to the network scheduler. Currently Qualcomm’s high data rate
(HDR) system require similar scheme (4). As the number of active users becomes high, re-
sources are wasted in carrying this amount of feedback, which lead to inefficient use of the
spectrum. This issue motivated researchers to propose new techniques to reduce the feedback
load while exploiting MUDiv.
Many investigations have been conducted to exploit multiuser diversity while keeping the
overhead as minimum as possible. For instance, the impact of the degree of quantization of
the SNR measurements on the throughput of constant rate transmission was investigated in
248 Radio Communications
(5). It was shown that reducing the feedback rate (few quantization levels) yields a good per-
formance compared to the unquantized feedback. In single carrier systems, (6) proposed a
discrete rate switch-based multiuser diversity (DSMUDiv) algorithm that reduced the feed-
back load and feedback rate while preserving the performance of OS. The scheduling algo-
rithm relied on a probing mechanism. One drawback of this algorithm is that as the average
SNR decreases the need for full probing increases, therefore, the algorithm suffers from high
feedback load at low average SNR values. The work was extended to multi-carrier systems in
(7), where further reduction in the feedback load was shown. Similarly, in (8) users compare
their sum-rate on all sub-carriers to a predefined threshold value. In (9), the threshold value
was optimized to meet a specified outage probability. Users with channel quality above the
threshold are allowed to feedback their SNR measurements, while all others remain silent. In
case no feedback, a random user is selected, which leads to loss in capacity. Also, the feedback
values are unquantized (analog values), which increases the feedback rate. In (10), the work
was extended, where the scheduler requests full feedback if none of the users’ channel quali-
ties are above the threshold. Although the loss in capacity was compensated by full feedback
as opposed to (9), the feedback load was increased. In (11), multiple feedback thresholds are
used in order to reduce the feedback load and exploit multiuser diversity. The feedback load
was reduced at an expense of scheduling delay. In addition, a set of switched-based multiuser
access schemes were proposed in (12) in order to reduce the feedback load. In (13), (14), the
feedback rate was reduced to a one bit feedback per user. The scheduler uses these feedback
bits to partition all users into two sets and assigns the channel to one user belonging to the
set experiencing favorable channel conditions. Although this reduces the feedback load and
feedback rate but some loss is expected due to the low resolution of the quantized feedback
(one bit). Other work have considered multi-carrier systems, for instants, in (15) a clustering
scheme was proposed to reduce the feedback load while slightly degrading the performance.
Each user feeds back a figure-of-merit listing its strongest clusters of subcarriers. Similarly, in
(16) a fixed number of subcarriers for each user is fed back instead of a full feedback. These
subcarriers are either the best K out of M subcarriers or K predetermined subcarriers. All pre-
viously mentioned work considered a polling threshold-based scheduling schemes to reduce
the feedback load.
Other work considered random access algorithms to exploit multiuser diversity while reduc-
ing the overhead. In (17) a distributed multiaccess scheme was proposed. Based on a channel
quality threshold, users report the best m channels with quality above the threshold value.
Optimization was performed to find the best threshold and m values to maximize the system
capacity. In (18), a random access threshold-based feedback scheme was proposed to exploit
diversity gain while reducing the feedback load. Parameter optimization is performed to al-
low only users with high channel gains to feedback, which maximizes the system capacity.
In (19), a medium access control protocol was designed based on a splitting algorithms to re-
solve collisions over a sequence of minislots, and determine the user with the best channel.
Contention resolution algorithms while exploiting the diversity gain were proposed in (20).
Finally, reduced feedback overhead algorithms were studied in (21). Static splitting was con-
sidered for the best effort traffic scenario. Whereas, for the traffic mixture scenario combine
contention and polling based feedback was considered to maintain quality of service.
While Polling-based algorithms, like the DSMUDiv, guarantee best user selection, it suffers
from scheduling delay. On the other hand, although contention-based algorithms reduces the
overhead more then centralized scheduling it suffers from loss in capacity. In this chapter
we introduce an opportunistic scheduling algorithm that is not only a polling-based feedback
A Hybrid Feedback Mechanism to Exploit Multiuser Diversity in Wireless Networks 249
algorithm like in (6), but it is a joint polling and contention based feedback (JPCF) algorithm.
During the guard time, which is divided into minislots, users feedback their channel qualities,
based on a predetermined channel threshold, either in a polling-based feedback minislot (p-
minislot) or/and a contention-based feedback minislot (c-minislot). When a the best user is
found data transmission begins. The scheduling algorithm is analyzed under slow Rayleigh
fading assumption and closed-form expressions of both the feedback load and the system
capacity are derived. We also look at the effect of the delay on the throughput, where we
derive the system throughput. The scheduling algorithm is compared with the DSMUDiv (6)
and the optimal (full feedback) selective diversity scheduling algorithms.
This chapter is organized as follows. Section 2 introduces the system model. Section 3 and
4 present the scheduling algorithm and the mathematical analysis of the JPCF algorithm, re-
spectively. In Section 5 we present some numerical examples. Finally, Section 6 ends the paper
with some concluding remarks.
2. System Model
We consider a single free interference cell in a wireless network with K active users commu-
nicating with a base station (BS). We assume downlink scheduling, where only one user is
allowed to receive data transmission in each time slot. The communication is based on time
division duplex (TDD), where downlink and uplink channels are reciprocal.
2αi α2
f αi ( α i ) = exp(− i ) (2)
Ωi Ωi
n ≤ N }, where M0 = 1 is the user outage (deep fade), and M N is the highest modulation level.
We assume perfect channel estimation and negligible time delay between channel estimation
and signal set adaptation, and as such, the rate adaptation can happen instantaneously. We
also assume error free feedback channels. If we denote the target average bit error probability
(BEP) by BEPo , thresholds or switching thresholds can be obtained according to (22, eq.(30)):
(1)
γth = [erfc−1 (2 · BEPo )]2 ,
(n) 2
γth = − (2n − 1) ln(5 · BEPo ); n = 2, 3, ....., N, (3)
3
( N +1)
γth = +∞,
3. Scheduling Algorithm
In this section, we will introduce our proposed algorithm, the JPCF scheduling algorithm.
Similar to the optimal selective scheduling algorithm, the JPCF algorithm always guarantees
that the best user is granted the channel access. The difference between the two is in the se-
lection process. In the JPCF algorithm decisions on whom to schedule are based on threshold
A Hybrid Feedback Mechanism to Exploit Multiuser Diversity in Wireless Networks 251
test. In simple terms, the BS compares the channel quality of a user to a predetermined thresh-
old value and selects the user if his channel quality exceeds the threshold. In case no user is
found with channel quality exceeding the threshold, then the user with the highest channel
quality among all is selected.
Let us define the following:
• L = {( D (i ), l ) : 1 ≤ l ≤ K is the probing order , and D (i ) is the ID of user i }. The set is
generated randomly each time slot.
(N) (N)
• The predetermined threshold value is set to γth . According to (3), γth is the SNR
threshold of the highest modulation level and q( N ) is the quantized threshold value.
• The probability of contention in the c-minislot is ρ.
The feedback mechanism of the JPCF algorithm is based on both polling period and contention
period. Each period is a minislot during. Fig. 1 shows the feedback channel structure, which
consists of p-minislots and c-minislots. The following describes the scheduling algorithm (Fig.
2 shows the flowchart):
(i) Through the broadcast channel all users know their polling order (L).
(ii) The feedback channel always begins with a p-minislot.
(iii) During the p-minislot the BS polls the channel state information of the user (his SNR)
who is in order.
(iv) The feedback channel is terminated and the data transmission begins if the polled user
has ql = q( N ) . By knowing (γl ) and according to (4) ql is determined.
(v) If ql = q( N ) , then his information is stored and the feedback channel continues with a
c-minislot following the previous p-minislot and step (vi) is performed.
(vi) During the c-minislot, which is a contention based minislot, users feedback their SNRs,
with probability ρ, if it satisfy q = q( N ) . Otherwise, they keep silent.
(vii) If the contention is successful, then the feedback channel is terminated and the data
transmission begins for that successful user. Otherwise, the feedback channel continues
with a p-minislot following the previous c-minislot and step (iii) is performed.
(viii) In case all users are polled, the BS picks the user with the highest channel quality among
them and the data transmission begins for that user.
(ix) In case a tie occurs, a random pick is performed.
4. Performance Analysis
The performance of the JPCF algorithm is evaluated in this section. Basically, we concentrate
on the feedback load, the system capacity, and the scheduling delay. Closed form expressions
for all three performance measures are also derived.
Consider two consecutive minislots (p-minislot and c-minislot) and denote the discrete ran-
dom variable η ∈ [1, 2] by the total number of feedback during them. Let U be the set of events
where a successful search occurs during the two minislots. Note that a successful search occurs
when a user with q = q( N ) is found. Therefore, the occurrence of a successful search is associ-
ated with one of the following events: (i) The polled user during the p-minislot has q = q( N ) ,
or (ii) The polled user during the p-minislot has q < q( N ) and a successful contention occurs
in the following c-minislot.
The probability of U given l probes is:
i K − l −i
K −l
U (N) (N) K−l (N) (N)
Γ (l, ρ) = 1 − Fγ (γth ) + Fγ (γth ) ∑ 1 − Fγ (γth ) Fγ (γth )
i =1
i
× iρ(1 − ρ)i−1 ,
(5)
where
−ζ
Fγ (ζ ) = P[γ < ζ ] = (1 − e γ̄ ), (6)
is the cumulative distribution function (CDF) of the SNR (γ). The first part of the right hand
side of (5) refers to the success in the p-minislot and the second part refers in the success in
the c-minislot.
let X represent the set of events where no feedback occurs on the c-minislot and Y to be the set
of events where a feedback occurs on the c-minislot. Conditioning on l, the probability of X
and the probability of Y, respectively, are:
i K − l −i
K −l
X (N) (N) K−l (N) (N)
Γ (l, ρ) = 1 − Fγ (γth ) + Fγ (γth ) ∑ 1 − Fγ (γth ) Fγ (γth )
i =0
i
× (1 − ρ ) i ,
(7)
and
i K − l −i
K −l
Y (N) K−l (N) (N) i
Γ (l, ρ) = Fγ (γth ) ∑ 1− Fγ (γth ) Fγ (γth ) 1 − (1 − ρ ) . (8)
i =0
i
In the above expression (12) it is assumed that the guard time duration is negligible, meaning
that the feedback rate will not degrade the total system spectral efficiency. Practically, this
is not valid. Therefore, the amount of bits transmitted as feedback has to be counted and
at the end it will influence the performance of the system. To look into this issue, which is
spectral efficiency degradation caused by the feedback traffic, we define a the system capacity
as [bits/channel use]. Assuming N modulation levels, then we need log2 N bits to represent
them. Therefore, the system capacity is:
AFL · log2 N
Csys = R(K ) − , (13)
S
where S is the number of symbols transmitted in the data transmission time slot.
In (13), the last term takes into account the amount of bits transmitted as feedback. Also, in the
same expression the time delay is not taken into account, which is the guard time duration.
The only consideration is the feedback rate, or the amount of bits transmitted as feedback. In
the next section we investigate the effect of delay on the system performance.
with probability:
l −1
( p) U (N)
P (l ) = ∏ 1 − Γ (i, ρ) · 1 − Fγ (γth ) . (15)
i =1
On the other hand, if the successful search occurs at the lth c-minislot, then the guard time is:
τg (l ) = 2lτ f , (16)
with probability:
l −1
(N)
P(c) (l ) = ∏ 1 − ΓU (i, ρ) · ΓU (l, ρ) − 1 − Fγ (γth ) . (17)
i =1
Note that the optimization may not be convex. The derivation of (10) is involved so we apply
an exhaustive search method to find an optimal value. Table 3 shows the optimal values with
different K given the parameters in Section 5. It is clearly seen from Table 3 that for a given K,
ρ has two optimal values at the two average SNR regions. This is due to the collision. At low
average SNR values, the value of ρ is increased to encourage good users to compete, whereas,
at higher average SNR values the value of ρ is decreased to lower the possibility of collision.
5. Numerical Results
In this section we elaborate on the the performance of the JPCF algorithm by presenting some
numerical examples. We compare its performance with both the DSMUDiv and the optimal
selective diversity scheduling schemes. Parameters values are found in Tables 1 and 2. Fig. 3
shows the normalized average feedback load (i.e., the average feedback load divided by the
number of users K) of the JPCF algorithm for different values of ρ, which is the probability
of contention. As the value of the average SNR changes from low to high, the optimal value
of ρ, at which the feedback is minimized, changes from ρ = 1 to ρ = 0.13, for a given value
of K. Table 3 shows the optimal values of ρ for different values of K. The reason for the
change of the optimal value is the threshold value. For a given threshold value, the percent of
users with channel quality exceeding it increases as the average SNR increases, which leads
to higher probability of collision. As more users contend the feedback load increases, which
forces the value of ρ to change to maintain the minimization in (20). The point at which this
(N)
change happens depend on the value of γth and the BEPo .
The comparison of the JPCF algorithm with both the DSMUDiv and the optimal selective di-
versity scheduling algorithms is presented in Fig. 4. In the figure, although the DSMUDiv
algorithm has decreased the feedback load compared to the optimal algorithm, the JPCF al-
gorithm has decreased the feedback load even more. This extra reduction comes from the
introduction of the contention-based feedback (c-minislot), where not all users need to be
polled as opposed to the DSMUDiv algorithm, which is a pure polling-based feedback algo-
rithm. In terms of spectral efficiency, as shown in Section 4.2, both the JPCF algorithm and the
DSMUDiv algorithm have the same spectral efficiency (here the feedback rate is not included).
In (6), it has been proven that the DSMUDiv algorithm maintain the performance of the full
feedback algorithm in terms of spectral efficiency, which means that the JPCF algorithm also
maintain the same performance. The difference will come when you include the feedback rate
(log2 N), which is defined as [bits/channel use]. From (13), we can see that as the feedback
256 Radio Communications
load increases the system capacity decreases, therefore, we deduce that the JPCF algorithm
has the highest system capacity compared to the other two algorithms, which can be seen in
Fig. 5 and 6. As a benchmark we include the average spectral efficiency (ASE) that does not
include the feedback rate. The gap between the system capacity and the ASE shrinks with the
increase of number of symbols transmitted in the data transmission time slot.
Although the number of minislots of the JPCF algorithm varies from 1 to 2K − 1, which is
much greater than the DSMUDiv algorithm, where the minislots varies from 1 to K, the aver-
age guard time of the JPCF algorithm is much smaller than the guard time of the DSMUDiv
algorithm as depicted in Fig. 7. Such advantage occurs at medium to high average SNR. As
the average SNR decreases this advantage diminishes as seen in Fig. 8. The reason is that the
JPCF algorithm has contention minislots which creates an additional delay on top of the delay
created by the polling minislots. This delay increase as the probability of finding a user with
channel gain exceeding the threshold value decreases, which is the case for low average SNR
values. Fig. 9 shows the effect of different data transmission time durations on the system
throughput. Obviously, higher values give better performance.
6. Conclusions
In this chapter we proposed a scheduling algorithm that maximizes the spectral efficiency
while reducing the feedback load. The algorithm, called joint polling and contention based
feedback (JPCF) algorithm, collects channel quality information of the users either in a polling
form or in a contention form. Compared to the optimal (full feedback) algorithm, the JPCF
algorithm has a similar spectral efficiency and a higher system capacity, which takes into ac-
count the effect of the feedback rate. Also, the JPCF algorithm shows more reduction in feed-
back load compared to the DSMUDiv algorithm. One drawback of the JPCF algorithm is the
high delay compared to the DSMUDiv algorithm as the average SNR decreases, which affects
the performance. As the average SNR increases, the delay encountered when using the JPCF
algorithm drops below the delay created by using the DSMUDiv algorithm, which improves
the system performance. The work presented in this paper includes analysis of the JPCF algo-
rithm under slow Rayleigh fading assumption. Closed-form expressions of the feedback load,
system capacity and scheduling delay are also presented in this paper.
Parameter Value
N 4 modulations
K 30 users
τf 154 µsec (based on reference (24))
Td 5 msec (based on reference (24))
Table 2. A List of Parameters
Fig. 1. The framing structure of a TDD system. Each polling-based feedback minislot (p-minislot) is
followed by a contention-based feedback minislot (c-minislot), where they carry the feedback information.
258 Radio Communications
Evaluating if a mobile goes through a critical period should not only focus on the classical
mean delay and jitter analysis. Indeed, a meaningful constraint regarding delay is the
limitation of the occurrences of large values. Accordingly, (Gueguen & Baey (c), 2008)
defines the concept of delay outage by analogy with the concept of outage used in system
coverage planning. A mobile k is in delay outage (in critical period) when its packets
experience a delay greater than a given threshold T k defined by the mobile application
requirements. The delay experienced by each mobile is tracked all along the lifetime of its
connection. At each transmission of a packet of mobile k, the ratio of the total number of
packets whose delay exceeded the threshold divided by the total number of packets
transmitted since the beginning of the connection is computed. The result is called Packet
Delay Outage Ratio (PDOR) of mobile k and is denoted PDOR k. This measure is
representative of the emergency for the mobile k to be served. Fig. 3 illustrates an example
cumulative distribution of the packet delay of a mobile at a given time instant. A mobile can
be considered as satisfied when, at the end of its connection, its delay constraint is met, i.e.
its experienced PDOR is less than the application specific PDOR target.
In WFO scheduling, the required QoS, the experienced QoS and the transmission conditions
are jointly considered in an extended cross-layer approach. The scheduling principle is to
allocate a Resource Unit n to the mobile jwhich has the greatest WFO parameter value
WFO k,n such as:
with f a strictly increasing polynomial function (Gueguen & Baey (d), 2008; Gueguen &
Baey, 2009):
f ( x) 1 x , (5)
The exponent parameter ´ allows being sensitive and reactive to PDOR fluctuations which
guarantees fairness at a short time scale. is a normalization parameter that ensures that
f(PDOR k) and m k,n are in the same order of magnitude.
With this scheduling, physical layer information (represented through the factor m k,n) are
used in order to take advantage of the time, frequency and multiuser diversity and
maximize the system capacity. Higher layer information (represented through the factor
f(PDOR k) are exploited in order to introduce dyna mic priorities between flows for ensuring
the same QoS level to all mobiles. With this original weighted system that introduces
dynamic priorities between the flows, WFO keeps a maximum number of flows active
across time but with relatively low traffic backlogs. This results in a well-balanced resource
allocation. Preserving the multiuser diversity allows to continuously take a maximal benefit
260 Radio Communications
6
Average spectral efficiency (proposed algorithm)
Proposed scheduling algorithm
DSMUDiv scheduling algorithm
5.5 Optimal selective diversity scheduling algorithm
Round Robin scheduling scheme algorithm
5
System Capacity [bits/channel use]
4.5
3.5
2.5
5 10 15 20 25 30 35 40 45 50
Number of users (K)
Fig. 5. System capacity of: (i) the proposed (JPCF) scheduling algorithm, (ii) the DSMUDiv scheduling
algorithm, and (iii) the optimal (full feedback) scheduling algorithm. Setting ρ = 1, 100 symbols are
transmitted, and γ = 15dB.
6
Average spectral efficiency (proposed algorithm)
Proposed scheduling algorithm
DSMUDiv scheduling algorithm
5.5 Optimal selective diversity scheduling algorithm
Round Robin scheduling scheme algorithm
5
System Capacity [bits/channel use]
4.5
3.5
2.5
5 10 15 20 25 30 35 40 45 50
Number of users (K)
Fig. 6. System capacity of: (i) the proposed (JPCF) scheduling algorithm, (ii) the DSMUDiv scheduling
algorithm, and (iii) the optimal (full feedback) scheduling algorithm. Setting ρ = 1, 500 symbols are
transmitted, and γ = 15dB.
A Hybrid Feedback Mechanism to Exploit Multiuser Diversity in Wireless Networks 261
3.5
JPCF scheduling algorithm
DSMUDiv scheduling algorithm
3
Average guard time [milliseconds]
2.5
1.5
0.5
10 15 20 25 30 35 40 45 50
Number of users (K)
Fig. 7. Average guard time of: (i) the JPCF scheduling algorithm, and (ii) the DSMUDiv scheduling
algorithm. Setting γ = 15dB.
16
JPCF scheduling algorithm
DSMUDiv scheduling algorithm
14
12
Average guard time [milliseconds]
10
0
10 15 20 25 30 35 40 45 50
Number of users (K)
Fig. 8. Average guard time of: (i) the JPCF scheduling algorithm, and (ii) the DSMUDiv scheduling
algorithm. Setting γ = 5dB.
262 Radio Communications
0.95
System throughput as percentage of the ASE
0.9
0.85
0.8
Td = 5 msec
Td = 50 msec
0.75
10 15 20 25 30 35 40 45 50
Number of users (K)
Fig. 9. System throughput as percentage of the average spectral efficiency of the JPCF scheduling algo-
rithm. Setting γ = 15dB, and 1 symbol is transmitted.
A Hybrid Feedback Mechanism to Exploit Multiuser Diversity in Wireless Networks 263
7. References
[1] P. Viswanath, D. N. C. Tse, and R. Laroia, “Opportunistic beamforming using dumb
antenna,” IEEE Transactions on Information Theory, vol. 48, no. 6, pp. 1277–1294, June
2002.
[2] R. Knopp and P. Humblet, “Information capacity and power control in single-cell mul-
tiuser communications,” in Proc. IEEE International Communication Conference (ICC’95),
Paris, France, June 1995, pp. 331–335.
[3] D. N. C. Tse, “Optimal power allocation over parallel Gaussian broadcast channels,” in
Proc. IEEE International Symposium Information Theory (ISIT’97), Ulm, Germany, June 1997,
p. 27.
[4] P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushyana, and S. Viterbi,
“CDMA/HDR: A bandwidth efficient high speed wireless data service for nomadic
users,” IEEE Communication Magazine, vol. 38, no. 7, pp. 70–77, July 2000.
[5] F. Floren, O. Edfors, and B. A Molin, “The effect of feedback quantization on the through-
put of a multiuser diversity scheme,” in Proc. IEEE Global Telecommunication Conference
(GLOBECOM’03), San Francisco, California, December 2003, pp. 497–501.
[6] Y. S. Al-Harthi, A. Tewfik, and M. S. Alouini, “Multiuser diversity with quantized feed-
back,” IEEE Transactions on Wireless Communication, vol. 6, no. 1, pp. 330–337, January
2007.
[7] Y. Al-Harthi, A. Tewfik, and M. S. Alouini, “Multiuser diversity-enhanced equal access
with quantized feedback in multicarrier OFDM systems,” in Proc. IEEE Vehicular Technol-
ogy Conference (VTC-Fall’05), Dallas, TX, September 2005, pp. 568–572.
[8] M. A. Regaeig, N. Hamdi, and M. S. Alouini, “Switched-based reduced feedback OFDM
multi-user opportunistic scheduling,” in Proc. IEEE International Symposium on Personal
and Indoor and Mobile Radio Communication (PIMRC ’05), Berlin, Germany, September
2005, pp. 2495–2499.
[9] D. Gesbert and M. S. Alouini, “How much feedback is multi-user diversity really
worth?,” in Proc. IEEE International Communication Conference (ICC’04), Paris, France,
June 2004, pp. 234–238.
[10] V. Hassel, M. S. Alouini, G. E. Øien, and D. Gesbert, “Rate-optimal multiuser scheduling
with reduced feedback load and analysis of delay effects,” EURASIP Journal on Wireless
Communications and Networking, vol. 2006, no. 36424, pp. 7, 2006.
[11] V. Hassel, M.-S Alouini, D. Gesbert, and G. E. Øien, “Exploiting multiuser diversity
using multiple feedback thresholds,” in Proc. IEEE Vehicular Technology Conference (VTC-
Spring’05), Stockholm, Sweden, 30 May-1 June 2005, pp. 1302–1306.
[12] B. Holter, M. S. Alouini, G. E. Øien, and H-C. Yang, “Multiuser switched diversity trans-
mission,” in Proc. IEEE Vehicular Technology Conference (VTC-Fall’04), Los Angeles, CA,
September 2004, pp. 2038–2043.
[13] Y. Xue and T. Kaiser, “Exploiting multiuser diversity with imperfect one-bit channel state
feedback,” IEEE Transactions on Vehicular Technology, vol. 56, no. 1, pp. 183–193, January
2007.
[14] S. Sanayei and A. Nosratinia, “Exploiting multiuser diversity with only 1-bit feedback,”
in Proc. IEEE Wireless Communications and Networking Conference (WCNC’05), New Or-
leans, LA, March 2005, pp. 978–983.
[15] P. Svedman, S. K. Wilson, Jr. L. J. Cimini, and B. Ottersten, “A simplified opportunistic
feedback and scheduling scheme for OFDM,” in Proc. IEEE Vehicular Technology Confer-
ence (VTC-Spring’04), Milan, Italy, May 2004, pp. 1878–1882.
264 Radio Communications
[16] Z. H. Han and Y. H. Lee, “Opportunistic scheduling with partial channel information in
OFDMA/FDD systems,” in Proc. IEEE Vehicular Technology Conference (VTC-Fall’04), Los
Angeles, CA, September 2004, pp. 511–514.
[17] K. Bai and Junshan Zhang, “Opportunistic multichannel Aloha: distributed multiaccess
control scheme for OFDMA wireless networks,” IEEE Transactions on Vehicular Technol-
ogy, vol. 55, no. 3, pp. 848–855, May 2006.
[18] T. Tang and R. W. Heath, “Opportunistic feedback for downlink multiuser diversity,”
IEEE Communications Letters, vol. 9, no. 10, pp. 948–950, October 2005.
[19] X. Qin and R. Berry, “Opportunistic splitting algorithms for wireless networks.,” in Proc.
IEEE Conference on Computer Communications (INFOCOM’04), Hong Kong, China, March
2004, pp. 1662–1672.
[20] H. Koubaa, V. Hassel, and G. E. Øien, “Contention-less feedback for multiuser diver-
sity scheduling,” in Proc. IEEE Vehicular Technology Conference (VTC-Fall’05), Dallas, TX,
September 2005, vol. 3, pp. 1574–1578.
[21] S. Patil and G. de Veciana, “Reducing feedback for opportunistic scheduling in wireless
systems,” IEEE Transactions on Wireless Communications, vol. 6, no. 12, pp. 4227–4232,
December 2007.
[22] M. S. Alouini and A. J. Goldsmith, “Adaptive modulation over Nakagami fading chan-
nels,” Kluwer Journal on Wireless Communications, vol. 13, pp. 119–143, May 2000.
[23] D. Bertsekas and R. Gallager, Data Networks, Prentice Hall, 1992.
[24] IEEE Standards Department, “IEEE Std 802.11. part 11: Wireless LAN medium access
control (MAC) and physical layer (PHY) specifications,” Technical Report, IEEE, NJ,
September 1999.
276 Radio Communications
Fig. 11. Analysis of the respect of QoS constraints for different targeted QoS (Mobile
dissatisfaction if PDORtarget = 5 % on the left, if PDORtarget = 10 % on the right).
Highly unfair, MaxSNR fully satisfies the required QoS of close mobiles at the expense of
the satisfaction of far mobiles. Indeed, only 54.5 percents of these latter experience a final
PDOR inferior to a PDOR target of 5 % (cf. Fig. 9a). Unnecessary priorities are given to close
mobiles who easily respect their QoS constraints while more attention should be given to the
farther. This inadequate priority management dramatically increases the global mobile
dissatisfaction, which reaches 23 % as shown on Fig. 9a and Fig. 10 (on the left).
PF brings more fairness and allocates more priority to far mobiles. Compared to MaxSNR,
PF offers a QoS support improvement with only 12.8 % of dissatisfied mobiles (cf. Fig. 9b
and Fig. 10 (on the right)). Fairness is still not total since the farther mobiles have a lower
spectral efficiency than the closer ones due to pathloss. All mobiles do not all benefit of an
equal average throughput despite they all obtain an equal share of bandwidth. This induces
heterogeneous delays and unequal QoS. This fairness improvement compared to MaxSNR
indicates however that some flows can be slightly delayed to the benefit of others without
significantly affecting their QoS.
WFO was built on this idea. The easy satisfaction of close mobiles (with better spectral
efficiency) offers a degree of freedom which ideally should be exploited in order to help the
farther ones. WFO allocates to each mobile the accurate share of bandwidth required for the
satisfaction of its QoS constraints, whatever its position. With WFO, only 0.8 percents of the
mobiles are dissatisfied (cf. Fig. 9c and Fig. 10 (on the left)). Additionally, compared to Fig.
9a and Fig. 9b, Fig. 9c exhibits superimposed curves, which prove the WFO high fairness,
included at short term.
Fig. 10 shows that WFO brings the largest level of satisfaction. Indeed, for a tight PDOR
target of 5 % (see on the left), the dissatisfaction ratio with a high traffic load of 1120 Kbps is
equal to 18 % with WFO versus 29.7 % with PF, the best of the other scheduling schemes. If
we set the PDOR target to 10 %, the dissatisfaction ratio with a high traffic load of 1120 Kbps
is 0 % with WFO versus 13.8 % with the best of the other scheduling schemes (PF).
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 277
We finally studied the system capacity offered by the four scheduling algorithms. Fig. 11a
shows the average number of bits carried on a used subcarrier by each tested scheduler
under various traffic loads. As expected, the non opportunistic Round Robin scheduling
provides a constant spectral efficiency, i.e. an equal bit rate per subcarrier whatever the
traffic load since it does not take advantage of the multiuser diversity. The three other tested
schedulers show better results. In contrast with RR, with the opportunistic schedulers
(MaxSNR, PF, WFO), we observe an interesting inflection of the spectral efficiency curve
when the traffic load increases. The join analysis of Fig. 11a and Fig. 11b shows that the
spectral efficiency of opportunistic scheduling is an increasing function of the number of
active mobiles, thanks to the exploitation of this supplementary multiuser diversity.
Consequently MaxSNR, PF and WFO increase their spectral efficiency with the traffic load
and the system capacity is highly extended compared to networks which use classical
scheduling algorithms. With these three schedulers, all mobiles are served even at the
highest traffic load of 1280 Kbps.
The performance of the four schedulers can be further qualified by computing the
theoretical maximal system throughput. Considering the Rayleigh distribution, it can be
noticed that ´ 2 k,n is greater or equal to 8 with a probability of only 0.002. In these ideal
situations, close mobiles can transmit/receive 6 bits per RU while far mobiles may
transmit/receive 4 bits per RU. If the scheduler always allocated the RUs to the mobiles in
these ideal situations, an overall efficiency of 5 bits per RU would be obtained which yields
a theoretical maximal system throughput of 1600 Kbps. Comparing this value to the highest
traffic load in Fig. 11a (1280 Kbps) further demonstrates the good efficiency obtained with
the opportunistic schedulers that nearly always serve the mobiles when their channel
conditions are very good. This result also shows that the WFO scheduling has slightly better
performances than the two other opportunistic schedulers. Keeping more mobiles active (cf.
Fig.11b) but with a relatively lower traffic backlog (cf. Fig.8a), the WFO scheme preserves
multiuser diversity and takes more advantage of it obtaining a slightly higher bit rate per
subcarrier (cf. Fig. 11a).
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 267
c d ac RU a d c d d .I
c b a , ac b d c a c bac a d
a c a Q S a a d a . T c
b a a db b ab c c .T a c
a c a d c c a b b a d acc
a d c b d (Va d B a ., 1999). T , ac a a a
a b d c a . Add a a b a a b d
a .
)UHTXHQF\
&KDQQHOVWDWHXSGDWHV7KURXJKSXW
5HVRXUFH8QLW
UHIUHVKLQJ
7LPHVORW
6XEFDUULHU
0RELOH$
%DQGZLGWK 0RELOH%
5EJGFWNKPI6GEJPKSWGUKP1(&/9KTGNGUU0GVYQTMU
T MAC c cd ca a a a a d
a d d d ca a a c . T c a acc
d R d R b (RR) a d Ra d Acc (RA) a ada d
a d d .M c ac
a b d c c d OFDM ba d a d
ca c c d c ab a ca c ac
b ( ) a ab c a c d a a . T c d
a b a d c d d a
. A c d d
a c .T a c d c a d: Ma S a - -N
Ra (Ma SNR), P a Fa (PF) a d c , W d Fa O c
(WFO).
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 279
across time but with relatively low traffic backlogs, WFO is designed for best profiting of the
multi-user diversity taking advantage of the dynamics of the multiplexed traffics.
Preserving the multiuser diversity, WFO takes a maximal benefit of the opportunistic
scheduling technique and maximizes the system capacity. Additionally, this also achieves a
time uniform fair allocation of the resource units to the flows ensuring short term fairness.
This higher layers/MAC/PHY cross-layer approach better conceals the system capacity
maximization, fairness objectives and the full support of multimedia services with adequate
QoS.
6. References
Hoymann, C. (2005). Analysis and performance evaluation of the OFDM-based
metropolitan area network IEEE 802.16. Computer Networks, ol. 49,
V No. 3, pp. 341-
363, ISSN: 1389-1286
Andrews, M.; Kumaran, K.; Ramanan, K. Stolvar, A. & whiting P. (2001). Providing quality
of service over a shared wireless link. IEEECommunicationsMagazine , Vol. 39, No.2,
pp. 150-154, ISSN: 0163-6804
Van de Beek, J.-J. ; Borjesson, P.O. ; Boucheret, M.-J ; Landstrom, D. ; Arenas, J.-M. Odling,
P.; Ostberg, C.; Wahlgvist, M. & Wilson, S.K. (1999). A time and frequency
synchronization scheme for multiuser OFDM. IEEE J.Sel. Areas Commun , Vol.17,
No.11, pp 1900-1914, ISSN: 0733-8716
Li, Y.G; Seshadri, N. & Ariyavisitakul, S. (1999). Channel estimation for ofdm systems with
transmitter diversity in mobile wireless channels. IEEE J.Sel. Areas Commun , Vol.17,
No.3, pp 461-471, ISSN: 0733-8716
Truman, T.E. & Brodersen, R.W (1997). A measurement-based characterization of the time
variation of an indoor wireless channel, proceedings of Int. Universal Personal
Communications Record (ICUPC) , pp. 25-32, ISBN: 0-7803-3777-8, San Diego, CA,
USA, October 1997
Knopp, R. & Humblet, P. (1995). Choi, J. (1996). Information capacity and power control in
single-cell multiuser communications, proceedings of IEEE Conference on
Communications,(ICC) pp 331-335, ISBN: 0-7803-2486-2, Seattle, WA, USA, june 1995
Wong, C.Y.; Cheng, R.S.; Lataief, K.B. & Murch, R.D. (1999). Multiuser OFDM with
adaptative subcarrier, bit and power allocation. IEEE J.Sel. Areas Commun , Vol.17,
No.10, pp 1747-1758, ISSN: 0733-8716
Wang, X. & Xiang, Y. (2006). An OFDM-TDMA/SA MAC protocol with QoS constaints for
broadband wireless LANs. ACM/Springer Wireless Networks , Vol. 12, No. 2, pp 159-
170, ISSN: 1022-0038
Viswanath, P.; Tse, D.N.C. & Laroia, R. (2002). Opportunistic beamforming using dumb
antennas. IEEE Transactions on Information , Vol. 48, No.6, pp. 1277–1294,
Theory
ISSN: 0018-9448
Kim, H.; Kim, K.; Han, Y. & Lee, J. (2002). An efficient scheduling algorithm for QoS in
wireless packet data transmission, proceedings of IEEE Int. Symposium on Personal,
Indoor and Mobile Radio Communications , ppPIMRC)
( 2244-2248, ISBN: 0-7803-7589-0,
Lisboa, Portugal, September 2002
280 Radio Communications
Anchun, W.; Liang, X.; Xjiin, S.X. & Yan, Y. (2003). Dynamic resource management in the
fourth generation wireless systems, proceedings of IEEE Int. Conference on
Communication Technology (ICCT) pp , 1095-1098, ISBN: 7-5635-0686-1, Beijing,
China, April 2003
Svedman, P.; Wilson, K. & Ottersen, B. (2004). A QoS-aware proportional fair scheduler for
opportunistic OFDM, proceedings of IEEE Int. Vehicular Technology Conference , VTC)
(
pp 558-562, ISBN: 0-7803-8521-7, Los angeles, CA, USA, September 2004
Kim, H.; Kim, K.; Han, Y. & Yun, S. (2004). A proportional fair scheduling for multicarrier
transmission systems, proceedings of IEEEInt.Vehicu larTechnologyConference , (VTC)
pp. 409-413, ISBN: 0-7803-8521-7, Los angeles, CA, USA, September 2004
Choi, J.-G. & Bahk, S. (2007). Cell-throughput analysis of the proportional fair scheduler in
the single-cell environment. IEEETransactionsonVehicularTechnology , vol. 56, No.2,
pp. 766-778, ISSN: 0018-9545
Gueguen, C. & Baey, S. (2008). Compensated proportional fair scheduling in multiuser
OFDM wireless networks, proceedings of IEEE Wireless and Mobile Computing,
Networking and Communications (WIMOB), pp119-125, ISBN: 978-0-7695-3393-3,
Avignon, France, October 2008
Holtzman, J. (2001). Asymptotic analysis of proportional fair algorithm, proceedings of IEEE
Int.SymposiumonPersonal,Indoor dMobile
an RadioCommunicationsPIMRC) ( , pp. 33-
37, ISBN: 0-7803-7244-1, San Diego, CA, USA, October 2001
Gueguen, C. & Baey, S. (2008). Weighted fair opportunistic scheduling for multimedia QoS
support in multiuser OFDM wireless networks, proceedings of IEEE Int. Symposium
on Personal, Indoor and Mobile Radio Communications , pp. 1-6,
( ISBN: 978-1-
PIMRC)
4244-2643-0, Cannes, France, September 2008
Gueguen, C. & Baey, S. (2008). An efficient and fair scheduling scheme for multiuser OFDM
wireless networks, proceedings of IEEE Int.Wireless Communications and Networki
Conference WCNC) ( , pp. 1610-1615, ISBN: 978-1-4244-1997-5, Las Vegas, NV, USA,
April 2008
Gueguen, C. & Baey, S. (2008). Scheduling in OFDM wireless networks without tradeoff
between fairness and throughput, proceedings of IEEE Int. Vehicular Technology
Conference VTC) ( , pp. 1-5, ISBN: 978-1-4244-1721-6, Calgary, Canada, September
2008
Gueguen, C. & Baey, S. (2009). A Fair Opportunistic Access Scheme for Multiuser OFDM
Wireless Networks. EURASIP Journal on Wireless Communications and Networking.
Special issue on Fairness" in Radio Resource Management for Wireless Net
Volume 2009 (2009), Article ID 726495, pp. 70-83
Parsons, J.D (1992). TheMobileRadioPropagationChannel, Wiley, ISBN: 978-0-471-98857-1
Baey, S. (2004). Modeling MPEG4 video traffic based on a customization of the DBMAP,
proceedings of Int. Symposium on Performance Evaluation of Computer
Telecommunication Systems (SPECTS) pp. , 705-714, ISBN: 1-56555-284-9, San Jose,
California, USA, July 2004
Brady, P. (1969). A model for generating on-off speech patterns in two-conversation. Bell
SystemTechnicalJournal , vol. 48, No.1, pp. 2445-2472
270 Radio Communications
Evaluating if a mobile goes through a critical period should not only focus on the classical
mean delay and jitter analysis. Indeed, a meaningful constraint regarding delay is the
limitation of the occurrences of large values. Accordingly, (Gueguen & Baey (c), 2008)
defines the concept of delay outage by analogy with the concept of outage used in system
coverage planning. A mobile k is in delay outage (in critical period) when its packets
experience a delay greater than a given threshold T k defined by the mobile application
requirements. The delay experienced by each mobile is tracked all along the lifetime of its
connection. At each transmission of a packet of mobile k, the ratio of the total number of
packets whose delay exceeded the threshold divided by the total number of packets
transmitted since the beginning of the connection is computed. The result is called Packet
Delay Outage Ratio (PDOR) of mobile k and is denoted PDOR k. This measure is
representative of the emergency for the mobile k to be served. Fig. 3 illustrates an example
cumulative distribution of the packet delay of a mobile at a given time instant. A mobile can
be considered as satisfied when, at the end of its connection, its delay constraint is met, i.e.
its experienced PDOR is less than the application specific PDOR target.
In WFO scheduling, the required QoS, the experienced QoS and the transmission conditions
are jointly considered in an extended cross-layer approach. The scheduling principle is to
allocate a Resource Unit n to the mobile jwhich has the greatest WFO parameter value
WFO k,n such as:
with f a strictly increasing polynomial function (Gueguen & Baey (d), 2008; Gueguen &
Baey, 2009):
f ( x) 1 x , (5)
The exponent parameter ´ allows being sensitive and reactive to PDOR fluctuations which
guarantees fairness at a short time scale. is a normalization parameter that ensures that
f(PDOR k) and m k,n are in the same order of magnitude.
With this scheduling, physical layer information (represented through the factor m k,n) are
used in order to take advantage of the time, frequency and multiuser diversity and
maximize the system capacity. Higher layer information (represented through the factor
f(PDOR k) are exploited in order to introduce dyna mic priorities between flows for ensuring
the same QoS level to all mobiles. With this original weighted system that introduces
dynamic priorities between the flows, WFO keeps a maximum number of flows active
across time but with relatively low traffic backlogs. This results in a well-balanced resource
allocation. Preserving the multiuser diversity allows to continuously take a maximal benefit
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 271
of opportunistic scheduling and thus maximize the bandwidth usage efficiency. When the
frequency diversity is sufficient, WFO better conceals the system capacity maximization,
QoS support and fairness objectives than PF and MaxSNR schemes.
4. Performance Evaluation
In this section we compare the most acknowledged schedulers, the Round Robin (RR), the
MaxSNR and the PF schemes with the most promising, the Weighted Fair Opportunistic
(WFO) scheduling. Each is implemented with subcarrier by subcarrier allocation.
Performance evaluation results are obtained using OPNET discrete event simulations. We
focus on the main scheduling problem: maximize the system capacity while ensuring high
fairness between mobiles localised at heterogeneous spatial positions in the cell.
In the simulations we assume 128 subcarriers and 5 time slots in a frame. The channel gain
model on each subcarrier considers free space path loss and multipath Rayleigh fading
(Parsons, 1992). We introduce a reference distance dreffor which the free space attenuation
equals aref. As a result the channel gain is given by:
3.5
d
ak ,n aref ref k2,n , (6)
dk
where dk is the distance to the access point of the mobile kand ´ 2 k,n represents the flat fading
experienced by this mobile kif it transmits or receives on subcarrier n. In the following, ´ 2 k,n
is Rayleigh distributed with an expectancy equal to unity.
P T
10log10 max s aref 31 dB , (7)
N 0
where T sis the time duration of an OFDM symbol, P max is the maximum achievable transmit
power and N 0 is the single-sided power spectral density of noise. The BER target is taken
equal to 10-3. With this setting, the value of m k,n for the mobiles situated at the reference
distance is 6 bits when ´ 2 k,n equals unity.
We assume all mobiles run the same videoconference application. This demanding type of
application generates a high volume of data with high sporadicity and requires tight delay
constraints, which substantially complicate the task of the scheduler. Each mobile has only
one service flow with traffic composed of an MPEG-4 video stream (Baey, 2004) and an
AMR voice stream (Brady, 1969).
In these extended simulations, we analyzed the behaviour of the schedulers when mobiles
occupy different geographical positions. The objective is to clearly exhibit the ability of the
272 Radio Communications
opportunistic schedulers to provide fairness whatever the respective position of the mobiles.
We first study a general context that includes mobility. We constitute two groups of 7
mobiles that both move straight across the cell, following the pattern described in Fig. 4 and
Fig. 5. Each mobile has a speed of 3 km/h and the cell radius is taken equal to 5 km (3 dref).
When a group of mobiles comes closer to the access point, the other group simultaneously
goes farther away. Additionally, the threshold time T k is fixed to the value 80 ms in order to
consider real time constraints and the PDOR target is 5 %.
Considering the path loss, the Rayleigh fading and this mobility model, we have computed
in Fig. 5 the evolution of the mean number of bits that may be transmitted per Resource Unit
for each group of mobiles, averaging over all the Resource Units of a frame. This shows the
impact of the mobile position on the mean m k,n values.
Regarding fairness, in wireless networks, it is well known that the closest mobiles to the
access point generally obtain better QoS than mobiles more distant thanks to their higher
spectral efficiency. Fig. 6 reports the mean PDOR experienced by each group of mobiles
across the time. MaxSNR is highly unfair. Indeed, as soon as the mobiles move away from
the access point, they experience high delays with a high number of packets in delay outage.
PF offers better results. It brings more fairness and globally attenuates the delay peaks of the
critical periods. However, we observe that WFO is the one that best smoothes these peaks. It
adequately and continuously allocates the adequate priorities between the mobiles reacting
to their relative movement across the cell. Providing a totally fair allocation of the
bandwidth resources, the WFO scheduling smoothes the delay experienced by each mobile
across time. Consequently, it further enhances the PF performances and the PDOR values
are further decreased. WFO results in a very fair resource allocation that fully satisfies the
delay constraints whatever the movement of the mobile.
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 273
Fig. 5. Position of the mobiles across time (for mobiles of group 1 on the left and for mobiles
of group 2 on the right).
Fig. 6. Mean number of bit(s) per Resource Unit for each group of mobiles (for mobiles of
group 1 on the left and for mobiles of group 2 on the right).
Fig. 7. PDOR fluctuation experienced by each group of mobiles (for mobiles of group 1 on
the left and for mobiles of group 2 on the right).
First we focus on the fairness provided by each scheduler. Fig. 7a, 7b, 7c and 7d display the
overall PDOR for different traffic loads considering the influence of the distance on the
scheduling.
The classical RR fails to ensure the same PDOR to all mobiles. Actually, the RR fairly
allocates the RUs to the mobiles without taking in consideration that far mobiles have a
much lower spectral efficiency than closer ones. Moreover, the RR does not take benefit of
multiuser diversity which results in a bad utilization of the bandwidth and in turn, poor
system throughput. Consequently, an acceptable PDOR target of 5 % is exceeded even with
relatively low traffic loads. Based on opportunistic scheduling, the three other schemes
globally show better QoS performances supporting a higher traffic load. However, MaxSNR
and PF still show severe fairness deficiencies. Close mobiles easily respect their delay
requirement while far mobiles experience much higher delays and go past the 5 % PDOR
target when the traffic load increases. In contrast, WFO provides the same QoS level to all
mobiles whatever their respective position. WFO is the only one to guarantee a totally fair
allocation. This allows reaching higher traffic loads with an acceptable PDOR for all mobiles.
Additionally, looking at the overall PDOR for all mobiles at different traffic loads shows
that, besides fairness, WFO provides a better overall QoS level as well.
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 275
Fig. 9 a. Mean buffer Fig. 9 b. Mean packet delay. Fig. 9 c. Packet jitter.
occupancy for close mobiles
(solid lines) and far mobiles
(dashed lines).
Fig. 9. Buffer occupancy, delay and jitter.
Observing the mean buffer occupancy in Fig. 8a, WFO clearly limits the buffer occupancy to
a same and reasonable value whatever the position of the mobile. This allows staying under
the PDOR target for any traffic load. With its system of weights, WFO dynamically adjusts
the relative priority of the flows according to their experienced delay. With this approach,
sparingly delaying the closer mobiles, WFO builds on the breathing space offered by the
easy respect of the delay constraints of the closer mobiles (with better spectral efficiency) for
helping the farther ones. The WFO interesting performance results are corroborated in Fig.
8b and 8c where the overall values of the mean packet delay and jitter obtained using WFO
are smaller.
Fig. 10 a. CDF of end cycle Fig. 10 b. CDF of end cycle Fig. 10 c. CDF of end cycle
PDOR with MaxSNR. PDOR with PF PDOR with WFO
Fig. 10. Perceived QoS with different allocation schemes.
We then had a look at the QoS satisfaction level that each mobile perceives across the
lifetime of a connection. We divided the connection of each mobile in cycles of five minutes
and measured the PDOR at the end of each cycle. Fig. 9 shows the CDF of end cycle PDOR
values for a traffic load of 960 Kbps, using respectively the MaxSNR, the PF and the WFO
schemes (RR performances are not presented here since it is not able to support this high
traffic load.). We also estimated the mobile dissatisfaction ratio. We checked if at the end of
each cycle the delay constraint is met or not. We then computed the mobile dissatisfaction
ratio defined as the number of times that the mobiles are not satisfied (experienced PDOR ≥
PDORtarget) divided by the total number of cycles (cf. Fig. 10).
276 Radio Communications
Fig. 11. Analysis of the respect of QoS constraints for different targeted QoS (Mobile
dissatisfaction if PDORtarget = 5 % on the left, if PDORtarget = 10 % on the right).
Highly unfair, MaxSNR fully satisfies the required QoS of close mobiles at the expense of
the satisfaction of far mobiles. Indeed, only 54.5 percents of these latter experience a final
PDOR inferior to a PDOR target of 5 % (cf. Fig. 9a). Unnecessary priorities are given to close
mobiles who easily respect their QoS constraints while more attention should be given to the
farther. This inadequate priority management dramatically increases the global mobile
dissatisfaction, which reaches 23 % as shown on Fig. 9a and Fig. 10 (on the left).
PF brings more fairness and allocates more priority to far mobiles. Compared to MaxSNR,
PF offers a QoS support improvement with only 12.8 % of dissatisfied mobiles (cf. Fig. 9b
and Fig. 10 (on the right)). Fairness is still not total since the farther mobiles have a lower
spectral efficiency than the closer ones due to pathloss. All mobiles do not all benefit of an
equal average throughput despite they all obtain an equal share of bandwidth. This induces
heterogeneous delays and unequal QoS. This fairness improvement compared to MaxSNR
indicates however that some flows can be slightly delayed to the benefit of others without
significantly affecting their QoS.
WFO was built on this idea. The easy satisfaction of close mobiles (with better spectral
efficiency) offers a degree of freedom which ideally should be exploited in order to help the
farther ones. WFO allocates to each mobile the accurate share of bandwidth required for the
satisfaction of its QoS constraints, whatever its position. With WFO, only 0.8 percents of the
mobiles are dissatisfied (cf. Fig. 9c and Fig. 10 (on the left)). Additionally, compared to Fig.
9a and Fig. 9b, Fig. 9c exhibits superimposed curves, which prove the WFO high fairness,
included at short term.
Fig. 10 shows that WFO brings the largest level of satisfaction. Indeed, for a tight PDOR
target of 5 % (see on the left), the dissatisfaction ratio with a high traffic load of 1120 Kbps is
equal to 18 % with WFO versus 29.7 % with PF, the best of the other scheduling schemes. If
we set the PDOR target to 10 %, the dissatisfaction ratio with a high traffic load of 1120 Kbps
is 0 % with WFO versus 13.8 % with the best of the other scheduling schemes (PF).
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 277
We finally studied the system capacity offered by the four scheduling algorithms. Fig. 11a
shows the average number of bits carried on a used subcarrier by each tested scheduler
under various traffic loads. As expected, the non opportunistic Round Robin scheduling
provides a constant spectral efficiency, i.e. an equal bit rate per subcarrier whatever the
traffic load since it does not take advantage of the multiuser diversity. The three other tested
schedulers show better results. In contrast with RR, with the opportunistic schedulers
(MaxSNR, PF, WFO), we observe an interesting inflection of the spectral efficiency curve
when the traffic load increases. The join analysis of Fig. 11a and Fig. 11b shows that the
spectral efficiency of opportunistic scheduling is an increasing function of the number of
active mobiles, thanks to the exploitation of this supplementary multiuser diversity.
Consequently MaxSNR, PF and WFO increase their spectral efficiency with the traffic load
and the system capacity is highly extended compared to networks which use classical
scheduling algorithms. With these three schedulers, all mobiles are served even at the
highest traffic load of 1280 Kbps.
The performance of the four schedulers can be further qualified by computing the
theoretical maximal system throughput. Considering the Rayleigh distribution, it can be
noticed that ´ 2 k,n is greater or equal to 8 with a probability of only 0.002. In these ideal
situations, close mobiles can transmit/receive 6 bits per RU while far mobiles may
transmit/receive 4 bits per RU. If the scheduler always allocated the RUs to the mobiles in
these ideal situations, an overall efficiency of 5 bits per RU would be obtained which yields
a theoretical maximal system throughput of 1600 Kbps. Comparing this value to the highest
traffic load in Fig. 11a (1280 Kbps) further demonstrates the good efficiency obtained with
the opportunistic schedulers that nearly always serve the mobiles when their channel
conditions are very good. This result also shows that the WFO scheduling has slightly better
performances than the two other opportunistic schedulers. Keeping more mobiles active (cf.
Fig.11b) but with a relatively lower traffic backlog (cf. Fig.8a), the WFO scheme preserves
multiuser diversity and takes more advantage of it obtaining a slightly higher bit rate per
subcarrier (cf. Fig. 11a).
278 Radio Communications
Fig. 13a. Measured QoS for close mobiles Fig. 13b. Spectral efficiency.
(solid lines) and far mobiles (dashed lines).
Fig. 13. Performances of schedulers with fixed multiuser diversity.
In the results described so far, the traffic load was varied by increasing or decreasing the
number of mobiles in the system, which modified the multiuser diversity. This exhibited the
opportunistic behaviour of the schedulers and especially their ability to take advantage of
the multiuser diversity brought with the increase of the number of mobiles. We also studied
the ability of each scheduler to take profit of the multiuser diversity brought by a given
number of users. In Fig.12, we provide complementary results obtained in a context where
the traffic load variation is done through just increasing the mobile bit rate requirement and
keeping a constant number of users (10 mobiles). The results in Fig. 12a show that, as
previously, WFO outperforms the other scheduling schemes. With its weighted algorithm,
WFO dynamically adjusts the priorities of the mobiles and ensures a completely fair
allocation. WFO is the only one which allows reaching higher traffic loads with an
acceptable PDOR for all mobiles. Additionally, even if the traffic load increases without
variation in the number of mobiles, WFO keeps more mobiles active across the time than the
other schemes and takes better advantage of the multiuser diversity. The analysis of Fig. 12b
confirms that WFO maximizes the average bit rate per subcarrier.
5. Conclusion
Opportunistic schedulers take benefit of multiuser and frequency diversity. They preferably
allocate the resources to the active mobile(s) with the most favourable channel conditions at
a given time. This maximizes the system throughput of OFDM wireless networks. Three
major algorithms have emerged: MaxSNR, PF and more recently WFO. However, in spite of
their high performances in terms of system throughput maximization, both MaxSNR and PF
suffer of severe fairness deficiencies owing to unequal spatial positioning of the mobiles.
This issue is resolved with WFO which appears as the best current opportunistic scheduler.
WFO jointly considers the transmission conditions, the currently measured/experienced
QoS and the QoS targets of the mobiles in the bandwidth allocation process. With an
original weighted system that introduces dynamic priorities between the flows, it
dynamically favors the flows that go through a critical period and always attributes the
adequate priorities for improved QoS support. Keeping a maximum number of flows active
Opportunistic Access Schemes for Multiuser OFDM Wireless Networks 279
across time but with relatively low traffic backlogs, WFO is designed for best profiting of the
multi-user diversity taking advantage of the dynamics of the multiplexed traffics.
Preserving the multiuser diversity, WFO takes a maximal benefit of the opportunistic
scheduling technique and maximizes the system capacity. Additionally, this also achieves a
time uniform fair allocation of the resource units to the flows ensuring short term fairness.
This higher layers/MAC/PHY cross-layer approach better conceals the system capacity
maximization, fairness objectives and the full support of multimedia services with adequate
QoS.
6. References
Hoymann, C. (2005). Analysis and performance evaluation of the OFDM-based
metropolitan area network IEEE 802.16. Computer Networks, ol. 49,
V No. 3, pp. 341-
363, ISSN: 1389-1286
Andrews, M.; Kumaran, K.; Ramanan, K. Stolvar, A. & whiting P. (2001). Providing quality
of service over a shared wireless link. IEEECommunicationsMagazine , Vol. 39, No.2,
pp. 150-154, ISSN: 0163-6804
Van de Beek, J.-J. ; Borjesson, P.O. ; Boucheret, M.-J ; Landstrom, D. ; Arenas, J.-M. Odling,
P.; Ostberg, C.; Wahlgvist, M. & Wilson, S.K. (1999). A time and frequency
synchronization scheme for multiuser OFDM. IEEE J.Sel. Areas Commun , Vol.17,
No.11, pp 1900-1914, ISSN: 0733-8716
Li, Y.G; Seshadri, N. & Ariyavisitakul, S. (1999). Channel estimation for ofdm systems with
transmitter diversity in mobile wireless channels. IEEE J.Sel. Areas Commun , Vol.17,
No.3, pp 461-471, ISSN: 0733-8716
Truman, T.E. & Brodersen, R.W (1997). A measurement-based characterization of the time
variation of an indoor wireless channel, proceedings of Int. Universal Personal
Communications Record (ICUPC) , pp. 25-32, ISBN: 0-7803-3777-8, San Diego, CA,
USA, October 1997
Knopp, R. & Humblet, P. (1995). Choi, J. (1996). Information capacity and power control in
single-cell multiuser communications, proceedings of IEEE Conference on
Communications,(ICC) pp 331-335, ISBN: 0-7803-2486-2, Seattle, WA, USA, june 1995
Wong, C.Y.; Cheng, R.S.; Lataief, K.B. & Murch, R.D. (1999). Multiuser OFDM with
adaptative subcarrier, bit and power allocation. IEEE J.Sel. Areas Commun , Vol.17,
No.10, pp 1747-1758, ISSN: 0733-8716
Wang, X. & Xiang, Y. (2006). An OFDM-TDMA/SA MAC protocol with QoS constaints for
broadband wireless LANs. ACM/Springer Wireless Networks , Vol. 12, No. 2, pp 159-
170, ISSN: 1022-0038
Viswanath, P.; Tse, D.N.C. & Laroia, R. (2002). Opportunistic beamforming using dumb
antennas. IEEE Transactions on Information , Vol. 48, No.6, pp. 1277–1294,
Theory
ISSN: 0018-9448
Kim, H.; Kim, K.; Han, Y. & Lee, J. (2002). An efficient scheduling algorithm for QoS in
wireless packet data transmission, proceedings of IEEE Int. Symposium on Personal,
Indoor and Mobile Radio Communications , ppPIMRC)
( 2244-2248, ISBN: 0-7803-7589-0,
Lisboa, Portugal, September 2002
280 Radio Communications
Anchun, W.; Liang, X.; Xjiin, S.X. & Yan, Y. (2003). Dynamic resource management in the
fourth generation wireless systems, proceedings of IEEE Int. Conference on
Communication Technology (ICCT) pp , 1095-1098, ISBN: 7-5635-0686-1, Beijing,
China, April 2003
Svedman, P.; Wilson, K. & Ottersen, B. (2004). A QoS-aware proportional fair scheduler for
opportunistic OFDM, proceedings of IEEE Int. Vehicular Technology Conference , VTC)
(
pp 558-562, ISBN: 0-7803-8521-7, Los angeles, CA, USA, September 2004
Kim, H.; Kim, K.; Han, Y. & Yun, S. (2004). A proportional fair scheduling for multicarrier
transmission systems, proceedings of IEEEInt.Vehicu larTechnologyConference , (VTC)
pp. 409-413, ISBN: 0-7803-8521-7, Los angeles, CA, USA, September 2004
Choi, J.-G. & Bahk, S. (2007). Cell-throughput analysis of the proportional fair scheduler in
the single-cell environment. IEEETransactionsonVehicularTechnology , vol. 56, No.2,
pp. 766-778, ISSN: 0018-9545
Gueguen, C. & Baey, S. (2008). Compensated proportional fair scheduling in multiuser
OFDM wireless networks, proceedings of IEEE Wireless and Mobile Computing,
Networking and Communications (WIMOB), pp119-125, ISBN: 978-0-7695-3393-3,
Avignon, France, October 2008
Holtzman, J. (2001). Asymptotic analysis of proportional fair algorithm, proceedings of IEEE
Int.SymposiumonPersonal,Indoor dMobile
an RadioCommunicationsPIMRC) ( , pp. 33-
37, ISBN: 0-7803-7244-1, San Diego, CA, USA, October 2001
Gueguen, C. & Baey, S. (2008). Weighted fair opportunistic scheduling for multimedia QoS
support in multiuser OFDM wireless networks, proceedings of IEEE Int. Symposium
on Personal, Indoor and Mobile Radio Communications , pp. 1-6,
( ISBN: 978-1-
PIMRC)
4244-2643-0, Cannes, France, September 2008
Gueguen, C. & Baey, S. (2008). An efficient and fair scheduling scheme for multiuser OFDM
wireless networks, proceedings of IEEE Int.Wireless Communications and Networki
Conference WCNC) ( , pp. 1610-1615, ISBN: 978-1-4244-1997-5, Las Vegas, NV, USA,
April 2008
Gueguen, C. & Baey, S. (2008). Scheduling in OFDM wireless networks without tradeoff
between fairness and throughput, proceedings of IEEE Int. Vehicular Technology
Conference VTC) ( , pp. 1-5, ISBN: 978-1-4244-1721-6, Calgary, Canada, September
2008
Gueguen, C. & Baey, S. (2009). A Fair Opportunistic Access Scheme for Multiuser OFDM
Wireless Networks. EURASIP Journal on Wireless Communications and Networking.
Special issue on Fairness" in Radio Resource Management for Wireless Net
Volume 2009 (2009), Article ID 726495, pp. 70-83
Parsons, J.D (1992). TheMobileRadioPropagationChannel, Wiley, ISBN: 978-0-471-98857-1
Baey, S. (2004). Modeling MPEG4 video traffic based on a customization of the DBMAP,
proceedings of Int. Symposium on Performance Evaluation of Computer
Telecommunication Systems (SPECTS) pp. , 705-714, ISBN: 1-56555-284-9, San Jose,
California, USA, July 2004
Brady, P. (1969). A model for generating on-off speech patterns in two-conversation. Bell
SystemTechnicalJournal , vol. 48, No.1, pp. 2445-2472
Bidirectional Cooperative Relaying 281
1
Bidirectional Cooperative Relaying
Prabhat Kumar Upadhyay and Shankar Prakriya
Indian Institute of Technology Delhi
India
1. Introduction
Modern radio communication systems aim to enhance throughput and reliability in wireless
networks with limited resources. Wireless mobile communication over a radio channel is lim-
ited by multipath, fading, path loss, shadowing, and interference. Spatial diversity techniques
are widely adopted to combat fading and other channel impairments. Cooperative commu-
nications have been recently developed to harness spatial diversity even with single-antenna
terminals. The distributed terminals cooperate by relaying each other’s message in order to
realize a virtual antenna array and achieve cooperative diversity. Cooperative relaying has
become a promising technique for enhancing coverage, reliability and throughput of wireless
networks with stringent spectrum and power constraints. They have found applications in
wireless cellular, ad hoc/sensor networks, WiFi/WiMAX, etc.
Dual-hop three-terminal channels wherein a relay terminal assists in the communication be-
tween source and destination terminals through some cooperation protocol are of particular
interest. Relaying can be performed in either full-duplex or half-duplex mode. Full-duplex
relaying allows the radios to receive and transmit simultaneously using the same frequency
channel and hence achieves higher spectral efficiency. However, the large difference in power
levels of the transmit and receive signals (typically 100-150 dB) makes its implementation
practically difficult. In half-duplex mode, the reception and transmission at the radios are
performed in time/frequency/code division orthogonal channels. Half-duplex systems are
therefore practically feasible. The major drawback of half-duplex relaying is a substantial loss
in spectral efficiency. This is because half of the channel resources are allocated to the relay for
cooperation, which reduces the overall data rate.
While much research has focused on exploiting cooperative diversity, little effort has been di-
rected towards improving spectral efficiency under half-duplex constraints. The authors in
(Rankov & Wittneben, 2007) propose a new two-phase two-way relaying protocol where a
bidirectional connection between two terminals is established with one half-duplex relay. Un-
der this scheme, two connections are realized in the same physical channel, thereby improving
the spectral efficiency. Referred to as the Two-Way Relay Channel (TWRC) in literature, this
pragmatic approach has become a focus of extensive recent research. An example of a TWRC
is the downlink and uplink in wireless mobile networks whereby both the base station and the
mobile station need to communicate via an assisting relay station due to the lack of a reliable
direct link. This is advantageous in the case when the mobile is highly shadowed or near the
cell edge. It is important to note that even when a direct link of sufficient quality is available,
it cannot be utilized in two-phase TWRC because otherwise both terminals need to transmit
and receive simultaneously in the same phase.
282 Radio Communications
2. Cooperative Communications
Cooperative communication systems seek to enhance the link capacity and transmission reli-
ability through cooperation between distributed radios. They exploit the broadcasting nature
of the wireless medium and allow single-antenna terminals to cooperate through relaying.
The conventional form of cooperation is multi-hopping, where a source communicates with a
destination via a series of dedicated relays. It is mainly used to combat signal attenuation in
long-range communication and it does not provide any diversity advantages. The key issue in
cooperative communications is resource sharing among network nodes. A three-terminal net-
work acts as a fundamental unit in cooperative communication and has been widely studied
in the literature.
The three-terminal relay channel model, introduced in (Meulen, 1971), comprises a source T1 ,
a destination T2 , and a dedicated relay R (as shown in Figure 1). The relay aids in commu-
nicating information from source to destination without actually being an information source
or sink. It was assumed that all nodes operate in the full-duplex mode, so the system can be
viewed as a Broadcast Channel (BC) at the source, and a Multiple Access Channel (MAC) at
the destination. The upper and lower bounds on the capacity of the non-faded relay chan-
Bidirectional Cooperative Relaying 283
recent developments are motivated by the user cooperation (Sendonaris et al., 2003) and co-
operative diversity (Laneman et al., 2004) in a fading channel. The authors in (Sendonaris et
al., 2003) introduced user cooperation by allowing the relay to transmit its own independent
information. Cooperative diversity introduced in (Laneman et al., 2004) is realized by relaying
and user cooperation. They proposed different cooperative diversity protocols and analyzed
their performance in terms of outage probability. The terms Amplify-&-Forward (AF) and
Decode-&-Forward (DF) were introduced in their work.
The source and relay nodes can share their resources on the basis of some cooperation strate-
gies to achieve the highest throughput possible for any given coding scheme. Based on dif-
ferent signal processing schemes employed at the relays, the cooperative relaying methods
are classified into fixed relaying and adaptive relaying (Laneman et al., 2004). For fixed re-
laying, the relay can amplify its received signal subject to its power constraint, or decode,
re-encode, and then retransmit the messages, referred to (respectively) as Amlify-&-Forward
(AF) or Decode-&-Forward (DF). This scheme has the advantage of easy implementation, but
the disadvantage of low spectral efficiency. This is because half of the channel resources are
allocated to the relay for transmission. Adaptive relaying schemes build upon fixed relaying
and adapt based upon Channel State Information (CSI) between cooperating terminals (selec-
tive relaying) or upon limited feedback from the destination (incremental relaying). Selective
relaying allows transmitting terminals to select a suitable cooperative or non-cooperative ac-
tion based on the measured SNR between them. If the received SNR at the relay exceeds a
certain threshold, the relay performs DF operation on the message. Otherwise, if the channel
between T1 and R has severe fading such that SNR falls below the threshold, the relay idles.
Incremental relaying improves upon the spectral efficiency of both fixed and selective relaying
by exploiting limited feedback from the destination and relaying only when direct link from
source to destination has an SNR below a threshold.
yr [ k ] = h1 [ k ] x1 [ k ] + n1 [ k ] (1)
y2 [ k ] = h3 [ k ] x1 [ k ] + n3 [ k ] (2)
where x1 [k] is the transmitted signal from T1 , yr [k] and y2 [k] are the received signals at the
relay and T2 respectively, hi captures the effects of path-loss, shadowing and frequency nonse-
lective fading, ni ∼ CN (0, σ2 ) is the Additive White Gaussian Noise (AWGN) which captures
the effects of receiver noise and other forms of interference in the system, where i ∈ {1, 2, 3}.
Throughout the chapter, we use hi [k] and hi interchangeably for brevity. The relay processes
yr [k] and relays the information by transmitting xr [k]. The signal received at T2 in time slot
k+1
y2 [ k + 1] = h2 [ k + 1] xr [ k ] + n2 [ k + 1]. (3)
As a function of the fading coefficients hi (modeled as zero-mean, independent, circularly
symmetric complex Gaussian random variables with variances σhi 2 ), the mutual information
Bidirectional Cooperative Relaying 285
for a protocol is a random variable I. For a target rate R, I < R denotes the outage event
and Pr[I < R] denotes the outage probability (Laneman et al., 2004). The maximum average
mutual information between input and output in direct transmission, achieved by indepen-
dent identically distributed (i.i.d.) zero-mean, circularly symmetric complex Gaussian inputs,
is given by
ID = log 1 + γ| h3 |2 (4)
where γ = P1 /σ2 is defined as SNR without fading and P1 is the average transmit power of
terminal T1 . For Rayleigh fading, | h3 |2 is exponentially distributed with parameter 1/σh3
2 , the
The direct transmission does not achieve any diversity gain as is obvious from γ−1 depen-
dence of outage probability in Equation (5).
2.3 AF Relaying
In this protocol, the relay amplifies the received signal in the first time slot according to its
available average transmit power and forwards a scaled signal in the second time slot to the
destination terminal. To remain within its power constraint, an amplifying relay must use
gain
Pr
g[k] ≤ (6)
P1 | h1 |2 + σ2
which is inversely proportional to the received power. Thus the relay transmits the signal
xr [k + 1] = g[k]yr [k] with the power Pr in the second time slot. This scheme can be viewed
as repetitive coding from two distributed transmitters T1 and R, except that the relay R am-
plifies the noise in its received signal. The destination T2 can decode its received signal y2 by
suitably combining the signals from the two time slots. This protocol produces an equivalent
one-input two-output complex Gaussian noise channel with different noise levels in the out-
puts. The SNR received at the destination is the sum of the SNRs from T1 and R links. The
maximum average mutual information between the input and the two outputs, achieved by
i.i.d. complex Gaussian inputs, is given by
1 2 γ| h2 gh1 |2
I AF = log 1 + γ| h3 | + . (7)
2 (1 + | h2 g |2 )
Note that g is a function of h1 . Notations g[k] and g are used interchangeably throughout for
brevity. The outage probability can be approximated at high SNR (Laneman et al., 2004) as
2
2 + σ2
σh1 h2 22 R − 1
Pr[ I AF < R] ∼
2 σ2 σ2
. (8)
2σh3 h1 h2
γ
The pre-log factor 1/2 in Equation (7) is due to half-duplex relaying which needs two channel
uses to transmit the information from source to destination. The outage behavior decays as
γ−2 , which indicates that fixed AF protocol offers diversity gain of 2.
286 Radio Communications
2.4 DF Relaying
In this scheme the relay processes its received signal yr [k] in the first time slot to obtain an
estimate x̂1 [k] of the source transmitted signal. Under a repetition-coded scheme, the relay
transmits the signal xr [k + 1] = x̂1 [k] in the second time slot. Although fixed DF relaying has
the advantage over AF relaying in reducing the effects of additive noise at the relay, it entails
the possibility of forwarding erroneously detected symbols to the destination. Therefore it is
required that both the relay and destination decode the entire codeword without error. This
leads to the expression of maximum average mutual information IDF between T1 and T2 as the
minimum of the two maximum rates, one at which the relay R can reliably decode the source
message, and the other at which the destination T2 can reliably decode the source message
given repeated transmissions from the source and relay. This implies that
1
IDF = min log 1 + γ| h1 |2 , log 1 + γ| h3 |2 + γ| h2 |2 . (9)
2
Here it is obvious that the performance of this system is limited by the worst link among the
T1 -T2 and T1 -R. The outage probability can be obtained for high SNR (Laneman et al., 2004)
as
1 22R − 1
Pr[ IDF < R] ∼ 2
. (10)
σh1 γ
The γ−1 behavior in Equation (10) indicates that fixed DF protocol does not provide diversity
gain for large SNR.
Fig. 3. Outage probabilities versus SNR in the low spectral efficiency regime.
Bidirectional Cooperative Relaying 287
over direct transmission. In Figure 4, the outage probabilities are depicted as functions of
spectral efficiency R for a fixed SNR of 35 dB. It is clear from Figure 4 that the performance
of fixed AF and DF protocols generally degrade with increasing rate R. It degrades faster
for AF scheme because of the inherent loss in spectral efficiency. Again, fixed DF protocol
does not have any diversity advantage over direct transmission. At sufficiently high rate R,
direct transmission becomes more efficient than cooperative relay communication. So we can
conclude that half-duplex operation requires double channel resources compared to direct
transmission for a given rate and hence leads to larger effective SNR losses for increasing rate.
However the performance enhancements in low spectral efficiency regime can be translated
into decreased transmit power for the same reliability.
3. Bidirectional Relaying
Although unidirectional or one-way communication has been extensively considered in the
literature, there is a lot of interest in recent years on bidirectional or two-way communication.
In two-way communication, two terminals simultaneously transmit their messages to each
other and the messages interfere with each other. The Two-Way Communication Channel
(TWC) was first studied by Shannon, who derived inner and outer bounds on the capacity
region (Shannon, 1961). He used a restricted two-way channel in which the encoders of both
terminals do not cooperate, and the transmitted symbols at one terminal only depend on the
message to be transmitted at that terminal (and not on the previously received symbols). He
showed that the inner bound coincides with the capacity region of the restricted two-way
channel. Later, the two-way communication problem was investigated for the full-duplex
relay channel, and the achievable rate regions were derived in (Rankov & Wittneben, 2006),
(Avestimehr et al., 2008), (Nam et al., 2008) and references therein. Further TWC has been
exploited in (Rankov & Wittneben, 2007), as TWRC, in order to mitigate the spectral efficiency
loss of cooperative protocols under half-duplex relaying. Recall that cooperative protocols
can provide higher outage capacity but not ergodic capacity because of use of orthogonal
time slots for relaying. Our goal here is to analyze spectrally efficient (measured in bits per
channel use) transmission schemes for the half-duplex bidirectional relay channel. Presently
the TWRC protocol has drawn much interest from both academic and industrial communities
owing to its potential application in wireless networks.
288 Radio Communications
where h1 is the complex channel gain between source and relay (first hop), x1 ∼ CN (0, P1 ) is
the transmit symbol of the source, and nr ∼ CN (0, σr2 ) is the AWGN at the relay. The relay
scales yr [k] by
Pr
g[k] = (12)
P1 | h1 [k]|2 + σr2
where Pr is the average transmit power of the relay. Depending on the amount of channel
knowledge at the relay, different choices for the relay gain are possible. In time slot k+1, the
destination receives
y2 [ k + 1] = h2 [ k + 1] g [ k ] h1 [ k ] x1 [ k ] + h2 [ k + 1] g [ k ] nr [ k ] + n2 [ k + 1] (13)
where h2 is the complex channel gain between relay and destination (second hop) and n2 ∼
CN (0, σ22 ) is the AWGN at the destination. The information rate of this scheme for i.i.d. fading
channels h1 [k] and h2 [k] is given by (Rankov & Wittneben, 2007)
1 P1 | h2 gh1 |2
I AF = E log 1 + 2 (14)
2 σ2 + σr2 | h2 g|2
where E {·} denotes the expectation with respect to the channels h1 and h2 . The pre-log factor
1/2 follows because of the two channel uses needed to transmit the information from T1 to T2 .
3.1.2 DF-OWRC
In this scheme, the relay decodes the message sent by the source, re-encodes it (by using the
same or a different codebook), and forwards the message to the destination. In time slot k, the
relay receives
yr [ k ] = h1 [ k ] x1 [ k ] + nr [ k ]. (15)
After decoding and retransmission, the destination receives in time slot k+1
y2 [ k + 1] = h2 [ k + 1] xr [ k + 1] + n2 [ k + 1] (16)
where xr ∼ CN (0, Pr ) is the transmit symbol of the relay. The information rate of this scheme
for i.i.d. fading channels h1 [k] and h2 [k] is given by (Rankov & Wittneben, 2007)
1 P1 | h1 |2 Pr | h2 |2
IDF = min E log 1 + , E log 1 + . (17)
2 σr2 σ22
This rate is exactly the ergodic capacity of the conventional half-duplex cooperative relay
channel with no direct connection. Compared to a bidirectional communication between T1
and T2 without two-hop relaying, the number of required resources is doubled. Therefore this
protocol is spectrally inefficient and does not take full advantage of the broadcast nature of
the wireless channel.
T1 and T2 transmit their signals to the relay node at the same time. After receiving the signals,
the relay node performs appropriate signal processing and broadcasts the resulting signal
to both nodes T1 and T2 in the second (BC) phase. At each node, its symbols contribute self
interference but can clearly be canceled (because they are known). The channels in the forward
direction are assumed to be the same as in the backward direction i.e., channel reciprocity is
assumed.
Bidirectional Cooperative Relaying 291
The transmission in each direction suffers still from the pre-log factor 1/2. However, the half-
duplex constraint can here be exploited to establish a bidirectional connection between two
terminals and to increase the sum rate of the network.
3.2.2 DF-TWRC
Consider now a two-way communication between terminals T1 and T2 via a half-duplex DF
relay R. In time slot k both terminals T1 and T2 transmit their symbols to relay R. In this MAC
phase, the relay receives
yr [ k ] = h1 [ k ] x1 [ k ] + h2 [ k ] x2 [ k ] + nr [ k ], (23)
decodes the symbols x1 [k] and x2 [k] and transmits xr [k + 1] = βx1 [k ] + 1 − βx2 [k] in the
next time slot (BC phase). The received signals at T2 and T1 are
y2 [ k + 1] = h2 [ k + 1] xr [ k + 1] + n2 [ k + 1] (24)
y1 [ k + 1] = h1 [ k + 1] xr [ k + 1] + n1 [ k + 1]. (25)
The relay uses an average transmit power of βPr for the forward direction and (1 − β) Pr
for the backward direction. Since T1 knows x1 [k] and T2 knows x2 [k], these symbols (back-
propagating self-interference) can be subtracted at the respective terminals prior to decoding
of the symbol transmitted by the partner terminal. We assume that the relay decodes x1 [k]
and x2 [k] without errors. The sum-rate is given (Rankov & Wittneben, 2007) by
In the absence of CSI knowledge in the BC phase, β = 12 is used by the relay. Note that in
fast fading channels, the channel coefficients change from phase to phase, and reliable CSI
may not be available. In other case β may be optimally chosen to maximize the sum rate. The
choice of β will depend on the amount of channel knowledge available (CSI or its statistics),
and applicable path losses in the links.
is defined as the ratio P/σ2 . Over 10000 random channels were used to average the rates in
Figures 7 and 8.
4. Resource Allocation
The performance of wireless relay networks can be significantly improved by efficient man-
agement of available radio resources. Mostly, resource management via power allocation is
employed. We have discussed bidirectional relaying in the previous section, static resource
allocation was assumed where all transmission phases are of same duration and all terminals
have individual power constraints with balanced rates. Dynamic resource allocation has been
investigated in (Agustin et al., 2008) in terms of phase durations, individual and sum-average
power, and data rate. The system model employs a DF relay that applies superposition coding
and takes into account the traffic asymmetry. It is assumed that the transmission is performed
in frames of length υ with N channel uses and normalized bandwidth of unity. The duration
of the two phases (MAC and BC) are denoted by υ1 and υ2 respectively. The two power con-
straints considered are maximum power and sum-average power (both denoted by P). The
first constraint assumes that all terminals transmit with power P, whereas in second case the
total average power used by the three terminals is considered to be P. The mutual information
of different links assuming equal noise power at all terminals is given by
P | h |2
I1r ( P1 ) = N log 1 + 1 21 (27)
σ
P | h |2
I2r ( P2 ) = N log 1 + 2 22 (28)
σ
P1 | h1 |2 P2 | h2 |2
I MAC ( P1 , P2 ) = N log 1 + + (29)
σ2 σ2
where I1r and I2r represent mutual information of T1 − R and T2 − R links respectively, and
I MAC is the mutual information at the relay when both terminals transmit simultaneously in
the MAC phase. The signal received by the relay in MAC phase is given by
h1 [k] x1 [k] + h2 [k] x2 [k] + nr [k] for 0 ≤ k ≤ υ1 N
yr [ k ] = (30)
0 for υ1 N ≤ k ≤ N.
Under superposition coding, the DF relay forwards one signal xr [k] intended to each destina-
tion by distributing the total power between them as
β 1 Pr β 2 Pr
xr = x + x (31)
P1 1 P2 2
where β 1 and β 2 indicate the fraction of power allocated to each signal. The signal received
by each destination in second phase is given by
0 for 0 ≤ k ≤ υ1 N
y1 [ k ] = (32)
h1 [k] xr [k] + n1 [k] for υ1 N ≤ k ≤ N
0 for 0 ≤ k ≤ υ1 N
y2 [ k ] = (33)
h2 [k] xr [k] + n2 [k] for υ1 N ≤ k ≤ N.
The optimal selection of phase duration, data rate of each terminal are found as the maximiza-
tion of the following problem (Agustin et al., 2008):
( R1 , R2 ) ∈ ρ(υ ) for 0 ≤ (υ ) ≤ 1
arg max ϑ1 R1 + ϑ2 R2 s.t. (34)
υ,R1 ,R2 ,P1 ,P2 ,Pr ϕ( P1 , P2 , Pr ) ≤ P for ζ ( R1 , R2 ) = κ
294 Radio Communications
ϕmax ( P1 , P2 , Pr ) = { P1 = P, P2 = P, Pr = P} . (36)
The power distribution at the relay satisfies 0 ≤ β 1 + β 2 ≤ 1. Hence the power allocation
can be optimized at the relay only. For sum-average power constraint, each terminal uses a
fraction of total power P which is controlled by variables δ and β as follows
δ P δ P P
ϕ avg ( P1 , P2 , Pr ) = P1 = 1 , P2 = 2 , Pr = . (37)
υ1 υ1 υ2
It has been shown in (Agustin et al., 2008) that the sum-average power constraint must satisfy
P1 υ1 + P2 υ1 + ςPr υ2 = P (38)
where ς = β 1 + β 2 so that δ1 + δ2 + β 1 + β 2 = 1. The data rates achieved on each link are
connected through
ζ ( R1 , R2 ) = R1 − κR2 ≤ 0 (39)
where κ is a positive real number accounts for the traffic asymmetry.
Under the sum-average power constraint the optimization problem for resource allocation is
convex and has a unique solution. However for maximum power constraint, the problem has
to be transformed into a convex one by introducing some auxiliary variables [see (Agustin et
al., 2008) and references therein].
coding has been proven to be a very effective solution to overcome the interuser interference in
wireless networks because of its ability to combining the different signals instead of separating
them from a traditional viewpoint.
Traditionally simultaneous transmission from T1 and T2 was avoided in order to simplify the
medium access control, and to avoid the interference at the relay R. Thereby four phases
were required to perform one round of information exchange between T1 and T2 through R.
However, by applying the idea of network coding, the authors in (Wu et al., 2005) proposed
a scheme to reduce the number of required phases from four to three as illustrated in Fig-
ure 9. In this scheme, T1 first transmits during first phase the message x1 to R consisting of
bits b1 (1), ..., b1 ( N ) with N denoting the message length in bits, which are decoded. During
the second phase, T2 transmits to R the message x2 consisting of bits b2 (1), ..., b2 ( N ), which
R decodes. In the third phase, R broadcasts to T1 and T2 a new message xr consisting of
bits br (n)’s, n = 1, ..., N, obtained by bit-wise exclusive-or (XOR) operation over b1 (n)’s and
b2 (n)’s i.e., br (n) = b1 (n) ⊕ b2 (n), ∀ n. Since T1 knows b1 (n)’s, T1 can recover its desired mes-
sage x2 by first decoding br (n) and then obtaining b2 (n)’s of x2 as b1 (n) ⊕ br (n), ∀n. Similarly,
T2 can recover x1 . The same type of three-phase coded bidirectional relaying scheme was
proposed independently in (Larsson et al., 2006). The resulting pre-log factor with respect to
the sum-rate of this three-phase coded scheme is thus 2/3 compared to 1/2 for conventional
half-duplex scheme. In this protocol, if a reliable direct link is possible, then the scheme may
gain in additional diversity and often better coverage as discussed in (Kim et al., 2008).
In (Popovski & Yomo, 2006); (Popovski & Yomo, 2007a); (Popovski & Yomo, 2007b), the au-
thors reduce the number of required phases from three to two by allowing T1 and T2 to trans-
mit simultaneously to R during the first phase, thereby eliminating the need for the second
phase. This corresponds to the MAC phase of DF-TWRC (Rankov & Wittneben, 2007). The
scheme proposed in (Katti et al., 2007a) is named as Analog Network Coding (ANC), while
that in (Zhang et al., 2006) is referred to as Physical-layer Network Coding (PNC). These
schemes differ in their relay operations, which are Amplify-and-Forward (AF) and Estimate-
and-Forward (EF), respectively. In ANC, R simply amplifies the mixed signal received simul-
taneously from T1 and T2 and then broadcasts it to both. By subtracting the back-propagating
self-interference, both T1 and T2 are able to receive their intended messages. Thus ANC
scheme is similar to the AF-TWRC (Rankov & Wittneben, 2007). Compared to ANC, PNC
(Zhang et al., 2006) performs more sophisticated operations than AF at R. Instead of decoding
296 Radio Communications
messages x1 from T1 and x2 from T2 separately in two different phases like in (Wu et al., 2005),
the EF method estimates at R the bitwise XORs between b1 (n)’s and b2 (n)’s from the mixed
signal received, and re-encodes the decoded bits into a new broadcasting message xr . Each of
T1 and T2 then recovers the otherŠs message by the same decoding method discussed in (Wu
et al., 2005).
Although the schemes proposed in these works are similar to AF- and DF-TWRC, they are
inspired by network coding. The principle of network coding has been further investigated
for the TWRC in (Hausl & Hagenauer, 2006); (Baik & Chung, 2008); (Cui et al., 2008a); (Cui
et al., 2008b). It has been shown in (Katti et al., 2007b) that joint relaying and network cod-
ing achieves higher data rates as compared to routing at the relay. In (Kim et al., 2008), the
authors compared the different half-duplex bidirectional DF relaying protocols and derived
their performance bounds. Note that two-phase TWRC does not exploit spatial diversity ad-
vantage like conventional approach. Including the direct link would provide diversity gain
but at the cost of spectral efficiency. Even more recently, the authors in (Li et al., 2009) analyze
the outage performance of two-phase AF- and DF-TWRC under half-duplex constraint. They
derived the exact closed-form expressions for the outage probabilities by considering network
coding at the relay for DF case. Furthermore, they propose an adaptive bidirectional relaying
protocol which switches between AF and DF to minimize the outage probability of the sys-
tem. TWRC coupled with network coding is thus developing as a promising technology to
combat interference and to improve throughput in wireless networks.
that both T1 and T2 perfectly know (H1 , H2 , H1T and H2T ) in the receiving mode, but not in the
transmit mode. The relay R on the other hand has knowledge of both receive and transmit
CSI. This is a reasonable assumption since the relay has to estimate the channels (H1 and H2 )
for decoding in the first phase and exploting channel reciprocity in the second phase (like
in TDD system). Terminal T1 transmits vector x1 to T2 whereas T2 transmits vector x2 to T1
respectively in two phases. Frequency flat slow fading and perfect synchronization is assumed
between all terminals. The signal received at the relay in the first phase is given by
yr = H1 x1 + H2 x2 + nr (40)
where H1 and H2 are the M × M channel matrices (with each element being i.i.d. com-
plex Gaussian with zero mean and unit variance) that remain constant during the block
transmission, x1 and x2 are M × 1 symbol vectors with power P1 and P2 respectively, and
nr ∼ CN (0, σr2 I M ) is the M × 1 complex AWGN vector.
During first phase, the relay decodes the messages from both terminals T1 and T2 . Using
a Gaussian codebook, the achievable rates of both terminals are theoretically described by
the MIMO-MAC (Cover & Thomas, 1991), which imposes constraints on the individual first-
phase rates R1,I and R2,I , as well as the first-phase sum rate R1,I + R2,I for successful decoding
at the destination terminal:
P
R1,I ≤ I1,I = log I + 1 2 H1 H1H (41)
Mσr
P2 H
R2,I ≤ I2,I = log I + H2 H2 (42)
Mσr2
P1 H P2 H
M H1 H1 + M H2 H2
R1,I + R2,I ≤ I I = log I + . (43)
σr2
In the second phase, the relay applies bit-level XOR precoding on decoded messages. The
relay therefore broadcasts the vector xr with power Pr . The received signals at T1 and T2 are
given by
y1 = H1T xr + n1 (44)
y2 = H2T xr + n2 (45)
298 Radio Communications
where n1 ∼ CN (0, σ12 I M ) and nr ∼ CN (0, σ22 I M ) are the complex AWGN M × 1 vectors at T1
and T2 respectively. Since both destinations have to be able to decode xr , the maximum data
rate in the second phase is given by
1
Rsum = min { I I , min { I1,I , I2,I I } + min { I2,I , I1,I I }} . (49)
2
The above rate expression can be optimized by exploiting CSI knowledge at the relay subject
to the relay transmit power constraint. This is achieved by maximizing the data rate in the
second phase as follows
Fig. 11. Average sum-rate of two-antenna DF-TWRC with XOR precoding compared to one-
antenna case.
Figure 11 compares the average sum-rate obtained (assuming Gaussian codebook) for DF-
TWRC using XOR precoding with one and two antennas at the terminals T1 and T2 . Rayleigh
Bidirectional Cooperative Relaying 299
fading is assumed, and the elements of the channel matrices H1 and H2 are zero mean and
unit variance complex Gaussian random variables. All nodes use the same transmit power
P1 = P2 = Pr = P and are assumed to have the same noise variance σ12 = σ22 = σr2 = σ2 .
The SNR is defined as P/σ2 . We simulated 10000 random channels for each value in Figure
11. We observe that there is considerable improvement in sum-rate by using two antennas at
each node compared to the single antenna case.
Further, the authors in (Hammerstrom et al., 2007) compared two approaches of combining
the messages in the second phase at the relay (the superposition coding and the XOR pre-
coding) and showed that MIMO-TWRC achieves substantial improvement in spectral effi-
ciency compared to conventional relaying with or without transmit CSI at the relay. They also
showed that the difference in sum-rate compared to the case where no CSIT is used increases
with increasing ratio between number of relay antennas and number of node antennas. Also
XOR precoding always achieves higher minimum user rates than superposition coding if CSIT
is used. In (Oechtering & Boche, 2007) the authors propose transmit strategies in a MIMO
two-way DF relaying scenario with individual power constraints. The optimal relay transmit
strategy is given by two point-to-point water-filling solutions which are coupled by the re-
lay power distribution. The diversity-multiplexing trade-off analysis for the MIMO-TWRC is
dealt in (Gunduz et al., 2008). In (Yang & Chun, 2008), the transmission rate is improved by
using the generalized Schur decomposition-based MIMO-TWRC.
yri = 2P1 h1i s1 + 2P2 h2i s2 + nri (51)
where h ji ∼ CN (0, 1) represents the channel gain between terminal Tj and relay Ri , nri is the
T × 1
vector representing the AWGN at the ith relay. The source transmit power is assumed
to be 2Pj because each source terminal transmits every two time slots. During second time
slot, the ith relay processes yri and transmits sri scaled by g to maintain average power Pr . The
signal received by jth terminal is given as
M
yj = ∑ gh ji sri + nj , j = 1, 2, (52)
i =1
where n j is the AWGN vector at the jth terminal.
7.1.1 2-AF
In this
scheme sri is obtained by precoding yri with a unitary matrix Wri and then scaled by
2Pr
g= M(2P1 +2P2 +1)
.The signal received at terminal T2 is given by
y2 = g 2P1 S1 h1− + 2P2 S2 h2− + z2 = g 2P1 H1 s1 + 2P2 H2 s2 + z2 (53)
where S j = [Wri s j , ..., WrM s j ], h1 = [ h11 h21 , ..., h1M h2M ] T , h2 = [h221 , ..., h22M ] T ,
z2 = g ∑iM M M 2
=1 h2i Wri nri + n2 , H1 = g ∑i =1 h1i h2i Wri , H2 = g ∑i =1 h2i Wri .
Since terminal T2 knows the back propagating signal s2 , the maximum-likelihood (ML)
decoding of s1 is obtained as (Cui et al., 2008c)
2
ŝ1 = arg min y2 − g 2P1 H1 s̃1 + 2P2 H2 s2 . (54)
s̃1 ∈A1M
7.1.2 Partial DF I
This protocol overcomes the drawback of 2-AF scheme (Cui et al., 2008c) by allowing each
relay Ri to first decode s1 and s2 via the ML decoder
2
{ŝ1i , ŝ2i } = arg min yri − 2P1 h1i Wri s̃1 − 2P2 h2i Wri s̃2 . (55)
s̃1 ∈A1M ,s̃2 ∈A2M
The number of unknowns in the above equation is twice the number of equations, this making
the error probability high. For this reason it has been suggested in (Cui et al., 2008c) that
instead of sending ŝ1i and ŝ2i directly, each relay transmits
sri = Wri 2P1 h1i ŝ1i + 2P2 h2i ŝ2i (56)
Pr
scaled by g = M( P + P )
. Thus the relays remove noise from the received signal without
1 2
dealing with the channel effects. If Pr (∆s1i , ∆s2i ) represents the pairwise error probability at
the ith relay, where ∆s1i = s1 − ŝ1i and ∆s2i = s2 − ŝ2i , then the ML decoding at T2 is given as
(Cui et al., 2008c)
Bidirectional Cooperative Relaying 301
M 2
ŝ1 = arg max ∑ ∏ Pr(∆s1i , ∆s2i ) exp − y2 + y − y (57)
s̃1 ∈A1M ∆s1i ,∆s2i i =1
M √ √
where y = g ∑ Wri 2P1 h1i ∆s1i + 2P2 h2i ∆s2i and y = g 2P1 H1 s̃1 + 2P2 H2 s2 .
i =1
It is difficult to implement the above decoder directly when either number M or constellation
size is large. At high SNR, ∏iM =1 Pr ( ∆s1i , ∆s2i ) is dominated by ∆s1i = 0, ∆s2i = 0. Therefore
the ML decoding at terminal T2 can be approximated as follows
2
ŝ1 = arg min y2 − g 2P1 H1 s̃1 + 2P2 H2 s2 . (58)
s̃1 ∈A1M
7.1.3 Partial DF II
In both AF and partial DF I schemes, a weighted sum of symbols is transmitted from two termi-
nals. This causes wastage of power since each destination knows the back-propagating signal.
In partial DF II (Cui et al., 2008c), components are superimposed via modular arithmetic. Let
the size of constellation A j be Zj with A j (q) representing the qth element of A j , where j = 1, 2
and q = 0, ..., Zj − 1. Consider u1 and u2 such that A1 (u1 ) = s1 and A2 (u2 ) = s2 . With the
setting Z = max { Z1 , Z2 }, it can be assume that Z1 ≥ Z2 without loss of generality. Under
this protocol, each relay obtains ŝ1i , ŝ2i from Equation (55) as in partial DF I. If A1 (û1i ) = ŝ1i
and A2 (û2i ) = ŝ2i then each relay transmits
h̄ ji
h ji = (61)
dαji
302 Radio Communications
where h̄ ji accounts for the channel fading characteristics due to the rich scattering environ-
ment, d ji represents the distance between the jth source and the ith relay, and α is the path loss
exponent. It is reasonable to assume that each relay terminal has its local channel information
under channel reciprocity condition. This local channel information can be exploited in realiz-
ing a distributed strategy of relay selection to improve the system performance. For instance,
consider that the relay Rb has been chosen as the best relay with corresponding channels h1b
and h2b . In the second phase the best relay Rb performs AF operation and transmits the mixed
signal given by
√ √
Ph1b s1 + Ph2b s2 + nrb √
srb = P (62)
P| h1b |2 + P| h2b |2 + σ2
to the two destinations. After removing the back-propagating self interference, the signal
received at jth terminal is given by
√
Ph jb √
yj = Phlb sl + nrb + n j . (63)
P| h1b |2 + P| h2b |2 + σ2
Therefore the mutual information between the lth source and jth destination is given by
γ2 | h1b |2 | h2b |2
Ijl = log 1 + , ∀ j = l & j, l ∈ [1, 2], (64)
2γ| h jb |2 + γ| hlb |2 + 1
where γ = P/σ2 represents the SNR. Relay selection (Ding et al., 2009) is performed in
medium access layer. It has been claimed that the two destinations have different prefer-
ences but they do not tend to contradict each other. The relay with channels yielding large I12
also has channels that give a large value for I21 , if not exactly the maximum. The best relay is
selected based on the following criterion
|h1b |2 |h2b |2
(65)
2γ| h1b |2 + γ| h2b |2 + 1
that maximizes the value of I12 . Then for this selected relay, the mutual information for sec-
ond source, I21 is determined. The relay selected in such a way is suboptimal for the second
source and hence some performance loss for the second source can be expected. The outage
probability for this scheme (Ding et al., 2009) at high SNR is
and spectrum. In this chapter, we discussed several half-duplex cooperative relaying proto-
cols and their performances. Among these, two-way relaying is envisioned as a promising
protocol to save radio resources in wireless networks, whereby both up- and down-link are
transmitted on the same channel resources.
There are still many open issues related to the channels investigated so far. Mostly the slow
frequency flat fading scenarios has been considered in the literature, performance analysis for
fast as well as frequency selective fading two-way relay channels need to be addressed. The
theoretical capacity limits or achievable rate regions of TWRC still needs to be developed for
clustered and distributed scenarios. The reported protocols still suffer performance loss as
compared to the theoretical bounds. So better code designs with acceptable complexity need
to be urgently evolved to meet the above challenge. MIMO bidirectional relaying strategies
has already gained some momentum, but schemes like beamforming, distributed coding, and
relay selection still need to be explored. Perfect synchronization among multiple radios is
perhaps the most difficult task to perform for bidirectional traffic in a cooperative network.
Cooperative relaying techniques can be expected to be adopted in future wireless systems, as
it has been introduced in the IEEE 802.16j (WiMAX) standard. However, substantial research
efforts are needed to construct practical systems based on bidirectional cooperation for larger
wireless networks. Immense research interest is currently being focused to assess whether the
cooperation technology enables the implementation of cognitive radio.
9. References
Agustin, A.; Vidal, J. & Munoz, O. (2008). Protocols and resource allocation for the two-way
relay channel with half-duplex terminals. Submitted to IEEE Transactions on Wireless
Communications, Paper-TW-Oct-08-1427, Oct. 2008.
Ahlswede, R.; Cai, N.; Li, S.Y.R. & Yeung, R.W. (2000). Network information flow. IEEE Trans-
actions on Information Theory, Vol. 46, No. 4, July 2000, 1204-1216.
Avestimehr, A.S.; Sezgin, A. & Tse, D.N.C. (2008). Approximate capacity of the two-
way relay channel: A deterministic approach. Available at http://arxiv.org/PS-
cache/arxiv/pdf/0808/0808.3145v1.pdf, Aug. 2008.
Baik, I.J. & Chung, S.Y. (2008). Network coding for two-way relay channels using lattices.
Proceedings of IEEE International Conference on Communications (ICC), 3898-3902, June
2008.
Chen, M. & Yener, A. (2008). Multiuser two-way relaying for interference limited systems.
Proceedings of IEEE International Conference on Communications (ICC), 3883-3887, May
2008.
Cover, T.M. & Gamal, A.A.E. (1979). Capacity theorems for the relay channel. IEEE Transactions
on Information Theory, Vol. 25, No. 5, Sep. 1979, 572-584.
Cover, T.M. & Thomas, J.A. (1991). Elements of Information Theory, ISBN 0-471-06259-6, New
York: Wiley, 1991.
Cui, T.; Ho, T. & Kliewer, J. (2008a). Memoryless relay strategies for two-way relay channels:
Performance analysis and optimization. Proceedings of IEEE International Conference
on Communications (ICC), May 2008.
Cui, T.; Gao, F.F. & Tellambura, C. (2008b). Physical layer differential network coding for two-
way relay channels. Proceedings of IEEE Global Communications Conference (GLOBE-
COM), New Orleans, Nov. 2008, LA, USA.
304 Radio Communications
Cui, T.; Gao, F.F.; Ho, T. & Nallanathan, A. (2008c). Distributed space-time coding for two-way
wireless relay networks. Proceedings of IEEE International Conference on Communica-
tions (ICC), Beijing, May 2008, China.
Ding, Z.; Leung, K.K.; Goeckel, D. & Towsley, D. (2009). On the study of network coding
with diversity. IEEE Transactions on Wireless Communications, Vol. 8, No. 3, Mar. 2009,
1247-1259.
Esli, C. & Wittneben, A. (2008). One- and two-way decode-and-forward relaying for wire-
less multiuser MIMO networks. Proceedings of IEEE Global Communications Conference
(GLOBECOM), New Orleans, Nov. 2008, LA, USA.
Gao, F.; Zhang, R. & Liang, Y.C. (2008). On channel estimation for amplify-and-forward two-
way relay networks. Proceedings of IEEE Global Communications Conference (GLOBE-
COM), New Orleans, Nov. 2008, LA, USA.
Gunduz, D.; Goldsmith, A. & Vincent Poor, H. (2008). MIMO two-way relay chan-
nel: diversity-multiplexing tradeoff analysis. Available at http://arxiv.org/PS-
cache/arxiv/pdf/0812/0812.3642v1.pdf, Dec. 2008.
Hammerstrom,I.; Kuhn, M.; Esli, C.; Zhao, J. ; Wittneben, A. & Bauch, G. (2007). MIMO two-
way relaying with transmit CSI at the relay. Proceedings of IEEE Workshop on Signal
Processing Advances in Wireless Communications (SPAW), June 2007, Finland.
Han, Y.; Ting, S.H.; Ho, C.K. & Chin, W.H. (2008). High rate two-way amplify-and-forward
half-duplex relaying with OSTBC. Proceedings of IEEE Vehicular Technology Conference
(VTC), Marina Bay, 2426-2430, May 2008, Singapore.
Hao, Y.; Goeckel, D.; Ding, Z.; Towsley, D.& Leung, K.K. (2007). Achievable rates for network
coding on the exchange channel. Proceedings of IEEE Military Communications Confer-
ence (MILCOM), Orlando, 371-382, Oct. 2007, Florida.
Hausl, C. & Hagenauer, J. (2006). Iterative network and channel decoding for the two-way
relay channel. Proceedings of IEEE International Conference on Communications (ICC),
1568-1573, June 2006.
Ho, C.K.; Zhang, R. & Liang, Y.C. (2008). Two-way relaying over OFDM: Optimized tone per-
mutation and power allocation. Proceedings of IEEE International Conference on Com-
munications (ICC), 3908-3912, May 2008.
Jing, Y. & Hassibi, B. (2006). Distributed space-time coding in wireless relay networks. IEEE
Transactions on Wireless Communications, Vol. 5, No. 12, Dec. 2006, 3524-3536, ISSN
1536-1276.
Jitvanichphaibool, K. ; Zhang, R. & Liang, Y.C. (2008). Optimal resource allocation for two-
way relay-assisted OFDMA. Proceedings of IEEE Global Communications Conference
(GLOBECOM), New Orleans, Nov. 2008, LA, USA.
Katti, S.; Gollakota, S. & Katabi, D. (2007a). Embracing wireless interference: Analog network
coding. Proceedings of Conference on Applications, Technologies, Architectures, and Proto-
cols for Computer Communications, 397-408, ISBN 978-1-59593-713-1, Kyoto, Feb. 2007,
Japan.
Katti, S.; Maric, I.; Goldsmith, A.; Katabi, D. & Medard, M. (2007b). Joint relaying and network
coding in wireless networks. Proceedings of IEEE International Symposium on Informa-
tion Theory, Nice, June 2007, France.
Kim, S.J.; Mitran, P. & Tarokh, V. (2008). Performance bounds for bi-directional coded coop-
eration protocols. IEEE Transactions on Information Theory, Vol. 54, No. 11, Nov. 2008 ,
5235-5241.
Bidirectional Cooperative Relaying 305
Laneman, J.N.; Wornell, G.W. & Tse, D.N.C. (2004). Cooperative diversity in wireless net-
works: Efficient protocols and outage behavior. IEEE Transactions on Information The-
ory, Vol. 50, No. 12, Dec. 2004, 3062-3080, ISSN 0018-9448.
Larsson, P.; Johansson, N. & Sunell, K.E. (2006). Coded bidirectional relaying. Proceedings of
IEEE Vehicular Technology Conference (VTC), 851-855, ISBN 1-7803-9392-9, Melbourne,
May 2006, Australia.
Li, Q.; Ting, S.H.; Pandharipande, A. & Han, Y. (2009). Adaptive two-way relaying and outage
analysis. IEEE Transactions on Wireless Communications, Vol. 8, No. 6, June 2009.
Meulen, E.C. (1971). Three-terminal communication channels. Adv. Appl. Probab., Vol. 3, No. 1,
120-154, 1971.
Nam, W.; Chung, S.Y. & Yong H.L. (2008). Capacity bounds for two-way relay channels. Pro-
ceedings of IEEE International Zurich Seminar on Communications, 2008.
Oechtering, T.J. & Boche, H. (2007). Optimal transmit strategies in multi-antenna bidirectional
relaying. Proceedings of IEEE Intern. Conf. on Acoustics, Speech, and Signal Processing
(ICASSP), Honolulu, Hawaii, Apr. 2007, USA.
Oechtering, T.J.; Schnurr, C.; Bjelakovic, I. & Boche, H. (2008). Broadcast capacity region of
two-phase bidirectional relaying. IEEE Transactions on Information Theory, Vol. 54, No.
1, Jan. 2008, 454-458.
Popovski, P. & Yomo, H. (2006). Bi-directional amplification of throughput in a wireless multi-
hop network. Proceedings of IEEE Vehicular Technology Conference (VTC), 588-593, ISBN
1-7803-9392-9, Melbourne, May 2006, Australia.
Popovski, P. & Yomo, H. (2007a). Wireless network coding by amplify-and-forward for bi-
directional traffic flows. Proc. IEEE Communication Letters, Vol. 11, No. 1, Jan. 2007,
16-18, ISSN 1089-7798.
Popovski, P. & Yomo, H. (2007b). Physical network coding in two-way wireless relay channels.
Proceedings of IEEE International Conference on Communications (ICC), 707-712, ISBN 1-
4244-0353-7, Glasgow, June 2007, Scotland.
Rankov, B. & Wittneben, A. (2006). Achievable rate regions for the two-way relay channel.
Proceedings of IEEE International Symposium on Information Theory, Seattle, 2006, WA.
Rankov, B. & Wittneben, A. (2007). Spectral efficient protocols for half-duplex relay channels.
IEEE Journal on Selected Areas in Communications, Vol. 25, No. 2, Feb. 1979, 379-389,
ISSN 0733-8716.
Sendonaris, A.; Erkip, E. & Aazhang, B.(2003). User cooperation diversity-Part I: System de-
scription. IEEE Transactions on Communications, Vol. 51, No. 11, Nov. 2003, 1927-1938,
ISSN 0090-6778.
Shannon, C.E. (1961). Two-way communication channels. Proc. 4th Berkeley Symp. Math. Stat.
and Prob., Vol. 1, 1961, 611-644, UC Press, Berkeley.
Unger, T. & Klein, A. (2007). Linear transceive filters for relay stations with multiple antennas
in the two-way relay channel. Proceedings of 16th IST Mobile and Wireless Communica-
tions Summit, Budapest, July 2007, Hungary.
Vaze,R. & Heath Jr., R.W. (2008). To code or not to code in multi-hop relay channels. available
at http://arxiv.org/abs/0805.3164, May, 2008.
Wu, Y.; Chou, P. & Kung, S.Y. (2005). Information exchange in wireless networks with net-
work coding and physical-layer broadcast. Proceedings of 39th Annual Conference on
Information Sciences and Systems (CISS), Baltimore, Mar. 2005, MD.
306 Radio Communications
Yang, H.J. & Chun,J. (2008). Generalized Schur decomposition-based two-way relaying
for wireless MIMO systems. Proceedings of IEEE Global Communications Conference
(GLOBECOM), New Orleans, Nov. 2008, LA, USA.
Zhang, S.; Liew, S.C. & Lam, P.P. (2006). Physical-layer network coding. Proceedings of the 12th
Annual International Conference on Mobile Computing and Networking, 358-365, ISBN
1-59593-286-0, Los Angeles, CA, Sept. 2006, USA.
Zhang, R.; Liang, Y.C.; Chai, C.C. & Cui, S. (2009). Optimal beamforming for two-way multi-
antenna relay channel with analogue network coding. IEEE Journal on Selected Areas
in Communications, Vol. 27, No. 5, June 2009, 699-712.
Zhao, J.; Kuhn, M.; Wittneben, A. & Bauch, G. (2008). Self-interference aided channel estima-
tion in two-way relaying systems. Proceedings of IEEE Global Communications Confer-
ence (GLOBECOM), New Orleans, Nov. 2008, LA, USA.
A Novel Amplify-and-Forward Relay Channel Model
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions 307
1. Introduction
Among several emerging wireless technologies, M2M communications in cooperative
networks has gained considerable attention in recent years. The driving force behind
merging M2M communications and cooperative networks is its promise to provide a better
link quality (diversity gain), an improved network range, and an overall increase in the
system capacity. M2M cooperative wireless networks exploit the fact that single-antenna
mobile stations cooperate with each other to share their antennas in order to form a virtual
multiple-input multiple-output (MIMO) system in a multi-user scenario (Dohler, 2003). Thus,
in such networks, cooperative diversity (Laneman et al., 2004; Sendonaris et al., 2003a;b) is
achieved by relaying the signal transmitted from a mobile station to the final destination
using other mobile stations in the network. However, to cope with the problems faced within
the development of such systems, a solid knowledge of the underlying multipath fading
channel characteristics is essential. Therefore, the aim of this chapter is to develop a flexible
M2M fading channel model for relay-based cooperative networks and to analyze its statistical
1 The material in this chapter was presented in part at the 19th IEEE International Symposium on Per-
sonal, Indoor and Mobile Radio Communications, PIMRC 2008, Cannes, France, September 2008.
308 Radio Communications
properties. This newly developed model would help communication system designers to
investigate the overall performance of cooperative communication systems.
So far, M2M amplify-and-forward relay fading channels have been modeled only for
some specific communication scenarios, either assuming NLOS or partial LOS propagation
conditions. It has been shown in (Patel et al., 2006) that under NLOS propagation conditions,
the M2M amplify-and-forward relay fading channel can be modeled as a double Rayleigh
fading channel (Erceg et al., 1997; Kovacs et al., 2002). Motivated by the studies of double
Rayleigh fading channels for keyhole channels (Almers et al., 2006), the so-called double
Nakagami-m fading channel model has also been proposed in (Shin & Lee, 2004). Further-
more, in amplify-and-forward relay environments, the M2M fading channel under LOS
conditions can be modeled as a double Rice fading channel (Talha & Pätzold, 2007a) and/or
as an SLDS fading channel (Talha & Pätzold, 2007b). In addition, M2M fading channels
in cooperative networks can efficiently be modeled using the multiple scattering concept
(Andersen, 2002).
The chapter is structured as follows: In Section 2, the reference model for the amplify-
and-forward MLSS fading channel is developed. Section 3 deals with the analysis of the
statistical properties of MLSS fading processes. Section 4 confirms the validity of the
analytical expressions presented in Section 3 by simulations. Finally, concluding remarks are
made in Section 5.
where µ(i) (t) (i = 1, 2, 3, . . .) is a zero-mean complex Gaussian process that represents the
scattered component of the ith link and αi (i = 1, 2, 3, . . .) is a real-valued constant that
A Novel Amplify-and-Forward Relay Channel Model
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions 309
determines the contribution of ith scattered component. In (1), Gaussian processes µ(i) (t) are
mutually independent. However, when the fading channel is modeled by taking into account
only the first two terms of (1), the resulting channel is referred to as the NLSS channel (Salo
et al., 2006). Here, we are presenting an extension of the NLSS channel to the MLSS channel
by incorporating LOS components in a novel manner for M2M amplify-and-forward relay
fading channels. The considered communication scenario determined by a source mobile
station, a destination mobile station and mobile relay is shown in Fig. 1.
PU t
1
PU t PU t
2 3
Source Destination
mobile station mobile station
Mobile relay
Fig. 1. The propagation scenario behind MLSS fading channels.
(i )
Starting from (1), ignoring µ(i) (t) ∀ i ≥ 4, and replacing µ(i) (t) by µρ (t) for i = 1, 2, 3,
results in
(1) (2) (3)
χρ (t) = µρ (t) + AMR µρ (t) µρ (t) (2)
where α1 = 1 and α2 = AMR . The quantity AMR in (2) is referred to as the relay gain. Since we
have assumed fixed gain relays in our system, it follows that AMR is a real constant. Further-
(1) (2) (3)
more, in (2), µρ (t), µρ (t), and µρ (t) are statistically independent non-zero-mean complex
Gaussian processes, which model the individual M2M fading channel in the source mobile sta-
tion to the mobile relay, the mobile relay to the destination mobile station, and the source mo-
bile station to the destination mobile station links (see Fig. 1). Each complex Gaussian process
(i ) (i ) (i )
µρ (t) = µρ1 (t) + jµρ2 (t) represents the sum of the scattered component µ(i) (t) and the LOS
(i )
component m(i) (t), i.e., µρ (t) = µ(i) (t) + m(i) (t). The scattered component µ(i) (t) is still
(i ) (i )
modeled by a zero-mean complex Gaussian process µ(i) (t) = µ1 (t) + jµ2 (t) with variance
2σ2 . The LOS component m(i) (t) = ρ e j(2π f ρi t+θρi ) assumes a fixed amplitude ρ , a constant
i i i
Doppler frequency f ρi , and a constant phase θρi for i = 1, 2, 3. Furthermore, it is obvious that
310 Radio Communications
(2) (3)
the product term µρ (t) µρ (t) in (2) is a non-zero-mean complex double Gaussian process,
(2) (3)
i.e., µρ (t) = ς ρ (t) = ς ρ1 (t) + jς ρ2 (t). Furthermore, ς ρ (t) models the overall fad-
(t) µρ
ing in the source mobile station to the destination mobile station link via the mobile relay. It
should also be noted here that the relay gain AMR would just scale the mean value and variance
(3) (3)
of the complex Gaussian process µ (t), i.e., m(3) (t) = E{ A µ (t)} = ρ
ρ e j(2π f ρ3 t+θρ3 )
MR ρ AMR
(3)
where ρ AMR = AMR ρ3 , and 2σA 2
MR
= Var{ AMR µρ (t)} = 2 ( AMR σ3 )2 . Finally, the overall fad-
ing process consisting of the direct link between the source mobile station and the destination
mobile station as well as the source mobile station to the destination mobile station link via the
mobile relay results in the complex process χρ (t) = χρ1 (t) + jχρ2 (t) given in (2). The abso-
lute value of χρ (t) defines the MLSS process, i.e., Ξ (t) = |χρ (t) |. Furthermore, the argument
of χρ (t) introduces the phase process Θ (t), i.e., Θ (t) = arg{χρ (t)}.
∞ ∞ ∞ ∞
pχρ1 χρ2 χ̇ρ1 χ̇ρ2(u1 , u2 , u̇1 , u̇2 ; t) = p (1) (1) (1) (1) (u1 − y1 , u2 − y2 , u̇1 − ẏ1 , u̇2 − ẏ2 ; t)
µρ1 µρ2 µ̇ρ1 µ̇ρ2
−∞−∞−∞−∞
pς ρ1 ς ρ2 ς̇ ρ1 ς̇ ρ2(y1 , y2 , ẏ1 , ẏ2 ; t) dẏ2 dẏ1 dy2 dy1 (3)
(1) (1)
where p (1) (1) (1) (1) (u1 , u2 , u̇1 , u̇2 ; t) is the joint PDF of the processes µρ1 (t), µρ2 (t),
µρ1 µρ2 µ̇ρ1 µ̇ρ2
(1) (1)
µ̇ρ1 (t), and µ̇ρ2 (t)
at the same time t. Similarly, pς ρ1 ς ρ2 ς̇ ρ1 ς̇ ρ2(y1 , y2 , ẏ1 , ẏ2 ; t) in (3), rep-
resents the joint PDF of the processes ς ρ1 (t), ς ρ2 (t), ς̇ ρ1 (t), and ς̇ ρ2 (t) at the same time
(1) (1)
t. It is worth mentioning here that the processes µρi (t), µ̇ρi (t), ς ρi (t), and ς̇ ρi (t)
(1) (1)
(i = 1, 2) are uncorrelated in pairs. Furthermore, the process pairs {µρi (t) , µ̇ρi (t)}
and {ς ρi (t) , ς̇ ρi (t)} (i = 1, 2) are statistically independent, which allows us to ex-
press p (1) (1) (1) (1)( y1 , y2 , ẏ1 , ẏ2 , u1 , u2 , u̇1 , u̇2 ; t ) as given in (3). The joint PDF
ς ς ς̇ ς̇ µ µ µ̇ µ̇
ρ1 ρ2 ρ1 ρ2 ρ1 ρ2 ρ1 ρ2
p (1) (1) (1) (1)
µρ1 µρ2 µ̇ρ1 µ̇ρ2
(u1 , u2 , u̇1 , u̇2 ; t) can be obtained using the multivariate Gaussian distribution
(see, e.g., (Simon, 2002, Eq. (3.2))). The expression for the joint PDF pς ρ1 ς ρ2 ς̇ ρ1 ς̇ ρ2(y1 , y2 , ẏ1 , ẏ2 ; t)
is presented in (4), where the quantity β i (i = 2, 3) is the negative curvature of the autocorrela-
tion function of the inphase and quadrature components of µ(i) (t) (i = 2, 3). Under isotropic
scattering conditions, β i (i = 2, 3) can be expressed as (Akki, 1994; Pätzold, 2002)
pς ρ1 ς ρ2 ς̇ ρ1 ς̇ ρ2 (y1 , y2 , ẏ1 , ẏ2 ; t) =
2 2 2 2
(3) (3) 2 2 2 (3) (3) (2) (2)
z1 − m
1
( t ) + z2 − m2 ( t ) (3) (3) β 2 ( z2 + z2 ṁ
ṁ (t) + ṁ2 (t) 1 2) 1
(t) + ṁ2 (t) + β 3 (y21 +y22 ) ṁ1 (t)+ṁ2 (t)
1
∞ ∞ −
2σ2
AMR − 2β 3 2
e e 2β 2 β 3 (y2 +y22 )+ β 2 (z2 +z22 )
1 1
dz2 dz1
e
2
2
−∞ −∞ (2π )3 σ22 σA MR
β 3 y 1 + y 2 + β z2 + z2 2
2 2 1 2
2 2
(2) (2) (2) (2) (2) (2) (3) (2) (2)
y2 + y2 m ( t ) + m2 ( t )
1 2 1 (z21 +z22 ) 1
−2 y2 m2 (t)+y1 m1 (t) z1 −2 y2 m1 (t)−y1 m2 (t) z2 + z1 ṁ2 (t) −y2 ẏ1 +y1 ẏ2 −ṁ2 (t)y1 z1 +ṁ (t)y2 z1
− 2
2σ22 (z2 +z2 β 3 (y2 +y22 )+ β 2 (z2 +z22 )
1 2) e 1 1
×e
A Novel Amplify-and-Forward Relay Channel Model
2 2
(2) (2) (2) (2) (2) (2) (3) (2) (2)
ẏ2 +ẏ2 z1 ṁ
1 2
ṁ (t) + ṁ2 (t) (z21 +z22 )
1 1
−2 ẏ2 ṁ2 (t)+ẏ1 ṁ1 (t) z1 −2 ẏ2 ṁ1 (t)−ẏ1 ṁ2 (t) z2 + (t) y1 ẏ1 +y2 ẏ2 −ṁ1 (t)y1 z1 +ṁ2 (t)y2 z1
2
2β 2 (z2 +z2
−
β 3 (y2 +y22 )+ β 2 (z2 +z22 )
1 2) 1 e 1
×e
(3) (2) (2) (3) (2) (2)
2β 2 z2 (z2 +z2
1 2) 1 1 1
ṁ (t) y2 ẏ1 −y1 ẏ2 +2ṁ2 (t)y1 z1 −2ṁ (t)y2 z1 +ṁ2 (t) y1 ẏ1 +y2 ẏ2 −2ṁ (t)y1 z1 −2ṁ2 (t)y2 z1 + β 3 (y21 +y22 )(ẏ21 +ẏ22 )
2 2 2 2 2 2 2
2β 2 (z +z2 ) β 3 (y +y2 )+ β 2 (z +z2 )
1 1 1
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions
×e
(2) (2) (2) (2)
(2) (3) (2) (3) (2) (3) (2) (3) β 3 ( y2 + y2
1 2)
−2ẏ2 ṁ2 (t)z1 +ṁ1 (t)z2 +2ẏ1 −ṁ1 (t)z1 +ṁ2 (t)z2
1 1 1 1
z22 ṁ (t)ṁ (t)y1 +ṁ2 (t)ṁ2 (t)y1 +ṁ2 (t)ṁ (t)y2 −ṁ (t)ṁ2 (t)y2
2 2
+ β z2 + z2 2β 2 (z2 +z2 β y2 + y2 + β z2 + z2
β 3 ( y2 + y2
1 2) 2( 1 2) 1 2) 3( 1 2) 2( 1 2)
×e e .
(4)
311
312
2 2 2 2 2 2
(2) (2) (3) (3) (1) (1)
x2 ṁ (t) + ṁ2 (t) ṁ (t) + ṁ2 (t) ṁ (t) + ṁ2 (t)
1 1 1
2σ2
−
1
− 2β 2 − 2β 3 − 2β 1
x2 e e e e
pΞΞ̇ΘΘ̇ x, ẋ, θ, θ̇; t =
2
(2π )4 σ12 σ22 σA MR
2 2 2 2
(3) (3) (1) (1)
1
z1 − m ( t ) + z2 − m2 ( t ) y1 + m ( t ) + y2 + m2 ( t )
1 (1) (1)
r y1 +m (t) cos θ +r y2 +m2 (t) sin θ
∞ ∞ ∞ ∞ 2σ2 1
−
2σ2
−
e AMR
e 1
σ2
dz2 dz1 dy2 dy1 e 1
2
−∞−∞−∞−∞ β 1 z21 + z22 + β 3 y21 + y22 + β 2 z21 + z22
2 2
2 2 (1) (1)
(2) (2) (2) (2) (2) (2) β 3 (y2 +y22 )
1
ṁ (t) + ṁ2 (t)
1
y2 + y2
1 2
m ( t ) + m2 ( t ) (z21 +z22 )
1
−2 y2 m2 (t)+y1 m1 (t) z1 −2 y2 m1 (t)−y1 m2 (t) z2 +
2
2β 1 β 1 (z2 +z22 )+ β 3 (y2 +y22 )+ β 2 (z2 +z22 )
1 1 1
−
2σ22 (z2 +z2
1 2) e
×e
2 2 2 2 2 2
2 (1) (1) (3) (3) (2) (2)
β22 (z2 +z2 β3 ṁ (t) + ṁ (t) + β1 ṁ (t) + ṁ (t) + β3 β1 ṁ (t) + ṁ (t)
1 2) 1 2 1 2 1 2 [ β3 (y21 +y22 )+ β1 (z21 +z22 )]
2
2β 3 β 2 β 1 β 1 (z2 +z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e
(2) (3) (2) (3) (2) (3) (2) (3) (1) (2) (1) (2) (1) (2) (1) (2)
1 1 1 1 1 1 1 1
z22 ṁ (t)ṁ (t)y1 +ṁ2 (t)ṁ2 (t)y1 +ṁ2 (t)ṁ (t)y2 −ṁ (t)ṁ2 (t)y2 −z1 ṁ (t)ṁ (t)+ṁ2 (t)ṁ2 (t) −z2 ṁ2 (t)ṁ (t)−ṁ (t)ṁ2 (t)
2
β 1 ( z2 + z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e
(2) (3) (2) (3) (2) (3) (2) (3) (1) (2) (1) (2) (1) (3) (1) (3)
1 1 1 1 1 1 1 1 1
z2 2z1 ṁ2 (t)ṁ (t)y1 −ṁ (t)ṁ2 (t)y1 −ṁ (t)ṁ (t)y2 −ṁ2 (t)ṁ2 (t)y2 −z2 ṁ2 (t)ṁ (t)−ṁ (t)ṁ2 (t) + ṁ2 (t)ṁ (t)−ṁ (t)ṁ2 (t) y1
2
β 1 ( z2 + z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e
(2) (3) (2) (3) (2) (3) (2) (3) (1) (3) (1) (3) (1) (3) (1) (3)
1 1 1 1 1 1 1 1 1
z2 ṁ (t)ṁ2 (t)y2 −ṁ (t)ṁ (t)y1 −ṁ2 (t)ṁ2 (t)y1 −ṁ2 (t)ṁ (t)y2 −z1 ṁ (t)ṁ (t)y1 +ṁ2 (t)ṁ2 (t)y1 +ṁ2 (t)ṁ (t)y2 −ṁ (t)ṁ2 (t)y2
2
β 1 ( z2 + z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e
(1) (2) (1) (2) (3) (3) (1) (2) (2)
1 1 1 1 1 1
z3 ṁ (t)ṁ (t)+ṁ2 (t)ṁ2 (t) + ṁ (t)(y2 z1 −y1 z2 )+ṁ2 (t)(y1 z1 +y2 z2 )+ ṁ2 (t)+ṁ2 (t)z1 +ṁ (t)z2 (z2 +z22 ) ( x θ̇ cos θ + ẋ sin θ )
2
+ β y2 + y2 + β z2 + z2
−
β 1 ( z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e
(3) (3) (1) (2) (2) (1) (3) (1) (3)
1 1 1 1 2) ( 1 1
ṁ2 (t)(y1 z2 −y2 z1 )+ṁ (t)(y1 z1 +y2 z2 )+ ṁ (t)+ṁ (t)z1 −ṁ2 (t)z2 (z2 +z2 ẋ cos θ − x θ̇ sin θ )− ṁ2 (t)ṁ2 (t)+ṁ (t)ṁ (t) y2 z2
2
β 1 ( z2 + z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e
2 2
(3) (3)
β 1 ( z2 + z2 ṁ (t) + ṁ2 (t)
(z21 +z22 ) ẋ2 +( xθ̇ )2 1 2) 1
2 2
−
{ }
2 β 1 ( z2 + z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
2β 3 β 1 (z2 +z2 + β y2 + y2 + β z2 + z2
1 2) 3( 1 2) 2( 1 2)
×e e , x ≥ 0, | ẋ | < ∞, |θ | ≤ π, |θ̇ | < ∞ . (5)
Radio Communications
A Novel Amplify-and-Forward Relay Channel Model
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions 313
β2 = 2 (σ2 π )2 f max
2
1
2
+ f max2
(5a)
β3 = 2 (σAMR π )2 f max
2
2
2
+ f max 3
. (5b)
The symbols f max1 , f max2 , and f max3 appearing in (5a) and (5b) denote the maximum Doppler
frequency caused by the motion of the source mobile station, the mobile relay, and the des-
tination mobile station, respectively. Substituting the joint PDF p (1) (1) (1) (1) (u1 , u2 , u̇1 , u̇2 )
µρ1 µρ2 µ̇ρ1 µ̇ρ2
and (4) in (3), applying the concept of transformation of random variables (Papoulis
& Pillai,
2002), and doing tedious algebraic manipulations, the joint PDF pΞΞ̇ΘΘ̇ x, ẋ, θ, θ̇; t of the pro-
cesses Ξ (t), Ξ̇ (t), Θ (t), and Θ̇ (t) can be derived. The resulting joint PDF pΞΞ̇ΘΘ̇ x, ẋ, θ, θ̇; t
is presented in (5), which is of fundamental importance, because it provides the basis for
the computation of the PDF, the level-crossing rate (LCR), and the average duration of fades
(ADF) of MLSS processes Ξ (t) as well as the PDF of the phase process Θ (t). Using (5), the
analytical expressions of the LCR and the ADF of the MLSS processes Ξ (t) have been derived
2
in (Talha & Pätzold, 2008a). In (5), the quantity β 1 is given by β 1 = 2 (σ1 π )2 f max 1
2
+ f max 3
(Akki, 1994; Pätzold, 2002).
∞ ∞
pΞΘ ( x, θ; t) = pΞΞ̇ΘΘ̇ x, ẋ, θ, θ̇; t dθ̇ d ẋ (6)
−∞ −∞
where
g1(ω, ψ; t) = ω 2 + ρ21 + 2ρ1 ω cos ψ − 2π f ρ1 t − θρ1 (8a)
2 2
ρ2 ω ρ AMR ν 2ρ2 ρ ω
g2(ω, ν, ψ; t) = 2 + 2 + 2 A2MR
σ2 ν σAMR σ2 σAMR
cos ψ − 2π f ρ2+ f ρ3 t − θρ2+ θρ3 (8b)
ρ1 cos θ − 2π f ρ1 t − θρ1 + ω cos (θ − ψ)
g3(ω, θ, ψ; t) = .
σ1
(8c)
In (7), I0 (·) is the zeroth-order modified Bessel function of the first kind (Gradshteyn &
Ryzhik, 2000).
314 Radio Communications
The PDF pΞ ( x ) of the MLSS fading process Ξ (t) can be obtained by integrating (7)
over θ in the interval [−π, π ]. Hence,
x2 ν2 + ρ2
− 2 ∞∞ (ω/ν)2 +ρ22 AMR
x e 2σ1 ω − −
2σ22 2σ2
pΞ ( x ) = dν dω e e AMR
2π σ12 σ22 σA
2 ν
MR 0 0
π
g4 (ω,ψ)
−
2σ2
x
dψ e 1 I0 g 4(ω, ψ) I0 g 5 (ω, ν, ψ) ,x≥0 (9)
σ12
−π
where
It is worth mentioning that the joint PDF pΞΘ ( x, θ; t) in (6) is dependent on time t. Neverthe-
less, the PDF pΞ ( x ) in (9) is independent of time t showing that MLSS processes Ξ (t) are first
order stationary. From the PDF pΞ ( x ) of MLSS fading processes Ξ (t), the following special
cases can be obtained.
For the special case when AMR = 1, ρ1 = 0, and σ12 → 0, the PDF of MLSS processes given in
(9) reduces to the PDF of double Rice processes (Talha & Pätzold, 2007a)
ν2 + ρ2
∞ ( x/ν)2 +ρ22
− 2 MR
A
x 1 − 2 2σ xρ2 νρ AMR
pΞ ( x ) AMR =1 = 2 2 e 2σ2
e AMR
I0 I0 dν, x ≥ 0 . (12)
ρ1 =0 σ2 σAMR ν νσ22 2
σA
σ 2 →0 0 MR
1
Similarly, substituting AMR = 1, ρ2 = ρ3 = 0, and σ12 → 0 in (9) allows us to write the PDF of
SLDS processes in the form (Talha & Pätzold, 2007b)
σ2 σx2 I0 σ2 σxA
ρ
K0 σ2 σA1 , x < ρ1
pΞ ( x ) AMR =1 = 2 AMR MR MR
(13)
σ2 σx2 K0 σ2 σxA
ρ
ρ2 ,ρ3 =0 I0 σ2 σA1 , x ≥ ρ1 .
σ 2 →0 2 AMR MR MR
1
A Novel Amplify-and-Forward Relay Channel Model
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions 315
The PDF of NLSS processes (see, e.g., (Salo et al., 2006)) can be derived from the PDF of MLSS
processes by substituting ρ1 = ρ2 = ρ3 = 0 in (9), i.e.,
2
− x 2 ∞ 2
x e 2σ
1 − ω2 ω ω
pΞ ( x ) AMR =1 = 2 2 2 ω e 1 K0
2σ
I0 2 x dω, x ≥ 0 . (14)
ρ1 ,ρ2 ,ρ3 =0 σ1 σ2 σA σ2 σAMR σ1
MR 0
Finally, solving (9) for ρ2 = ρ3 = 0, the PDF of SLSS processes (Salo et al., 2006) is obtained as
∞π
x
2 g ( x,θ )
− ω2 − 5 2 ω ω
pΞ ( x ) AMR =1 = dθ dω ω e 2σ
1 e 2σ
1 K0 I0 2 g6(x, θ) , x ≥ 0 (15)
ρ2 ,ρ3 =0 2π σ12 σ22 σA
2 σ2 σAMR σ1
MR 0 −π
where
g6 ( x, θ ) = x2 + ρ21 − 2xρ1 cos θ . (16)
The PDF pΘ (θ; t) of the phase process Θ (t) given in (17) reduces to the PDF of the
phase process corresponding to double Rayleigh (Talha & Pätzold, 2007a), double Rice (Talha
& Pätzold, 2007a), SLDS (Talha & Pätzold, 2007b), NLSS, and SLSS processes by selecting ρ1 ,
ρ2 , ρ3 , and σ12 in a similar fashion as described in Subsection 3.1.
4. Numerical Results
In this section, we will provide sufficient evidence to support the validity of the analytical
expressions presented in Section 3 with the help of simulations. Furthermore, for the sake
of completeness, a detailed comparison of the PDF pΞ ( x ) of MLSS processes Ξ (t) to that of
the special cases mentioned above will be presented. Similarly, a comparison of the PDF
pΘ (θ ) of the phase process Θ (t) with other phase PDFs will also be presented. The concept
of sum-of-sinusoids (Pätzold, 2002) was employed to simulate the underlying uncorrelated
Gaussian noise processes of the overall MLSS process Ξ (t). The number of sinusoids required
to simulate the inphase and quadrature components of Gaussian processes µ(i) (t) was
316 Radio Communications
selected to be 20 and 21, respectively. Furthermore, the simulation model parameters were
computed using the generalized method of exact Doppler spread (GMEDS1 ) (Pätzold &
Hogstad, 2006). The maximum Doppler frequencies, i.e., f max1 , f max2 , and f max3 were set to
91 Hz, 75 Hz, and 110 Hz, respectively. Furthermore, for simplicity, the amplitudes of the
three LOS components ρ1 , ρ2 , and ρ3 are assumed to be equal, i.e., ρ1 = ρ2 = ρ3 = ρ. The
quantities σ12 , σ22 , σ32 , and the relay gain AMR are set to 1, unless stated otherwise.
The results presented in Figs. 2 and 3 show a good fitting between the analytical and
simulation results. In Fig. 2, the PDF pΞ ( x ) of MLSS processes Ξ (t) is compared to that
of classical Rayleigh, classical Rice, double Rayleigh, double Rice, SLDS, NLSS, and SLSS
processes for ρ = 1, where f ρ1 , f ρ2 , and f ρ3 , were set to 166 Hz, 185 Hz, and 201 Hz,
respectively. It can be observed that the maximum value of the PDF pΞ ( x ) of MLSS processes
Ξ (t) is lower than that of all the other processes under consideration for the same value of
ρ. However, the PDF pΞ ( x ) of MLSS processes Ξ (t) has a higher spread as compared to the
spreads of the above mentioned processes for the same value of ρ. The same trend can be
seen when different values of ρi (i = 1, 2, 3) are selected. Furthermore, increasing the value of
the relay gain AMR causes a decrease in the maximum value and an increase in the spread of
the PDF of MLSS processes Ξ (t).
0.7
Theory
Probability density function, pΞ (x)
Simulation
0.6 Classical Rayleigh
0
0 1 2 3 4 5 6 7 8 9 10
Level, x
Fig. 2. A comparison of the PDF pΞ ( x ) of the MLSS process Ξ (t) with that of various other
stochastic processes.
Figure 3 presents a comparison of the PDF pΘ (θ ) of the phase process Θ (t) with that
of the phase processes corresponding to the classical Rayleigh and double Rayleigh processes,
the classical Rice and double Rice processes, the SLDS process, the NLSS process, and the
SLSS process for ρ = 1. It should be noted that the results presented in Fig. 3 are valid for the
case when f ρi (i = 1, 2, 3) is set to zero. It can be observed that the PDF of the SLDS phase
A Novel Amplify-and-Forward Relay Channel Model
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions 317
process has the highest peak. The PDF pΘ (θ ) of the phase process Θ (t) follows the same
trend in terms of the maximum value and the spread as that of the classical Rice process for
the same value of ρ. Furthermore, it is interesting to note that for the phase process Θ (t) with
ρi (i = 1, 2, 3) being selected as ρ1 = ρ3 = 0.5 and ρ2 = 1, the PDF pΘ (θ ) is almost the same
as that of the double Rice process for ρ = 1. Figure 3 also shows the impact of the relay gain
AMR on the PDF pΘ (θ ) of the phase process Θ (t).
0.7
Theory
Simulation
Probability density function, pΘ (θ)
0.6
ρ = 1 (SLDS process)
0.5
fρ1 = fρ2 = fρ3 = 0
ρ = 1; AMR = 1 (MLSS process)
ρ = 1; AMR = 1.5 (MLSS process) ρ = 1 (Classical Rice)
0.4
ρ = 1 (SLSS Process)
0.3 ρ1 = ρ3 = ρ2 ; AMR
(MLSS process) ρ = 1 (Double Rice)
0.2
0.1
Classical Rayleigh
Double Rayleigh
ρ = 0 (NLSS process)
0
−3.14 0 3.14
Phase, θ
Fig. 3. A comparison of the PDF pΘ (θ ) of the phase process Θ (t) with that of various other
various processes.
5. Conclusion
In this chapter, we have proposed a new flexible M2M amplify-and-forward relay fading
channel model under LOS propagation conditions. The novelty in the model is that we have
considered the LOS components in both transmission links, i.e., the direct link between the
source mobile station and the destination mobile station as well as the link via the mobile
relay. By analogy with multiple scattering radio propagation channels, we have developed
the MLSS fading channel as a second-order scattering channel, where the received signal
comprises the single and double scattered components. Furthermore, the flexibility of the
MLSS fading channel model comes from the fact that it can be reduced to double Rayleigh,
double Rice, SLDS, NLSS, and SLSS channel models under certain assumptions.
This chapter also presents a deep analysis of the statistical properties of MLSS fading
channels. The statistical properties studied, include the PDF of MLSS processes along with
the PDF of the corresponding phase processes. Accurate analytical expressions have been
derived for the above mentioned statistical quantities. The accuracy and validity of the
analytical expressions are confirmed by simulations. The excellent fitting of the theoretical
318 Radio Communications
and simulation results verifies the correctness of the derived analytical expressions. The
presented results show that the statistical properties of MLSS channels are quite different
from those of the processes embedded in the MLSS channel model as special cases. It is
also evident from the illustrated results that the relay gain has a significant impact on the
statistical properties of MLSS channels.
The statistics of a fading channel dictate the choice of the transmitter and the receiver
techniques, including the detection, modulation, and coding schemes, etc. Therefore, the the-
oretical results presented in this chapter are quite useful for the designers of the physical layer
of M2M cooperative wireless networks. Furthermore, the developed M2M channel model can
be employed to investigate the overall system performance of M2M communication systems
under both NLOS and LOS propagation conditions.
6. References
Akki, A. S. (1994). Statistical properties of mobile-to-mobile land communication channels,
IEEE Trans. Veh. Technol. Vol. 43(No. 4): 826–831.
Almers, P., Tufvesson, F. & Molisch, A. F. (2006). Keyhole effect in MIMO wireless channels:
measurements and theory, IEEE Trans. Wireless Commun. Vol. 5(No. 12): 3596–3604.
Andersen, J. B. (2002). Statistical distributions in mobile communications using multiple scat-
tering, Proc. 27th URSI General Assembly, Maastricht, Netherlands.
Dohler, M. (2003). Virtual Antenna Arrays, Ph.D. dissertation, King’s College, London, United
Kingdom.
Erceg, V., Fortune, S. J., Ling, J., Rustako, Jr, A. J. & Valenzuela, R. A. (1997). Comparison
of a computer-based propagation prediction tool with experimental data collected in
urban microcelluar environment, IEEE J. Select. Areas Commun. Vol. 15(No. 4): 677–
684.
Gradshteyn, I. S. & Ryzhik, I. M. (2000). Table of Integrals, Series, and Products, 6th edn, New
York: Academic Press.
Kovacs, I. Z., Eggers, P. C. F., Olesen, K. & Petersen, L. G. (2002). Investigations of outdoor-to-
indoor mobile-to-mobile radio communication channels, Proc. IEEE 56th Veh. Technol.
Conf., VTC’02-Fall, Vol. 1, Vancouver BC, Canada, pp. 430–434.
Laneman, J. N., Tse, D. N. C. & Wornell, G. W. (2004). Cooperative diversity in wireless net-
works: efficient protocols and outage behavior, IEEE Trans. Inform. Theory Vol. 50(No.
12): 3062–3080.
Papoulis, A. & Pillai, S. U. (2002). Probability, Random Variables and Stochastic Processes, 4th edn,
New York: McGraw-Hill.
Patel, C. S., Stüber, G. L. & Pratt, T. G. (2006). Statistical properties of amplify and forward
relay fading channels, IEEE Trans. Veh. Technol. Vol. 55(No. 1): 1–9.
Pätzold, M. (2002). Mobile Fading Channels, Chichester: John Wiley & Sons.
Pätzold, M. & Hogstad, B. O. (2006). Two new methods for the generation of multiple un-
correlated Rayleigh fading waveforms, Proc. IEEE 63rd Semiannual Veh. Tech. Conf.,
VTC’06-Spring, Vol. 6, Melbourne, Australia, pp. 2782–2786.
Salo, J., El-Sallabi, H. M. & Vainikainen, P. (2006). Statistical analysis of the multiple scattering
radio channel, IEEE Trans. Antennas Propagat. Vol. 54(No. 11): 3114–3124.
Sendonaris, A., Erkip, E. & Aazhang, B. (2003a). User cooperation diversity — Part I: System
description, IEEE Trans. Commun. Vol. 51(No. 11): 1927–1938.
A Novel Amplify-and-Forward Relay Channel Model
for Mobile-to-Mobile Fading Channels Under Line-of-Sight Conditions 319
Sendonaris, A., Erkip, E. & Aazhang, B. (2003b). User cooperation diversity — Part II: Im-
plementation aspects and performance analysis, IEEE Trans. Commun. Vol. 51(No.
11): 1939–1948.
Shin, H. & Lee, J. H. (2004). Performance analysis of space-time block codes over keyhole
Nakagami-m fading channels, IEEE Trans. Veh. Technol. Vol. 53(No. 2): 351–362.
Simon, M. K. (2002). Probability Distributions Involving Gaussian Random Variables: A Handbook
for Engineers and Scientists, Dordrecht: Kluwer Academic Publishers.
Talha, B. & Pätzold, M. (2007a). On the statistical properties of double Rice channels, Proc.
10th International Symposium on Wireless Personal Multimedia Communications, WPMC
2007, Jaipur, India, pp. 517–522.
Talha, B. & Pätzold, M. (2007b). On the statistical properties of mobile-to-mobile fading chan-
nels in cooperative networks under line-of-sight conditions, Proc. 10th International
Symposium on Wireless Personal Multimedia Communications, WPMC 2007, Jaipur, In-
dia, pp. 388–393.
Talha, B. & Pätzold, M. (2008a). Level-crossing rate and average duration of fades of the
envelope of mobile-to-mobile fading channels in cooperative networks under line-
of-sight conditions, Proc. 51st IEEE Globecom 2008, New Orleans, USA, pp. 1–6. DOI
10.1109/GLOCOM.2008.ECP.860.
Talha, B. & Pätzold, M. (2008b). A novel amplify-and-forward relay channel model for mobile-
to-mobile fading channels under line-of-sight conditions, Proc. 19th IEEE Int. Symp.
on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, Cannes, France,
pp. 1–6. DOI 10.1109/PIMRC.2008.4699733.
320 Radio Communications
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 321
1. Introduction
The purpose of this chapter is to develop a resource management technique to utilize
resource efficiently in multi-hop cellular networks. Multi-hop cellular networks have been
proposed as a way to enhance throughput and extend coverage (Cho & Haas, 2004). This
enhancement can in general be achieved by deploying relay stations in conventional cellular
networks. The advantage of multi-hop networks arises from the reduction in the overall
path loss achieved by using a relay station between a base station and a mobile station.
Moreover, deeply shadowed mobile stations can be supported by using relay stations to
bypass obstacles.
Even though the multi-hop transmission has advantages, it also carries a penalty: the need
for additional resources to transmit data in multi-hop manner (for example, in two-hop
transmission, two time slots or frequency channels for the base station-relay station link and
the relay station-mobile station link) (Lee et al.2008).
, Hence, this penalty of multi-hop
transmission is represented by ‘worms’, which devour resources (Ju etal. 2009).
,
The trade-offs associated with the multi-hop networks make it difficult to assess their
overall performance. For mobile stations with quality-of-service (QoS) requirements
guaranteed by single-hop transmission with few resources, multi-hop transmission could
end up wasting additional resources through multiple hops, even though it may provide
higher end-to-end data rates. In other words, a higher end-to-end data rate does not
guarantee higher efficiency in resource utilization. Hence, the amount of resources required
to guarantee QoS should be considered when assessing multi-hop transmission performance
and the performance can be different depending on a mobile station.
In addition, the infrastructure cost increases almost linearly with the equipment capability
(Johansson et al.2004),
, and it is impossible to change the capability of the installed
equipment flexibly according to the change of the required capability. Hence, a relay station
has the limited and determined capability. Due to the limited capability, some of mobile
stations cannot transmit in multi-hop if all capability of relay station has been already fully
used for the other mobile stations. Hence, the resource management for assigning the
322 Radio Communications
limited capability to the mobile station, who can take more advantage of multi-hop
transmission, is required.
In this chapter, for utilizing the resources efficiently, the resource management considering
both the different multi-hop gains of each mobile stations and the limited capability of relay
station is provided. First of all, a brief explanation about multi-hop cellular networks is
provided in Section 2. Then, the transmission mode selection is discussed as a way to
determine whether multi-hop or single-hop transmission is the transmission mode most
appropriate for minimizing the resources used to guarantee a certain QoS in Section 3. The
multi-hop gain is defined as the amount of resources saved by using multi-hop transmission
instead of single-hop transmission, and the elements which affect the multi-hop gain are
discussed. Based on the affecting elements, two criteria for transmission mode selection are
provided and the performance of them is also verified.
In Section 4, the multi-hop user admission is discussed as a way to determine which mobile
station should be admitted or rejected to transmit data in multi-hop for maximizing the
achievable multi-hop gain using the limited capability of relay station. The multi-hop user
admission is formulated as a multi-dimensional knapsack problem, and two efficient
heuristic algorithms for multi-hop user admission are introduced and the performance of
those algorithms is discussed.
Finally, the structure of resource management including the transmission mode selection
and the multi-hop user admission is provided in Section 5.
Fig. 1 shows an example of the connectivity for this system. In Fig. 1, the k th mobile station,
MSk , is connected with the m th base station, BSm , and MSk uses the i th fixed relay station
in the m th cell, RS mi , for multi-hop transmission. A number of fixed relay stations are
placed on the relay belt. All the fixed relay stations are regenerative relays, so they decode
data received from the base station and then forward it to the target mobile stations. In this
system, three kinds of links are formed. The base station-fixed relay station links and the
fixed relay station-mobile station links occurring with two-hop transmission are denoted by
the link for the first hop ( L1 ) and the link for the second hop ( L2 ), respectively. The link for
single-hop transmission ( LS ) also denotes the base station-mobile station link. Generally, it
is assumed that L1 has good channel condition for a line-of-sight (LOS) environment, and
L2 and LS are in a non line-of-sight (NLOS) environment (Liu et al.2006).
, The LOS
assumption can be satisfied by deploying fixed relay stations at selected locations, such as
on top of a blinding.
As QoS parameters which can be handled in the physical layer, the target data rate and the
target bit-error-rate (BER) can be considered. In the regenerative relay, errors generated at
each hop are propagated to the next hop. The sum of the target bit-error-rates for each hop
in two-hop transmission should therefore be equal to or less than the target bit-error-rate in
2
B
T
two-hop transmission, B T , as T
Li B T where BLi is the target bit-error-rate on the link
i 1
where RLT is the target data rate on the link of the i th hop.
i
In OFDMA systems, each subcarrier can obtain a different channel gain. So, the received
signal to interference and noise ratio (SINR) on the n th subcarrier of the link L
( L {LS , L1 , L2} ) can be defined as
GL ( n) PI
L (n) = , L, (1)
j (n) GI (n) PI
jm
j
where is the additive Gaussian noise power and GL (n) is the channel gain of link L on
the n th subcarrier. I j is the link between an interferer in the j th cell and the target node,
and PI is the transmission power of the transmitter on that link.
If it is assumed that every link in a cell utilizes different resources and resources used for
transmission on a link are also reused at the same link in other cells concurrently, then the
link BSm - RS mi and the link BS j - RS ij ( j m ) use the same resources. Hence, in single-hop
transmission, L is the link BSm - MSk , I j is the link BS j - MSk , and PI = PBS , where PBS is
the transmission power of the base station in (1). In addition, in two-hop transmission, L is
the link BSm - RS mi , I j is the link BS j - RS mi , and PI = PBS on the first hop. L is the link RS mi -
324 Radio Communications
MSk , I j is the link RS ij - MSk , and PI = PFRS on the second hop where PFRS is the
transmission power of the fixed relay station.
Some of subcarriers are not being used when the mobile stations do not require all of
subcarriers in OFDMA systems. Hence, j ( n) in (1) is adopted to express the loading state
of the n the subcarrier in the j th cell. j ( n) = 1 if the n th subcarrier is used to transfer data
in the j th cell, while j ( n) = 0 otherwise. Therefore, the average loading state of the j th
cell, j , is defined as
1 N
j (n),
N n =1
j = (2)
where N is the total number of subcarriers in a cell. In addition, j becomes one when
there is full loading.
With adaptive modulation coding (AMC), the throughput on the link L is expressed as the
function of L (n) and BLT , as follows:
RL (n) = f ( BLT , L (n))
1 1.5 (3)
= log 2 1 T
L (n) , L, n,
Ts ln(5 BL )
where Ts is the symbol duration (Qiu and Chawla, 1999). The number of subcarriers on link
L required to guarantee the QoS for MSk , Ck , L , is determined by R T and RL (n) . For
instance, when the channel gains of all subcarriers are equal and the average loading state
for the other cells is one, then RL (1) = RL (2) = = RL , and Ck , L can be defined as
Ck , L = RT / RL k , L, (4)
where is the least integer equal to or greater than . Hence, the total numbers of
subcarriers of MSk required to transmit data with a QoS guarantee by single-hop
transmission and multi-hop transmission, CkSH and CkMH , are respectively defined as
2
CkSH = Ck , L , CkMH = Ck , L , k . (5)
S i
i =1
A fixed relay station has a limited capability due to the cost, the limitation of power
amplifier and so on. In this chapter, the number of supportable subcarriers is considered as
the capability of the fixed relay station. It means that the i th fixed relay station can support
up to N i , RX subcarriers for receiving on L1 (the link between the base station and the relay
station) and N i ,TX subcarriers for transmitting on L2 (the link between the relay station and
the mobile station) in a time. Hence, the total number of required subcarriers of each link
should be equal or fewer than the supportable number of subcarriers of a fixed relay station
in each link as follows:
Ck , L Ni , RX , Ck , L Ni,TX ,
1 2
(6)
k MU i k MU i
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 325
where MU i is the set of mobile stations who want to use the i th fixed relay station in
transmission. Fixed relay stations which have higher capabilities can generally support
more subcarriers with higher total power.
transmission, subcarriers for multi-hops, the sum of Ck , L and Ck , L , should be used. By this
1 2
relation, the multi-hop gain is affected by the loading states of other cells and the location of
the mobile station. As the loading state of other cells increases or if the mobile station is
located near the cell boundary, the SINRs of the three links decrease. At a lower SINR, the
achievable data rate is more sensitive to variation of SINR due to the log function as in (3).
This means that the farther the SINR falls, the faster the number of subcarriers required for
guaranteeing QoS increases. Hence, in this environment, Ck , L increases more rapidly than
S
0.6
0.4
0.2
=1.00
Multi-hop gain
-0.2
=0.95
-0.4
=0.90
QoS Requirements
-0.6 -6
6 4kbps/1 0
-6
=0.85 1 28 kbps/10
-0.8 -3
1 28 kbps/10
Fig. 2. Multi-hop gain based on QoS requirements (target data rate/target BER), loading
state of other cells ( ) and mobile station location (the mobile station’s QoS parameters are
128kbps / 103 for all cases except for the case of = 1.0.)
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 327
However, this increasing multi-hop gain begins to decrease when dk is above a certain
value (e.g., d k / dcell 0.7 when 0.95 in Fig. 2). The reason for this is that Ck , L is also
2
increasing rapidly due to larger interference as the mobile station moves to the cell edge,
causing the difference between CkSH and CkMH to get smaller.
On the other hand, as the mobile station approaches the base station or the loading states of
other cells decrease, the SINRs for all three links are increasing. When the SINR has
increased enough, the required number of subcarriers becomes small and it is no longer
sensitive to the variation in SINR. Hence, in this environment, all of Ck , L , Ck , L and Ck , L
S 1 2
are small, so that the multi-hop transmission would waste subcarriers because of the usage
of subcarriers for two hops. For this reason, the multi-hop transmission does not have any
gain as the loading states of other cells decrease or the mobile station approaches the base
station (e.g., dk / dcell 0.5 when 0.95 in Fig. 2).
In addition, comparing the upper three lines in Fig. 2 shows that the multi-hop gain has
different values depending on the target data rate and the target BER. Even the multi-hop
gains for these three cases become similar when the mobile station approaches the cell
boundary because of the large amount of interference, a lower target BER induces a higher
multi-hop gain because the reliable transmission is more important to mobile stations
requiring lower target BERs. The multi-hop gain also varies depending on the target data
rate due to the subcarrier allocation process.
In this subsection, the affecting elements on the multi-hop gain, the loading state of other
cells, the location of mobile station, and QoS requirement, have been discussed. Since the
multi-hop transmission can save (or waste) resources according to those elements, the multi-
hop transmission should be used selectively for efficient utilization of resources. Hence,
transmission mode selection is required to determine the appropriate transmission mode for
each mobile station: multi-hop transmission or single-hop transmission.
S i
N
RL = (1 / N ) RL (n).
n =1
As simpler way to select transmission mode, the distance based criterion can be used. As
discussed in Section 3.1, the multi-hop gain changes depending on the locations of mobile
stations. Positive gain could be obtained when a mobile station is located near the base
station. Hence, the transmission mode can be determined using the following criterion (Lee
etal., 2008):
k , D = d k d ref , k . (9)
Only Single-hop
Only Multi-hop
0.5
TMS-D
TMS-S
Blocking Probability
0.4
=1.0
0.3
=0.9
0.2
=1.0
0.1
=0.9
0
30 70 110 150 190 230 270 310 350
Total number of mobile stations in a cell
Fig. 3. Comparison of blocking probabilities based on total number of mobile stations in a cell
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 329
In Fig. 3, TMS-D and TMS-S demonstrate better performance, regardless of the loading
states of other cells, than the cases where either single-hop transmission or the multi-hop
transmission is applied without the selection process. This means that more mobile stations
can be supported in a cell with lower blocking probability when the transmission mode
selection is applied. Specifically, when the loading states of other cells are 1.0 and the
blocking probability is 0.1, only 45 mobile stations and 95 mobile stations can be supported
using conventional single-hop transmission and the multi-hop transmission, respectively.
The number of supportable mobile stations increases to 150 with TMS-D and 250 with TMS-S.
s.t 1,i : xk Ck , L N i , RX , i
1 (10)
k MU i
2,i : xk Ck , L N i ,TX , i
2
k MU i
3 : xk {0,1}, k ,
where F is the total number of fixed relay stations in a cell, and the xk is the indicator of
admission. If MSk is admitted to transmit in multi-hop using the fixed relay station,
then xk = 1 , otherwise xk = 0 and MSk should transmit in single-hop.
For each fixed relay station, there are two constraints from the limited capabilities: 1,i and
2,i based on the i th fixed relay station. The Lagrangian of multi-hop user admission
problem, Lag (u , u) , can be defined as follows:
F
i =1 k MU i k MU i
1
k MU i
2
Lag (u , u) = xk S k ui xk Ck , L N i , RX ui xk Ck , L N i ,TX
(11)
F
= Lag (ui , ui' )
i =1
330 Radio Communications
where ui and ui' are Lagrangian multipliers. Hence, it is shown that the primal problem can
be decomposed into sub-problems Z (ui , ui' ) where Z (ui , ui' ) = max Lag (ui , ui' ) . It means that
the parallel multi-hop user admissions for each fixed relay station can work independently
since the result of one fixed relay station's multi-hop user admission does not affect the
other fixed relay stations' multi-hop user admission. Therefore, we can deal with the multi-
hop user admission problem by decomposing into the independent multi-hop user
admission problems for each fixed relay station, which can be formulated as follows:
max x k Sk
k MU i (12)
s.t 1,i , 2,i , and 3 .
The problem in (12) has the equivalent form with the two-dimensional knapsack problem
(TDKP) which is a kind of multi-dimensional knapsack problem (MDKP) (Qiu & Chawla,
1999). The MDKP is a variant of the classical 0-1 knapsack problem (KP) with more than two
knapsacks.
used subcarriers on L1 and L2 by the currently admitted multi-hop users, respectively. The
priority function of the BL-MUA algorithm, U BL , k , is set by the multi-hop gain over the
aggregate resources, Sk / Ak , as follows:
S k l12 l22
U BL , k = . (11)
Ck , L l1 Ck , L l2
1 2
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 331
If at least one of N i ,TX and N i , RX is insufficient for supporting all multi-hop users in MU i ,
the multi-hop user with the lowest priority is rejected to use the fixed relay station one by
one. The priority function helps to balance between the loading states of two links while
rejecting the multi-hop user.
station generally due to the full loading of L2 , not that of L1 (the supportable subcarriers in
L2 is exhausted quickly than that in L1 ).
Therefore, the multi-hop user admission considering both loading states of L1 and L2 can
be simplified to that considering only that of L2 . In this case, the multi-hop user admission
strategy becomes a simple knapsack problem, not the two-dimensional knapsack problem
anymore. Hence, the focused link multi-hop user admission (FL-MUA) algorithm is
proposed to focus only on the loading state of L2 (Lee etal.
, 2007). As the priority function in
the FL-MUA algorithm, the multi-hop gain per the average number of required subcarriers
in L2 is used as
U FL , k Sk / Ck , L2 . (12)
When the supportable subcarriers of a fixed relay station are not sufficient, the multi-hop
users are excluded in a low-priority order one by one.
generally unknown, except for some centralized scheduling-based MAC protocols like Time
Division Multiple Access (TDMA) where the problem finds a mathematical formulation.
The main finding in (Gupta, 2000) is that per-node capacity of a random wireless network
with n static nodes scales as ( 1 ) . They assume a threshold-based link layer model in
n log n
which a packet transmission is successful if the received SNR at the receiver is greater than a
fixed threshold. Instead of this ideal link layer model, Mhatre et al. considere a probabilistic
lossy link model and show that the per-node throughput scales as only ( 1 ) instead of
n
1 (Mahtre & Rosenberg, 2006).
( )
n log n
These asymptotic bounds are calculated under assumptions such as node homogeneity and
random communication patterns. Therefore, some researches try to relax some of these
assumptions on network configuration. Jain et al. focus on interference status among the
transmitters as one of the main limiting factors on routing performance (Jain et. al, 2003).
They propose to represent interference among wireless links using a conflict graph. A
conflict graph shows, which wireless links interfere with each other, such that each edge in
the connectivity graph is represented by a vertex and there exists an edge between two
vertices if the links interfere with each other. Thus, the throughput optimization problem is
posed as a linear programming problem in which upper and lower bounds of the maximum
throughput are obtained by finding the maximal clique and independent set in the conflict
graph.
Karnik et al. extend the conflict graph idea to a conflict set (Karnik et. al, 2007). Their
rational is that an interference model can not be binary since for a given link, generally there
is a subset of links that at least one of them should be silent when the given link is
transmitting. They propose a joint optimization of routing, scheduling and physical layer
parameters to achieve the highest throughput. Both these proposals bring valuable
achievement but as they investigate the highest capacity of a network, they have to assume
TDMA instead of contention-based algorithm, which leads to probabilistic results. Hence,
they implicitly assume that data transmissions are scheduled by a central entity. Therefore
they may not be applied easily to more practical networks such as IEEE 802.11 with random
access to the channel.
Computing the optimal throughput, despite of giving a good vision to the maximum
achievable throughput in the network, may not be implementable in a real network. There
are many complicated issues such as necessity of having a distributed routing/scheduling
protocol, random quality for the wireless links, limited allowable overhead to the network,
compatibility with MAC 802.11, etc., that motivate the researchers to find a practical
solution to achieve a good performance.
priority function of the BL-MUA algorithm in (11) can be approximated to the priority
function of the FL-MUA algorithm in (12) as
U BL , k = S k l12 l22 C k , L1 l1 C k , L l2
2
S k Ck , L = U FL, k . Thus, the similar priority functions
2
are used in both algorithms, so the total numbers of admitted users of them do not have big
difference. It implies that the FL-MUA algorithm could obtain similar performance to the
BL-MUA algorithm with less complexity.
In addition, in the aspect of total capacity in a cell, more mobile stations can be supported
with guaranteeing their QoS requirements regardless of single-hop or multi-hop
transmissions using the multi-hop user admission algorithms. This can be verified by Fig. 6
which shows the blocking probability as the number of mobile stations per cell increases.
334 Radio Communications
30
w/o MUA
Total number of admitted multi-hop users FL-MUA
25
BL-MUA
H-FRS
20
15
L-FRS
10
0
1 11 21 31 41 51 60
Number of multi-hop users after transmission mode selection
Fig. 5. The total multi-hop gain obtained from the admitted multi-hop users in a fixed relay
station according to two types of fixed relay stations
w/o MUA
FL-MUA L-FRS
0.5
BL-MUA
Blocking probability
0.4
0.3 H-FRS
0.2
0.1
0
120 140 160 180 200 220 240 260 280 300
Total number of mobile stations per cell
Fig. 6. The blocking probabilities according to two types of fixed relay stations
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 335
The blocking probabilities of the multi-hop user admission algorithms are smaller than that
of the case without the algorithm over all range. Specifically, within 0.1 blocking probability,
the case without the algorithm can support at most 135 mobile stations with L-FRSs and 185
mobile stations with H-FRSs. On the other hand, the numbers of supportable mobile stations
are increased up to 180 mobile stations with L-FRSs and 223 mobile stations with H-FRSs by
the multi-hop user admission algorithms. It implies that 33 % and 20 % of the supportable
mobile stations in a cell are increased by the multi-hop user admission algorithms with L-
FRSs and H-FRSs, respectively. Thus, more mobile stations can be supported in a cell with
low blocking probability by the multi-hop user admission algorithms.
1) Once the mobile station set is defined and the required SINR information of the mobile
stations are collected in a base station, the resource management process can start. The
required SINR information is determined according to the criterion of the transmission
mode selection and it could include the received SINRs of L1 , L2 and LS .
2) During the transmission mode selection with a specific criterion (subcarrier-based or
o
distance-based criterion), the set of multi-hop users, MU i , and the set of single-hop users,
o
SU , are determined.
3) After determining the set of multi-hop users, the multi-hop user admission can be
performed. Through a multi-hop user admission algorithm (BL-MUA or FL-MUA
algorithm), the mobile stations who can finally receive data in multi-hop, MU i and the
mobile stations who should receive data in single-hop, SU , due to the lack of the capability
of the fixed relay station are determined.
o
4) The single-hop users in the sets of SU and SU are forwarded to the resource allocation
process based on SINR information of LS , and the multi-hop users in the set of
MU i undergoes the resource allocation process based on SINR information of L1 and L2 .
After all of those processes are progressed, the final transmission mode which can maximize
the multi-hop gain within the limited capability can be obtained.
According to the transmission mode selection criterion and the multi-hop user admission
algorithm, the complexity of this resource management could be changed. In the
transmission mode selection, the complexity of the transmission mode selection with the
subcarrier-based criterion is O ( KT N (log p ) p 2 ) where p is the required number of digits
used in the operations such as square root and multiplication. It is higher than the
complexity of transmission mode selection with the distance-based criterion, O ( KT p 2 ) (Lee
., 2008). Hence, the subcarrier-based selection criterion’s complexity is higher than the
et al
distance-based selection criterion, but it achieves better performance since it consider more
elements for determining an appropriate transmission mode as shown in Section 3.
In the multi-hop user admission, the FL-MUA algorithm is simpler than the BL-MUA
algorithm while the BL-MUA algorithm could achieve better performance as shown in
Section 4.
Therefore, designers can use appropriate selection criterion and multi-hop user admission
algorithm based on what the acceptable complexity level for that system is.
6. Conclusion
This chapter provides the resource management for efficient resource utilization in multi-
hop cellular networks. The resource management has two parts: the transmission mode
selection and the multi-hop user admission. The transmission mode selection is a way to
select an appropriate transmission mode between the multi-hop transmission and the
single-hop transmission for saving resources with guaranteeing QoS requirements of mobile
stations. Two kinds of selection criteria, subcarrier-based and distance-based criterion, are
provided after discussing the elements which affect the multi-hop gains such as the QoS
requirements, the mobile station’s location, and the loading states of other cells.
Resource Management with Limited Capability
of Fixed Relay Station in Multi-hop Cellular Networks 337
However, due to the limited capability of a relay station, some mobile stations cannot
transmit data in multi-hop even though they select the multi-hop transmission mode.
Hence, the multi-hop user admission is provided as a way to assign the limited capability of
a relay station to the mobile stations which can maximize the multi-hop gain. Since the
multi-hop user admission strategy is a NP-hard problem, two heuristic algorithms are
provided: the BL-MUA algorithm focused on the load balance between L1 and L2 and the
FL-MUA algorithm focused only on the load state of L2 . Through the transmission mode
selection and the multi-hop user admission, the resources can be used efficiently with
supporting more mobile stations with lower blocking probability.
7. Acknowledgement
This work was supported by Korea Science and Engineering Foundation through the NRL
Program (Grant R0A-2007-000-20043-0).
8. References
Akbar, M. M.; Rahman, M. S.; Kaykobaad M. & Manning, E. G. (2005). Solving the
Multidimensional Multiple-choice Knapsack Problem by Constructing Convex
Hulls. Computers&operations,research Vol. 33, No. 5, pp. 1259-1273, ISSN 0305-0548.
Boyer, J.; Falconer, D. D. & Yanikomeroglu, H. (2004). Multihop Diversity in Wireless
Relaying Channels. IEEE Transactions onCommunications , Vol. 52, No. 10, pp. 1820-
1830, ISSN 0090-6778.
Cho, J. & Haas, Z. J. (2004). On the Throughput Enhancement of the Downstream Channel in
Cellular Radio Networks through Multihop Relaying. IEEEJournalonSelectedAreas
inCommunications , Vol. 22, No. 7, pp. 1206-1219, ISSN 0733-8716.
Jing, S.; Zhao-yang, Z.; Pei-liang, Q. & Guan-ding, Y. (2005). Subcarrier and Power
Allocation for OFDMA-Based Regenerative Multihop Links. InternationalConference
onWirelessCommunications, orking
Netw andMobileComputing , Vol. 1, pp. 207-210.
Johansson, K.; Furuskar, A.; Karlsson, P. & and Zander, J. (2004). Relation between Base
Station Characteristics and Cost Structure in Cellular Systems. IEEE International
SymposiumonPersonal,IndoorandMobileRadioCommunications.
Ju, H.; Oh, E. & Hong, D. (2009). Catching Resource-Devouring Worms in Next-Generation
Wireless Relay Systems - Two-way Relay and Full-Duplex Relay. IEEE
CommunicationsMagazine , Vol. 47, No. 9, pp. 58-65, ISSN 0163-6804.
Lee, J.; Wang, H.; Lim, S. & Hong, D. (2007). A Multi-hop User Admission Algorithm for
Fixed Relay Stations with Limited Capabilities in OFDMA Cellular Networks. IEEE
th
81 InternationalSymposiumonPersonal, IndoorandMobileRadioCommunications , pp.
1-5, ISBN 978-1-4244-1144-3, Athens, Sept. 2007.
Lee, J.; Wang, H.; Seo, W. & Hong, D. (2008). QoS-guaranteed Transmission Mode Selection
for Efficient Resource Utilization in Multi-hop Cellular Networks. IEEETransactions
onWirelssCommunications, Vol. 7, Issue 10, pp. 3697-3701, ISSN 1536-1276.
Liu, T. etal. (2006). Radio Resource Allocation in Two-hop Cellular Relaying Network, IEEE
VehicularTechnologyConference , Vol. 1, pp. 91-95, ISBN 1-7803-9392-9, May 2006.
338 Radio Communications
On Cross-layer Routing in
Wireless Multi-Hop Networks
Golnaz Karbaschi1, Anne Fladenmuller2 and Sébastien Baey2
1InstitutNationaldeRecherche
ique
enet
Informat
enAutomatique(INRIA)–Saclay
2UniversitéPierreetMarieCurie(UPMC)–Paris
France
1. Introduction
Wireless multi-hop networks represent a fundamental step in the evolution of wireless
communications. Several new applications of such networks have recently emerged
including community wireless networks, last-mile access for people, instant surveillance
systems and back-haul service for large-scale wireless sensor networks, local high-speed P2P
networking, or connectivity to rural/remote sites which was previously limited by cables.
Wireless multi-hop networks consist of computers and devices (nodes), which are connected
by wireless communication channel, denoted as links. Since a wireless communication has a
limited range, many pairs of node cannot communicate directly, and must forward data to
each other via one or more cooperating intermediate nodes. Thus, in a unicast routing the
source node transmits its packets to a neighboring node with which it can communicate
directly. The neighboring node in turn transmits the packets to one of its neighbors and so
on until the packets reach their final destination. Each node that forwards the packets are
referred to as a hop and the set of the links, which are selected to transfer the packets, are
called the route. Different routes from any nodes to any destinations are discovered by a
distributed routing protocol in the network. Figure 1 shows an example of a wireless mesh
network in which node S2 sends data traffic to the destination D via cooperation of
intermediate nodes R1 and R2, while the other source node S1 sends out its data traffic to
the gateway via the node A.
Wireless multi-hop networks are self-expanding networks; connectivity of the network is
only due to existence of the nodes, thus the network can be expanded or decreased simply
by adding or removing a node. In contrast, cellular networks are a much more expensive
infrastructure since they need at least one base station to provide connectivity. Moreover,
the capacity of the base station is limited and so not all the nodes in the coverage area can be
connected to the network. Therefore, wireless multi-hop networks are a promising solution
to expand the network easily as they allow flexibility and rapid deployment at low cost.
340 Radio Communications
causes the wireless link capacity to depend also on the sensitivity of receivers in sensing the
environment as well as other links status in terms of their transmission range and power.
Packet reception reliability over a link depends on several parameters such as
modulation, source/channel coding of that link, the sensitivity of the link and the length of
the packets.
Radio channels have some additional features such as asymmetrical nature and non-
isotropic connectivity (Ganesan et. al, 2002; Cerpa et. al, 2003; Zhou et. al, 2004). Asymmetry
of the channels means connectivity from node A to node B might differ significantly from B
to A and non-isotropic connectivity means nodes geographically far away from source may
get better connectivity than nodes that are geographically closer.
As a result of these characteristics, the radio cell is neither binary nor static. From the
perspective of a node, the set of other nodes it can hear and the loss probability to or from
these nodes vary abruptly over time with a large magnitude. This has been widely
conrmed in real platforms (Couto et al, 2002; Ganesan et. al, 2002; Cerpa et. al, 2003; Couto,
2004). These random variations induce much more complexity for wireless networks to
guarantee performance to transmit real-time or even critical data.
Fig. 2. Different assumptions for wireless link connectivity made by minimum-hop routing
and link quality aware routing.
Furthermore, transmitting the flow over the low-rate links degrades the performance of
other flows, which are transmitted over higher rate links. The main reason of this effect is
that slow-speed links require larger amount of medium time to transmit a packet over the
shared wireless medium and so block the other flows for a longer time. Heusse et al. denotes
this problem as Performance Anomaly of 802.11b (Heusse et. al, 2003). They show
analytically that a contending node with lower nominal bit rate degrades the throughput of
faster contenders to even a lower bit-rate than the slowest sender. (Mahtre et. al, 2007;
Razandralambo et. al, 2008; Choi et. al, 2005) have evaluated and shown the same effect.
Another effect of multi-rate option for a minimum hop routing is that in multi-rate networks
broadcast packets benefit from the longer range of low rate transmissions to reach farther
nodes and so are always sent at the lowest transmission rate. Therefore, hearing the
broadcast Hello messages from a node is not a good enough basis for determining that two
nodes are well connected for transferring data packets at high rates. Lundgren et al. have
referred to this effect as the gray-zone area (Lundgren et. al, 2002). A gray zone is the
maximum area, which is covered by the broadcast messages at low rate, but not all the
nodes in this area can forward the packets at high rates.
Choosing closer nodes with shorter-range links instead of minimum-hop routes can solve
this problem. Consequently, minimum-hop metric has no flexibility in dealing with random
quality fluctuations of the links. Link quality aware routing counters these limitations by
using observation of miscellaneous parameters such as frame delivery or signal strength to
select the good paths. In this approach, link quality metric is measured and observed in
order to predict the near future quality of the links. This estimation is then used to
determine the best route.
On Cross-layer Routing in Wireless Multi-Hop Networks 343
generally unknown, except for some centralized scheduling-based MAC protocols like Time
Division Multiple Access (TDMA) where the problem finds a mathematical formulation.
The main finding in (Gupta, 2000) is that per-node capacity of a random wireless network
with n static nodes scales as ( 1 ) . They assume a threshold-based link layer model in
n log n
which a packet transmission is successful if the received SNR at the receiver is greater than a
fixed threshold. Instead of this ideal link layer model, Mhatre et al. considere a probabilistic
lossy link model and show that the per-node throughput scales as only ( 1 ) instead of
n
1 (Mahtre & Rosenberg, 2006).
( )
n log n
These asymptotic bounds are calculated under assumptions such as node homogeneity and
random communication patterns. Therefore, some researches try to relax some of these
assumptions on network configuration. Jain et al. focus on interference status among the
transmitters as one of the main limiting factors on routing performance (Jain et. al, 2003).
They propose to represent interference among wireless links using a conflict graph. A
conflict graph shows, which wireless links interfere with each other, such that each edge in
the connectivity graph is represented by a vertex and there exists an edge between two
vertices if the links interfere with each other. Thus, the throughput optimization problem is
posed as a linear programming problem in which upper and lower bounds of the maximum
throughput are obtained by finding the maximal clique and independent set in the conflict
graph.
Karnik et al. extend the conflict graph idea to a conflict set (Karnik et. al, 2007). Their
rational is that an interference model can not be binary since for a given link, generally there
is a subset of links that at least one of them should be silent when the given link is
transmitting. They propose a joint optimization of routing, scheduling and physical layer
parameters to achieve the highest throughput. Both these proposals bring valuable
achievement but as they investigate the highest capacity of a network, they have to assume
TDMA instead of contention-based algorithm, which leads to probabilistic results. Hence,
they implicitly assume that data transmissions are scheduled by a central entity. Therefore
they may not be applied easily to more practical networks such as IEEE 802.11 with random
access to the channel.
Computing the optimal throughput, despite of giving a good vision to the maximum
achievable throughput in the network, may not be implementable in a real network. There
are many complicated issues such as necessity of having a distributed routing/scheduling
protocol, random quality for the wireless links, limited allowable overhead to the network,
compatibility with MAC 802.11, etc., that motivate the researchers to find a practical
solution to achieve a good performance.
have to use small-sized probes at low transmission rate. Therefore the quality experienced
by larger data packets at variable transmission rate is not the same as probe packets.
De Couto et al proposes a simple and effective routing metric called the expected
transmission count (ETX) for 802.11-based radios employing link-layer retransmissions to
recover frame losses (De Couto et. al, 2005). ETX of a wireless link is defined as the average
number of transmissions necessary to transfer a packet successfully over a link. For
estimating the expected number of transmission of the links, each node broadcasts
periodically fixed-size probe packets. This enables every node to estimate the frame loss
ratio pf to each of its neighbors over a window time, and obtain an estimate pr of the reverse
direction from its neighbors. Then, assuming uniform distribution of error-rate over each
link, the node can estimate the expected transmission count as 1 .The ETX of
(1 p f )(1 p r )
a path is obtained by summing up the ETX of its links. Therefore, each node picks the path
that has the smallest ETX value from a set of choices. ETX has several drawbacks. First, its
measurement scheme by using identical small-sized probe packets does not reflect the actual
error-rate that the data packets experience over each link. The accuracy of the measurement
scheme of a link quality metric has a great impact on its functionality (Karbaschi et al. 2008).
Furthermore, ETX does not account the link layer abandon after a certain threshold of
retransmissions. This may induce to select a path, which contains links with high loss rate.
Koksal et al. introduce another version of ETX, called ENT (Effective Number of
Transmissions), which deals with this problem (Koksal & Balakrishnan, 2006). ENT takes
into account the probability that the number of transmissions exceeds a certain threshold
and then calculates the effective transmission count based on an application requirement
parameter, which limits this probability. Moreover, ETX by taking an inversion from the
delivery rate to get the expected number of transmissions implicitly assumes uniform
distribution for the bit error rate (BER) of the channel, which may not be correct.
The Expected Transmission Time (ETT), proposed by Draves et al. improves ETX by
considering differences in link transmission rates and data packet sizes (Draves & Zill,
2004). The ETT of a link l is defined as the expected MAC layer latency to transfer
successfully a packet over link l. The relation between ETT and ETX of a link lis expressed
as:
sl
ETTl ETX (1)
rl
where rlis the transmission rate of link land slis the data packet size transmitted over that
link. The weight of a path is simply the summation of the ETT’s of the links of that path. The
drawback of ETT is, as it is based on ETX, it may choose the paths, which contain the links
with high loss rates. (Draves & Zill, 2004) proposes also another new metric based on ETT,
which is called Weighted Cumulative Expected Transmission Time (WCETT). The purpose
of this metric is finding the minimum weight path in a multi-radio network. The WCETT is
motivated by observing that, enabling the nodes with multi-radio capability reduces the
intra-flow interference. This interference is caused by the nodes of a path of a given flow
competing with each other for channel bandwidth. For a path p, WCETT is defined as:
where X j is the number of times channel jis used along path p and is an adjustable
parameter for the moving average subject to 0 1 . (Yang et. al, 2005) shows that
WCETT is not non-isotonic and thus it is not a loop-free metric.
One of the characteristics of wireless links that can be observed is the received signal
strength. It is very attractive if link quality can be reliably inferred by simply measuring the
received signal strength from each received packet. Theoretically, the BER is expected to
have a direct correlation with the received signal-to-noise ratio (SNR) of the packet, and the
packet error rate is a function of the BER and coding. Therefore, the SNR level of the
received packets has been widely used as a predictor for the loss rate of the wireless links
(ex. Goff et. al, 2001; Dube et. al, 1997). (Aguayo et. al, 2004; Woo, 2004) through collecting
experimental data have shown that although SNR has an impact on the delivery probability,
lower values of SNR has a weak correlation with the loss rate of the links. Thus, it can not
predict the quality of the links easily. In addition, (Woo, 2004) illustrates that where traffic
load interference happens, collisions can affect link quality even though the received signal
is very strong. The main reason is that prediction of the link quality by observing the SNR
samples of the packets, counts only on the packets which are received successfully. This
leads to ignoring the congestion status of the links.
A number of proposed wireless routing algorithms collect per-link signal strength
information and apply a threshold to avoid links with high loss ratios (Goff et. al, 2001;
Yarvis et. al, 2002). In the case that there is only one lossy route to the destination, this
approach may eliminate links that are necessary to maintain the network connectivity.
to respond faster to link breakage or quality degradation and in turn will lead to a higher
throughput. However, frequent changes of the selected route induce packet reordering and
jitter issues. Moreover, reducing the updating period of the metric obviously produces a
higher amount of routing overhead. This may overload the network and could severely
degrade the network performance. The sensitivity degree of the routing metric to link
quality variations is the other parameter which obviously has a great impact on the routing
response time. The sensitivity degree depends on the way the set of measured parameters
(frame loss, delay, SNR, ...) are mapped onto the metric. Sensitivity degree S of a link quality
metric is defined as the norm of the gradient of the defined metric function with respect to
the set of parameters that measures the link quality. Let q be the set of measured parameters
and m(q) the calculated metric based on q. The sensitivity of the metric is:
S m (q ) m(q ) (3)
With a highly sensitive metric, the variations of link conditions are intensified. The path
metric, which aggregates the link metrics along a path, fluctuates faster and the probability
of changing the selected route increases. The possibly resulting route flapping may cause
higher jitter which for some applications is harmful as reordered or delayed packets may be
considered as lost ones. This section focuses on investigating the impact of a more sensitive
metric on route flapping, control overhead and real-time application performances.
measured parameters ( q ) over this link will be defined as q xy (i ) k xy (i ), l xy (i ) .The
i
success rate in delivering two frames of data and RTS from x to y denoted by m1 (qxy ) is
computed as:
i 2 (4)
m1 (qxy )
k xy (i ) lxy (i)
i 1 1
m2 (q xy ) (5)
k xy (i ) l xy (i )
i
With the same argument, if the sender gives up sending RTS or data frames, m2 (q xy ) is set
to zero.
Figure 3 illustrates the calculated success rate returned by m1 and m2 as a function of the
number of data and RTS retransmissions for each sent packet over a given link (Equation 4
and 5). As shown in this figure, an interesting property of both m1 and m2 is that their
variations over the range of RTS and data retransmission numbers is not uniform. Indeed,
both metrics are much more sensitive to a given variation of its arguments k xy and l xy when
these parameters ranges between 1 and 4 than for values ranging between 6 to 10. In other
words, the quality variations of a poor link are far less reflected in the metric than the
variations of a high quality link. This is desirable since if a link does not work well and there
is no alternate much higher quality link, it is not worth changing the selected path. In
counterparts, quality variations of a good links have a much greater impact on the
throughput of that link. As a result, good quality links should be more prone to changes.
On Cross-layer Routing in Wireless Multi-Hop Networks 351
Fig. 3. Measured link quality using m1 and m2 function of the number of Data and RTS
frames retransmissions.
From this point of view, the two metrics differ. Indeed, m2 differentiates better than m1 a
small degradedness from a former high quality measured value. As clearly shown in
Figure 3, both functions return 1 when no retransmission occurs which confirms the value of
100% success for the transmission while by lessening in link quality, m2 drops more sharply
than m1 . For example, an increase in the number of data transmissions from 3 to 4 causes
32% decrease in m2 and about 15 % in m1 . Therefore, m 2 is called as Faster FTE (FFTE).
The variations of the metric with respect to quality changes can be evaluated using the
sensitivity degree (Equation 3). Figure 4 compares the sensitivity degree of m1 and m2 using
the difference S m1 ( q xy ) S m 2( q xy ) . We see that for all the variations range of k xy (i ) and
l xy (i ) , S m 2 is larger or equal to S m1 .
Consequently, m2 has an even greater sensitivity in detecting changes in the estimated link
quality than m1 . m2 obliges the routing agent to be more reactive and changes the selected
route more often than m1 .
352 Radio Communications
comparison to the MH metric in a time duration of 2000 s. Figure 5 also shows that m 2
outperforms the two other metrics. This confirms that m 2 , the more sensitive metric, is able
to find a higher throughput path faster than m 1 and so reduces the packet drops.
Fig. 5. Average received throughput with same routing update period (T = T 0 = 15s)
Comparing in Figure 6 the number of times that one dedicated flow flaps per second reveals
that a link quality metric leads the routing to change the selected path more frequently. This
effect is even greater when the sensitivity of the metric increases (m 2 compared to m 1 ). To
show the impact of the metrics on the routing overhead, the average bit rate of control
messages for the three metrics are compared in Figure 7. This reveals that the overhead
generated by m 1 and m 2 are nearly the same and both more than MH’s overhead. The reason
is that the higher sensitivity of m 1 and m 2 generates more paths changes than MH. This
obliges the nodes to piggy back more neighbors entries into their broadcast message and
makes it larger, thus raising the routing overhead. Another cause of overhead increase is
that a link quality metric needs a larger field in the control message than a hop metric (32
bits compared 16 bits). This enlarges the overall size of the control messages.
354 Radio Communications
To see the efficiency of functionality of the link quality metrics, the evaluation is repeated by
adjusting the amount of overhead to an identical value for the three metrics by tuning the
value of T to 30 s. As explained in Section 3 this may reduce the throughput of m 1 and m 2
due to lower update rate of the metric. However, the average throughput comparison shows
that m 2 still brings a much higher throughput (Figure 8).
On Cross-layer Routing in Wireless Multi-Hop Networks 355
Flapping the selected route may cause the consecutive packets to be routed through
different routes. The subsequent instability of the selected path may cause a higher jitter
level. Figure 9 illustrates the measured jitter per packet for the three metrics during a sample
interval of a VoIP connection. Table 1 gives the mean and standard deviation of the jitter
measured using the three metrics, which gives an idea of the spreading of the jitter
distribution.
MH m1 m2
mean (ms) 9.5 9.6 9.43
std (ms) 20 25 30.2
Table 1. Jitter statistics
The jitter experienced using m 2 is much greater than the jitter observed with m 1 and MH.
High jitter levels can have a great impact on the perceived quality in a voice conversation
and as a result, many service providers now account for maximum jitter levels.
356 Radio Communications
Most of the VoIP end-devices use a de-jitter buffer to compensate the jitter transforming the
variable delay into a fixed delay (Khasnabish, 2003). Thus, high levels of jitter increase the
network latency and cause a large number of packets to be discarded by the receiver. This
may result in severe degradation in call quality. Therefore, real-time applications may not
benefit from the higher throughput obtained with a more sensitive metric.
4. Conclusion
Wireless multi-hop networks are a promising technology to provide flexibility and rapid
deployment for connecting the users at low cost. This chapter has examined the issues of
link quality aware routing for wireless multi hop networks. Since the quality of wireless
communications depends on many different parameters, it can vary dramatically over time
and with even slight environmental changes. The peculiarity of wireless links and strong
fluctuations in their quality lead to challenges in designing wireless multi hop routings.
Therefore the necessity of having more efficient routing rather than the ones proposed for
wired networks has arisen. Traditional hop count shortest-path routing protocols fail to
provide reliable and high performance because of their blindness to under layer status. This
draws lots research efforts to improve the routing performance through choosing good
paths via transferring link status information from under layers.
This chapter addressed the stability issues of link quality aware routing which can be
extremely important specially in providing quality of service for jitter sensitive applications.
It was argued that having a reactive routing to cope with random changes of wireless links
is essential. A quantitative tool for estimating the sensitivity of a link quality metric was
introduced which indicated how strongly the metric reflects the quality changes. It was
shown that the sensitivity has a great impact on the routing adaptivity. To illustrate this,
On Cross-layer Routing in Wireless Multi-Hop Networks 357
two comparable link quality metrics (FTE and FFTE) with different sensitivity were
introduced and the routing performance observed with these metrics was compared by
simulation. It was shown that having a sensitive metric can improve the routing
functionality in terms of transferring a higher number of data packets through the network.
However, one resulting side-effect is more oscillation in path selection. This leads to higher
jitter level which a delicate application such as VoIP may not tolerate.
5. References
Adya, A. ; Bahl, P. ; Padhye, J. ; Wolman, A. & Zhou, L (2004). A multi-radio unication
protocol for ieee 802.11wireless networks, FirstInternationalConferenceonBroadb
Networks (BROADNETS’04) , ISBN 0-7695-2221-1, pp. 344–354, October 2004, San
Jose, California, USA, IEEE Computer Society, 2004.
Aguayo, D. ; Bicket, J. ; Biswas, S. ; Judd, G. & Morris, R. (2004). Link-level measurements
from an 802.11b mesh network, Proceedings of ACM Sigcomm , Vol. 34, No. 4, pp.
121–132, Aug-Sept 2004, ACM, 1-58113-862-8/04/0008.
Awerbuch, B. ; Holmer, D. & Rubens, H. (2004). High throughput route selection in multi-
rate ad hoc wireless networks, Kluwer Mobile Networks and Applications (MONET)
JournalSpecialIssueon etIntern
WirelessAccess:1.208andBeyond , Vol. 2928, pp. 253–
270, ISBN 3-540-20790-2, January 2004.
Cerpa, A. ; Busek, N. & Estrin, D. (2003). Scale: A tool for simple connectivity assessment in
lossy environments, In CENS Technical Report 021 , September 2003, experimental
evaluation of wireless links.
Conti, M. ; Maselli, G. ; Turi, G. & Giordano, S. (2004). Cross-Layering in Mobile Ad Hoc
Network Design, Computer , Vol. 37, No. 2, pp. 48-51, Feb. 2004,
doi:10.1109/MC.2004.1266295
Choi, S. ; Park, K. & Kim, C. (2005). On the performance characteristics of WLANs:
Revisited. Proceedings of the 205 ACM SIGMETR ICS international conference on
Measurementandmodelingofcomputer , pp.systems
97-108, ISBN 1-59593-022-1, Banff,
Alberta, Canada, ACM, New York, USA.
Dang, T. D. ; Sonkoly, B. & Molnar, S. (2004). Fractal analysis and modelling of VoIP traffic,
In International Telecommunications Network Strategy andISBN: Planning Sympos
3-8007-2840-0, pp. 556–562, June 2004, DOI 10.1109/NETWKS.2004.1341826
De Couto, D. S. J. ; Aguayo, D. ; Chambers, B. A. & Morris, R. (2002). Performance of
multihop wireless networks: Shortest path is not enough. Proceedings of the First
Workshop on Hot Topics in Networks (HotNets- . Princeton,
I) New Jersey: ACM
SIGCOMM, October 2002.
De Couto, S. J. D. (2004). High-throughput routing for multi-hop wireless networks. Ph.D.
dissertation, Department of Electrical Engineering,and Massachusetts
Computer Science
Institute of Technology, June 2004.
De Couto, D. S. J., Aguayo, B ; Chambers, B. A. & Morris R. (2005). A high-throughput path
metric for multi-hop wireless routing, Wireless Networks , Volume 11 , Issue 4, July
2005, pp 419 – 434, ISSN:1022-0038.
Draves, R. ; Padhye, J. & Zill B. (2004). Routing in multi-radio, multi-hop wireless mesh
networks, Proceedings of the 10th annual international conference on Mobile
and Networking , pp. 114–128, ISBN:1-58113-868-7, International Conference on
358 Radio Communications
Mobile Computing and Networking, Philadelphia, PA, USA, ACM, New York, NY,
USA, 2004.
Dube, R. ; Rais, C. D. ; Wang, K.-Y. & Tripathi, S. K. (1997). Signal stability-based adaptive
routing (ssa) for ad hoc mobile networks, IEEE Personal Communications , Vol 4, pp
36-45, February 1997, Digital Object Identifier 10.1109/98.575990
Ganesan, D. ; Krishnamachari, B. ; Woo, A. ; Culler, D. ; Estrin, D. & Wicker, S. (2002).
Complex behavior at scale: An experimental study, UCLA Computer Science, Tech.
Rep. TR 02-0013, 2002.
Goldsmith A. & Wicker S. (1998). Design challenges for energy-constrained ad hoc wireless
networks,IEEEWirelessCommunications , vol. 9, no. 4, pp. 8–27, 2002.
Goff, T. ; Abu-Ghazaleh, N. B. ; Phatak, D. S. & Kahvecioglu, R. (2001). Preemptive routing
in ad hoc networks, ProceedingofACM/IEEEMobiCom, pp. 43–52, ISBN 1-58113-422-
3, July 2001, ACM SIGMOBILE, Rome, Italy, 2001.
Gupta P. & Kumar P. R. (2000). The capacity of wireless networks, IEEE Transactions on
InformationTheory , March 2000, Vol. 46, No. 2, pp. 388–404, Digital Object Identifier
10.1109/18.825799.
Hedrick, C. (1998). Routing information protocol. Network working group , RFC 1058, The
Internet Society, June 1988.
Heusse, M. ; Rousseau, F. ; Berger-Sabbatel, G. & Duda, A. (2003) . Performance anomaly of
802.1b , Proceedings of INFOCOM, Twenty-Second Annual Joint Conference of the
IEEE Computer and Communications Societies. Vol. 2, pp. 836–843, 2003, ISBN: 0-
7803-7752-4, ISSN: 0743-166X.
Iannone, L.& Fdida, S. (2006). Evaluating a cross-layer approach for routing in wireless
mesh networks, Telecommunication Systems Journal Springer) ( Special issue: N
Generation Networks - Architectures, Protocols, , vol. 31, no. 2–3, pp. 173–
Performance
193, March 2006.
Jain, K. ; Padhye, J. ; Padmanabhan, V. & Qiu L. (2006). Impact of interference on multi-hop
wireless network performance , MobiCom '03: Proceedings of the 9th annual
international conference on Mobile computing and networking, pp. 66--80, ACM
Press, New York, NY, USA, 2003.
Johnson D. B. & Maltz, D. A. (1994). Dynamic source routing in ad-hoc wireless network
Proceedings of the Workshop on Mobile Computing Systems and Application, pp.
158–163, December 1994.
Karbaschi, G. (2008). Link Quality Aware Routing in IEEE 802.11 Multi Hop Networks, PhD
Thesisdissertation,of PierreetMarie,Curie
University April 2008.
Karbaschi, G. & Fladenmuller, A. (2005). A link-quality and congestion-aware cross layer
metric for multi-hop wireless routing, Proceedings of IEEE Mobile Ad hoc and Sensor
SystemsMASS) ( , Nov. 2005.
Karbaschi, G. ; Fladenmuller, A. & Wolnger, B. E. (2008) Link-quality measurement
enhancement for routing in wireless mesh , Proceedings
networksof International
Symposium on a World of Wireless, Mobile and Multimedia tworks,
Ne 208 WoWMoM
(
208), ISBN: 978-1-4244-2099-5, pp. 1-9, Digital Object Identifier:
10.1109/WOWMOM.2008.4594842
Keshav, S. (1991). A control-theoretic approach ow controlto, ACM SIGCOMM Computer
Communication Review, Vol. 21, no. 4, pp. 3–15, 1991, ISSN 0146-4833
On Cross-layer Routing in Wireless Multi-Hop Networks 359
Khanna, A. & Zinky, J. (1989). The revised arpanet routing , ACM SIGCOMM
metric Computer
Communication Review, Vol. 19, No. 4, pp. 45–56, ACM New York, NY, USA 1989,
ISSN 0146-4833.
Karnik, A. ; Iyer A. & Rosenberg C. (2008). Throughput-optimal guration
con of wireless
networks, IEEE/ACM Transaction in Networking, vol 16, Issue 5, Oct. 2008, pp
1161-1174, Digital Object Identifier 10.1109/TNET.2007.909717.
Khasnabish, B. (2003), Implementing Voice over IP, 1st edition, ISBN-10: 0471216666, ISBN-
13: 978-0471216667, Wiley-Interscience publisher, 2003.
Koksal C. E. & Balakrishnan H. (2006). Quality-aware routing metrics for time-varying wirel
mesh networks , IEEE Journal onSelected Areas mmunication
of Co Special Issue on Multi-
HopWirelessMeshNetworks , vol. 24, no. 11, pp. 1984–1994, November 2006.
Kyasanur, P. & Vaidya, N. H. (2006). Routing and link-layer protocols for multi channel
multi-interface ad hoc wireless networks, ACM SIGMOBILE Mobile Computing and
CommunicationsReview , vol. 10, no. 1, pp. 31 –43, ISSN:1559-1662, Jan. 2006.
Lundgren, H. ; Nordstrom, E. & Tschudin, C. (2002). Coping with communication grey
zones in IEEE 802.11b based ad hoc networks. ProceedingsofIEEEIntlSymposiumon
a WorldofWireless, MobileandMultimedia NetworksWoWMoM) ( pp. 49–55,
, Atlanta,
Ga, USA, September 2002.
Mhatre, V. P. ; Lundgren, H. & Diot, C. (2007). Mac-aware routing in wireless mesh
networks. Proceedings of theFourth Annual Conference onWireless onDemand Net
Systems and Services WONS’0 ( ),7 pp. 46–49, Jan. 2007, ISBN: 1-4244-0860-1, Digital
Object Identifier 10.1109/WONS.2007.340461, 2007-04-02.
Mhatre V. & Rosenberg C. (2006). The impact of link layer model on the capacity of a
Next random ad hoc network, Proceedings of IEEE International Symposium on Information
Theory (ISIT), pp. 1688–1692, July 2006, Digital Object Identifier
10.1109/ISIT.2006.261642
Moy, J. (1998). OSPF version 2, network working group, RFC,238 The Internet Society, April
1998.
Park V. D. & Corson M. S. (1997). A highly adaptive distributed routing algorithm for
mobile wireless networks, Proceedings of IEEE Infocom , vol.3, pp.1405–1413, April
ks. 1997.
Perkins, C. E. & Bhagwa, P. (1994). Highly dynamic destination-sequenced distance-vector
routing (dsdv) for mobile computers,” ACM SIGCOMM Computer Communication
Review , pp. 234–244, 1994, ACM, New York, NY, USA, ISSN 0146-4833
Perkins C. E. & Belding-Royer E. (1999). Ad-hoc on-demand distance vector routing,
Proceedings of the nd 2 IEEE Workshop on Mobile Computing Systems and,Applicatio
pp. 90–100, New Orleans, LA, USA, Feb 1999.
Perkins C. E. & Belding-Royer E. (2003). Ad hoc On-demand Distance Vector (aodv) routing,
InternetRFC3561, The Internet Society, July 2003.
Perkins C. E. & Bhagwa, P. (1994). Highly dynamic destination-sequenced distance-vector
routing (dsdv) for mobile computers. Association for Computing Machinery’s Special
Interest GrouponDataCommunication’9 , Volume 24,
4 Issue 4 October 1994, ISBN: 0-
89791-686-7, pp. 234–244, ACM, New York, NY, USA
Proakis, J. (2001). Digital Communications, McGraw-Hill , Fourth edition, ISBN 0-07-232111-
3, New York.
360 Radio Communications
1. Introduction
The IEEE802.16-2004 Air Interface standard (IEEE Std 802.16-2004, 2004), which is the basis
of the WiMAX technology, is the most recent solution for the provision of fixed broadband
wireless services in a wide geographical scale and proved to be a real effective solution for the
establishment of wireless metropolitan area networks (WirelessMAN).
On February 2006, the IEEE802.16e-2005 amendment (IEEE Std 802.16e-2005, 2006) to the
IEEE802.16-2004 standard has been released, which introduced a number of features aimed
at supporting also users mobility, thus originating the so-called Mobile-WiMAX profile. Cur-
rently IEEE802.16 Task Group (TG) and WiMAX Forum are developing the next generation
Mobile-WiMAX that will be defined in the future IEEE802.16m standard (Ahmadi, 2009; Li
et al., 2009).
Although the Mobile-WiMAX technology is being deployed in the United States, Europe,
Japan, Korea, Taiwan and in the Mideast, there are still ongoing discussions about the poten-
tial of this technology. What is really remarkable, in fact, with regard to the Mobile-WiMAX
profile, is the high number of degrees of freedom that are left to manufacturers. The final deci-
sion on a lot of very basic and crucial aspects, such as, just to cite few of them, the bandwidth,
the frame duration, the duplexing scheme and the up/downlink traffic asymmetry, are left
to implementers. If follows that the performance of this technology is not clear yet, even to
network operators.
This consideration motivated our work, which is focused on the derivation of an analyti-
cal framework that, starting from system parameters and implementation choices, allows to
evaluate the performance level provided by this technology, carefully taking all aspects of
IEEE802.16e into account. In particular, the analysis starts from the choices to be made at the
physical layer, among those admitted by the specification, and "goes up" through the proto-
col pillar to finally express the application layer throughput and the number of supported
voice over IP (VoIP) users, carefully considering "along the way" all characteristics of the the
medium access control (MAC) layer, the resource allocation strategies, the overhead intro-
duced, the inherent inefficiencies, etc.
Let us remark that the analytical framework described in the following can be used not only as
a mean to gain an insight into the IEEE802.16e performance, but, above all, to drive the choices
of network operators in terms of system configuration. This is particularly true considering
that beside the model derivation, here we provide criteria, equations and algorithms to make
the best choices from the viewpoint of the system efficiency.
* Portions reprinted, with permission, from Proceedings of IEEE International Symposium on Personal,
Indoor and Mobile Radio Communications, 2007 (PIMRC 2007). ©2007 IEEE.
362 Radio Communications
2. IEEE802.16 overview
Before starting our analysis let us introduce the most relevant characteristics of the IEEE802.16
technology, that are recalled hereafter.
The result of the IEEE802.16 TG/WiMAX Forum activity is a complete standard family
(IEEE Std 802.16-2004, 2004; IEEE Std 802.16e-2005, 2006) that specifies the air interface for
both fixed and mobile broadband wireless access systems, thus enabling the convergence of
mobile and fixed broadband networks through a common wide area broadband radio access
technology and a flexible network architecture.
The IEEE802.16 standard family supports four transmission schemes:
• WirelessMAN-SC, which has been mainly developed for back-hauling in line-of-sight
(LOS) conditions and operates in the 10 GHz - 66 GHz frequency range adopting a
single carrier modulation scheme;
• WirelessMAN-SCa, which has the same characteristics of WirelessMAN-SC but oper-
ates even in non-LOS conditions in frequency bands below 11 GHz;
• WirelessMAN-OFDM, which has been developed for fixed wireless access in non-LOS
conditions and adopts the orthogonal frequency division multiplexing (OFDM) modu-
lation scheme in frequency bands below 11 GHz;
• WirelessMAN-OFDMA, which has been conceived for mobile access and adopts the
orthogonal frequency division multiple access (OFDMA) scheme in the 2 GHz - 6 GHz
frequency range.
Since we are interested in the mobility enhancement provided by the IEEE802.16e amend-
ment, here we focus our attention on the WirelessMAN-OFDMA transmission scheme.
WirelessMAN-OFDMA is based on the OFDMA multiple-access/multiplexing technique
which is, on its turn, based on an NFFT subcarriers OFDM modulation scheme (Cimini, 1985;
Van Nee & Prasad, 2000) with NFFT equal to 128, 512, 1024 or 2048.
The NFFT subcarriers form an OFDM symbol and can be further divided into three main
groups:
• data subcarriers, used for data transmission;
• pilot subcarriers, used for estimation and synchronization purposes;
• null subcarriers, not used for transmission: guard subcarriers and DC subcarrier.
Considering sequences of OFDM symbols, it is easy to understand that transmission resources
are available both in the time domain, by means of groups of consecutive OFDM symbols,
and in the frequency domain, by means of groups of subcarriers (subchannels); it follows that
a given mobile station can be allocated one or more subchannels for a specified number of
symbols.
Several different schemes (in the following, permutation schemes) for subcarriers grouping
are provided by the specification, with different possibilities for the downlink and uplink
phases: among them we can cite DL-FUSC (downlink full usage of subchannels), DL-PUSC
(downlink partial usage of subchannels), DL-TUSC (downlink tile usage of subchannels), or
UL-PUSC (uplink partial usage of subchannels) (see the first column of table 1 for a complete
list).
The minimum OFDMA time-frequency resource that can be allocated is one OFDMA-slot,
which corresponds to 48 data subcarriers that can be accommodated in one, two or three
OFDMA symbols, depending on which kind of permutation scheme (DL-FUSC, DL-PUSC,
UL-PUSC, ...) is adopted; in particular:
Mobile WiMAX Performance Investigation 363
DOWNLINK
DL-FUSC 2 8 16 32 1
DL-PUSC 3 15 30 60 2
DL-OptFUSC 2 8 16 32 1
DL-TUSC1 4 17 35 70 3
DL-TUSC2 4 17 35 70 3
UPLINK
UL-PUSC 4 17 35 70 3
UL-OptPUSC 4 17 35 70 3
differences among these services are on the uplink resource allocation; resource allocation
is, in fact, defined by the base station, which cannot have a perfect knowledge of all uplink
buffers in any instant. The interested reader can find a detailed description of the scheduling
services in (IEEE Std 802.16-2004, 2004) and (IEEE Std 802.16e-2005, 2006).
Fig. 2. Analytical framework for the derivation of the amount of OFDMA-slots per down-
link/uplink subframe.
Given BW, the value of an auxiliary parameter n (called sampling factor), introduced by the
specification, can be immediately derived: in particular, n = 28/25 if BW is a multiple of 1.25
MHz, 1.5 MHz, 2 MHz or 2.75 MHz, otherwise n = 8/7.
Once BW and n are known, we can derive the sampling frequency Fs , which is defined by the
specification as follows:
BW
Fs = n · · 8000, (1)
8000
having denoted with x the highest integer not greater than x.
Given the number NFFT of OFDM subcarriers, the subcarriers spacing ∆ f and the useful
OFDM symbol duration Tu can be immediately derived from the knowledge of Fs :
Fs 1
∆f = NFFT , Tu = ∆f . (2)
The guard time interval Tg and, finally, the OFDM symbol duration Ts follow:
Tg = G · Tu , Ts = Tu + Tg . (3)
rived:
MAX TF − TTGmin − RTGmin
NSy = − NPr , (4)
Ts
as depicted in figure 2.
scheme (denoted in the following with the superscript m) requires the allocation of a multiple
of an integer (1, 2 or 3, depending on the permutation scheme) number of OFDM symbols NSy m
m m
(NSydl in the downlink and NSyul in the uplink, respectively) and the sum NSy of uplink and
downlink symbols allocated for each permutation scheme is bounded by the above assessed
MAX :
NSy
Mdl −1 Mul −1
m m MAX
∑ NSy dl
+ ∑ NSy ul
= NSy ≤ NSy , (5)
m =0 m =0
where Mdl (Mul ) is the amount of permutation schemes adopted in the downlink (uplink)
subframe.
As recalled in section 2, at least two OFDM symbols are allocated with DL-PUSC in the down-
link subframe, in order to carry frame management messages, while three OFDM symbols are
allocated with UL-PUSC in the uplink subframe, in order to carry signalling common chan-
nels; here we assume that the entire first two OFDM symbols in downlink (with DL-PUSC)
and the entire first three OFDM symbols in uplink (with UL-PUSC) are used for this scope,
denoting the related overhead with NOSydl = 2 and NOSyul = 3.
Moreover, the rest of the sub-frame is supposed to be transmitted adopting only one permu-
tation scheme. Thus, the superscript correspondent to the adopted permutation scheme will
be omitted in the following and (5) is rearranged as follows:
MAX
NOSydl + NSydl + NOSyul + NSyul = NSy ≤ NSy , (6)
where NSydl and NSyul now represent the amount of downlink/uplink symbols available for
user data.
Let us observe that the choice of NSydl and NSyul is not only constrained to fulfill (6), but is
also a consequence of the desired asymmetry between the downlink and uplink phases of the
TDD frame, hereafter referred to as “desired asymmetry factor” and denoted as AFin .
Let’s keep in mind, in this regard, that the minimum resource that can be allocated is the
OFDMA-slot and that the number of slots in a subframe is related not only to the number of
OFDM symbols within the frame, but also to the adopted permutation scheme; as an exam-
ple, with NFFT = 2048 subcarriers two OFDM symbols adopting the DL-PUSC permutation
scheme carry 60 slots while three OFDM symbols adopting UL-PUSC carry 70 slots (refer to
(8) and table 1). Thus, defining AFSl as the asymmetry factor in terms of ratio between the
amounts of downlink and uplink slots:
NSldl
AFSl = , (7)
NSlul
and deriving the amount of OFDMA-slots available for data transmission in the down-
link/uplink subframe through the equation (where dl/ul denotes downlink or uplink as al-
ternatives):
NSydl/ul
NSldl/ul = NChdl/ul · , (8)
NGSdl/ul
the desired asymmetry AFin can be approached finding the values NSydl and NSyul that make
AFSl as near as possible to AFin . In general, a perfect matching between AFin and AFSl will be
not possible, due to the system constrains.
The detection of NSydl and NSyul in such a way to minimize the resource wasting (that
is, OFDM symbols within the frame that are unused because unable to accomodate entire
368 Radio Communications
OFDMA-slots) for a given AFin can be carried out by means of the algorithm provided in
appendix I.
Equation (8) represent the final outcome of this section since, jointly with the constraints given
by the desired asymmetry factor and system choices (bandwidth, guard interval, number of
subcarriers, frame duration, ....) accounted for by the previous equations, allows to derive the
amount of OFDMA-slots available in each subframe for data transmissions.
Please refer to figure 2 for a pictorial representation of the whole methodology described in
this section.
Fig. 3. Diagram of the calculation from the packet size to the number of OFDMA-slots that are
needed to accomodate it.
Also in this case, in order to help the reader, the analytical framework outlined in the following
has been summarized in a pictorial fashion, reported in figure 3.
Let us consider the aforementioned ASDUs of S AS bytes; as represented in figure 1 they even-
tually arrive at the MAC layer with the addition of the higher layers overheads of O HL bytes,
thus originating MAC layer service data units (MSDUs) of S MS bytes:
S MS = S AS + O HL . (9)
The MSDUs are then fragmented into a fixed number NF← MS of fragments, each of them of
size S Fmax except, in case, the last one. This one has a size of S Flast ≤ S Fmax bytes; thus:
S MS
NF← MS = , (10)
S Fmax
S Flast = S MS − [( NF← MS − 1) · S Fmax ] (11)
where x indicates the lowest integer not less than x.
It follows that each MSDU is carried at the MAC layer by:
• (NF← MS − 1) fragments of size S Fmax ,
• 1 fragment of size S Flast .
Of course, if S MS is a multiple of S Fmax , then S Flast =S Fmax .
Let us assume now, for the sake of simplicity, that no packetization is performed at the MAC
layer; each fragment is therefore mapped onto one MPDU with the addition of the MAC
layer overhead of O M bytes. It follows that the number NMP← MS of MPDUs needed to carry
a single MSDU is equal to NF← MS . Since all but (in case) the last MPDU have the same size,
we have:
370 Radio Communications
These equations show that when the MPDU size is not a multiple of the amount of bytes
carried by a single OFDMA-slot, some padding bits have to be added in order to fill the last
slot, wasting some resources.
Thus, a single MSDU is transmitted with the generic transmission mode j through:
• ( NMP← MS − 1) MPDUs of size S MPmax , accommodated into
( j)
( NMP← MS − 1) · NSl ← MPmax slots,
( j)
• 1 MPDU of size S MPlast , accommodated into NSl ← MPlast slots.
( j)
Assuming no resource wastage due to data regions’ allocations 1 , the number NSl ← MS of
OFDMA-slots needed to carry a complete MSDU adopting transmission mode j is given by:
( j) ( j) ( j)
NSl ← MS = (( NMP← MS − 1) · NSl ← MPmax ) + NSl ← MPlast . (14)
Recalling that the scope of the analysis reported in this section was to derive the amount of
OFDMA-slots needed to accomodate an ASDU, we can state that (14) is the final outcome of
this section since, jointly with the equations reported in subsection 4.2, it achieves our end.
12
10
ThrA
8
Throughput [Mbps]
ThrP
0
0 500 1000 1500
S [Byte]
Fmax
Fig. 4. Comparison between physical layer and application layer throughput (Thr P and Thr A )
varying the fragment (ARQ block) maximum size S Fmax . Transmission modes 0 and 6.
DL-PUSC has been considered in the downlink and UL-PUSC in the uplink, with AFin =
1 and AFSl = 1.37 (following the equations reported in section 3.3, we obtain NSydl = 16,
NSyul = 15, NSldl = 480 and NSlul = 350). Transmission modes 0 and 6 are considered.
Mobile WiMAX Performance Investigation 373
The comparison between the dashed and solid curves highlights the reduction of throughput
due to both the allocation procedure of ASDUs and the overhead. As can be noted, small
variations in the choice of S Fmax may affect the system performance, due to the slot granularity
in the physical resource allocation and the impossibility to further divide a fragment (i.e., an
ARQ block).
These curves also show that a too small value of S Fmax should not be chosen (this is mainly a
consequence of the presence of the overheads O HL and O M ). However, although considering
error prone transmissions is out of the scope of the present work, it should be clear that a large
value of S Fmax should be avoided too, since each ARQ block must be entirely retransmitted if
not correctly received.
Figure 5 deepens the previous results focusing the attention on the application layer through-
put and considering all transmission modes.
A direct comparison of the throughput perceived adopting the different transmission modes
as a function of S Fmax shows that the choice of S Fmax is a tricky task, since there is no optimal
value providing the maximum throughput for all transmission modes.
As can be observed, a number of choices for S Fmax are highlighted through vertical lines and
the correspondent throughput values with circles. These values are somehow suboptimal and
have been chosen according to the following steps:
1. for each value of S Fmax in the range [1, 500 bytes] the throughput values achieved by
each transmission mode normalized to the peak value for that mode were summed into
SU MThr (S Fmax );
2. the values of S Fmax that brought to relative maximum of SUMThr (S Fmax ) were found,
neglecting those values of S Fmax that do not give an absolute value of SUMThr (S Fmax )
higher than the previous one.
The values of S Fmax derived as previously described (S Fmax = 98, 125, 134, 152, 206, 254, 422
bytes) allow to reduce resource wasting when a single fragment (ARQ block) is transmitted in
a single MPDU.
In figure 6 the value of AFSl is compared to AFApp , which is defined as the ratio between the
maximum application layer throughput in downlink and the one in uplink. The DL-PUSC
and UL-PUSC permutation schemes have been considered in the downlink and in the uplink,
respectively; AFin = 1, AFin = 2 and AFin = 3 have been assumed as desired asymmetry
factors. Transmission mode 6 only.
As can be noted, a good match between AFSl and AFApp is achieved for all the considered
AFin (avoiding to consider too large values for S Fmax ). On the contrary, it is quite hard to
exactly respect the desired AFin with no wasting: note, in fact, that the cases AFin = 1 and
AFin = 2 bring to the same result (that is, the need to minimize the resource wasting brings,
in both cases, to the same choice of NSydl and NSyul ).
In figure 7 the throughput is shown as a function of the number of OFDM symbols available
for data transmission in the downlink subframe for all possible permutation schemes (refer
to table 1). In this case, NSydl is set and the correspondent AFSl follows as a consequence (see
section 3.3). Transmission mode 6 and S Fmax = 206bytes have been considered. This figure
also highlights that an increase (reduction) in NSydl has an effect only if it involves at least NGS
symbols.
374 Radio Communications
10
9 Mode 6
8
Mode 5
7
Throughput [Mbps]
6
Modes 3,4
5
4
Mode 2
3
Mode 1
2
Mode 0
1
0
0 100 200 300 400 500
SFmax [byte]
Fig. 5. Application layer throughput (Thr A ) varying the fragments (ARQ blocks) maximum
size S Fmax for all transmission modes. The values of S Fmax that allow to have a good occupa-
tion adopting any possible transmission mode are marked with vertical lines and small circles
(o); they correspond to S Fmax = 98, 125, 134, 152, 206, 254, 422 bytes
4
AF =3
in
3.5
2.5
Asymmetry Factor
AF =1,2
in
1.5
AF
App
0.5 AFSl
AF
App
AFSl
0
0 500 1000 1500
S [byte]
Fmax
Fig. 6. Comparison between AFSl and AFApp , given AFin = 1, AFin = 2 and AFin = 3.
Transmission mode 6.
20
DL−FUSC/DL−OptFUSC
18 DL−PUSC
DL−TUSC1/DL−TUSC2
16 UL−PUSC/UL−OptPUSC
14
Throughput [Mbps]
12
10
0
0 5 10 15 20 25 30
NSy
dl
Fig. 7. Comparison of application layer throughput (Thr A ) adopting the various permuta-
tion schemes, varying the number of downlink useful symbols NSydl . Transmission mode 6.
S Fmax = 206 bytes.
A description of the considered VoIP codecs and scheduling services is given before entering
into the details of the analytical model.
will adopt ν = 1 when no silence suppression is activated and ν < 1 in the case of silence
suppression.
In the latter case, in order to derive a realistic value of ν, we simulated the dynamic of a con-
versation according to a detailed model that takes into account also periods of simultaneous
talks or silences of the two parties, and the short gaps through the speeches (Stern et al., 1996).
This model gives a 33% of voice activity over the total conversation duration for each of the
two parties. It must be noted, however, that since 8 full packets are still transmitted dur-
ing the hangover period, the activity factor ν is approximately 0.45; please note that this value
corresponds to both our simulations and the experimental results given in (Estepa et al., 2005).
As for the less sophisticated G.711 codec, here it was considered only as a reference, and no
silence suppression is introduced.
The parameters of all considered codecs, with and without silence suppression, are given in
the first four columns of table 2. In particular: the first column indicates the considered codecs
(the subscript ss indicates that silence suppression is considered); the second column defines
the number of bits B of full packets and the number of full packets per second ρ that are
transmitted when the voice is detected; similarly, the third column defines the number of bits
BSID of SID packets and the number ρSID of SID packets per second that are transmitted when
silences are detected; finally, the fourth column represents the activity factor ν; the rest of the
table will be illustrated in the following.
Fig. 8. Topmost part: AMR codec full packets and SID packets generation, with ρ = 50pack/s.
Rest of the figure: buffer state and resource allocation of a generic uplink voice traffic flow
with UGS and ertPS, following the packets generation depicted in the topmost part.
(x) (x)
S MSSID = BSID /8 + O HL + O M . (22)
Of course, the ARQ mechanism is assumed inactive, since we are considering a real time
service.
Let us recall (from section 6.2), now, that for a given codec x:
packet are:
(x)
( x,j) S MS
NSl ← MS =
( j) , (26)
SSl
(x)
( x,j) S MSSID
NSl ← MS
SID
=
( j) .
(27)
SSl
Depending on the considered scheduling service k and the specific VoIP codec x, the average
number of slots required in a given (DL/UL) subframe by a single user adopting mode j, is
given by:
( x,k,j) ( x,j) ( x,j)
MSl ←U = f ( x,k) NSl ← MS , NSl ← MS , (28)
SID
Performance on UGS. Since UGS resources are statically allocated, as negotiated during con-
nection setup, the silence suppression procedure does not provide any benefit in the uplink
direction.
Denoting with TF the frame duration, (28) becomes:
( x,UGS,j) ( x,j)
MSl ←U = TF ρ( x) · NSl ← MS , (30)
Please note that there is no dependence on the activity factor (some resources will be wasted
if ν( x) < 1).
( x,UGS,j)
Combining (30) and (29) the maximum number NUMAX of VoIP users supported by the UGS
scheduling service can be easily derived.
Performance on ertPS. In the case of ertPS scheduling service, besides the adopted codec x
and transmission mode j, also the activity factor ν( x) must be considered in order to derive
the amount of supported VoIP users. After the hangover period, in fact, the transmission rate
is reduced and a single slot is allocated (NSl ← MH = 1) in order to allow the transmission of
a stand-alone MAC signaling header for a quick modification of the resources request (see
figure 8). Please note, by the way, that, although reduced, this allocation entails a resource
wasting, since no transmission is performed in the most of cases. Resource wasting will occur
also at any rate reduction (refer to figure 8): before a rate decreases, in fact, the request is sent
in the uplink using an oversized resource.
380 Radio Communications
Let us observe, furthermore, that following a rate increase request, the first (larger) resource is
allocated in the subsequent frame, without respecting the normal rate of allocation, in order
to reduce the latency.
( x,ertPS,j)
In the case of ertPS scheduling service, therefore, in order to calculate MSl ←U we must take
into account:
• the slots needed for full packets, that are generated with rate ρ( x) during active voice pe-
( x,j)
riods: R · NSl ← MS average slots per second, where R = ν( x) · ρ( x) indicates the average
number of full packets per second;
(x)
• the slots needed for SID packets, that are generated with rate ρSID during silent periods:
( x,j) (x)
RSID · NSl ← MS average slots per second, where RSID = (1 − ν( x) ) · ρSID indicates the
SID
average number of SID packets per second;
• the slots needed for stand-alone MAC headers, allocated with rate ρ( x) when neither full
packets nor SID packets are generated: R MH · NSl ← MH average slots per second, where
R MH = 1 − R − RSID ; indicates the average number of slots left for MAC headers per
second, transmitted at the same rate;
• the slots that are wasted during variations from full packets allocation to stand-alone
( x,j)
MAC headers allocations: RCFG · NSl ← MS average slots per second, where RCFG =
1
av + T av
TCFG indicates the average number of uninterrupted periods of full packets per
CSS
second, that depends on the average duration of a period of continuous full packets
av ) and on the average duration of a period of silence sup-
generation by the codec (TCFG
av );
pression with SID packets generation (TCSS
• the slots that are wasted during variations from SID packets to stand-alone MAC head-
( x,j)
ers: RSID · NSl ← MS average slots per second.
SID
( x,ertPS,j)
Thus, in this case, MSl ←U is given by:
( x,ertPS,j) ( x,j) ( x,j)
MSl ←U = TF ( R + RCFG ) · NSl ← MS + 2 · RSID · NSl ← MS + R MH · NSl ← MH , (31)
SID
Concerning the parameters TCFG av and T av , please note that they are not only related to the
CSS
adopted codec, but also to the characteristics of the specific conversation, also including, as an
example, the language; in order to derive meaningful results, hereafter we adopted the values
av
reported in (Stern et al., 1996) (TCFG = 0.17s and TCSSav = 0.3428s), although they are related
to the voice-silence intervals rather than to codec full generation-codec silence suppression
(they do not consider the hangover periods); for this reason, a slight underestimation of the
maximum number of VoIP users is expected in the numerical results.
( x,ertPS,j)
Finally, combining (31) and (29), the maximum number NUMAX of VoIP users supported by
the ertPS scheduling service can be easily derived.
UGS
600
G.711
550 G.729
AMR4.75
500
AMR12.2
450
350
300
250
200
150
100
50
0
0 1 2 3 4 5 6
Mode
Fig. 9. Maximum number of users using UGS scheduling service. All modes. All VoIP codecs
without silence suppression.
ertPS
600
G.729SS
AMR4.75SS
500 AMR12.2SS
Maximum number of users
400
300
200
100
0
0 1 2 3 4 5 6
Mode
Fig. 10. Maximum number of users using ertPS scheduling services. All modes. All VoIP
codecs with silence suppression.
are left for uplink data, adopting UL-PUSC (the rest of the symbols are used for the uplink
common channels and the downlink subframe).
In the last column of table 2 the maximum number of VoIP users that can be served with
UGS and ertPS (separated by the symbol “/”) are reported for each codec; modes 0 and 6 are
considered. Two underscores are typed when the adoption of that scheduling service makes
no sense with that codec (i.e., ertPS with no silence suppression).
The maximum amount of VoIP users that can be supported is shown for all modes in figures 9
and 10 focusing on UGS and ertPS, respectively. Obviously, the VoIP capacity adopting UGS
382 Radio Communications
with and without silence suppression is always the same; for this reason the results related to
the case of silence suppression are not reported in figure 9.
It can be observed that, as expected, VoIP capacity is strictly related to the average data rate
generated by the codec.
Comparing figures 9 and 10 we can also appreciate the significant benefit provided by the
adoption of the ertPS instead of UGS.
7. Conclusions
The performance of IEEE8021.16e WirelessMAN-OFDMA depends on a large number of sys-
tem parameters and implementation choices, such as, among the others, the available band-
width, the frame duration, the uplink/downlink traffic asymmetry and the fragmentation
policy.
In the previous sections we provided an analytical framework that allows to evaluate the
throughput achievable with TCP/IP connections as well as the amount of supported VoIP
users as a function of the most significant parameters characterizing this technology. Beside
the analytical model derivation, here we provided criteria, equations and algorithms to make
the best choices from the viewpoint of system efficiency.
Furthermore, some numerical results were given, showing the impact of some specific pa-
rameters on the system performance. With reference to TCP/IP connections, for instance, the
troublesome choice of the maximum size of ARQ blocks has been discussed as well as the
potential resource wastage entailed by a wrong choice of the asymmetry factor between the
downlink and uplink subframes. The main outcome of this analysis is given by a set of criteria
to be followed in order to maximize the throughput provided to the final user.
As far as VoIP connections are concerned, here we assessed the maximum number of users
that can be supported, carefully considering the voice codec characteristics and the adopted
scheduling service. The outcomes of this investigation provide an indication about the capac-
ity of this technology to be alternative to other technologies such as UMTS and LTE for the
provision of the voice service.
As a final remark, let us observe that the analytical framework proposed in this chapter pro-
vides a tool to evaluate the upper limits of the throughput and the maximum amount of VoIP
users that can be supported by IEEE802.16e WirelessMAN-OFDMA. However, in order to in-
vestigate the actual performance of such a complex technology in a given scenario considering
the degradation due, for instance, to fading, shadowing, noise and interference, the only feasi-
ble way is to adopt a simulation tool able to carefully reproduce all aspects of communications,
with particular reference to the physical layer behavior.
This kind of investigation has been carried out at WiLab (Italy) by means of the simulation
platform SHINE, that has been developed in the last years to assess the performance of wire-
less networks in realistic scenarios. The interested reader may refer to (Andrisano et al., 2007;
2009; Bazzi et al., 2006).
Mobile WiMAX Performance Investigation 383
Appendix I
Here we illustrate the algorithm that allows to maximize symbols usage starting from the
number of useful symbols NUSy = NSy − NOSydl − NOSyul .
The following steps must be followed:
1. derive J = Resul = mod( NUSy , NGSul );
2. find, if possible:
a = min
NUSy
so that mod( J + a · NGSul , NGSdl ) = 0. (32)
a∈ 0, N
GSul
3. if a was not found, then reduce J by one and return to step 2, else exit.
The obtained value a and the parameter J allow the derivation of the minimum value for NSydl
MI N ) that maximally reduces the symbols wasting:
(NSy dl
MI N
NSy dl
= J + a · NGSul , (33)
Finally, we can choose the value of b that brings to the AFSl (b) nearer to AFin .
384 Radio Communications
8. References
3GPP TS 26.071 (2008). Mandatory speech codec speech processing functions; amr speech
codec; general description.
3GPP TS 26.092 (2008). Mandatory speech codec speech processing functions; adaptive multi-
rate (amr) speech codec; comfort noise aspects.
Ahmadi, S. (2009). An overview of next-generation mobile wimax technology, IEEE Commu-
nications Magazine Vol.47(n.6): pp.84–98.
Andrisano, O., Bazzi, A., Leonardi, G. & Pasolini, G. (2007). Ieee802.16e best effort perfor-
mance investigation, Proceedings of IEEE International Conference on Communications,
2007 (ICC 2007), IEEE, Glasgow, Scotland, pp. 4837–4842.
Andrisano, O., Bazzi, A., Leonardi, G. & Pasolini, G. (2009). Ieee802.16e simulation issues,
Proceedings of IEEE Mobile WiMAX Symposium 2009 (MWS 2009), IEEE, Napa Valley,
California, pp. –.
Bazzi, A., Gambetti, C. & Pasolini, G. (2006). Shine: Simulation platform for heterogeneous in-
terworking networks, Proceedings of IEEE International Conference on Communications,
2006 (ICC 2006), IEEE, Istanbul, Turkey, pp. 5534–5539.
Benyassine, A., Shlomot, E. & Su, H. (1997). Itu-t recommendation g.729 annex b: a silence
compression scheme for use with g.729 optimized for v.70 digital simultaneous voice
and data applications., IEEE Communications Magazine Vol.35(Issue 9): pp.64–73.
Cimini, J. (1985). Analysis and simulation of a digital mobile channel using orthogonal fre-
quency division multiplexing., IEEE Trans. Comm. Vol.COM-33(n.7): pp.665–675.
Estepa, R., Vozmediano, J. & Estepa, A. (2005). Accurate prediction of voip traffic mean bit
rate., ELECTRONICS LETTERS Vol.41(n.17): pp.985–987.
Goode, B. (2002). Voice over internet protocol (voip), Proceedings of the IEEE
Vol.90(n.9): pp.1495–1517.
IEEE Std 802.16-2004 (2004). Ieee standard for local and metropolitan area networks part 16:
Air interface for fixed broadband wireless access systems.
IEEE Std 802.16e-2005 (2006). Ieee std 802.16eŹ-2005 and ieee std 802.16Ź-2004/cor1-2005 ieee
standard for local and metropolitan area networks part 16: Air interface for fixed
and mobile broadband wireless access systems amendment 2: Physical and medium
access control layers for combined fixed and mobile operation in licensed bands and
corrigendum 1.
ITU-T Rec. G.711 (1988). Pulse code modulation (pcm) of voice frequencies.
ITU-T Rec. G.729 (1996a). Coding of speech at 8kbit/s using conjugate-structure algebraic-
code-excited linear-predictive (cs-acelp)coding.
ITU-T Rec. G.729, A. (1996b). A silence compression scheme for g.729 optimized for terminals
conforming to itu-t v.70.
Lee, H., Kwon, T., Cho, D., Lim, G. & Chang, Y. (2006). Performance analysis of scheduling
algorithms for voip services in ieee 802.16e systems, Proceedings of IEEE Vehicular
Technology Conference (VTC 2006-Spring)., IEEE, Melbourne, Australia, pp. 1231–1235.
Li, Q., Lin, X., Zhang, J. & Roh, W. (2009). Advancement of mimo technology in wimax: from
ieee 802.16d/e/j to 802.16m, IEEE Communications Magazine Vol.47(n.6): pp.100–107.
Stern, H., Mahmoud, S. & Wong, K. (1996). A comprehensive model for voice activity in
conversational speech-development and application to performance analysis of new-
generation wireless communication systems, Wireless Networks Vol.2(n.4): pp.359–
367.
Van Nee, R. & Prasad, R. (2000). OFDM for Wireless Multimedia Communications, Artech House.
Throughput-Enhanced Communication Approach for
Subscriber Stations in IEEE 802.16 Point-to-Multipoint Networks 385
Throughput-Enhanced Communication
Approach for Subscriber Stations in
IEEE 802.16 Point-to-Multipoint Networks
Chung-Hsien Hsu and Kai-Ten Feng
Department of Electrical Engineering, National Chiao Tung University
Taiwan, R.O.C.
1. Introduction
The IEEE 802.16 standard for wireless metropolitan area networks (WMANs) is designed to
satisfy various demands for high capacity, high data rate, and advanced multimedia services
(Abichar et al., 2006). The medium access control (MAC) layer of IEEE 802.16 networks sup-
ports both point-to-multipoint (PMP) and mesh modes for packet transmission (IEEE Std.
802.16-2004, 2004). Based on the application requirements, it is suggested in the standard that
only one of the modes can be exploited by the network components within the considered
time intervals, and the PMP mode is considered the well-adopted one. In the PMP mode,
packet transmission is coordinated by a base station (BS) which is responsible for controlling
the communication with multiple subscriber stations (SSs) in both downlink (DL) and up-
link (UL) directions. All the traffic within an IEEE 802.16 PMP network can be categorized
into two types, including inter-cell traffic and intra-cell traffic. For the inter-cell traffic, the
source-destination pair of each traffic flow are located in different cells. On the other hand,
the intra-cell traffic is defined if they are situated within the same cell. The inefficiency within
the PMP mode occurs while two SSs are intended to conduct packet transmission, i.e., the
intra-cell traffic between the SSs. It is required for the data packets between the SSs to be
forwarded by the BS even though the SSs are adjacent with each others. Due to the packet
rerouting process, the communication bandwidth is wasted which consequently increases the
packet-rerouting delay.
In order to alleviate the drawbacks resulted from the indirect transmission, a directly com-
municable mechanism between SSs should be considered in IEEE 802.16 networks. Several
direct communication approaches have been proposed for different types of networks. The
direct-link setup (DLS) protocol is standardized in the IEEE 802.11z draft standard to support
direct communication between two SSs in wireless local networks (IEEE P802.11zTM /D5.0,
2009). However, the DLS protocol is designed as a contention-based mechanism, which does
not guarantee the access of direct link setup and data exchanges between two SSs. The dy-
namic slot assignment (DSA) scheme for Bluetooth networks is proposed in (Zhang et al.,
2002) and (Cordeiro et al., 2003), which is primarily implemented based on the characteris-
tics of the Bluetooth standard. Since frame structures and medium access mechanisms are
different among these wireless communication technologies, both the DLS protocol and DSA
scheme cannot be directly applied to IEEE 802.16 networks.
386 Radio Communications
In this book chapter, a point-to-point direct communication (PDC) approach is proposed for
achieving direct transmission between two SSs. The PDC approach is designed as a flexible
and contention-free scheme especially for time division duplexing based IEEE 802.16 PMP
networks. The BS is coordinating and arranging specific time intervals for the two SSs that are
actively involved in packet transmission. Both the relative locations and channel conditions
among the BS and SSs are utilized as constraints for determining if the direct communication
should be adopted. The advantage of exploiting the PDC approach is that both the required
bandwidth for packet transmission and packet-rerouting delay for intra-cell traffic can be sig-
nificantly reduced. The effectiveness of the proposed PDC approach can be observed via the
simulation results, which demonstrate that the PDC approach outperforms the conventional
IEEE 802.16 transmission mechanism in terms of user throughput.
The remainder of this book chapter is organized as follows. Section 2 briefly reviews the
MAC frame structure and packet transmission mechanism in IEEE 802.16 PMP networks. The
proposed PDC approach, consisting of management structures, an admission control scheme,
and direct communication procedures, is described in Section 3. The performance of the PDC
approach is evaluated in Section 4. Section 5 draws the conclusions.
time
DL Subframe UL Subframe
T R
T Initial Bandwidth UL PHY UL PHY UL PHY UL PHY UL PHY T
DL PHY PDU
G ranging request PDU #1 PDU #k-j PDU #k-j+1 PDU #k-1 PDU #k G
DLFP DL-MAP UL-MAP DCD UCD MAC PDUs MAC PDUs MAC PDUs
UL Subframe
IE IE IE IE IE IE IE IE IE IE IE IE IE IE IE IE
IE DLFP IE
Fig. 1. Schematic diagram of IEEE 802.16 PMP OFDM frame structure with TDD mode.
On the other hand, as can be seen from Fig. 1, the UL subframe starts with the contention
intervals that are specified for both initial ranging and bandwidth request. It is noted that
more than one UL PHY PDU can be transmitted after the contention intervals. Each UL PHY
PDU consists of a short preamble and a UL burst, where the UL burst transports the MAC
PDUs for each specific SS. Moreover, a transmit-to-receive transition gap (TTG) and a receive-
to-transmit transition gap (RTG) are inserted in between the DL and the UL subframes and
at the end of each frame respectively. These two gaps provide the required time for the BS to
switch from the transmit to receive mode and vice versa.
SS1
Intra-cell traffic
Internet
BS (or other networks)
SS2 Inter-cell traffic
Packet-rerouting delay
Fig. 3. Schematic diagram of IEEE 802.16 packet transmission mechanism in time sequence.
such as the traffic flow between SS1 and SS2 in Fig. 2. Considering the scenario that SS1
intends to communicate with its neighboring station SS2 , two transport connections are re-
quired to be established via the service flow management mechanism for the intra-cell traffic,
i.e., the UL transport connection from SS1 to the BS and the DL transport connection from the
BS to SS2 . Fig. 3 illustrates the conventional transmission mechanism of IEEE 802.16 PMP
networks in time sequence. In the most ideal case, the jth intra-cell packet, transmitted from
SS1 to the BS in the nth frame, will be forwarded to SS2 in the (n+1)th frame by the BS. The
rerouting process apparently requires twice of communication bandwidth for achieving the
intra-cell packet transmission, which consequently increases control overhead by duplicating
the corresponding data packet. Moreover, the delay time for packet-rerouting can be more
than one half of a frame duration while the packet transmission from the BS to SS2 is post-
poned to a latter DL subframe.
subsections, the proposed architecture and management structures will be described in Sub-
section 3.1; while an admission control scheme for direct link establishment is explained in
Subsection 3.2. The direct communication procedures of the PDC approach are given in Sub-
section 3.3.
where D ( x, y) denotes the relative distance between x and y; while the source SS and desti-
nation SS of a intra-cell traffic is represented as SSs and SSd respectively. In other words, the
transmission power utilized by SSs for achieving direct transmission is adjusted to be equal
to or less than that as specified in the conventional IEEE 802.16 mechanism.
On the other hand, for the purpose of enhancing the efficiency for data transmission, channel
conditions among the BS and (SSs , SSd ) pair should be taken into account. Different MCSs
associated with various number of data bits are adopted for data transmission under different
channel conditions. Based on channel states and the corresponding MCSs, the second-tiered
constraint (C2 ) is defined as
where T (SSs , SSd ) represents the raw user throughput defined as "number of bits per second that
is received by the destination SSd while the source is SSs ". In other words, the raw user throughput
resulted from the PDC approach (TPDC ) should be at least equal to or higher than that from the
conventional IEEE 802.16 mechanism (TConv ). The values of both TPDC and TConv are derived
as the description in the following paragraph.
MCS index Modulation Coding rate Coded block size (byte) Receiver SNR (dB)
0 BPSK 1/2 24 3.0
1 QPSK 1/2 48 6.0
2 QPSK 3/4 48 8.5
3 16-QAM 1/2 96 11.5
4 16-QAM 3/4 96 15.0
5 64-QAM 2/3 144 19.0
6 64-QAM 3/4 144 21.0
Table 1. OFDM Modulation and Coding Schemes
Table 1 shows the supported MCSs that are specified within the IEEE 802.16 standard. In the
considered OFDM system, the raw data rate Rd of a MCS with index ξ is represented as
Bu [ξ ]
Rd [ξ ] = , (1)
Ts
where Ts is the OFDM symbol duration. The notation Bu [ξ ] indicates the number of uncoded
bits per OFDM symbol of a MCS with index ξ, which is obtained as
Bu [ξ ] = Nd · log2 M · Rc [ξ ], (2)
where Nd denotes the number of data subcarriers and Rc [ξ ] is the coding rate of a MCS with
index ξ. The value of the parameter M depends on the adopted MCS, i.e., M = 2 for BPSK,
M = 4 for QPSK, M = 16 for 16-QAM, and M = 64 for 64-QAM. Moreover, the OFDM
symbol duration Ts can be acquired as
1+G
Ts = Tb + Tg = Tb + G · Tb = , (3)
f
Throughput-Enhanced Communication Approach for
Subscriber Stations in IEEE 802.16 Point-to-Multipoint Networks 391
where Tb and Tg represent the useful symbol time and the cyclic prefix (CP) time respectively.
The notation G denotes the ratio of Tg to Tb . The subcarrier spacing f is obtained as
Fs 8000 n · BW
f = = · , (4)
Ns Ns 8000
where Ns indicates the number of total subcarriers. The notation Fs represents the sampling
frequency with its value specified by the IEEE 802.16 standard as in (4), where n is the sam-
pling factor and BW is the channel bandwidth. By substituting (4) into (3), the OFDM symbol
time can be approximated as
Ns Ns
Ts = · (1 + G ) ≈ · (1 + G ). (5)
Fs n · BW
With (2) and (5), the raw data rate Rd of a MCS with index ξ in (1) becomes
Nd · log2 M · Rc [ξ ] · n · BW
Rd [ξ ] ≈ . (6)
Ns · (1 + G )
Based on (6), the raw user throughput by adopting the PDC approach is acquired as
where ξ (s,d) represents the index of a MCS that will be assigned to the direct link of the (SSs ,
SSd ) pair. On the other hand, the raw user throughput in the conventional IEEE 802.16 mech-
anism is constrained by the two-hop transmission, i.e., from SSs to BS and from BS to SSd .
Thus the TConv can be obtained as
1
TConv (SSs , SSd ) = R [φ ], (8)
2 d (s,d)
where
φ(s,d) = min ξ (s,BS) , ξ ( BS,d) . (9)
The notation ξ (s,BS) denotes the index of the MSC utilized in the link between the SSs and BS;
while that is assigned to the link between the BS and SSd is represented as ξ ( BS,d) .
SSs BS SSd
Data packet
DL/UL-MAPs (excludes PDL_IEs)
Data packet
Data + PDL subheader (request)
DL/UL-MAPs (excludes PDL_IEs)
Data + PDL subheader (request)
SINR detection message
PDL subheader (response)
SSs BS SSd
Data packet
DL/UL-MAPs (excludes PDL_IEs)
Data packet
PDL subheader (request)
SINR detection message
Data + PDL subheader (response)
PDL subheader (response)
information of SSs will be filled into the PDL subheader. As the BS receives the request PDL
subheader from the SSs , the BS will attach a PDL subheader to the data packet and conduct
the transmission to SSd . Moreover, the BS will arrange a DL burst for SSs with the assignment
in the corresponding DL-MAP message. SSs will transmit an SINR detection message to SSd
with the BPSK−1/2 MCS for estimating the channel state of the direct link. After receiving the
PDC subheader and the SINR detection message from the BS and SSs respectively, SSd will
transmit a response PDL subheader associated with the calculated SINR value. It is noted that
the location information of SSd is carried in the response PDL subheader if it is required by
the BS. On the other hand, the BS-initiated direct communication procedure is shown in Fig.
5. Contrary to the SS-initiated procedure, the BS actively announces the link request along
with the PDL subheader to the specific SSs, i.e, SSs and SSd . As SSs receives the requesting
PDL subheader from the BS, it will utilize the response PDL subheader to provide the location
information that is requested by the BS. The remaining steps of the BS-initiated procedure are
similar to that of the SS-initiated case, such as the SINR detection and SSd response.
The BS executes the admission control procedure after it received the response PDL subheader
transmitted from SSd . Based on the collected information, the aforementioned two-tiered con-
Throughput-Enhanced Communication Approach for
Subscriber Stations in IEEE 802.16 Point-to-Multipoint Networks 393
trol scheme is exploited by the BS to either confirm or deny the direct communication request
between SSs and SSd . If the request is rejected, the BS will broadcast a denying announce-
ment along with the PDL subheader. On the other hand, a confirming announcement will be
transmitted if the request is granted. Consequently, the BS will arrange the PDL bursts for the
direct link in the subsequent frames.
After receiving the confirmation announcement, the considered SSs will activate the proce-
dure of direct communication. According to the received MAPs associated with the PDL IEs,
SSs will conduct packet transmission directly to SSd within the PDL bursts. Moreover, SSd
will continuously observe and evaluate the cannel condition for the direct link with the adap-
tation to an appropriate MCS. The calculated SINR is compared with the receiver SNR range
of the current MCS (as listed in Table 1) by SSd . If the existing MCS is observed to be im-
proper for the current channel condition, SSd will initiate a PBPC-REQ message to the BS for
suggesting an appropriate MCS. Consequently, the BS will respond a PBPC-REP message with
a recommended MCS.
SSs BS SSd
that the link termination can be initiated by either the BS or SS. In the SS-initiated termination
procedure, the SS will transmit a termination PDL subheader to the BS. As the message is re-
ceived by the BS, it will broadcast an announcement along with a PDL subheader to both SSs
and SSd regarding the termination of the direct link. On the other hand, for the BS-initiated
termination procedure, the termination information is actively announced by the BS. As a
result, the BS and the associated SSs will return to adopt the original packet transmission
mechanism as defined in the IEEE 802.16 standard.
4. Performance Evaluation
The performance of the proposed PDC approach is evaluated and compared with the conven-
tional packet transmission mechanism in IEEE 802.16 PMP networks via simulations. A single
BS with 12 SSs uniformly distributed within the BS’s coverage are considered as the simulation
layout. The OFDM modulation and coding schemes listed in Table 1 are adopted in the simu-
lation. The occurring frequencies for both inter-cell traffic and intra-cell traffic are considered
uniformly distributed. The packet lengths are selected to follow the exponential distribution;
while the Poisson distribution is adopted for packets arrival time. Since scheduling algorithm
is not specified in the IEEE 802.16 standard, the direct round robin (DRR) (Shreedhar & Vargh-
ese, 1996) and weighted round robin (WRR) (Katevenis et al., 1991) algorithms are selected as
the BS’s DL and UL schedulers respectively. The DRR algorithm is also utilized by the SS to
share the UL grants that are provided by the BS among their connections. The parameters
adopted in the simulations are listed in Table 2.
Parameter Value
Channel bandwidth (BW) 7 MHz
Number of total subcarriers (Ns ) 256
Number of data subcarriers (Nd ) 192
Sampling factor (n) 8/7
Sampling frequency (Fs ) 8 MHz
Useful symbol time (Tb ) 32 µs
CP time (Tg ) 2 µs
The ratio of CP time and useful time (G) 1/16
OFDM symbol duration (Ts ) 34 µs
Maps modulation BPSK
Data modulation QPSK, 16-QAM, 64-QAM
Frame duration 5 ms, 10 ms
SSTTG/SSRTG 35 µs
Initial ranging interval 5 OFDM symbols
Bandwidth request interval 5 OFDM symbols
Average packet size 200 bytes
Simulation time 1 sec
Table 2. Simulation Parameters
Fig. 7 shows the comparison of the user throughput with an increasing number of intra-cell
traffic flows ranging from 10 to 100 (frame duration = 5 and 10 ms). As can be expected that
the user throughput increases as the number of intra-cell traffic flows is augmented. It can be
observed that the proposed PDC approach outperforms the conventional IEEE 802.16 scheme
Throughput-Enhanced Communication Approach for
Subscriber Stations in IEEE 802.16 Point-to-Multipoint Networks 395
5
IEEE 802.16 w/o PDC (5 ms)
4.5 IEEE 802.16 w/ PDC (5 ms)
IEEE 802.16 w/o PDC (10 ms)
IEEE 802.16 w/ PDC (10 ms)
4
User Throughput (Mb/s)
3.5
2.5
1.5
0.5
10 20 30 40 50 60 70 80 90 100
Number of Intra−cell Traffic Flows
Fig. 7. Performance comparison: user throughput versus number of intra-cell traffic flows.
3.5
3
User Throughput (Mb/s)
2.5
1.5
with higher user throughput under different frame durations. In the conventional mechanism,
it is required for the intra-cell traffic to be forwarded by the BS. Consequently, more than twice
396 Radio Communications
6.5
5.5
User Throughput (Mb/s)
4.5
3.5
Fig. 9. Performance comparison: user throughput versus percentage of intra-cell traffic flows.
of the communication bandwidth is necessitate for the packet transmission. By adopting the
proposed PDC approach, the intra-cell traffic can be directly transmitted from the source sta-
tion to the destination station, which resulted in saved bandwidth. Moreover, the longer frame
duration can achieve higher user throughput owing to the reason that less control overheads
are required within the transmission. The comparison of the user throughput under differ-
ent traffic load (λ) is illustrated in Fig. 8, wherein there are 50 intra-cell traffic flows. Similar
performance benefits can be observed by adopting the proposed PDC approach.
In order to evaluate the influence from the inter-cell traffic, the user throughput with an in-
creasing number of inter-cell traffic flows ranging from 10 to 100 is shown in Fig. 9 (with
the number of total traffic flows is equal to 100). It is noticed that the inter-cell traffic can
be considered as a particular type of direct communication within the cell since the packets
are passed from the BS to SS directly. Consequently, the user throughput is decreased as the
percentage of the intra-cell traffic is augmented since there are increasing amounts of indi-
rect links within the network. Nevertheless, the PDC approach can still provide comparably
higher user throughput under different percentages of intra-cell traffic flows. The merits of
the proposed PDC scheme can be observed.
5. Conclusions
In this book chapter, a flexible and contention-free point-to-point direct communication (PDC)
approach is proposed to achieve direct transmission between SSs within IEEE 802.16 PMP net-
works. With the considerations of both relative locations and channel conditions among the
BS and SSs, a two-tiered admission control scheme is proposed to determine the establishment
of direct link between the SSs in the PDC approach. While adapting the PDC approach, the
Throughput-Enhanced Communication Approach for
Subscriber Stations in IEEE 802.16 Point-to-Multipoint Networks 397
BS arranges specific time intervals for the two SSs that are actively involved in direct trans-
mission. The advantage of exploiting the PDC approach is that both the required bandwidth
for packet transmission and packet-rerouting delay for intra-cell traffic can be significantly
reduced. Furthermore, the design of the PDC approach is compatible and can be directly in-
tegrated with the existing protocols defined in the IEEE 802.16 standard. The effectiveness of
the proposed PDC approach can be observed via the simulation results, which demonstrate
that the PDC approach outperforms the conventional IEEE 802.16 transmission mechanism in
terms of user throughput.
6. Acknowledgments
This work was in part funded by the Aiming for the Top University and Elite Research Center
Development Plan, NSC 96-2221- E-009-016, NSC 98-2221-E-009- 065, the MediaTek research
center at National Chiao Tung University, the Universal Scientific Industrial (USI) Co., and the
Telecommunication Laboratories at Chunghwa Telecom Co. Ltd, Taiwan.
7. References
Abichar, Z., Peng, Y. & Chang, J. M. (2006). WiMAX: The emergence of wireless broadband,
IEEE IT Prof. 8(4): 44–48.
Cordeiro, C., Abhyankar, S. & Agrawal, D. P. (2003). A dynamic slot assignment scheme
for slave-to-slave and multicast-like communication in Bluetooth personal area net-
works, Proc. IEEE Global Telecommunications Conf. (GLOBECOM), San Francisco, CA,
pp. 4127–4132.
IEEE P802.11zTM /D5.0 (2009). Draft Standard for Information Technology- Telecommunications
and information exchange between systems- Local and metropolitan area networks- Specific
requirements- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) specifications, Amendment 6: Extensions to Direct Link Setup (DLS), IEEE, 3 Park
Avenue, New York, NY 10016-5997, USA.
IEEE Std. 802.16-2004 (2004). IEEE Standard for Local and Metropolitan Area Networks- Part 16:
Air Interference for Fixed Broadband Wireless Access Systems, IEEE, 3 Park Avenue, New
York, NY 10016-5997, USA.
Katevenis, M., Sidiropoulos, S. & Courcoubetis, C. (1991). Weighted round-robin cell multi-
plexing in a general-purpose atm switch chip, IEEE J. Sel. Areas Commun. 9(8): 1265–
1279.
Shreedhar, M. & Varghese, G. (1996). Efficient fair queueing using deficit round robin,
IEEE/ACM Trans. Netw. 4(3): 375–385.
Zhang, W., Zhu, H. & Cao, G. (2002). Improving Bluetooth network performance through a
time-slot leasing approach, Proc. IEEE Wireless Communications and Networking Conf.
(WCNC), Orlando, FL, pp. 592–596.
398 Radio Communications
Holdoff Algorithms for IEEE 802.16 Mesh Mode in Multi-hop Wireless Mesh Networks 399
RepublicofKorea
1. Introduction
1
Multi-hop wireless mesh networks (M-WMNs) [Akyildiz, I. F., 2005] are one of the key
features of beyond 3G systems because of their flexibility and low-cost deployment. So far,
most of existing studies on multi-hop wireless mesh networks have been accomplished
based on the IEEE 802.11 ad hoc mode. The IEEE 802.16 working group (WG) specified the
IEEE 802.16-2004 standard [IEEE Std. 802.16-2004, 2004] in October 2004 and the standard
defined two modes: the point-to-multi-point (PMP) mode and the mesh mode. The IEEE
802.16 mesh standard defines three mechanisms to schedule the data transmission:
centralized scheduling (CSCH) [Morge, P. S., 2007], [Han, B., 2007], coordinated distributed
scheduling (C-DSCH) [Morge, P. S., 2007], and uncoordinated distributed scheduling (Un-
DSCH). In the IEEE 802.16 mesh mode with the CSCH, C-DSCH, and Un-DSCH, multi-hop
communication is possible between nodes such as mesh base stations (MeshBSs) and mesh
subscriber stations (MeshSSs) because all nodes are peers and each node can act as routers to
support multi-hop packet forwarding. In particular, in the IEEE 802.16 mesh mode with the
C-DSCH, every node competes for channel access using a distributed election algorithm
(DEA) based on the scheduling information of the extended neighborhoods (one-hop and
two-hop neighbors) in a completely distributed manner and reserves radio resource by a
three-way handshaking mechanism in which nodes request, grant, and confirm available
radio resource using mesh distributed scheduling (MSH-DSCH) message. Like this, because
the IEEE 802.16 mesh mode with the C-DSCH has good flexibility and scalability, it is
suitable as an alternative medium access control (MAC) protocol for establishing M-WMNs.
For M-WMNs to serve as a wireless network infrastructure, the protocol design for M-WMN
should target a high network throughput. In the IEEE 802.16 mesh mode with the C-DSCH,
after occupying radio resource, a node cannot transmit any MSH-DSCH message for a
holdoff time in order to share radio resource with other nodes in M-WMN. If nodes get a
short holdoff time in a heavily loaded network situation, the competition between nodes
will happens severe and thus they will experience long contention times before reserving
radio resource. On the other hand, if nodes get a long holdoff time in a lightly loaded
1 This work was performed while the first author was a Ph.D. student.
400 Radio Communications
network situation, radio resource will be wasted unnecessarily. Like this, network
throughput has a close relationship with the performance of holdoff algorithm.
This chapter deals with holdoff algorithms for the IEEE 802.16 mesh mode with the C-DSCH
in multi-hop wireless mesh networks and is structured as follows. In Section 2, we present
the overview of the IEEE 802.16 mesh mode with the C-DSCH. In Section 3, we first explain
a static holdoff algorithm, which is defined in the IEEE 802.16 mesh standard mesh
standard, and introduce its limitations with the respect to network throughput. Next, we
describe existing dynamic holdoff algorithm and introduce its advantages and
disadvantages. Lastly, we propose an adaptive holdoff algorithm based on node state. In the
adaptive holdoff algorithm, nodes collect neighborhood information in a distributed manner
and calculate a metric to reflect the current network situation around them. And, nodes
decide appropriate holdoff times on the basis of the calculated metric in order to improve
network throughput. In Section 4, some simulation results are given. Simulation results
show that it is required for nodes to adaptively adjust their holdoff times according to
current network situations in order to improve the performance of M-WMN based on the
IEEE 802.16 mesh mode with the C-DSCH. In Section 5, we make a conclusion.
transmission time by the DEA. In the C-DSCH, the transmission time corresponds to a
specific TO in the schedule control subframe shown in Fig. 1. In the DEA, a node performs
two functions: collecting the next transmission times (Next_Xmt_Times) of all nodes within
its extended neighborhood (one-hop and two-hop neighbors) and selecting its
Next_Xmt_Time.
1) CollectingtheNext_Xmt_Times nodes
ofall to select a collision-
withinextendedneighborhood:
free TO for the MSH-DSCH transmission, every node should collect the Next_Xmt_Times of
all nodes within its extended neighborhood. So, every node must inform its neighbors of the
next MSH-DSCH transmission time of its neighbors as well as itself. In the DEA, nodes
broadcast not an exact Next_Xmt_Time but the next transmission time interval
(Next_Xmt_Time_Interval) information, which is expressed by two parameters of next
transmission maximum (Next_Xmt_Mx) and transmission holdofff exponent
(Xmt_Holdoff_Exp) as follows:
2 *Next_Xmt_Mx<Next_Xmt_Time
Xmt_Holdoff_Exp
2< Next_Xmt_Mx
*(
Xmt_Holdoff_Exp )+1 (1)
Temp_Xmt_Time=Current_Xmt_Time
Xmt_Holdoff_Time
+ +1 (2)
Next, the node should determine the set of eligible competing nodes related to the
Temp_Xmt_Time from its neighbor table. This set will include neighbors that meet at least
one of the following conditions: [Bayer, N., 2006]
In the conditions above, the Earliest_Subsequent_Xmt_Time is the earliest time that the node
is eligible to transmit a MSH-DSCH message after the Next_Xmt_Time, as shown in
equation (3):
Earliest_Subsequent_Xmt_Time=Next_Xmt_Time+Xmt_Holdoff_Exp
+2 *Next_Xmt_Mx
Xmt_Holdoff_Exp (3)
The DEA is performed based on this set of eligible competing nodes. With this set, a node
checks whether any competing nodes do not use a specific TO corresponding to the
Temp_Xmt_Time, or not. If any competing nodes of the node do not use the specific TO, the
node is the winner of the distributed election and the Next_Xmt_Time is set equal to the
Temp_Xmt_Time. If a node does not win the distributed election, the Temp_Xmt_Time is set
to Temp_Xmt_Time + 1 and the above process is performed again in order to select a
collision-free Next_Xmt_Time.
Xmt_Holdoff_Time(Xmt_Holdoff_Exp
=2 +Xm t_Holdoff_Exp_Base) (4)
The IEEE 802.16 mesh standard defines static holdoff algorithm. In the static holdoff
algorithm, the Xmt_Holdoff_Exp_Base is fixed to 4 for resource sharing between nodes in an
M-WMN. The Xmt_Holdoff_Exp is also set to a specific value between 0 and 7 in initial
node configuration procedure. That is, all nodes in M-WMN have an identical transmission
holdoff time regardless of current network situation. Thus, when Xmt_Holdoff_Exp = 0, the
competition between nodes happen severe and a node experiences long contention times
before reserving resource. On the other hand, as the Xmt_Holdoff_Exp value increases, the
contention between nodes becomes less competitive; however, nodes get a longer holdoff
time and thus transmission interval becomes longer [Cao, M., 2005]. In particular, if the
Xmt_Holdoff_Exp is set to an unnecessarily large value in a lightly loaded network situation,
the waste of resource happens. Hence, the static holdoff algorithm can result in network
throughput degradation regardless of an assigned Xmt_Holdoff_Exp value.
406 Radio Communications
According to the node types above, different Xmt_Holdoff_Exp values are defined as
follows:
By using different Xmt_Holdoff_Exp values according to current node types, the DyExp
algorithm improves network capacity. However, because the operation of DynExp
algorithm depends on information from the routing layer, the DynExp algorithm cannot be
operated independently without cooperation with routing layer.
3.3.1 Definitions
Before proposing the adaptive holdoff algorithm, the neighbors of a node are classified into
four types: tx-neighbor, rx-neighbor, tx/rx-neighbor, and null-neighbor. Each classification
is defined as follows:
A tx-neighbor of a node is a neighbor that has a data packet to send to the node.
An rx-neighbor of a node is a neighbor to which the node has a data packet to send.
A tx/rx-neighbor of a node is a neighbor that is both tx-neighbor and rx-neighbor of
the node.
Holdoff Algorithms for IEEE 802.16 Mesh Mode in Multi-hop Wireless Mesh Networks 407
Fig. 4. Classification of neighbor nodes: A solid line between a pair of nodes indicates that
there is at least one data packet to transmit between the two nodes, with an arrow showing
the direction of the pending data transmission. A dotted line indicates that there is no data
waiting for transmission between the pair of nodes
In Fig. 4, node I has four types of neighbors. Nodes A, B, C, and D correspond to the tx-
neighbor, rx-neighbor, tx/rx-neighbor, and null-neighbor of node I, respectively.
Fig. 5. Example topology: A solid line between a pair of nodes indicates that there is at least
one data packet to transmit between the two nodes, with an arrow showing the direction of
the pending data transmission
In Fig. 5, node I has two links (Links 1 and 2) for communication with nodes A and B,
respectively. As shown in Fig. 5, node I should reserve each minislot for data reception from
node A and data transmission to node B. On the other hand, node A needs to reserve only
minislots for data transmission to node I, and node B needs to reserve only minislots for
data reception from node I. Therefore, node I should be able to access schedule control
subframe at a higher rate than nodes A and B in order to prevent node I from being a
bottleneck.
408 Radio Communications
Based on the features above, the Weightof a node is first defined for the adaptive holdoff
algorithm as follows:
Weight=tx_exist*1+rx_exist*2 (5)
In equation (5), the tx_exist represents whether a node has at least one tx-neighbor or not.
And, the rx_exist indicates whether a node has at least one rx-neighbor or not. Because a
node transmits only one MSH-DSCH message (bandwidth grant message) to tx-neighbor
over the TO of the schedule control subframe during the three-way handshaking, the
tx_exist is multiplied by 1 in equation (5). On the other hand, because a node transmits two
MSH-DSCH messages (bandwidth request and bandwidth grant confirmation messages) to
rx-neighbor during the three-way handshaking, the rx_exist is multiplied by 2. In addition,
as shown in Fig. 2, the MSH-DSCH message can contains multiple MSH-
DSCH_Request_IE()s, MSH-DSCH-Availability_IE()s, and MSH-DSCH_Grants_IE()s at one
time. Namely, a node can simultaneously request, grant, and confirm resources for multiple
links via only one MSH-DSCH message. Therefore, the Weight depends on only the tx_exist
and rx_exist in equation (5).
Next, a neighbor table is presented in order to explain how to obtain the Weightof a node. In
the adaptive holdoff algorithm, nodes store neighbor information in their neighbor table, as
shown in Fig. 6. Each entry in the neighbor table contains Node_ID, Type_Tx/Rx,
Expire_Tx/Rx, and Expire. Node_ID denotes the identifier of a neighbor. Type_Tx/Rx is
used to distinguish the neighbor types: tx-neighbor, rx-neighbor, tx/rx-neighbor, or null-
neighbor. Expire_Tx/Rx indicates the expiration time of a neighbor as a tx-neighbor or as an
rx-neighbor. Expire represents the expiration time of a neighbor table entry.
In the adaptive holdoff algorithm, the neighbor table is managed in the following way:
1) Setting Type_Tx/Rx, Expire_Tx/Rx, and Expire: Whenever a node sends or receives a data
packet to or from a neighbor over minislots of data subframe, it sets the values of
Type_Tx/Rx, Expire_Tx/Rx, and Expire in the neighbor table entry for the neighbor. When
a node receives a data packet from a neighbor, it finds the neighbor table entry for that
neighbor in its neighbor table and sets the values of Type_Tx, Expire_Tx, and Expire as
follows: the Type_Tx is set to 1. The Expire_Tx and Expire are set to EXPIRE_TIME, which is
Holdoff Algorithms for IEEE 802.16 Mesh Mode in Multi-hop Wireless Mesh Networks 409
a pre-defined constant value. When a node sends a data packet to a neighbor, it finds the
neighbor table entry for that neighbor in its neighbor table and sets Type_Rx, Expire_Rx, and
Expire as follows: the Type_Rx is set to 1. The Expire_Rx and Expire are set to EXPIRE_TIME.
)2 Maintaining/removing neighbor table Maintenance
entries:and removal of a neighbor table
entry is performed using the neighbor timer. The neighbor timer expires periodically; when
this occurs, a node compares the current time with each values of Expire_Tx/Rx and Expire in
a neighbor table entry and updates Type_Tx/Rx, Expire_Tx/Rx, and Expire in the following
way: if the values of Expire_Tx/Rx are higher than the current time, the values of Type_Tx/Rx
and Expire_Tx/Rx are not changed; otherwise, they are set to 0. If the value of Expire is less
than the current time, the neighbor table entry is removed; otherwise, the value of Expire is not
changed. This procedure is repeated for all the entries in the neighbor table.
According to the neighbor table management above, node I in Fig. 4 has the neighbor table
as shown in Fig. 6. In the adaptive holdoff algorithm, a node can calculate its Weightusing
its neighbor table. For example, node I can calculate the Weightby checking the values of
Type_Tx/Rx in its neighbor table entries as follows: if a node has at least one neighbor entry
with the Type_Tx value of 1 in its neighbor table, the tx_exist is set to 1; otherwise, the
tx_exist is set to 0. In a similar way, if a node has at least one neighbor entry with the
Type_Rx value of 1 in its neighbor table, the rx_exist is set to 1; otherwise, the rx_exist is set
to 0. Therefore, node I in Fig. 4 has the Weightvalue of 3 (= 1 * 1 + 1 * 2).
In the adaptive holdoff algorithm, the Weightof a node represents its access rate required to
reserve a shared resource for data transmission or reception. Therefore, a node with a large
Weightvalue should be able to access the TOs of the schedule control subframe at a high rate,
and a node with a small Weightvalue should access the TOs of the schedule control
subframe at a low rate.
To achieve this goal, in the adaptive holdoff algorithm, current transmission holdoff
exponent (Cur_Xmt_Holdoff_Exp) is defined as follows:
Cur_Xmt_Holdoff_Exp=Max_Xmt_Holdoff_Exp*(1Weight
- / 3) (6)
Xmt_Holdoff_TimeXmt_Holdoff_Base
( =2 +Cur_Xmt_Holdoff_Exp) (7)
Algorithm 1 AdaptiveHoldoffAlgorith
mbasedonNodeState
Notations Used:
= indicate whether a node currently has at least one tx-neighbor
tx_exist
= indicate whether a node currently has at least one rx-neighbor
rx_exist
Weight= access rate of a node
Current_Xmt_Holdoff_Exp = current transmission holdoff exponent
Xmt_Holdoff_Exp_Base = transmission holdoff exponent base (= 4)
Max_Xmt_Holdoff_Exp = maximum value of transmission holdoff exponent (= 3)
Xmt_Holdoff_Time = transmission holdoff time
4. Simulation Evaluation
Computer simulations were performed to evaluate the performance of the holdoff
algorithms. To show the importance of adjusting holdoff time according to current network
situation from the perspective of performance improvement, the performance of the
adaptive holdoff algorithm based on node state (AHA) is compared with that of the static
holdoff algorithm (SHA), which is described in the IEEE 802.16 mesh standard.
Parameters Value
Max. transmission range MeshSS: 400m, MeshBS: 400m
Bytes per OFDM symbol 108 (64-QAM_3/4)
Xmt_Holdoff_Exp_Base 4
Xmt_Holdoff_Exp 3 (only static holdoff algorithm)
Distance between MeshSSs 300m
Table 1. Simulation parameters for holdoff algorithms
Simulations are performed in two scenarios: multi-hop peer-to-peer and multi-hop Internet
access scenarios. Figure 8 shows traffic flows in the multi-hop peer-to-peer scenario. The
multi-hop Internet access scenarios are classified into upload and download patterns. The
traffic flows for upload and download patterns are shown in Figs. 9 and 10, respectively.
To evaluate the performances of two holdoff algorithms (SHA and AHA), the following
performance metrics are used:
The average per-flow throughput is the average packet throughput at a receiver.
The total network throughput is the sum of the average packet throughputs at all
receivers.
holdoff time regardless of their current state. However, in the AHA, because nodes adjust
their Xmt_Holdoff_Exp in a range between 0 and 3 according to their current state, the radio
resource can be used efficiently.
Fig. 16. Total Total network throughput in multi-hop Internet access - download
For example, because a node with the Weight= 0 currenlty has no data communication with
neighbors, even though the node uses the Xmt_Holdoff_Exp of 3 in the holdoff process, the
communication problem does not happen. Furthermore, that a node with a small Weight
value reduces the access rate to the schedule control subframe enables other nodes with a
large Weightvalue to access the schedule control subframe at a high rate.
A node with the Weight= 3 can access the schedule control subframe at a high rate by setting
the Xmt_Holdoff_Exp to 0. By adaptively adjusting the Xmt_Holdoff_Exp value according
to the current node state, the AHA performs better than the SHA in terms of average per-
flow throughput and total network throughput, as shown in Figs. 11 and 12.
In general, access to the Internet through MeshBS is desirable for MeshSSs to obtain
necessary service. In the multi-hop Internet access scenario, it frequently happens that
MeshSSs upload files to Internet through MeshBS and MeshSSs download files provided in
the Internet through MeshBS. As illustrated in Figs. 9 and 10, computer simulations are also
performed in the multi-hop Internet access scenario with upload and download patterns.
Figures 13 and 14 show the average per-flow throughput and total network throughput in
the multi-hop Internet access scenario with upload pattern, respectively. In addition, Figs. 15
and 16 show the average per-flow throughput and total network throughput in the multi-
hop Internet access scenario with download pattern, respectively. In the multi-hop Internet
access scenario, it frequently happens that nodes act as one of sender or receiver. For
example, node 12 serves only as sender in Fig. 9, and only as receiver in Fig. 10. In the AHA,
because nodes set their Xmt_Holdoff_Exp to an appropriate value according to their current
role, the AHA outperforms the SHA, as shown in Figs. 13, 14, 15, and 16.
Holdoff Algorithms for IEEE 802.16 Mesh Mode in Multi-hop Wireless Mesh Networks 417
5. Conclusion
Multi-hop wireless mesh networks are one of the key features of beyond 3G system because
of their flexibility and low-cost deployment. The IEEE 802.16 mesh mode with the C-DSCH
has recently emerged as an alternative MAC protocol for establishing M-WMNs. For the
IEEE 802.16 mesh mode to serve as a MAC protocol for M-WMN, it should get a high
network throughput. However, the holdoff algorithm of the IEEE 802.16 mesh standard has
a limitation to the performance improvement of M-WMN. In this chapter, we dealt with
existing holdoff algorithms such as static holdoff algorithm and dynamic holdoff algorithm
and introduced their limitations. In addition, we proposed an adaptive holdoff algorithm
based on node state for the IEEE 802.16 mesh mode with the C-DSCH. The adaptive holdoff
algorithm assigns an appropriate Xmt_Holdoff_Exp value according to current network
situation and it maintains the backward compatibility with the IEEE 802.16 mesh standard.
Simulation results show that it is required for nodes to adaptively adjust their holdoff time
according to current network situations in order to improve the performance of an IEEE
802.16 mesh system.
6. Acknowledgments
This research was supported by the MIC (Ministry of Information and Communication),
Korea, under the ITRC (Information Technology Research Center) and MMPC (Mobile
Media Platform Center) support programs supervised by the IITA (Institute of Information
Technology Advancement)
7. References
Han, B., Jia, W., and Lin, L. (2007). Performace Evaluation of Scheduling in IEEE 802.16
based Wireless Mesh Networks, Elsevier Computer Communications, Vol. 30, No.
4, Feb. 2007, pp. 782-792, ISSN 0140-3664
Akyildiz, I. F., Wang, X., and Wang W. (2005). Wireless Mesh Networks : A Suervey,
Elsevier Computer Networks, Vol. 47, No. 4, Mar. 2005, pp. 445-487, ISSN 1389-
1286
IEEE Std. 802.16-2004 (2004). IEEE Standard for Local and Metropolitan Area Networks: Part
16: Air Interface for Fixed Broadband Wireless Access Systems, Oct. 2004
Cao, M.; Ma, W.; Zhang, Q.; Wang, X. & Zhu, W. (2005). Modeling and Performance
Analysis of the Distributed Scheduler in IEEE 802.16 Mesh Mode, Proceedings of
ACM MobiHoc , pp. 78-89, ISBN 1-59593-004-3, Urbana-Champaign, May 2005,
ACM, Illinois, USA
Bayer, N.; Xu, B. ; Rakocevic, V. & Habermann, J. (2007). Improving the Performance of the
Distributed Scheduler in IEEE 802.16 Mesh Networks, Proceedings of IEEE VTC
Spring , pp. 1193-1197, ISBN 1-4244-0266-2, Burlington Hotel, Apr. 2007, IEEE,
Dublin, Ireland
Bayer, N. ; Sivchenko, D.; Xu, B.; Rakocevic, V. & Habermann, J. (2006). Transmission
Timing of Signaling Messages in IEEE 802.16 based Mesh Networks, Proceedings of
European Wireless, ISBN 978-3-8007-2961-6, National Technical University of
Athens, Apr. 2006, Athens, Greece
418 Radio Communications
Morge, P. S.; Hollick, M. & Steinmetz, R. (2007). The IEEE 802.16-2004 MeSH Mode
Explained Technical Report, KOM-TR-2006-08, Feb. 2007
Wang, S. Y.; Huang, C. H.; Lin, C. C.; Chou, C. L. & Liao, K. C. (2007-(a)). The Protocol
Developer Manual for the NCTUns 4.0 Network Simulator and Emulator, July
2007.
Wang, S. Y.; Chou, C. L. & Lin, C. C. (2007-(b)). NCTUns Hompage. [Online]. Available:
http://nsl10.csie.nctu.edu.tw/
Wang, S. Y.; Chou, C. L. & Lin, C. C. (2007-(c)). The GUI User Manual for the NCTUns 4.0
Network Simulator and Emulator, July 2007
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 419
93chemindesMeinajarièsB.P.281 1cedex
9 4 8, Avignon
-9 -France
bLIMIARF/FSR,Mohammed V-AgdalUniversity
Avenue
4 IbnBattoutaB.P.Agdal 410 Rabat
- Morocco
-
1. Introduction
The next generation network WiMAX (Worldwide Interoperability for Microwave Access),
has become synonymous with the IEEE802.16 Wireless Metropolitan Area Network (MAN)
air interface standard. In its original release the 802.16 standard addressed applications in
licensed bands in the 10 to 66 GHz frequency range. Subsequent amendments have
extended the 802.16 air interface standard to cover non-line of sight (NLOS) applications in
licensed and unlicensed bands from 2 to 11 GHz bands. These 802.16 networks are able to
provide high data rates and are preferably based, for NLOS applications, on Orthogonal
Frequency Division Multiple Access (OFDMA) (Piggin, 2004). In OFDMA, modulation
and/or coding can be chosen differently for each sub-carrier, and can also change with time.
Indeed, in the IEEE802.16 standard, coherent modulation schemes are used starting from
low efficiency modulations (BPSK with coding rate 1/2) to very high efficiency ones (64-
QAM with coding rate 3/4) depending on the SNR (Signal-to-Noise Ratio). It has been
shown that systems using adaptive modulation perform better than systems whose
modulation and coding are fixed (Yaghoobi, 2004). Adaptive modulation increases data
transmission throughput and the system reliability by using different constellation sizes on
different sub-carriers.
The authors in (Peyre et al., 2008) introduce a new Quality of Service (QoS) for real-time
calls in IEEE802.16e Multi-class Capacity including AMC scheme and QoS Differentiation
for Initial and Bandwidth Request Ranging (Seo et al., 2004). The QoS defined in this work is
to maintain a same bit rate for RT calls independently of user position in the cell. The
authors use a Discrete Time Markov Chain (DTMC) to model the system over a
decomposition of IEEE802.16e cell. The authors took account the mobility of users among
1This work was supported by a research contract with Maroc Telecom R&D No.
10510005458.06 PI.
420 Radio Communications
the regions of the cell. So, the analysis of wireless systems, as IEEE802.16e WiMAX, often
requires to model the effect of user mobility. The mobility model is a critical element for any
study about the radio communications. Therefore we choose to use the Random Waypoint
(RWP) mobility model. This model have been studied largely in Ad-hoc networks
(Johnson & Maltz, 1996) and briefly in wireless networks (Hyyti & Virtamo, 2007). In
particular we consider (Johnson & Maltz, 1996), wherein the authors introduced the RWP
mobility model to find the mean arrival and departure rates into a concentric cell as well as
the mean sojourn time in the cellular networks.
Call Admission Control schemes play an important part in radio resource management
(Kobbane et al., 2007), (Ibrahimi et al., 2008) and (Ibrahimi et al., 2009). Their aims are to
maintain an acceptable QoS to different calls by limiting the number of ongoing calls in the
system, minimize the call blocking and dropping probabilities and in the same time
efficiently utilize the available resources (Niyato & Hossain, 2005). Our study is motivated
by an attempt to find the better CAC in IEEE802.16e WiMAX, for both traffics RT and BE
that handles the intra or inter cell mobility issue in the downlink of IEEE802.16e WiMAX
with AMC technic. Based on the RWP mobility model for an IEEE802.16e cell, we model the
system capacity through a Continuous Time Markov Chain (CTMC). For this reason we
propose to study two promising CAC algorithms that guarantee a QoS. Our propositions
allow to Internet Service Providers (ISP) to choice a CAC dependently of its purpose to
manage their networks.
The rest of this paper is organized as follows: In Section 2, we describe the system and
mobility properties as well as both CAC algorithms. In section 3, we develop the system and
RWP mobility model. Based on it, the sections 4 and 5, develop the analysis for the first and
second CAC schemes respectively. In Section 6 we define the performance metrics used to
achieve the performance match. The section 7 provides some numerical results before
conclude in section 8.
2. Framework
2.1. IEEE802.16 basis principles
The IEEE802.16e Physical layer uses an OFDMA sub-carrier allocation policy for the data
transmission. The uplink and downlink sub-frames divide the time and frequency space
into sub-carriers. The minimum frequency-time unit of sub-channelization is one slot, and a
frame is constructed by a number of slots. Different sub-carriers are allocated to a mobile
transmission in function of the resource requested by the mobile. Moreover, a sub-channel
can be used periodically by different mobiles due to theirs classes of traffic. Once a mobile is
granted to transmit by a bandwidth response in the DL-MAP, base station assigns one or
more subcarriers and hence defines the sub-channels that the mobile will be able to use for
its data transmission.
An IEEE802.16e cell is organized in region. Each region use specific modulation and coding
technics. Users belongs to a region in function of theirs Signal-to-Noise Ratio SNR. The
number of subcarriers allocated to a mobile directly depends on the available modulation,
the type of traffic and the requested bandwidth.
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 421
The Fig. 2 represents our last CAC algorithm for a new call of class- c . In this other CAC
algorithm the BE calls have no bandwidth requirement. Since the BE calls tolerate
throughput variation, they will use the sub-carriers left by the RT call occupancy. In fact, the
BE calls are never blocked and received the same resources according with the Processor
422 Radio Communications
Sharing (PS) (Benameur et al., 2001). Thus, the bit rate of a BE call depends on its region (i.e
modulation). For the RT calls only, the CAC algorithm follows the same scheme than
previously: a new RT call arriving in region i is accepted if enough resources are available
for it. And since a RT call did not terminate its service in region i before migrating to a
region j , j = i 1 , the call will be able to remain in the system if enough resources are
available to afford the modulation change.
RT call moving to
New class-c call in region i
region j
New class-c
call is
Required
n yes
resources
available?
Finally, remarks that for both CAC algorithms, the RT calls are independent of the consume
resources: the RT-call remaining-time only depends on the behavior of the user. Conversely
the BE calls remain in the system in function of the consumed resources: the more sub-
carriers a BE call have, the faster it leaves the system.
In addition, our CAC algorithms seek to reduce the dropping probability: the probability
that an on-progress service is dropped due to its mobility. As explained above, the call
consumes bandwidth in function of the used modulation. By migrating to an outer region, a
call may require additional resources. Thus, this call might undergo a drop due to lack of
available resources. To prevent from these drops, our CAC algorithms introduce a reserved
part of bandwidth. This reservation aims to satisfy the need of additional resources
demanded in case of outer migration.
3. Model
3.1 Cell decomposition and instantaneous throughput
We consider without loss of generality, the Adaptive Modulation and Coding (AMC) with
pathloss only. Then, the OFDMA cell is decomposed into r regions according to the AMC
value corresponding to a certain value of SNR as depected in Fig. 3. Let R i (i=1, …,r) be the
radius of the i-th region and Si represents the corresponding surface. Each region corresponds
to a specific modulation order (see Table 1). In OFDMA scheme, the total number N of sub-
carriers is divided into L sub-channels (or groups) each containing ksub-carriers, such k=N/L .
In our study, we consider the multi-services WiMAX/OFDMA system with two types of
traffics real-time (RT) and best-effort (BE). Also, we define the instantaneous bit rate (radio
interface rate) for a call of class-c located in the region i as follows:
where K is the number of sub-carriers assigned to each sub-channel; B is the baud rate
(symbol/sec); ei is the modulation efficiency (bits/symbol) and Lci is the sub-channels
allowed for class-c call in region i . The above bit rate can be degraded by the error channel
due to collision, shadow fading effect, as defined in (Tarhini & Chahid, 2007),
where BLERi is the BLock Error Rate in region i. The Table 1 indicates the modulations and
codings used in a IEEE802.16e cell as function of the user SNR. The SNR requirement for a
BLER less than 10-6 depends on the modulation type as specified in the standard (Standard
IEEE802.16, 2004). Then, we have γ1= 24.4 dB, γ2= 18.2 dB, γ3= 9.4 dB, γ4= 6.4 dB and γ0 =∞.
variable vi. In particular in the RWP model, it is assumed that Pi and vi are all independent
and vi are uniformly distributed. Here, the domain Ω corresponds to one cell and leg to path
between both waypoints Pi and Pi-1 . Also, the node corresponds to a mobile or user moving
in the cell. With this notation the RWP process (for a single node) is defined by an infinite
sequence of triples (Bettstetter et al., 2004),
{( P0 , P1 , v1 ),( P1 , P2 , v2 ), ....}.
We note that the process RWP is time reversible. This means that the arrival rates across any
line segment or border are equal in both directions. In other words, the average rates of calls
moving from region ito region jper time unit is equal to the number of calls moving from
region jto region iper time unit, i. e., ci , j = cj ,i as proved in (Norris, 1999).
migration rates c . As the velocity of the user
i, j
Our aim is to compute the (node) is
assumed to have an uniform distribution from vmin, (vmin>0) to vmax, denoted by fv(v), where
1
, if v vmin , vmax ;
f v (v) = vmax vmin
0, otherwise.
li
Let T i denote the transition time on i-th leg (path) defined as Ti = , where
vi
li =| Pi Pi 1 | . The variables li and vi are independent random variables. The average time
from one waypoint to another is given by:
1 ln (vmax /vmin )
E[T ] = l f v (v)dv = l = l.E[1/v]. (3)
v v vmax vmin
We consider the area Ai of each concentric cell of radius Ri as a convex disk of same
radius in which the mobiles move according to the RWP model. Our aim is to compute the
arrival rate into a cell of radius Ri 1 . As introduced in (Hyyti & Virtamo, 2007), let
opposite direction (see Fig. 4). Also, we note the specific flux at Ri 1 in direction by
426 Radio Communications
1
( Ri 1 , ) = .a1a2 (a1 a2 ),
2Cv (4)
where Cv = lAi2 .E[1/ v]. We recall that the i th disk surface is Ai = Ri2 and the
mean length of a leg in this disk is
1
l=
Ri2 a a (a
0
1 2 1 a2 )d . (5)
According with the RWP model developed in cellular network context (Hyyti & Virtamo,
2007) , the arrival rate for one user to region i 1 over all contour of disk of the radius Ri 1
is given by
( Ri 1 ) = 2Ri 1 sin ( ) ( Ri 1 , )d . (6)
0
As the user mobility behaviors are independent, the total migration rate from region i
(i = 1, , r ) to region j ( j = i 1 ) of class- c is given by
Now we can compute the mean sojourn time ic of one mobile that proceed to class-c call in
region i . This mobile can arrives from region j with rate cj ,i ( i = j 1 ) or from outside
as new call with rate c0,i . Let pci be the probability of finding a call of class-c in region i
(i = 1, , r ). Then the mean sojourn time is given by (Hyyti & Virtamo, 2007):
pci
i
=
c , with c0,1 = 0, (9)
i 1,i
c i 1,i
c 0
c ,i
where
pci = P (nci (t ) 1) =
k (n). (10)
n , nci 1
where k is the probability distribution computed in the next system analysis andk=1,2 .
Rc
Lic = . (11)
k B ei (1 BLERi )
428 Radio Communications
We recall that the mean call duration of BE calls in the system depends on the transmitting
RBE
payload in bits, i.e., BE = , where E ( Pay ) is the mean file size (Downey,
E ( Pay )
2001). Thus, we define the space of the admissible states as follows
r
E = {n N 2 r | {nRT
i
LiRT nBE
i
LiBE } L}. (12)
i =1
Let Lm be the reserved capacity for migrating or handoff calls of class-c and L0 denotes
the remaining capacity given by L0 = L Lm . Let B1 (n) be the occupancy bandwidth
when system state is n , with
r
B1 (n) {nRT
i
LiRT nBE
i
LiBE }. (13)
i =1
We have two classes of services RT and BE. Each class-c call in region i ( i = 1, 2,, r )
i
requires the effective bandwidth L c . Then, we have 2r classes in the cell and the
equilibrium distribution is given by BCMP theorem (Chao et al., 2001) for multiple classes
ci (n)
with possible class changes, with = i
i
c as
c c
i i
1 r ( RT
i n
) RT ( BE
i n
) BE
1 ( n) = i i
, (15)
G i =1 nRT ! nBE !
where n E and G is the normalizing constant given by
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 429
ni ni
r
( RT
i
) RT ( BE
i
) BE
G = i i
.
nE i =1 nRT ! nBE !
So, this probability depends of the mean sojourn time ic which depends itself on the
i
probability pc in equation (10). Also the latter depends of the above distribution and vice
versa. We can use the fixed point theorem to resolve this problem as follow:
4: Derive the new value of probability from (10), denoted by pci ,new .
5: Check the convergence of the probability between the old and the new values. if
| pci ,new pci ,old |< , where is a very small positive number, then the new probability is
used to compute the performance metrics. Otherwise, go to step 2 with new value as initial
value. The iterations are continued until to reach the convergence of probability.
channels for RT calls mobility. We denote by LRT the remaining capacity for RT calls given
by:
Let B2 (n) be the bandwidth occupied by RT calls when system sate is n , with
r
B2 (n) = nRT
i
LiRT , (17)
i =1
where
RRT
LiRT = .
k B ei (1 BLERi )
430 Radio Communications
In this section, we guarantee for RT calls a QoS in terms to maintain a same bit rate
everywhere in the covered area by the cell. Whereas a BE call receives the instantaneous bit
i
rate denoted by RBE in region i . The dynamic capacity C (n) shared fairly among all BE
calls simultaneously in progress in the system is
L B (n) Lm , if B (n) < L ;
C ( n) = 2 RT 2 RT
(18)
LBE , otherwise.
The BE calls share the reserved capacity with PS manner. The number of sub-channels LiBE
allocated to a BE call in region i with PS policy is
i C ( n)
L (n) =| r
BE |, (19)
nBE i
i =1
r
F = {n N 2 r | nRT
i
LiRT LRT }. (20)
i =1
1, if X is true;
(X ) =
0, otherwise.
c
its modulation order and we denote this transition by q c . Let ni, j ( j = i 1 ) be the
( n , ni )
state when a class-c call in region i moves to the neighbor region j and we denote this
transition by q c . Then, we have
( n , ni , j )
q RT = ( B2 (n) LiRT LRT )RT
0
,i ,
( n , ni )
q BE = BE
0
,i ,
( n , ni )
q RT = ( B2 ( n) iRT
,j
LRT LmRT )RT
i, j
,
( n , ni , j )
q BE = BE
i, j
,
( n , ni , j )
q RT = nRTi
( RT iRT ),
( n , ni )
q BE = nBEi
( BE
i
(n) iBE ),
( n , ni )
obtained as the sum of all terms in each line in matrix Q is equal to zero for RT call and BE
one as well as i = 1, , r .
1 = 1. (22)
6. Performances metric
Once the equilibrium distribution probabilities 4.2 and 5.3 are calculated, we compute many
interesting metrics of the system. In this section, we provide explicit expressions for various
metrics like dropping probabilities, blocking probabilities, average sojourn time and average
throughput.
where Eci , j = {n E | B1 (n) Lcj Lic > L}.
where FRTi = {n F | B2 (n) LiRT > LRT }.
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 433
where FRTi , j = {n F | B2 (n) RT
j ,i
> LRT LmRT }.
r i
Th2 =
2 ( n ) ( n RT RRT n i
BE R i
BE ( n )). (28)
nF i =1
7. Numerical applications
The following parameters and assumptions are used in our numerical applications.
Considering OFDMA cell system with an FFT (fast Fourier transform ) size of 2048 sub-
carriers. The cell is decomposed into two regions (r = 2), R 1 = 300 m and R 2 = 600 m with
AMC scheme: 16-QAM 3/4 (e1 = 3 bits/symbol) and QPSK 1/2 (e2 = 1 bit/symbol). The
baud value B = 2666 symbols/sec, BLER i = 0, and K = 48. These parameters correspond to
the transmission modes with conventionally coded modulation (Liu & Zhou, 2005); The bit
rate R RT is equal to 128 Kbps and R BE is 384 Kbps (Tarhini & Chahed, 2007); The total
bandwidth L is 10 sub-channels; The mean call duration for RT calls is equal to 120 sec and
the download of files with mean size for BE calls is equal to E(Pay) = 5 Mbits. We assume a
mobile moves according to the RWP model on a convex disk of radius R z = 900 m. It
randomly chooses a new speed in each waypoint from an uniform
distribution between [vmin, v max ], where vmin=3km/h (low mobility) or
vmin= 20km/h (high mobility), vmax = 90 km/h.
the reserved bandwidth Lm increases, the calls are more blocked as the incoming region is
away from the base station and as the calls demand an high bandwidth. In particular, we
observe on the figure the blocking probabilities for two type of arrivals : BE calls in 16QAM
and RT calls in QPSK. The blocking probabilities are exactly the same because the product
between the required bandwidth and the modulation efficiency are the same for both.
0.2
0.18
0.16
Mean speed = 46.5 km/h
0.14
Bocking probabilities
0.12
0.1
scheme 1 : class-RT 16-QAM
0.08 scheme 1 : class-RT QPSK
scheme 1 : class-BE 16-QAM
0.06 scheme 1 : class-BE QPSK
0.04
0.02
0
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18
Reserved portion for mobility Lm
0
RT ,i = 0
BE ,i = 0.3 call/sec.
The Fig. 6 shows the average throughput of the whole cell versus the reserved threshold
mobility. On this figure two singular behaviors have to be studied. The first main
observation deals with the throughput increasing because of an higher mobility. As a mobile
moves faster, it increases its probability to change region (and thus modulation) per unit of
time. This fact implies also more calls dropped due to lack of resources. In fact the system
will implicitly coerce the system calls to use better modulations. This last deduction explains
how an higher mobility allows to reach a better throughput. Note that this remark is
confirmed in (Peyre & Elazouzi, 2009) and also observed for the ad-hoc networks
(Grossglause & Tse, 2002). Moreover, we can criticize on the Fig. 6, the impact of resource
reservation to ease the call mobility. For any mobility behavior, the average cell throughput
decreases as the reservation share increases. But the throughput fall depends on the mobility
behavior. In fact, by introducing a resource reservation, we helps more and more migrating
calls to remain in the border regions. Theses calls use more subchannels to reach the same
bit rate than previously. Consequently, the system reaches a lower throughput by
prioritizing the user mobility management.
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 435
1.3
scheme 1 : mean speed = 46.5 km/h
1.2 scheme 1 : mean speed = 55 km/h
1.1
0.9
0.8
0.7
0.6
0.5
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18
Reserved portion for mobility Lm
Fig. 6. Average throughput versus threshold Lm and mean speed for RT
0
,i = BE ,i = 0.3
0
call/sec.
The Fig. 7 represents the dropping probabilities versus reserved threshold Lm . We plot the
results for both types of traffic in the border region (i.e. QPSK modulation), and for two
mobility behaviors. The figure helps to appreciate the great impact of the resource
reservation on the mobility management efficiency. Concerning the real-time traffics, we
observe that an higher mobility causes an twenty-times dropping increase. To fight against
this effect, our CAC algorithm permits to tune the resource reservation in order to decreases
the call drops under a desired value. For examples, a reservation lower than ten percents of
the total bandwidth decreases the number of dropped calls under a one-percent probability.
For the Best Effort traffic, we observe exactly the same behavior. Nevertheless, the dropping
probability for the BE traffic remains higher than for the RT because the BE calls require an
higher bit rate. As they ask for more bandwidth, they undergo more drops. For this type of
traffic, our CAC allows also to greatly reduce the dropping probability of the BE calls by
increasing the resources reservation Lm .
-7
x 10
1.6
scheme 2 : Lm
RT
=1%, mean speed = 46.5 km/h, 16-QAM
1.4
scheme 2 : Lm
RT
=1%, mean speed = 46.5 km/h, QPSK
1.2 scheme 2 : Lm
RT
=3%, mean speed = 46.5 km/h, 16-QAM
RT call blocking probabilities
scheme 2 : Lm
RT
=3%, mean speed = 46.5 km/h, QPSK
1
0.8
0.6
0.4
0.2
0
0 0.05 0.1 0.15
Minimum reserved portion LBE
0
RT ,i = 0
BE ,i = 0.3 call/sec.
0.5
0.45
scheme 1: mean speed = 46.5 km/h, class-RT
Dropping probabilities in region 2 (QPSK)
0.3
0.25
0.2
0.15
0.1
0.05
0
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18
Reserved portion for mobility Lm
Fig. 8. Dropping probabilities versus threshold LBE and LmRT for RT
0
,i = BE ,i = 0.3
0
call/sec.
of LBE and LmRT on the blocking probabilities experienced in each region. In general, the
blocking probabilities are heavily increased by the BE bandwidth reservation. In addition,
this drawback is amplify by the increase of the mobility management resource reservation.
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 437
From this statement, we could compute the the value ranges for LBE and LmRT which
satisfy a maximum blocking probability threshold.
The Fig. 9 shows the dropping probabilities for the RT traffics in the border region versus
the bandwidth reservation for the Best Effort call. We plot the results obtained for two
resource reservation profiles for the user mobility management. The figure shows how the
resource reservation LmRT fights against the dropping due to the BE bandwidth reservation.
On this figure, the dropping probability is reduced as the BE reservation is greater than ten
percents. So we can determine the possible values for LmRT from a desired maximum
dropping probability.
The Fig. 10 shows the total cell throughput. This figure presents the impact of the different
bandwidth reservation to increase the BE call throughput and to ease the call mobility. On
the Fig. 10 we can appreciate the great impact of the BE bandwidth reservation LBE .
Indeed, by reservation 15% of the total bandwidth, we double the total cell throughput. In
addition, to increase the mobility-purpose reservation slightly decrease the total throughput.
This observation leads to think that a small quantity of subchannels for Best effort calls
allows to reach very higher throughput. In fact, this by reserving few subchannels to the BE
calls, we also increase the blocking and dropping probabilities for the RT calls. Therefore,
these amount of resources freed by the dropped call or let free by the blocking one allow to
the BE calls to use even more resources.
0.24
scheme 2 : Lm
RT
=1%, mean speed = 46.5 km/h
0.22 scheme 2 : Lm =3%, mean speed = 46.5 km/h
RT
Average cell throughput-[Mbps]
0.2
0.18
0.16
0.14
0.12
0.1
0 0.05 0.1 0.15
Minimum reserved portion LBE
-8
x 10
3.5
scheme 2 : Lm
RT
=3%, mean speed = 46.5 km/h
2.5
1.5
0.5
0
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16
Minimum reserved portion LBE
Fig. 10. RT dropping probabilities versus threshold LBE and LmRT for RT
0
,i = BE ,i = 0.3
0
call/sec.
8. Conclusion
Recently many works have been introduced to study the WiMAX performances in order to
improve some QoS for users. In this sense our work contributes in order to improve the QoS
of users. In fact, by considering both traffics RT and BE, we proposed two strategies of QoS
management. The first defines constant bit rates (CBR) for RT and BE calls. We also
introduce a resource reservation to ease the mobility of the users. The second scheme
replaces the CBR policy of the BE calls by a Processor Sharing (PS), and we add an other
bandwidth reservation to improve the minimum Best Effort call throughput. Moreover, we
define a realistic mobility model through the accurate Random Waypoint model. Based on
these propositions we develop a continuous time Markov chain which determines the
steady state of the system. From the model, we provide a large range of performance
metrics. We conclude our analysis by criticize the impact of each CAC algorithm parameters
on the system performances. By gathering all our results, we can easily choose one of the
two proposed CAC algorithms to meet with the desired traffic prioritization policy. In
addition, we analyzed the possible ways to tune the parameters of each CAC algorithms in
order to specify the main thresholds (average throughput, blocking and dropping
probabilities). As future works we seek to introduce thinking times in our RWP model. Our
main objective is also to improve the CAC algorithms by determining the best way to roam
the mobile user to a region, in function of its speed and the expected time spend in the next
region.
Call Admission Control Algorithms based on
Random Waypoint Mobility for IEEE802.16e Networks 439
9. References
Benameur, N.; Ben Fredj, S.; Delcoigne, F.; Oueslati-boulahia, F.; Roberts, J. W.; &
Moulineaux, I. L. (2001). Integrated admission control for streaming and elastic
traffic. Journal Lecture Notes in Computer , Vol.Science
2156, (February, 2001), pp. 69-
82, ISSN 0302-9347.
Bettstetter, C.; Hartenstein, H. & Perez-Costa, X. (2004). Stochastic properties of the random
waypoint mobility model. ACM/KluwerWireless Networks: Special Issue on Modeling
andAnalysisofMobileNetworks , Vol. 10, No. 5, (September, 2004).
Chao, X.; Miyazawa, M.; Pinedo, M. & Atkinson, B (2001). Queuing networks: Customers,
signals and product form solutions. The Journal of the Operational Research Socie
Vol. 52, No. 5, (May, 2001), pages number (600-601).
Downey, A.B. (2001). The structural cause of file size distributions. IGMETRICS/Performance,
Vol. 29, No. 1, (June, 2001), pages number (328–329), ISSN 0163-5999.
Grossglauser, M. & Tse, D. (2002). Mobility increases the capacity of ad-hoc wireless
networks. IEEE/ACM Transactions on Networking, Vol. 10, (August, 2002) pages
number (477-486), ISSN 1063-6692.
Hyyti, E. & Virtamo, J. (2007). Random waypoint mobility model in cellular networks.
Wireless Network , Vol. 13, No. 2, (Avril, 2007), pages number (177-188), ISSN 1022-
0038.
Ibrahimi, K.; El-Azouzi, R.; & Bouyakhf, E.H. (2008). Uplink Call Admission Control in
Multi-services W-CDMA Network. Proceedings of 13th IEEE Symposium on
ComputersandCommunications, ISCC' ( July )80 2008, Marrakech, Morocco.
Ibrahimi, K.; El-Azouzi, R.; S.K. Samanta; & Bouyakhf, E.H. (2009). Adaptive Modulation
and Coding scheme with intra- and inter-cell mobility for HSDPA system. To apear
in the Sixth International Conference on Broadband Communications, Networks,
and Systems (IEEE/ICST BROADNETS), Septembre 2009, Madrid, Spain.
Johnson, D.B. & Maltz, D.A. (1996). Dynamic source routing in ad hoc wireless networks. In
thebook MobileComputing , pages number (153–181). Kluwer Academic Publishers.
Kobbane, A.; El-Azouzi, R.; Ibrahimi, K. & Bouyakhf, E.H (2007). Capacity Evaluation of
multi-service W-CDMA : A Spectral Analysis Approach. Proceedings of the Sixth
IASTED International Conference on unication
Comm Systems and Networks, CSN,
August 2007, Palma of Mallorca, Spain.
Liu, G.O. & Zhou, Z. (2005). Queuing with adaptive modulation and coding over wireless
links: Cross-layer analysis and design. IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS , Vol. 4, No. 3, (May 2005).
Niyato, D. & Hossain, E. (2005). Call admission control for qos provisioning in 4G wireless
networks: issues and approaches. IEEE Network, Vol. 19, No. 5, (2005) pages
number (5–11), ISSN 0890-8044.
Norris, J.R. (1999). Markovchains. Cambridge University ess,PrISBN = 0-521-68181-3.
Peyre, T. & El-Azouzi, R. (2009). IEEE802.16 multi-class capacity including AMC scheme,
mobility and QoS differentiation for initial and bandwidth request ranging. To
appearintheproceedings, of Hungary,
WCNC April 2009, Budapest.
Peyre, T.; Ibrahimi, K. & El-Azouzi, R. (2008). IEEE802.16 multi-class capacity including
AMC scheme and QoS differentiation for initial and bandwidth request ranging.
ProceedingsofValuetools , Greece, October 2008, Athens.
440 Radio Communications
Piggin, P. & Depth, W. (2004). Broadband wireless access. IEEE Communications Engineer,
Vol. 2, Issue 5, (Octobre 2004), pages number (36-39).
Seo, H.H.; Ryu, B.H.; Hwang, E.S.; Cho, C.H. & Lee, N.W. (2004). A study of code
partioning scheme of efficient random access in OFDMA-CDMA ranging
subsystem. Proceedings of JCCI, pages 262, April 2004.
Standard IEEE802.16. (2004). IEEEstandardforlocalandmetropol itanareanetworks,part16:Air
interfaceforfixedbroadbandwirelessaccesssystems, New York, USA.
Tarhini, C. & Chahed, T. (2007). On capacity of OFDMA-based ieee802.16 WiMAX including
adaptative modulation and coding and inter-cell intereference. Proceedings of the
15 thIEEEWorkshoponLocalandMetr opolitanAreaNetwork(LANMAN) , Princeton NJ,
June 2007, USA.
Yaghoobi, H. (2004). Scalable OFDMA physical layer in IEEE 802.16 Wirelessman. Intel
TechnologyJournal , Vol. 8, (August 2004), pages number (201–212).
Queueing-Model-Based Analysis for IEEE802.11 Wireless LANs with Non-Saturated Nodes 441
1. Introduction
The IEEE 802.11 protocol has gained widespread popularity as a standard MAC-layer proto-
col for wireless local area networks (WLANs). The IEEE 802.11 standard defines Distributed
Coordination Function (DCF) as a contention-based MAC mechanism, but it does not have
quality-of-service (QoS) functionality. The IEEE 802.11 standard group has approved the
802.11e standard for MAC layer QoS enhancements to the former 802.11 standard, where the
Enhanced Distributed Channel Access (EDCA) function of 802.11e is a QoS enhancement of
the DCF.
While the IEEE 802.11e claims to support the QoS, several challenging problems still remain
on the support of real-time applications with strict QoS requirements. Under the DCF, the
real-time bidirectional applications like Voice over IP (VoIP) cannot efficiently utilize the
bandwidth of WLANs. The inefficient bandwidth utilization is mainly caused by the up-
link/downlink unfairness problem in WLANs (Cai et al., 2006). The DCF assigns the same
number of access opportunities to each individual mobile terminal as well as the access point
(AP), but each mobile terminal serves one uplink flow while the AP needs to serve all down-
link flows. Thus, a downlink flow necessarily gets comparatively lower bandwidth than an
uplink flow gets. The unfairness between uplink and downlink flows likely builds up the
queue at the access point (AP) and causes packet loss of downlink flows even at moderate
load, where unused bandwidth still remains for uplink flows in a WLAN. This implies that,
under the use of bidirectional applications, the AP is likely to become performance bottleneck
over the standard WLANs. Note that the occupancy of the AP buffer strongly depends on
the throughput of the WLAN, at which rate the AP can successfully transfer frames over the
WLAN. Thus, the performance of bidirectional applications over WLANs needs to be ana-
lyzed by taking into account both the occupancy of the AP buffer and the throughput of the
IEEE 802.11 DCF (or EDCA).
In this article, we present a mathematical model for evaluating the MAC-layer performance
such as per-flow throughput as well as the network-layer performance such as packet loss at
each station. Our proposal combines a Markov chain model for evaluating the throughput of
the IEEE 802.11 DCF and a queueing model for analyzing the network-layer performance of
each station. The Markov chain model used in our proposal is primarily based on the model
by Malone (Malone et al., 2007), which allows us to analyze the throughput of IEEE 802.11
under unsaturated nodes, but we have made an important extension of their model in order
to consider the effect that arriving IP packets are queued in the buffer of a station when the
442 Radio Communications
station has frames to transmit. For analyzing the network-layer performance, we apply the
GI/M/1 model, where the service time corresponds to the MAC-layer packet service time,
which is the time interval between the instant that a packet reaches the head of the queue and
the instant that the packet is successfully transferred. It was shown in (Zhai et al., 2004) that
the exponential distribution is a good approximation for the MAC-layer packet service time,
the mean of which can be evaluated throughput the analysis of the IEEE 802.11 DCF.
Through extensive simulations using the simulator ns2, we show that our model can accu-
rately predict how many VoIP conversations can be multiplexed over a WLAN without loss
of any packets. Our model allows us to evaluate the IEEE 802.11 DCF with contention win-
dow (CW) differentiation, which is a service differentiation scheme provided by EDCA. By
using this feature of our proposal, in this article, we also investigate how much the CW differ-
entiation could improve the bandwidth utilization by making contention window of the AP
smaller than mobile terminals.
This article is organized as follows: in Section 2 we present review on related work. In Section
3, we propose an analytical model to evaluate the performance of the IEEE 802.11 DCF under
non-saturated conditions. In Section 4, we present a queueing model to analyze the queueing
delay and packet loss ratio at the buffer of the AP or mobile terminals. In Section 5, we show
the results of simulation experiments to show the accuracy of the proposed model. In Section
6, we conclude the article with a few remarks.
2. Related Work
The performance of the IEEE802.11 has been widely studied in the literature. Bianchi (Bianchi,
2000) proposed a two-dimensional Markov chain model to analyze the performance of the
IEEE 802.11 DCF under the so-called saturation condition, in which all stations always have
data to send. Robinson et al. (Robinson & T.S.Randhawa, 2004) and Xiao (Xiao, 2005) extended
Bianchi’s DCF model to analyze the performance of the EDCA function of IEEE802.11e under
the saturation condition.
Since persistent saturation continues only during a short time period in actual operation, it is
important to evaluate the performance of IEEE 802.11 under non-saturation conditions. Ergen
et al. (Ergena & Varaiya, 2005) proposed an extension of the Bianchi’s DCF model by introduc-
ing additional states to the Bianchi’s Markov chain to represent idle states of a station. Malone
et al. (Malone et al., 2007) developed a different extension of the Bianchi’s DCF model; their
model allows stations to have different packet-arrival rates. Daneshgaran et al. (Daneshgaran
et al., 2008) proposed an analytical model for non-saturated conditions in order to account for
packet transmission failures due to errors caused by propagation through the channel. Foh et
al. (Foh et al., 2007) proposes to use a queueing model to evaluate the performance of IEEE
802.11 under non-saturated conditions. In their queueing model, customers in the system
represent active stations, where being “active" means having frames to send. The Zhao et al.
(Zhao et al., 2008) proposed approximating the attempt rate, at which a station attempts to
send a frame, in non-saturated setting by scaling the attempt rate of saturated setting with the
probability that a packet arrives.
As we have explained, in the use of bidirectional applications, packets are likely to be delayed
and dropped in the buffer of the AP. The queueing delay and the packet loss in the buffer
of the AP would largely affect the performance of real-time applications. All of the studies
mentioned in the above, however, could not analyze the queueing delay and the packet loss
at the buffer of the AP or each station. Several proposals have been made to conduct cross-
layer analysis where the performance of the network layer such as queueing delay or packet
Queueing-Model-Based Analysis for IEEE802.11 Wireless LANs with Non-Saturated Nodes 443
loss at stations is jointly evaluated with the MAC-layer performance such as the throughput
(Cheng et al., 2007; Tickoo & Sikdar, 2004; Xiang et al., 2007; Zhai et al., 2004). For example,
Zhai et al. (Zhai et al., 2004) integrated the Bianchi’s Markov-Chain with a queueing model.
Tickoo et al. (Tickoo & Sikdar, 2004) proposed a similar model where a simplified Bianchi’s
model was used. The proposal by Xiang et al. (Xiang et al., 2007) corresponds to the exten-
sion of the Zhai’s model to non-saturated conditions. The existing proposals concerning the
cross-layer analysis approximate the Bianchi’s Markov-chain by a simplified model. Our ana-
lytical model, which is categorized into the cross-layer analysis, attempts to directly integrate
Bianchi’s (or Malone’s) Markov-chain with the queueing model.
has arrived during the current time slot; otherwise it enters (0, k − 1)e . We assume that the
transition probability from state (0, k )e to state (0, k − 1) of station l is ql .
A station in state (k, 0) (0 ≤ k ≤ ml ) attempts to transmit a frame at the beginning of the
next time slot. In the case of a successful transmission, it makes a transition into one of post-
backoff states ((0, k )e , k = 0, . . . , W0 − 1) with probability 1 − rl , and it makes a transition into
one of backoff states with stage 0 ((0, k ), k = 0, . . . , W0 − 1) with probability rl . In the case of
a collision, it enters one of states with back-off stage k + 1 (when 0 ≤ k < ml ) or ml (when
k = ml ). More precisely,
P[(0, l )e |(k, 0)] = (1 − rl )(1 − pl )/W0 ,
P[(0, l )|(k, 0)] = rl (1 − pl )/W0 ,
P[(k + 1, l )|(k, 0)] = rl (1 − pl )/Wk+1 , for 0 ≤ k < ml
P[(m, 0)|(m, 0)] = rl (1 − pl )/Wml . (1)
Parameter rl is the probability that station l has at least one frame after frame transmission.
If the back-off counter of the station in post-backoff state reaches 0 but it has no frame, it
remains in post-backoff state (0, 0)e . A station in state (0, 0)e receives at least one frame with
probability ql during the current time slot. If it receives at least one frame during the current
time slot and the medium is sensed idle, it attempts to transmit a frame at the start of the
next time slot. In the case of a successful transmission, it makes a transition into one of post-
backoff states ((0, k )e , k = 0, . . . , W0 − 1) with probability 1 − ql , and it makes a transition into
one of backoff states with stage 0 ((0, k ), k = 0, . . . , W0 − 1) with probability ql . In the case of
a collision, it enters one of states with back-off stage 1. If a station in state (0, 0)e receives a
frame during the current time slot but the medium is sensed busy at the start of the next time
slot, it enters one of backoff-states with stage 0. More precisely,
ql (1 − pl ) Pidle
P[(0, 0)e |(0, 0)e ] = 1 − ql + ,
W0
P[(0, k )e |(0, 0)e ] = ql (1 − pl ) Pidle /W0 , for k > 0
P[(0, k )|(0, 0)e ] = ql (1 − Pidle )/W0 , for k ≥ 0
P[(1, k )|(0, 0)e ] = ql pl Pidle /W1 , for k ≥ 0.
where Pidle is the probability that the medium is idle when the station in state (0, 0)e attempts
to transfer a frame. Malone et al. assumed that Pidle = 1 − pl , and we use this assumption in
this article. We can explicitly obtain the stationary distribution of other states.
A station in state (k, 0) (0 ≤ k ≤ m) attempts to transmit a frame when the medium is idle at
the beginning of the next time slot. A station in state (0, 0)e also attempts transmission at the
beginning of the next time slot if (at least) one frame arrives during the current time slot. The
probability that station l attempts transmission, τl , is then given by
As shown in (2), the stationary distribution of each state contains unknown parameter pl , ql ,
and rl . If packets arrive at station l according to a Poisson process with mean rate λl , we can
estimate pl and ql through the following equations:
pl = 1 − ∏(1 − τj ),
j=l
(4)
To obtain rl , we assume that the station l can be modeled as a queue with infinite-buffer, and
observe that the mean inter-arrival time of packets at station l should be equal to the mean
frame-transmission interval of station l if the queue is stable. Now assume that a station
446 Radio Communications
enters one of post-backoff or backoff states via absorbing state (0, 0) a after successful frame
transmission. (The sojourn time in (0, 0) a is assumed to be zero.) Note that the mean return
time to (0, 0) a is equal to the mean frame-transmission interval. With denoting Es the expected
time spent per state, it follows from the fact b(0, 0) a = τl (1 − pl ) that
Es Es
mean frame-transmission interval = = .
b(0, 0) a τl (1 − pl )
1 Es
= , (5)
λ τl (1 − pl )
where TF is the mean MAC-layer packet service time, which is defined as the time interval
between the instant that a packet reaches the head of the queue and the instant that the packet
is successfully transferred, and it is approximately represented by (8). If the right hand side of
(6) exceeds 1, we set rl = 1. Note that the right hand side of (6) exceeds 1 only when station l
is congested and thus the frame loss frequently occurs due to the buffer overflow at station l.
The expected time spent per state Es is given as follows:
Es = ∏(1 − τi ) Ts + 1 − ∏(1 − τi ) Tc ,
i i
where Ts is the length of time slot, and Tc is the expected time taken for a collision. In this
article, we assume that RTS/CTS is disenabled and thus
ACK + 2 × PHY DATA
Tc = + + SIFS + DIFS,
Rb Rd
where
– SIFS: SIFS duration
– DIFS: DIFS duration
– ACK: length of ACK frame (without physical header)
– PHY: length of physical header
– DATA: length of date frame (without physical header)
– Rb : basic rate
– Rd : data rate
Equations (3), (4), and (6) are simultaneous equations concerning p j , q j , r j , τj for j = 1, . . . , n
which can be numerically solved by iterative substitution.
Queueing-Model-Based Analysis for IEEE802.11 Wireless LANs with Non-Saturated Nodes 447
464 Radio Communications
The connection switching process is performed in the following steps. When detecting the
need for switching the current link based on its policy (e.g. signal strength, transmission rate,
missed beacon number, retransmission number, etc), a client looks up its preferred AP list
and selects one except its currently associated AP in the same station as a target AP. Then, it
sets up its interface to the desired channel and PHY type, transmits an AuthenticationRequest
frame to the target AP, and waits for an Authentication Response during
MinChannelTime ,a
Queueing-Model-Based Analysis for IEEE802.11 Wireless LANs with Non-Saturated Nodes 449
higher priority to the AP over mobile terminals and thus, under this parameter setting, the
unfairness between uplink and downlink flows should be improved. Actually, the differ-
ence between uplink and downlink flows in the total throughput became smaller than the
case when (CWmin , CWmax ) = (31, 1023). The throughput estimated by our analytical model
agrees well with simulation results when the number of mobile terminals was less than 13,
but some discrepancy was observed when the number of mobile terminals was larger than 15.
This discrepancy may come from (5) where we neglect the packet loss at the buffer of stations.
We also evaluated the throughput when the contention window parameters of the AP were set
at (CWmin , CWmax ) = (3, 7). The results are shown in Figure 4. In this parameter setting, the
downlink flows obtained larger throughput than the uplink, indicating that mobile terminals
were the performance bottleneck.
1.2
Throughput [Mbps]
1
Uplink
0.8
0.6
0.4
Downlink
0.2
0
0 5 10 15 20 25 30
Number of Mobile Terminals
Fig. 2. Throughput versus the number of voice flows: (CWmin , CWmax ) = (31, 1023) at the AP.
1
Throughput [Mbps]
0.8
Uplink
0.6
Downlink
0.4
0.2
0
0 5 10 15 20 25 30
Number of Mobile Terminals
Fig. 3. Throughput versus the number of voice flows: (CWmin , CWmax ) = (7, 1023) at the AP.
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 467
From the two tables, we can observe that the combination of selective passive scan and
AuthScan achieves the lowest interrupted connection time. The delay obtained by selective
passive scan is 94.4% smaller than the one obtained by standard passive scan when
establishing terminated wireless connections. The delay obtained by AuthScan is 94.2%
smaller than the one obtained by active scan when switching wireless connection to the next
AP. The increased connected time will become larger in proportion to the number of
wireless connection establishment and switching while traving by subway. Besides the
aforementioned parameters, there are hardware induced delays such as interface setup time.
These delays are not considered in the previous analysis, because they vary from maker to
maker and, therefore, are unsettled. In fact, the real delay observed in experiments is even
larger than the values obtained in the analysis.
experimental APs.
452 Radio Communications
↓ ↑
The unbalance between Nad and Nad when (CWmin , CWmax ) = (31, 1023) comes from the
uplink/downlink unfairness in WLANs. The table shows that the discrepancy was resolved
as the congestion window parameters of the AP became smaller. The multiplexable limit
of voice conversation, however, did not increase so much even when the uplink/downlink
unfairness was improved.
simulation
0.8
our model
Packet Loss Ratio
0.6
Downlink
0.4
Uplink
0.2
0
0 5 10 15 20 25 30
Number of Mobile Terminals
Fig. 5. Packet loss ratio: CWmin=31, CWmax=1023.
simulation
0.8
our model
Packet Loss Ratio
0.6
Downlink
0.4
0.2
Uplink
0
0 5 10 15 20 25 30
Number of Mobile Terminals
Fig. 6. Packet loss ratio: CWmin=7, CWmax=1023.
Queueing-Model-Based Analysis for IEEE802.11 Wireless LANs with Non-Saturated Nodes 453
Asymmetric carrier sense in heterogeneous medical networks environment 473
1. Introduction
Integration of heterogeneous wireless technologies is required to for revolutionary
healthcare delivery in hospital, small clinic, residential care center, and home [1-4]. The
medical environment is a diverse workspace, which encompasses everything from the
patient admission process, to examination, diagnosis, therapy, and management of all these
procedures. The concept of “wireless hospital” combines all medical, diagnostic and clinical
data together whenever needed through wireless integration [4]. There is desire to use IEEE
version of wireless local area networks (WLAN) and wireless personal area networks
(WPAN) technologies in the unlicensed industrial, scientific and medical (ISM) bands as a
common communication infrastructure [2, 3]. The WLAN technology is typically used for
office oriented applications and patient connection to the outside world, while the WPAN
Queueing-Model-Based Analysis for IEEE802.11 Wireless LANs with Non-Saturated Nodes 455
and thus
W0 −1
W0 q
∑ b(0, k )e = b(0, 0)e . (19)
k =0 1 − (1 − q)W0
Next we consider the stationary probability of state (0, k ). The balance equation concerning
state (0, W0 − 1) yields
(1 − p )r q(1 − Pidle )
b(0, W0 − 1) = ∑ b(k, 0) + b(0, 0)e
k ≥0
W 0 W0
b(0, 0) p + b(0, 0)e qpPidle (1 − p)r q(1 − Pidle )
= b(0, 0) + + b(0, 0)e
1− p W0 W0
b(0, 0) + b(0, 0)e qpPidle (1 − p)r q(1 − Pidle )
= + b(0, 0)e
1− p W0 W0
r q
= b(0, 0) + b(0, 0)e {1 − (1 − pr ) Pidle } . (20)
W0 W0
It comes from the balance equation concerning state (0, k ) that for W0 − 1 > k ≥ 0
qW0 q(W0 + 1)
= b(0, 0)e 1 − q − +
1 − (1 − q)W0 2(1 − r )
qW0
× + ( 1 − Pidle )( 1 − r ) − rPidle ( 1 − p ) .
(1 − (1 − q)W0 )
(23)
By substituting (19), (23), (24), and (25) into the normalization condition
Wi −1 Wi −1
∑ ∑ b(i, k) + ∑ b(0, k )e = 1,
i =0 k =0 k =0
we finally have
q(W0 + 1) qW0
1/b(0, 0)e = 1 − q + + ( 1 − Pidle )( 1 − r ) − rPidle ( 1 − p )
2(1 − r ) (1 − (1 − q)W0 )
pq2 W0 Pidle (1 − p)r 1 − p − p(2p)m−1
+ − 1 + 2W0 .(26)
2(1 − p)(1 − r ) 1 − (1 − q)W0 q 1 − 2p
Once we have obtained b(0, 0)e , the stationary probabilities of other states are easy to calculate.
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 457
1. Introduction
Recently, an increasing number of people retrieve various contents via the Internet using a
publish/subscribe service such as podcasts. Typical usage of those applications is to
subscribe to as many favorite sites as possible, and selectively enjoy the automatically
downloaded latest episodes. Newly available portable multimedia players enable people to
easily enjoy downloaded video/audio contents in a variety of places, and the added
communication functionality such as 3G or 802.11 (IEEE Standard 802.11, 1999) makes it
possible to retrieve the latest episodes as soon as they are published on the web.
Service like podcasts are especially beneficial to people traveling by subway1 considering
their idle time in a subway train. However, most of subway tunnels in Tokyo are
unfortunately covered by neither 3G nor 802.11 as of December 2008. Wireless connection
can be established when a subway train stays under coverage areas at a station2, but it will
be repeatedly interrupted each time the subway train passes through non-coverage areas in
the tunnels while traveling along a railroad. This interruption limits the time under
coverage areas, which reduces the maximum possible connected time. This time is further
reduced by current implementation exploiting the intermittent connectivity poorly. In this
chapter, we focus on the 802.11 wireless connection management while traveling by subway
because of its higher throughput, lower subscription cost, and larger variety of 802.11-
enabled portable devices than 3G.
We aim to increase the time connected to already deployed 802.11 wireless networks for
podcast-like applications while traveling by subway in Tokyo. To understand the target
environment, we investigated the commercial 802.11 HOTSPOT networks (NTT
Communications HOTSPOT, [Online]) deployed in Tokyo Metro. One of the findings
1Tokyo Metro carries average 6.22 million passengers per day as of 2007 (Tokyo Metro,
[Online])
2In Tokyo, for example, approximately 97% of subway stations are densely covered by three
against the common belief regarding long distance mobility is that the main factor to the
diminishment of available connected time is link layer connection management, not IP layer
mobility support because of the deployed VLANs across the target networks. We propose
an optimized solution for this subway environment to increase the connected time by
reducing the following two types of delay. The one delay is experienced when establishing
the wireless connection after coming out of non-coverage area in the tunnel, and the other
when switching the wireless connection to the next AP while crossing overlapping coverage
areas at stations.
Our method reduces the establishment delay by building a chain that links the last AP in the
previous station before the tunnel with the first AP in the next station after the tunnel, called
border APs in this chapter. By referring to this chain when leaving a station, a client can
reduce the delay to establish the connection through the use of passive scan only on the
channel corresponding to the upcoming border AP. The switching delay is reduced by
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 459
Fig. 2. Waseda (T4) station structure (Tokyo Metro, [Online]) There are six 802.11g APs
installed on channel 1, 6 and 11 to collaboratively cover the station including entrances,
ticket gates, platforms, etc.
3In Tokyo Metro, NTT Communications HOTSPOT provides 173 subway stations among
179 with IEEE 802.11 b/g wireless access service. (Tokyo Metro, [Online])
4 Yoyogi-uehara (C1), Yoyogi-koen (C2), Meiji-jingumae (C3), Omote-sando (C4),
Takatanobaba (T3), Waseda (T4), Kagurazaka (T5), Kasumigaseki (M15), Ginza (M16),
Tokyo (M17), and Otemachi (M18) station
460 Radio Communications
stamps of received beacon frames while moving by subway through seven stations from
Nihombashi (T10) to Waseda (T4) station on Tozai line. The measured results are shown in
Table 1. From the table we observe that: 1) there exist non-coverage areas in each tunnel,
and 2) the time length under non-coverage areas is approximately one third of the total
moving time on a railroad. This is explained by different speeds of subway when passing
above two areas: high speed within large non-coverage areas in the tunnels and low speed
within small coverage areas in the stations. Though there is large period of time spent under
coverage of 802.11 wireless networks even while traveling by subway, the wireless
connection is repeatedly interrupted due to non-coverage areas in the tunnel. Therefore, it is
necessary to establish disconnected wireless connection whenever the client enters the
following coverage areas.
Once an IP address is assigned in the beginning of a session, the same address is repeatedly
assigned not only from different APs in the same station, but also from the APs in other
stations by another DHCP request during the DHCP lease length. We confirmed this fact by
starting a session at Yoyogi-uehara (C1) station, and receiving the same IP address from two
different APs in the same station and also receiving it in other stations such as Yoyogi-koen
(C2), Meiji-jingumae (C3), Omote-sando (C4), etc.
From above two experiments, we observe that HOTSPOT implements Virtual Local Area
Network (VLAN) (IEEE Standard 802.1Q-2003, 2003) to accommodate multiple subnets in
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 461
4GUVTKEVKQPUQP#RRNKECVKQP.C[GT
177&RPPXQLFDWLRQV+276327LPSOHPHQWVZHE EDVHGDXWKHQWLFDWLRQWRFRPSOHPHQWWKH
RSHQV\VWHPDXWKHQWLFDWLRQ’HVSLWHDVXFFH
VVIXO7&3,3DGGUHVVFRQILJXUDWLRQYLD’+&3
DFOLHQWLVXQDEOHWRVHQGDQGUHFHLYHGDWDWUD
IILFRXWVLGHWKHQHWZRUN7RJDLQ,QWHUQHWDFFHVV
RXWVLGH WKH QHWZRUN XVHUV DUH UHTXLUHG
HQWHU DWR
XVHUQDPH DQG SDVVZRUG LQ DQ
DXWKHQWLFDWLRQZHESDJHWRZKLFKWKHILUVWDWWH
PSWWRDFFHVVDQ\ZHESDJHDIWHUODXQFKLQJD
ZHEEURZVHULVDXWRPDWLFDOO\UHGLUHFWHG:HDO
VRIRXQGWKDWWKHZHEDXWKHQWLFDWLRQH[SLUH
ZKHQWKHUHLVQRWUDIILFVHQWRUUHFHLYHGGXUL
QJ’+&3OHDVHOHQJWKL
H PLQXWHV$JDLQ
DVWKHWLPHP
Asymmetric carrier sense in heterogeneous medical networks environment 483
Usually, NP criteria is adopted in CCA because a miss detection of a busy channel is riskier
than a false alarm of a free channel. Eq. (7) can be re-written as
Q 1 ( Pfa ) 2 N
Pd Q . (11)
1 2
As expected, P f is independent of γ since there is no signal under H0. When the channel is
varying due to fading and shadowing, Eq. (12) gives a CCA performance conditioned on the
instantaneous SNR. The average CCA performance can be derived by averaging Eq. (11)
over fading statistics
Q 1 ( Pfa ) 2 N
Pd Q f ( )d , (12)
0 1 2
where f ( ) is the probability of distribution function (PDF) of SNR under fading.
The medium-scale variance of SNR can be characterized by log-normal distribution [22]. The
log-normal shadowing is usually described in-term of its dB-spread, dB, which is related to
by
dB ln(10) / 10 . (13)
1
f ( ) exp( ) 0 , (14)
where denotes to average SNR. If the SNR follows a Rician distribution, the PDF of γ
becomes
K 1 ( K 1) K ( K 1)
f ( ) exp( K ) I 0 (2 ) 0, (15)
where K is the Rician factor and I 0 (.) is the modified Bessel function with order zero.
Because it is difficult to have close-form expressions of Eq. (12) over fading channels, we
evaluated them numerically in this chapter.
Figure 4 plots ROCs of energy based CCA over AWGN, log-normal shadowing, Rayleigh
fading, and Rician fading channels. The asymmetric CCA abilities of WPAN and WLAN
remain the same in fading channels. WLAN systems are insensitive to WPAN signals, while
WPAN systems are oversensitive to WLAN signals. Comparing with the AWGN curves, we
observe that channel fading degrades the performance of energy based CCA, and the
degradations are closely related with the CCA parameters and SNR. In other words,
meeting the desired performance demands a longer CCA window. Especially Rayleigh
fading and Rician fading degrade the CCA performance of all systems significantly.
484 Radio Communications
0
10
(a)
Probability of detection
-1
10
0
10
(b)
Probability of detection
-1
10
The connection switching process is performed in the following steps. When detecting the
need for switching the current link based on its policy (e.g. signal strength, transmission rate,
missed beacon number, retransmission number, etc), a client looks up its preferred AP list
and selects one except its currently associated AP in the same station as a target AP. Then, it
sets up its interface to the desired channel and PHY type, transmits an AuthenticationRequest
frame to the target AP, and waits for an Authentication Response during
MinChannelTime ,a
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 465
The delay of AuthScan is as follows. Assuming at least one of the target APs is available and can
fulfill the handoff policy, it takes M * RTT + (N - M) * MinChannelTime , where N is the number of
target APs that exclude the associated AP before handoff in the preferred AP list at each station,
and M is the number of AuthenticationResponse frames received. The total connection switching
delay Tswitch will be composed of M * RTT + (N - M) * MinChannelTime due to the scanning
process, one RTT for authentication, and one RTT for association phase. This achieves channel
scanning with lowest delay among the approaches to work under subway's intermittent
connectivity without modifying deployed APs as shown in the next section.
non-coverage area in the tunnel. Assuming that a client starts to scan at the benining of
coverage area, total delay to establish wireless connection of each method is as follows.
Passive Scan: 185 * BeaconInterval + 2 * RTT
Selective Passive Scan: 1 *BeaconInterval + 2 * RTT
For example, in the case of T4 station where a single border AP exists on channel 1, as
depicted in Figure 3, Testablish of above two methods are compared in Table 3, where RTT is
0.6 msec, beacon interval is 100 msec.
Method Testablish
Passive Scan 18 * 100 + 2 * 0.6 = 1801.2 msec
Selective Passive Scan 1 * 100 + 2 * 0.6 = 101.2 msec
Table 3. Connection establishment delay
Secondly, we compare Tswitch of active scan, selective active scan, selective unicast scan, and
AuthScan, which expedite scanning process by generating extra management traffic across
overlapping coverage area at station. Assuming that there are M target APs on N channels
and all of them response to requests, total delay to switch wireless connection of each
methods are as follows, where MaxChannelTime is a time parameter involved in active scan
long enough to guarantee the reception of the Probe Response frames from multiple APs
available in the same channel.
For example, in the case of T4 station where five target APs exist on three channels as
depicted in Figure 3, Tswitch of above four methods are compared in Table 4, where RTT is 0.6
msec, beacon interval is 100 msec, MaxChannelTime is 15 msec, and MinChannelTime is 1024
μsec (Jeong et al., 2003).
Method Tswitch
Active Scan 3*15+15*1.024+2*0.6=61.56 msec
Selective Active Scan 3 * 15 + 2 * 0.6 = 46.2 msec
Selective Unicast Scan 5 * 0.6 + 2 * 0.6 = 4.2 msec
AuthScan 5 * 0.6 + 1 * 0.6 = 3.6 msec
Table 4. Connection switching delay
5Additional 4 channels (52, 56, 60, and 64ch) in 5.3GHz (W53) and 11 channels (100, 104, 108,
112, 116, 120, 124, 128, 132, 136, and 140ch) in 5.6GHz (56W) were added to the conventional
4 channels in 5.2 GHz (52W) for 11a in 2005 and 2007, respectively. Therefore, the total
number of channels to scan sums up 33 channels. However, we focus on the conventional 18
channels, which most of devices in Japan support, in this chapter.
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 467
From the two tables, we can observe that the combination of selective passive scan and
AuthScan achieves the lowest interrupted connection time. The delay obtained by selective
passive scan is 94.4% smaller than the one obtained by standard passive scan when
establishing terminated wireless connections. The delay obtained by AuthScan is 94.2%
smaller than the one obtained by active scan when switching wireless connection to the next
AP. The increased connected time will become larger in proportion to the number of
wireless connection establishment and switching while traving by subway. Besides the
aforementioned parameters, there are hardware induced delays such as interface setup time.
These delays are not considered in the previous analysis, because they vary from maker to
maker and, therefore, are unsettled. In fact, the real delay observed in experiments is even
larger than the values obtained in the analysis.
experimental APs.
468 Radio Communications
Base-T cable, and all APs are working as a bridge between the wireless and wired network
in link layer level under open system authentication.
We evaluate our prototype's performance by measuring 1) its average delay to switch
wireless connection on the application level, and 2) RTTs during handoff in comparison
with active scan in the following experiment scenario. A client with an IEEE 802.11 a/b/g
NIC is associated to AP0. The client moves towards AP5 while using pingcommand to
transmit ICMP Echo Request frames to the target host in the same subnet. We set the ICMP
frame size as 480 bytes, and the interval between frames as 10 msec. Then, we reduce the
transmission power of AP0, while increasing that of AP5 to emulate a mobility scenario in a
limited space. As the client gets closer to AP5, the degradation of signal strength from AP0
triggers handoff to AP5. Figure 7 shows the average delay to switch wireless connection
from ten runs of the handoff scenario since the sending of the Authenticationframe to
Request
the first AP scanned (2AQ in the graph). The x-axis shows the steps in the authentication
scanning process. They correspond to the sending of the Authenticationframe (AQ),
Request
reception of the Authentication Response frame (AS), sending of the
Reassociation Request
frame (RQ) and reception of the Reassociation Response frame (RS). The number before each
of them is the actual AP name being checked. The y-axis is the time delay in milliseconds
measured in the application in order to get the handoff delay from the user's perspective.
We added a checkpoint right before calling the driver ioctl , in the case of the AQ and RQ,
and right after receiving the driver's informational event for the AS and RS.
50
average delay
40
30
delay (msec)
20
10
0
2AQ 2AS 5AQ 5AS 3AQ 3AS 1AQ 1AS 4AQ 4AS 5RQ 5RS
handoff steps
The total handoff delay in the application level obtained when checking five APs with open
system authentication is 37.84 msec in average. This includes hardware induced delay such
as interface setup time, delay introduced by system calls and events that flow between
userland and kernel space, and 1 RTT for Authenticationand Authentication.Response
Request
It takes 3.60 msec in average to check APs on the same channel (from AP 0 to AP2, from AP5
to AP3, from AP1 to AP4), while it takes 8.46 msec in average to check APs on the different
channel(from AP 2 to AP5, from AP3 to AP1). Therefore, the AuthScan client saves 4.86
msec to setup the interface into the desired channel, each time checking APs on the same
channel consecutively in our experiment.
Increasing the Time Connected to Already
Deployed 802.11 Wireless Networks while Traveling by Subway 469
Figure 8 shows one example of the way RTT changes during handoff from AP0 to AP5. The
upper graph corresponds to one run by an AuthScan client, and the lower by an active scan client.
The x-axis shows the ICMP sequence number and the y-axis shows the RTT in milliseconds.
Handoff takes place between the 682nd and 686th frames (A) in the case of the AuthScan client
(i.e., 3 frames dropped, 30 msec disrupted), and between the 3637th and 3924th frames (B) for the
active scan client (i.e., 286 frames dropped, 2860 msec disrupted). Therefore, the AuthScan client
drops approximately 98.95% fewer frames than the active scan client in the experiment.
6. Conclusion
In order to increase the time connected to already deployed 802.11 wireless networks while
traveling by subway in Tokyo, we have developed a system equipped with two scanning
modes: 1) passively scanning on a selected channel, and 2) scanning with multiple open
authentication. Through analysis and experiments, we have shown that our method
increases the time connected to 802.11 wireless networks by establishing wireless connection
when coming out of non-coverage area in the tunnel and switching its wireless connection
across overlapping coverage area at station with less delay.
1. Introduction
As wireless networks are becoming more omnipresent and pervasive, appropriate resource
allocation and organization becomes an increasingly pressing challenge. There exist on the
consumer market two important types of wireless network technologies. On the one hand,
cellular mobile networks are highly centralized and hierarchical. By contrast, wireless local
area networks (WLANs) are deployed in an ad-hoc unstructured manner, thus avoiding the
need for elaborate and costly planning. However, WLANs such as those falling under the
highly successful 802.11 standard do not manage interference effectively and tend to collapse
at high offered traffic loads. It can be seen that cellular and WLAN represent two radically
different approaches in radio resource management, characterized by different sets of advan-
tages and drawbacks.
The purpose of this chapter is to demonstrate the feasibility of a connection-oriented self-
organized wireless system which offers efficient radio resource management and provides
the best aspects of both cellular (reliable, connection-oriented operation even at high of-
fered loads) and WLANs (ad-hoc deployment and distributed intelligence). This is achieved
based on the multi-agent concept and local synergistic micro interaction (between neighbor-
ing transceivers) from which a global organization emerges.
The notion of Multiple Agent (MA) considered is of the “ant” variety, whereby small min-
imalist agents sense their environment and react to it in an interdependent manner. Social
insects and mostly ants or bees are the most cited biological examples. In the literature
such approaches have already been used to solve many combinatorial/optimization problems
(Beongku et al., 2003; Brueckner & Parunak, 2003; Muraleedharan & Osadciw, 2003).
This design philosophy differs from more traditional approaches which consist in postulating
criteria expressed by equations and models in order to formulate the problem in such a way
that an optimal solution is derived within the defined context. In the agent approach, precise
mathematical formulation of the problem is neither required nor very useful. The approach
thus becomes attractive for tackling complex multidimensional problems which would oth-
erwise be intractable. Therefore, our goal is not to demonstrate an optimal design, but to
illustrate how a Multi Agent System (MAS) can be empirically designed and fine-tuned to fit
a specific application. Moreover, it will be seen that such a dynamically adaptive solution, in
spite of its empirical nature, offers many advantages over a rigid analytically-derived coun-
terpart.
494 Radio Communications
We will focus herein on Parunak’s methodology (Parunak, 1997) because it offers an intuitive
modeling framework, which is well suited to the empirical design approach.
Considering wireless networks, this chapter describes a flexible distributed base station (DBS)
framework which removes many limitations of current networks in order to augment the so-
lution space. For example, a plurality of DBS can simultaneously provide a network link
to the same mobile, thus leveraging macrodiversity to improve link quality and/or achieve
power savings. These DBS are designed with auto-organization in mind, such that the net-
work structures itself autonomously. This is where MAS come in, offering the desired dis-
tributed intelligence, adaptability, scalability and auto configuration properties. However, the
DBS architecture is challenging in at least three aspects:
1. It requires the continuously-updated solving of a large combinatorial problem, namely
finding a good allocation of DBS resources to mobiles requiring service.
2. Interference must be handled in a transparent way so that mobiles can gain the best
benefit of macrodiversity without being restrained by interfering mobiles.
3. Power control is an important aspect for both energy consumption and network capac-
ity given that it is tightly-coupled with interference patterns.
These three aspects are entangled together such that an optimal allocation is a complex combi-
natorial problem. It is NP hard unless some heavy simplifying assumptions are made (on the
geometry, on propagation, or other aspects). Moreover, in the context of mobility, an optimal
solution at one point in time is not optimal if it cannot easily adapt to changing parameters
(mobiles’ positions, fading, etc.).
Yet, this complex context is well suited for a MAS design. Indeed, MA need an active environ-
ment in which to generate interaction. And each event of allocating power, channel or connec-
tions to mobiles, that a DBS generate, has consequences on other mobiles’ links. This creates
the required active environment in which agents can sense parameters such as the received
power, interference and link quality, and where decisions can be made locally to generate new
actions. In turn, the effect of these actions are sensed by other agents. The next section de-
scribes the challenges of the proposed DBS architecture. Then, MA design concepts used in
this study are described. The fourth section details the proposed design of three categories of
interacting agents respectively for :
1. macrodiversity connection management,
2. channel allocation, and
3. power level control.
Finally, the system is emulated. Results, including simulation of complex cases with randomly
distributed DBS and mobile traffic, show first the resource allocation quality that can be ob-
tained, and second the effectiveness of MAS design in terms of auto-configuration/scalability
and dynamic adaptation properties.
A final brief discussion will extend Parunak’s agent design principles to summarize the
lessons learned from designing MAS for the application at hand.
Asymmetric carrier sense in heterogeneous medical networks environment 473
1. Introduction
Integration of heterogeneous wireless technologies is required to for revolutionary
healthcare delivery in hospital, small clinic, residential care center, and home [1-4]. The
medical environment is a diverse workspace, which encompasses everything from the
patient admission process, to examination, diagnosis, therapy, and management of all these
procedures. The concept of “wireless hospital” combines all medical, diagnostic and clinical
data together whenever needed through wireless integration [4]. There is desire to use IEEE
version of wireless local area networks (WLAN) and wireless personal area networks
(WPAN) technologies in the unlicensed industrial, scientific and medical (ISM) bands as a
common communication infrastructure [2, 3]. The WLAN technology is typically used for
office oriented applications and patient connection to the outside world, while the WPAN
474 Radio Communications
technology is usually used for wearable sensors around patients to collect vital information
for ubiquitous healthcare service [2-6].
The use of complementary heterogeneous WLANs and WPANs in the shared ISM band
results in coexistence, interference and spectrum utilization issues. The coexistence of
wireless technologies in ISM band has been a hot topic [6-9]. Adaptive frequency hopping
was proposed for Bluetooth devices to avoid interference from WLAN [7]. A model for
analyzing the effect of 802.15.4 on 802.11b performance was provided by Howitt and
Gutierrez [8]. The degradation of WLAN performance is small given that the WPAN activity
is low. However, the high duty cycle of WLAN traffic can drastically affect the WPAN
performance [6]. A distributed adaptation strategy for WPAN based on Q-learning has been
proposed to minimize the impact of interference from 802.11b [9]. However, the spatial reuse
issue in the heterogeneous networks has not drawn much attention. Some researches have
shown that the spatial reuse and aggregate throughput in the homogeneous WLAN mesh
network is closely related to physical channel sensing. Yang and Vaidya showed that the
aggregate throughput can suffer significant loss with an inappropriate choice of carrier
sense threshold [10]. Ma etal , by means of Markov chain model, evaluated how carrier sense
threshold affects the throughput and packet collision [11]. Zhai and Fang found that the
optimal carrier sensing threshold for one-hop flows does not work for multihop flows [12].
Zhu etal reported that a tunable sensing threshold can effectively leverage the spatial reuse
and demonstrated it through testbed measurement [13, 14]. In [15], Zhu et al proposed a
heuristic algorithm to adaptively tune the threshold of carrier sense to enhance throughput
per user. Jamieson found carrier sense can be inefficient at low data rate when capture effect
is most prevalent [16]. Ramachandran and Roy showed cross-layer dependence between
carrier sense and system performance [17]. Simulators widely used for performance
evaluation, like NS-2 and OPNET, do not contain detailed physical layer module like carrier
sense. For the lack of carrier sensing knowledge between WPAN and WLAN, Golmie et al
simply simulated two carrier sensing cases: the WPAN can only detect packets of its own
type and the WPAN can also detect WLAN’s transmission, in their coexistence study for
medical applications [6].
In this chapter we study the coexistence issue in the heterogeneous medical networks
environment from carrier sensing point. The remainder of the chapter is organized as
follows. Section II briefly reviews various carrier sense methods and the considered WLAN
and WPAN systems. In section III, a mathematical analysis of energy based carrier sense in
both AWGN channel and fading channel is presented. Section IV describes the impact of
asymmetric carrier sense in heterogeneous networks environment and presents a two-band
carrier sense to combat the asymmetry. Section V finally concludes the chapter.
Wireless medical sensor networks can be considered as a special part of general wireless
sensor networks (WSN), which are mainly implemented by low-rate WPAN technologies.
As compared in Table I, both share some common features which include limited resources
(e.g. computation power, memory, battery, bandwidth), low/modest duty cycle, energy
efficiency, plug-and-play, diverse coexistence environments, and heterogeneous device
Asymmetric carrier sense in heterogeneous medical networks environment 475
ability. But we can also find significant differences between them in the sensor device,
dependability, networking, traffic pattern and channel.
Firstly medical sensors consider safety, quality and reliability as top priority, while general
WSN are cost sensitive for market reason. The safety to human/animal body is therefore the
first factor taken into considered. Thus medical sensors must be conscious of specific
absorption ratio (SAR) to protect human tissue. Wearable IEEE WPAN devices are
suggested to be separated at least 30cm distance from human body. Safe to human is the top
priority of medical sensors. The radio emission should be as weak as possible. And medical
sensors should be lightweight and small to achieve non-invasive and unobtrusive monitor.
This limits the available resource which includes memory, battery power and computation
ability in the medical sensors. The requirement is more stringent than the general WSN.
Secondly the medical sensor networks have more frequency bands to select than general
WSN, which usually work in ISM band. Although the specific medical bands are less noisy,
they are narrow band and conditional license. For example, the wireless medical telemetry
service (WMTS) band can only be used in the licensed hospital and clinic, but not at home.
On the contrary, the wideband ubiquitous ISM is somehow noisy since the frequency band
should be shared with other systems.
Thirdly, the traffic pattern in medical sensor networks is featured by periodical real time
data (e.g. EEG and ECG) and some top priority burst data (e.g. alarm and alert) [17]. In
contrast, general WSN typically consider versatile traffic. The medical information,
especially the alarm notification, have very strict requirement in terms of Quality-of-Service
(QoS) since they are life critical. The transmission of vital signal has a life or dead meaning.
This means more stringent QoS requirement than general WSN.
Fourthly, security of data is traditionally utmost important. Patient data needs to be
protected in all stages of data acquiring, data transmission and data storage. It therefore
importance to secure data at physical layer and MAC lay. However, security is not free,
extensive sources are needed to secure data at the link layer. In the resource limited WSN,
security becomes an overhead of existing network QoS. Because both of them are
paramount in the healthcare service, the balance of security and QoS is a new issue. The
general WSN do not require strict QoS and security simultaneously.
Fifthly, to improve reliability, general WSN tend to distribute redundant sensors as backup
for sensing, transmission and forwarding. In contrast, there is little redundancy in medical
WSN for medical reasons. For example, vital signals, like EEG (Electroencephalography)
and ECG (Electrocardiogram), are location dependent and can only be measured by
deterministic location. Therefore it is difficult to allocate redundant sensors in the limited
area. Especially, it makes no sense to allocate sensors outside of the interest/effect area.
In summary, the lack of redundancy, priority traffic, dominant periodical data and balance
of guaranteed QoS and security in versatile coexistence environment challenge the
reliability design of wireless medical sensor networks.
476 Radio Communications
B.Systemsoverview
We consider IEEE 802.15.4b and 802.11b as examples for the ubiquitous medical services [2, 3,
6]. The former is a good candidate technology for low data rate and low cost medical
sensors. Both systems operate in the unlicensed 2.4GHz ISM band, and both are based on
carrier sense multiple access with collision avoidance (CSMA/CA) protocol. Carrier sense is
more generally known as clear channel assessment (CCA) in the standards. The physical
CCA can be either energy based, or feature based, or a combination of two. As shown in Fig.
1, there are only 4 WPAN channels locate in the guard bands of WLAN. Table II lists the
parameters of both systems [18, 19]. The bit error rate (BER) of WLAN systems with AWGN
channel is give by [18]
128 6
BER11b M 1l Q ( M 2l SNR ) , (1)
255 l 1
where SNR is the signal-to-noise ratio, Q(.) is Gaussian Q-function, M1=[24167 241] ,
and M2=[410246]
8 . The BER of WPAN systems is given by [19]
pl 40.2 20 log10 d d 8
, (3)
pl 58.5 33 log10 (d / 8) d 8
where d is separation distance between transmitter and receiver.
802.11b channels
25 MHz 22 MHz
1 6 11
802.15.4b channels
5 MHz 2 MHz
11 12 ….. ….. 26
C.Clearchannelassessment
Several IEEE WLAN and WPAN standards adopt CSMA protocol for channel access. CCA
is a physical layer activity and is an essential element of the CSMA protocol. The concept of
CCA was first proposed as an enhancement to the ALOHA protocol. The CCA detects an
incoming packet and ensure a free medium before transmission. The CCA module
processes received radio signals in a suitable time duration termed CCA window. It then
reports the medium state, either busy or idle, by comparing the detection with a threshold.
The energy based CCA integrates signal strength from radio front end during the CCA
window. The feature based CCA looks for the known features, e.g. the modulation and
spreading characteristics, of the signal over the channel. Modulated signals are in general
coupled with sine wave carriers, pulse trains, repeating spreading, or cyclic prefixes, which
result in built-in periodicity. This periodicity can be used to detect signal of a particular
modulation type.
The feature based CCA performs far better than the energy based CCA. However, a prior
knowledge of the signal characteristic is necessary. And the CCA module would need a
dedicated detector for every potential coexistence signal class. The main advantages of
energy based CCA are its simplicity, generality, and low power consumption. It is a
universal mechanism that can be deployed in all systems. Unlike feature based CCA, there
is no need for waiting time for the specific features of the signal and synchronization [17].
The downside of energy based CCA is that it is prone to false detection.
We applied energy based CCA to 802.15.4b and 802.11b systems to deliver ubiquitous
healthcare service in this heterogeneous networks environment. There are several reasons
for this. First, there have been nearly 10 wireless technologies with different modulations,
band plans, and transmission powers in the 2.4GHz ISM bands due to its global availability.
Note that the error floor depends on the number of symbol chips and the SNR. When
SNR<<1, Eq. (9) can be approximated as
PCCA _ ef Q N . (10)
2
A linear decrease in SNR requires a quadratic increase in N to maintain the same error floor.
A. Asymmetric energy based CCA
Table III lists the numbers of signal chips in the CCA windows of IEEE WLAN and WPAN.
Figure 3 shows the CCA error floor in the heterogeneous networks environment when the
noise is known. Per Eq. (9), the error floors decrease with increment in signal chips in the
CCA window. Given the defined CCA windows, the CCA abilities, e.g. sensitivity and
range, to determine the channel state are different, this is termed asymmetric CCA. Under
the same SNR conditions, the lowest error floor is where WPAN is used to sense 802.11b
signals; the highest error floor is where WLAN is used to sense 802.15.4b signals. The
performance difference is nearly 10dB.
The CCA asymmetry can be attributed to differences in the underlying signals over channel
(power, symbol rate and background noise) and CCA window. In physics, a higher data
rate and a longer CCA window means more signal pulses in baseband can be collected.
Better CCA performance is a natural result. Asymmetric CCA can be further reinforced by
other factors. For example, the difference in transmission powers which is usually stronger
for WLAN, and the difference in channel bandwidth, which are 22MHz and 2MHz for the
WLAN and WPAN, respectively. For both WPAN and WLAN, the performances to detect
the signal of its own type are similar. There is not big difference in the numbers of symbols
in the CCA window.
Table IV compares communication with CCA when both have an error probability of 1‰
with AWGN channel. As expected, the CCA range is larger than the communication range.
For WPAN, sensing 802.11b signals has 4dB greater link margin compared to sensing the
signals of its own type. In contrast, for WLAN sensing 802.15.4b signals requires a 4.8dB
higher SNR.
Asymmetric CCA makes channel sensing insensitive or oversensitive to other signals in the
mixed WLAN and WPAN environment. The asymmetric CCA in the heterogeneous
networks is different from the traditional “hidden node” or “exposed node” issues in the
homogeneous network. In the homogeneous network, two devices belong to the same
system are reciprocal in ability to sense each other (we do not consider the minor difference
due to implementation.). However, in the heterogeneous networks, the sensing abilities of
different systems are unequal and depend on the underlying signals over channel and the
separation distances. As shown in Fig. 3, WLAN signals are well sensed by both of them,
but WPAN signals could be ignored by the WLAN systems when they are separated by
enough space.
482 Radio Communications
Signal
Table 4. SNRs (dB) to achieve 1‰ communication BER and CCA error floors in AWGN channel
0
10
-1
10
Energy based CCA error floor
-2
10
-3
10
-4
15.4b CCA (15.4b signals)
10 15.4b CCA (11b signals)
11b CCA (15.4b signals)
11b CCA (11b signals)
Fig. 3. Error floor of energy based CCA with AWGN channel in heterogeneous networks
Asymmetric carrier sense in heterogeneous medical networks environment 483
Usually, NP criteria is adopted in CCA because a miss detection of a busy channel is riskier
than a false alarm of a free channel. Eq. (7) can be re-written as
Q 1 ( Pfa ) 2 N
Pd Q . (11)
1 2
As expected, P f is independent of γ since there is no signal under H0. When the channel is
varying due to fading and shadowing, Eq. (12) gives a CCA performance conditioned on the
instantaneous SNR. The average CCA performance can be derived by averaging Eq. (11)
over fading statistics
Q 1 ( Pfa ) 2 N
Pd Q f ( )d , (12)
0 1 2
where f ( ) is the probability of distribution function (PDF) of SNR under fading.
The medium-scale variance of SNR can be characterized by log-normal distribution [22]. The
log-normal shadowing is usually described in-term of its dB-spread, dB, which is related to
by
dB ln(10) / 10 . (13)
1
f ( ) exp( ) 0 , (14)
where denotes to average SNR. If the SNR follows a Rician distribution, the PDF of γ
becomes
K 1 ( K 1) K ( K 1)
f ( ) exp( K ) I 0 (2 ) 0, (15)
where K is the Rician factor and I 0 (.) is the modified Bessel function with order zero.
Because it is difficult to have close-form expressions of Eq. (12) over fading channels, we
evaluated them numerically in this chapter.
Figure 4 plots ROCs of energy based CCA over AWGN, log-normal shadowing, Rayleigh
fading, and Rician fading channels. The asymmetric CCA abilities of WPAN and WLAN
remain the same in fading channels. WLAN systems are insensitive to WPAN signals, while
WPAN systems are oversensitive to WLAN signals. Comparing with the AWGN curves, we
observe that channel fading degrades the performance of energy based CCA, and the
degradations are closely related with the CCA parameters and SNR. In other words,
meeting the desired performance demands a longer CCA window. Especially Rayleigh
fading and Rician fading degrade the CCA performance of all systems significantly.
484 Radio Communications
0
10
(a)
Probability of detection
-1
10
0
10
(b)
Probability of detection
-1
10
-3
10
486 Radio Communications
The background noise power fluctuates from time to time due to changes of environment
and mobility of device. Another source of uncertainty is the error in quantization which us
usually implemented by A/D convertor. Assume the noise estimation is expressed as
2 k 2 , k 0 . (17)
0
10
-1
10
-2
10
CCA error floor
-3
10
underestimation -3 (dB)
-4 0 (dB)
10
overestimation 3 (dB)
Fig. 5. Total error of energy based CCA with AWGN channel in the case of a 3dB noise
uncertainty
Asymmetric carrier sense in heterogeneous medical networks environment 487
Table V lists the required minimum SNRs and their corresponding distances to achieve
reliable energy based CCA (P FA <1% and P D >90%) over AWGN channel. The corresponding
distances were computed using Eq. 1 to Eq. 3 and the parameters listed in Table I. For WPAN,
the sensing of 802.11b signals is reliable at an SNR as low as -9.25dB. This SNR is 9.65dB lower
than the critical SNR which is the least SNR to achieve BER<0.1‰ for communication. The
CCA range is 180 meters longer than the communication range. In contrast, sensing 802.15.4b
signal by WLAN requires a high SNR up to 9.75dB, which is 3.15dB more than the critical SNR
for communication. The CCA range is 42 meters shorter than the communication range. In the
fading channels, all distances decreases depending on the fading condition.
We can define a “heterogeneous exclusive CCA range” (HECR), in which systems in the
heterogeneous environment can reliably sense the activities of each other. In the considered
scenario, the HECR is the maximum distance that WLAN can sense 802.15.4b signals. Given
the system parameters and assumptions, the HECR for IEEE WLAN and WPAN is 25m in
AWGN channel. Peaceful and fair coexistence between them can be expected when they are
located within the HECR. However, it becomes different when they are separated beyond
the HECR. For WPAN systems, the CCA range of WLAN signals is more than twice as long
as the communication range. And it is longer than the CCA range of its own signal type.
That is, the WPAN is oversensitive to the WLAN signals. It can even sense a WLAN packet
that is outside of the keep-out range of receiver in the worst case. 3 Although the
oversensitive CCA avoids the ‘hidden node’ issue, it suffers from the ‘exposed node’ issue.
This results in poor spatial reuse of frequency channels and low aggregation throughput
since WPAN sometimes unnecessarily withdraw packet before transmission. As simulated
in [11], the threshold optimized to maximize aggregate throughput is higher than the
optimal threshold for a single hop. For WLAN systems, the CCA range of WPAN signals is
about a quarter of the communication range. Packet collision may occur when WLAN traffic
occurs immediately after the WPAN traffic.
Table 5. Minimum SNRs (dB) and corresponding distances (m) to achieve CCA (P FA <1%,
P D >90%) with AWGN channel
3 The keep-out range denotes to the minimum separation which WPAN and WLAN do not
interfere each other.
488 Radio Communications
Although the HECR of 25 meters is not sufficient for outdoor applications, it seems to be
good enough for most indoor applications. Typical bedside medical applications define by
IEEE 1073 are within this range [24]. This is different from those of most coexistence studies
in which it is usually assumed that WLAN cannot sense the activities of WPAN [6, 8, 9]. The
HECR over fading channels is expected to be shorter than 25 meters depending on the
fading parameters. But the asymmetric CCA issue still exists. Putting the oversensitive and
insensitive CCAs together results in an unfair share of channel between WLAN and WPAN
when they are separated beyond HECR. There is a preferential treatment of WLAN traffic.
The WLAN is over-protected, while the WPAN is vulnerable.
B.Two-bandclearchannelassessment
WLAN channel
WPAN channel 5 MHz
802.11b 802.15.4b
WPAN signals √ × √ ×
WLAN signals √ √ √ √
Table 6. Output states of the two-band CCA detector when the channel is busy
5. Conclusion
In this chapter, we have investigated the coexistence issue in the heterogeneous medical
networks environment for ubiquitous health services from network access point. The
energy based CCA was considered because the 2.4GHz ISM band is too crowded to apply
feature based CCA for simple medical sensors.
Using central limit theorem, we have derived closed-form expressions for energy based
CCA. We have shown and qualified impact of noise uncertainty on CCA and the
asymmetric CCA in AWGN channel and fading channels. In the considered heterogeneous
medical networks environment for ubiquitous healthcare purposes, WPAN is oversensitive
to 802.11b signals and WLAN is insensitive to 802.15.4b signals. When WPAN and WLAN
are located within the HERC, energy based CCA can effectively avoid possible packet
collisions. The HERC is sufficient for most indoor medical applications. However, when
they are farther apart, WLAN lose its sense to 802.15.4b signals. The asymmetric CCA puts
WPAN traffic in a secondary position in the heterogeneous networks. We have proposed a
two-band energy-based CCA with an additional CCA detector tuned in the auxiliary
channel to combat the asymmetric CCA issue.
490 Radio Communications
6. References
R. Istepanian, E. Jovano and Y Zhang, “Guest editorial introduction to the special section on
M-Health: beyond seamless mobility and global wireless healthcare connectivity,”
IEEETrans.InformationTechnologyinBiomedicine , vol.8, no.4, p.405-414, 2004.
A. Soomro and D. Cavalcanti, “Opportunities and challenges in using WPAN and WLAN
technologies in medical environments,” IEEECommunicationMagazine , vol.45, no.2,
p.114-122, 2007.
D. Cypher, N. Chevrollier, N. Montavont, and N. Golmie, “Prevailing over wires in
healthcare environments: benefits and challenges,” IEEE Communication Magazine ,
vol. 44, no. 4, p. 56-63, 2006.
http://www.wilho.net/
A. Lymberis “Smart wearable systems for personalized health management: current R&D
and future challenges,” Inter.Conf.ofIEEE, vol.4, p.3716-3719, 2003.
N. Golmie, D. Cypher, and O. Rebala, “Performance analysis of low rate wireless
technologies for medical application,” Computer Communication , vol.28, no.10,
p.1255-1275, 2005.
N. Golmie, N. Chevrollier, and O. Rebala, “Bluetooth and WLAN coexistence: challenges
and solutions,” IEEEWirelessCommunicationMagazine , vol.10, no.6, p.22-29, 2003.
I. Howitt and J.A. Gutierrez, “IEEE 802.15.4 low rate –wireless personal area network
coexistence issues,” IEEE Wireless Communication & Network, Conf. vol.3, p.1481-
1486, 2003.
S. Pollin, M. Ergen, and A. Dejonghe, “Distributed cognitive coexistence of 802.15.4 with
802.11,” Inter. Conf. on Cognitive Radio Oriented Wireless Networks
Communications , p.1-5, 2006.
Y. Xiao and N.H. Vaidya, “On physical carrier sensing in wireless ad hoc networks,” IEEE
Conf.onComputerCommunications , vol.4, p.2525-2535, 2005.
H. Ma, H. Alazemi and S. Roy, “A stochastic model for optimizing physical carrier sensing
and spatial reuse in wireless ad hoc networks,” IEEE Conf. on Mobile adhoc and
Sensorsystems , 2005.
H. Zhai and Y. Fang, “Physical carrier sensing and spatial reuse in multirate and multihop
ad hoc network,” IEEEConf.onComputerCommunications , p.276-285, 2006.
J. Zhu, S. Roy, X. Guo, and W.S. Conner, “Leveraging spatial reuse in 802.11 mesh networks
with enhanced physical carrier sensing,” IEEE Conf. on Communications , vol.7, p.
4004-4011, 2004.
J. Zhu, B. Metzler, X. Guo, and Y. Liu, “Adaptive CSMA for scalable network capacity in
high-density WLAN: a hardware prototyping approach,” IEEE Conf. on Computer
Communications , p.1-10, 2006.
Y. Zhu, Q. Zhang, Z. Niu and J. Zhu, “On optimal physical carrier sensing: theoretical
analysis and protocol design,”IEEEConf.onComputerCommunications , p.2351-2355,
2007.
K. Jamieson, B. Hull, A. Miu and H Balakrishnan, “Understanding the real-world
performance of carrier sense,” ACM SIGCOMM workshop on Experimental Approach
toWirelessNetworkDesignand, Analysis p. 52-57, 2005.
I. Ramachandran and S. Roy, “On the impact of clear channel assessment on MAC
performance,” IEEEGlobalCommunications, Conf p. 1-5, 2006.
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 515
The power level for each mobile is then given by the eigenvector associated with the largest
positive eigenvalue of A.
Note that this algorithm is not trying to maximize each mobile’s SIR. Rather, it finds a set of
power levels which maximizes the lowest SIR, thus leading to each mobile’s SIR being equal
to the minimum (maximized) SIR. Also, the obtained power levels are proportional to at least
the eigenvector and thus need to be scaled to fit inside the mobiles’ power level range. This
is where the instability of this algorithm becomes apparent, since under certain interference
conditions, if a mobile is very close to its master DBS, its power level will be very low. Yet,
since its SIR is forced to be equal to the other mobiles’ SIR, proportionally, the noise at the
receiver will have a much stronger impact leading to very poor SINR. Supposing a mobile
faces 1W interference power and 0.1W noise power, and emits 10W to obtain a SIR of 10dB, it
has an SINR of 9.6dB. In contrast, consider a mobile faced with .1W of interference; it emits 1W
to obtain the same SIR of 10dB, but has an SINR of 7dB, hence an effective penalty of half. In
order to minimize this effect, the minimum power level should be high enough so that noise
remains as much as possible negligible. Hence, the power levels will be scaled such that the
maximum power level evaluated is set to the maximum mobile’s range.
On the other hand, a more complex evaluation of such effects would make it possible to lower
the maximum power level, keeping it as low as possible, and hence, maximizing the efficiency
of the link quality versus the power used per mobile.
1. Introduction
As wireless networks are becoming more omnipresent and pervasive, appropriate resource
allocation and organization becomes an increasingly pressing challenge. There exist on the
consumer market two important types of wireless network technologies. On the one hand,
cellular mobile networks are highly centralized and hierarchical. By contrast, wireless local
area networks (WLANs) are deployed in an ad-hoc unstructured manner, thus avoiding the
need for elaborate and costly planning. However, WLANs such as those falling under the
highly successful 802.11 standard do not manage interference effectively and tend to collapse
at high offered traffic loads. It can be seen that cellular and WLAN represent two radically
different approaches in radio resource management, characterized by different sets of advan-
tages and drawbacks.
The purpose of this chapter is to demonstrate the feasibility of a connection-oriented self-
organized wireless system which offers efficient radio resource management and provides
the best aspects of both cellular (reliable, connection-oriented operation even at high of-
fered loads) and WLANs (ad-hoc deployment and distributed intelligence). This is achieved
based on the multi-agent concept and local synergistic micro interaction (between neighbor-
ing transceivers) from which a global organization emerges.
The notion of Multiple Agent (MA) considered is of the “ant” variety, whereby small min-
imalist agents sense their environment and react to it in an interdependent manner. Social
insects and mostly ants or bees are the most cited biological examples. In the literature
such approaches have already been used to solve many combinatorial/optimization problems
(Beongku et al., 2003; Brueckner & Parunak, 2003; Muraleedharan & Osadciw, 2003).
This design philosophy differs from more traditional approaches which consist in postulating
criteria expressed by equations and models in order to formulate the problem in such a way
that an optimal solution is derived within the defined context. In the agent approach, precise
mathematical formulation of the problem is neither required nor very useful. The approach
thus becomes attractive for tackling complex multidimensional problems which would oth-
erwise be intractable. Therefore, our goal is not to demonstrate an optimal design, but to
illustrate how a Multi Agent System (MAS) can be empirically designed and fine-tuned to fit
a specific application. Moreover, it will be seen that such a dynamically adaptive solution, in
spite of its empirical nature, offers many advantages over a rigid analytically-derived coun-
terpart.
494 Radio Communications
We will focus herein on Parunak’s methodology (Parunak, 1997) because it offers an intuitive
modeling framework, which is well suited to the empirical design approach.
Considering wireless networks, this chapter describes a flexible distributed base station (DBS)
framework which removes many limitations of current networks in order to augment the so-
lution space. For example, a plurality of DBS can simultaneously provide a network link
to the same mobile, thus leveraging macrodiversity to improve link quality and/or achieve
power savings. These DBS are designed with auto-organization in mind, such that the net-
work structures itself autonomously. This is where MAS come in, offering the desired dis-
tributed intelligence, adaptability, scalability and auto configuration properties. However, the
DBS architecture is challenging in at least three aspects:
1. It requires the continuously-updated solving of a large combinatorial problem, namely
finding a good allocation of DBS resources to mobiles requiring service.
2. Interference must be handled in a transparent way so that mobiles can gain the best
benefit of macrodiversity without being restrained by interfering mobiles.
3. Power control is an important aspect for both energy consumption and network capac-
ity given that it is tightly-coupled with interference patterns.
These three aspects are entangled together such that an optimal allocation is a complex combi-
natorial problem. It is NP hard unless some heavy simplifying assumptions are made (on the
geometry, on propagation, or other aspects). Moreover, in the context of mobility, an optimal
solution at one point in time is not optimal if it cannot easily adapt to changing parameters
(mobiles’ positions, fading, etc.).
Yet, this complex context is well suited for a MAS design. Indeed, MA need an active environ-
ment in which to generate interaction. And each event of allocating power, channel or connec-
tions to mobiles, that a DBS generate, has consequences on other mobiles’ links. This creates
the required active environment in which agents can sense parameters such as the received
power, interference and link quality, and where decisions can be made locally to generate new
actions. In turn, the effect of these actions are sensed by other agents. The next section de-
scribes the challenges of the proposed DBS architecture. Then, MA design concepts used in
this study are described. The fourth section details the proposed design of three categories of
interacting agents respectively for :
1. macrodiversity connection management,
2. channel allocation, and
3. power level control.
Finally, the system is emulated. Results, including simulation of complex cases with randomly
distributed DBS and mobile traffic, show first the resource allocation quality that can be ob-
tained, and second the effectiveness of MAS design in terms of auto-configuration/scalability
and dynamic adaptation properties.
A final brief discussion will extend Parunak’s agent design principles to summarize the
lessons learned from designing MAS for the application at hand.
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 495
lutions present multiple compromises on connection reliability and distribution of QoS. e.g.
some solutions could favor maximizing overall signal strength for high transfer rate, others
by distributing relaying links differently could prevent disconnections due to sudden strong
fading or interference because mobiles would in general enjoy higher probability of being
assigned multiple relay connections.
As such, it is not necessarily meaningful to define a priori goals for the search of a solution,
as it is not known beforehand what are the benefits and drawbacks of each possible Pareto
solution. This solution space is moreover hardly tractable due to the discrete nature of the
problem, with a finite but large number of link resources to attribute. It is limited by phys-
ical conditions where some links may not be feasible due to the weakness of the considered
signals. Also each link brings an increment of additional quality to the mobile’s overall link
quality, whose importance heavily depends on local propagation conditions that can vary
continuously (with slow fading and changing mobile-DBS distances), or abruptly given the
arrival of new connections in frequency allocation or strong fading situations. In this context,
no analytically tractable mathematical framework exists leading to an optimum solution tak-
ing into account all the dimensions of the problem. More specifically, one must consider that
an optimal solution, at a given state of the network and a given frame in time, could be too
heavily specialized to that particular situation, such that a sudden change (strong fading, new
mobiles joining the network) would make it ineffective. By analogy, it is known in biology
that a species too well adapted to its environment is heavily endangered due to its limited
capacity to adapt to environmental changes. Hence, a good solution is not an optimal one, but
a good enough one that provides margins for adaptation in time to face changes.
There is a strong need for distributed techniques which are flexible enough to be tuned to the
desired compromises while being able to handle unexpected events.
any gains by reducing its power level, a non cooperative strategy is not a good choice for a
game-theoretic approach to power level adaptation.
Necessarily, some mobiles will have to “accept” to reduce their power level in order to al-
low other mobiles in need to enjoy better QoS by reducing interference and enabling them
to reach more DBS for macrodiversity. Yet, and due to the non linearity of the propagation
environment, there necessarily is a point of diminishing returns for mobiles to reduce their
power level. While any reduction necessarily implies a reduction in interference, the potential
gain for other mobiles does not necessarily offset or compensate (given a compromise choice
at a global scale) the loss in QoS for this mobile. It is to be understood here that there exist
trade-offs for an infinity of Pareto solutions. Therefore, and again, postulating one global uni-
dimensional criteria (e.g. as is done in traditional algorithms (Grandhi et al., 1993) ) to derive
a power allocation method would not allow assessment of the potential benefits of different
trade-offs. Indeed, the results of the proposed design will show how the traditional approach
to power control (which consists in maximizing the minimum SINR for all mobiles) in spite of
offering interesting capabilities in some situations, also prevents most mobiles from achieving
their QoS potential.
3. Multi-Agent Design
To solve the resource allocation problem, with the previously described considerations, mul-
tiple agents or bio-inspired optimization seems appropriate, as such approaches provide the
most important sought-after characteristics, namely
• scalability ;
• dynamic adaptation ;
• auto-configuration ;
• reliability facing unexpected events.
Following Parunak’s (Parunak, 1997) design principles, three main characteristics need to be
provided in a MA design: coupling, auto-catalysis, and function. Coupling implies that each
MA process is coupled directly or not to the others and their environment (e.g indirectly using
pheromones via an environment). Auto-catalysis implies that the agents’ actions taken in the
right direction1 , by the nature of the agents’ processes, favor similar actions leading the system
to converge to a desirable state (positive feedback reinforcing the convergence towards the
solution). And finally, the system must be such that a useful global function emerges out of
the induced local interactions.
3.1 Coupling
To achieve coupling, Parunak explains that we first need an active environment. The radio
propagation medium constitutes just such an environment, as each mobile emitting on a given
channel influences the others due to interference. Hence, a mobile’s movement changes the
interference patterns for all others in its immediate vicinity. Additionally, mobiles are entities
which strive to acquire connections and in so doing, they necessarily broadcast information
to inform neighboring DBS of their presence and of their link quality. This forms an active
environment in which information is exchanged to sustain coupled processes.
We emphasize the fact that DBS and mobiles do form appropriate entities to host agents that
are small in size and scope. In particular, DBS, compared to central cellular base stations, are
specifically meant to be small, and will necessarily have small scope as they can only relay a
(smaller) limited number of mobiles in their vicinity.
As a final criterion related to coupling, agents should be mapped as entities, not functions since
an agent does not implement a complete function. That is, the function optimizing resource
allocation should be the result of the interaction of the agents and not be implemented as the
output of one agent. Indeed, an ant (in ant colonies) does not find a shortest path alone.
In the proposed system, the agents are mapped to either mobiles or DBS. Their actions will
then be to either allocate or deallocate a channel, or a connection, or modify a mobile’s power
level. Necessarily, all processes which modify resource allocation are all coupled since each
agent’s actions will not only influence the concerned mobile (changing channel, obtaining a
new relay connection or changing its power level), but also influence the neighboring mo-
biles, modifying their own channel footprint, their QoS, hence influencing other agents, and
coupling each agent’s processes together indirectly.
1 Since a priori goals are not explicitly defined, neither is the concept of a ”right direction”. Rather, a
behavior is designed, tuned and retained because its auto-catalysis properties happen to converge to a
solution which satisfies the needs of the system. Therefore, such a design allows wide exploration of
the solution space rather then restricting to predefined goals by not including all the effects involved in
the multidimensional problem. The design represents a certain creative process.
500 Radio Communications
3.2 Auto-catalysis
3.2.1 Flows
For agents to maintain their interactions, they must be designed to let the process evolve
continuously. Therefore, agents should not be designed based on discrete state transitions,
leading to pauses in the processes because of unverified conditions. That is why we must
favor flows instead of transitions. One way to achieve this is for agents to use volatile markers
(i.e. permanent and non-obstructive source of information which dissipate in time as they
become irrelevant –e.g. pheromones in ant colonies) to inform other agents on their particular
state, so that the agents’ processes continuously evolve rather than stop and wait for specific
conditions.
It is a design choice that no explicit information exchange is performed concerning the positions
of mobiles and DBS, available resources, etc. As mentioned, the available information stems
from what DBS and mobiles can sense locally (mobiles’ needs and QoS), which represents
our volatile markers. These bits of information are by nature volatile, as they only stay in
the environment as long as they are broadcasted by the mobiles, and hence are necessarily
current.
Since agents should not wait for predefined conditions to take actions, it is a comparative basis
that will trigger a corresponding action of:
1. allocating/deallocating a macrodiversity connection;
2. changing a mobile’s channel (frequency hopping);
3. increasing/decreasing a mobile’s power level to a certain amount.
3.2.2 Homeostasis
The notion stems directly from biology in which systems always strive to maintain an equi-
librium or homeostasis point, e.g. the blood sugar concentration is maintained (mainly) by two
different hormones which have opposite effects to balance the concentration.
This point of equilibrium must be sustained by an ongoing flow to ensure the system continu-
ously explores the solution space and does not get stuck in a deadend. This flow is analogous
to the variations of a stock market title whose value is influenced (at a macro level) by the
traders’ actions of selling and buying. In turn, at the micro level, the variations of the values
influences the traders’ decisions.
The corresponding aspect of our system is created by forcing DBS to continuously create and
destroy connections, continuously change channels (via channel hopping), and continuously
adjust power levels. Each of these actions — at the macro level of agents — influences the
status of mobiles, and these changes are in turn sensed by surrounding mobiles and DBS.
In effect, the flow of actions makes the system converge to a homeostasis point. This point
will be dependent on the the state of the network (traffic, available resources, etc.) due to
the comparative basis that triggers actions. As long as there exists a bias observed by the
agents that will trigger an action, the system will converge or oscillate to its homeostasis point.
These variations are important, since without them, and if there is no other change in the
system (e.g., induced by mobile motion), the sensed QoS of mobiles would never change,
never trigger actions, and the system might simply stop short of an optimal state.
such that convergence (to a solution) is favored. In other words, the actions of an agent which
lead the system in a desirable global direction should be favored and should also influence
the surrounding agents to act in the same direction.
In effect, an MA system is comparable to a Genetic Algorithm (Goldberg, 1989) preserving
"genes" that seem to provide the best fitness and hence are part of an optimal solution. The
difference is that there are no external observing entities that measure via a metric the fitness
of candidate solutions. Rather, it is the interactions between agents and their environment —
the propagation medium — that must provide the natural selection function.
Limitation also implies preventing the whole system from focusing on one point (exacerbating
the convergence of actions to a local minimum) and thus miss a better solution. Moreover, lim-
itation can favor convergence by dampening the effect of amplification to prevent the system
from going past a solution or oscillating around it without converging.
3.3 Function
Coupling may be trivial to obtain and auto-catalysis somewhat more involved, but if the pro-
cess as a whole does not realize a useful function, then it is irrelevant. Function implies that
the homeostasis point described previously is useful for the system, e.g. in biology the home-
ostasis point for the blood sugar concentration is such that enough sugar is available to fuel
the cells, but not too much to avoid excessive sugar loss through the kidneys.
In our system, the sought-after function consists in
• maximizing the potential usage of the resources;
• and balancing them to offer a good compromise of quality across all mobiles, while not
hindering the overall system performance.
Most often, function is obtained through a utility function which translates the flow of varia-
tions (of QoS) sensed into rational decisions. That is, it converts a multi-dimensional problem
into a one-dimensional quantity upon which decisions for actions are based.
In spite of the fact that many frameworks attempt to provide mathematical support to de-
rive such utility functions (such as game theory (Mackenzie & Wicker, 2001) or COIN theory
(Tumer & Wolpert, 2004)), these frameworks mostly consider intelligent agents having the
ability to learn (eventually using reinforcement learning techniques), which is not the nature
of the proposed design. Ultimately, defining simple agent behavior to obtain an intended
global behavior still relies on intuition and art such as in Conway’s “game of life” (Elwyn R.
Berlekamp et al., 1982), or with Wolfram’s cellular automatons (Wolfram, 2002). Therefore, no
systematic procedure is known which derives the locally-applicable utility function from the
desired global behavior.
Function can also be sustained (especially if a utility function is not found) with
• behavior diversity and
• randomness.
Randomness can be helpful to introduce alternative solutions, that will or not be kept in time
given how effective they are. Behavior diversity can be obtained by forcing neighboring
agents to act differently so as to provide different reactions and experiments given identi-
cal stimulus. These properties support the function property by breaking the symmetry so as to
prevent the system from entering any deterministic patterns which might hinder convergence.
In the following section it is described how auto-catalysis and function are obtained for each
class of agents.
Inter-RAT Handover Between UMTS And WiMAX 5.
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 503
504 Radio Communications
1. If a mobile has no connection, it must be favored, since basic connectivity should take
precedence.
2. If a mobile has only one connection, the DBS should not disconnect it.
Furthermore, there are two complementary compromises involved in the DBS’ decision pro-
cess:
1. either to remove a link because the mobile already enjoys sufficient QoS,
2. or to maintain it because it is the main DBS providing it;
and,
1. either to connect a mobile because it is in need,
2. versus not connecting it because the additional diversity brought to this mobile would
be low (compared to other possible connections).
Finally, the function must provide a natural ordering to classify the compromises in order to
take a decision.
The following function addresses all the characteristics discussed above:
This function is necessarily positive or null. It is null if the mobile has no connection, since,
if it were connected to the DBS, it would have PT (m) = Pe (m, b) which implies Fdiv = 1
giving a null value of the logarithm. Likewise, it is null if considered for disconnection and
the mobile’s only link is to the considered DBS. Hence, if this utility function is null, the
agent will either privilege this mobile for connection or not disconnect it to keep the mobile’s
existing connection active.
The evaluation of the compromise is obtained by the multiplication of the two terms. Hence,
the more the DBS provides diversity, or the higher is the current QoS enjoyed by the mobile,
the higher is the function’s value.
The choice of compromise itself comes derives from “shaping function” used prior to the
multiplication of the two metrics. Simulation showed that the optimization happens most
efficiently if the shaping function of the second term is concave (naturally, it should be strictly
increasing), hence the use of the logarithm, which also provides the necessary null value for a
mobile with a single link.
4.3.2 Coupling
Following Parunak’s principles, the sought-after function (optimizing the allocation) is di-
vided into independent actions whose interactions should lead to the other two properties
(auto-catalysis and function).
First, given the macrodiversity context, a mobile will choose one of its relaying DBS to be its
“master” connection, which implies one type of action and one agent (to select the master)
mapped at each mobile.
Second, DBS will choose mobiles (from their master links) and change their channels as is done
in cellular systems. Except that here, the change, or channel hopping, will not be triggered by
specified conditions (e.g. a mobile SINR falling below a threshold, or a mobile changing cell).
Instead, the flow of channel hopping will be sustained by having DBS choose a mobile at each
agent activation and change its channel. Channel allocation agents will activate in the same
way that the connection agents do. Two types of actions must be defined:
1. choosing a mobile, and
2. choosing a channel.
Mapping these actions at the DBS level, rather than letting the mobile decide when to change
channel makes sense in that DBS can gather information most effectively on the different chan-
nels in use, thus preventing mobiles from having to continuously scan channels.
4.3.2.1 Sensing
In addition to the mobile’s sensed link quality, DBS can sense
1. the received power of surrounding mobiles pr (m, b);
2. and the interference level on various channels p I (b, c) (for channel c at DBS b).
4.3.3 Function
Maximizing the channel usage constitutes, in a sense, an effort against the second law of ther-
modynamics. Indeed, the channel allocation, if optimal at some point in time, will necessarily
deteriorate with mobility as two mobiles transmitting on the same channel get closer to a point
where the interference will degrade the offered QoS, such that resources are not balanced any-
more. Considering this aspect, and rather than trying to solve an NP-complete problem, load
balancing is obtained by always attempting to change the channels of mobiles in need such
that they enjoy better SINR.
Three utility functions need to be designed taking as input what the agents can sense, and
yielding a chosen parameter value as output.
a. Mobile m will choose a master DBS (among its relaying DBS) on activation (where its
activation follows a Poisson law) based on the DBS from which it obtains the highest
link quality:
b = arg max{ Pe (b, m)}. (6)
b
506 Radio Communications
b. DBS b will choose a mobile (among mobiles connected as master to b), that is the most
in need, i.e.
m = arg min{ Fneed (m)}. (7)
m
c. Ideally, the DBS should try to use the channel with the lowest interference power level:
However, it may be overwhelming for a DBS to systematically sense channels to maintain up-
to-date information on interference levels on all channels, and this behavior (utility function
c.) is therefore only used as a benchmark.
Akaiwa & Andoh (1993) suggested a selection mechanism which is used herein with some
modifications. DBS b will scan channels in the order of a given priority list it maintains, and
determine if a channel can be assigned according to
• whether the resulting SINR will be above an SINR threshold ;
• and (in addition to Akaiwa’s method) whether it will also be above the actual SINR the
mobile enjoys.
The SINR threshold represents a mean to control the hidden terminal effect. It is a studied pa-
rameter in order to observe to which extend it prevents HTE while not limiting the flexibility
of the system.
For Akaiwa’s segregation algorithm, the priority list is obtained dynamically given the ratio
for each channel of previous assignments versus previous assignment attempts.
Finally, a random priority list is proposed as a simple, yet effective (as we will see) alternative
to the segregation algorithm approach.
4.3.4 Limitation
DBS will only test a limited number of channels given by the Chmax parameter, before giving
up. Indeed, there is no guarantee that the DBS will find a channel that will suit the chosen
mobile. Therefore, and instead of letting it scan all channels, it is forced to limit its search.
Eventually, it will try again, or another DBS will, thus providing behavior diversity as well.
In effect, the DBS are only trying to maintain channel assignments in a working state by “up-
grading” the solution iteratively in an opportunistic fashion given the eventual availability of
channels. It is the effect of a new channel allocation that will cause other DBS to also react
and change channels for the mobiles that will see their QoS affected by the new neighboring
interference. As this flow of action is sustained, the channel allocation remains functional and
should adapt to changes.
maximized with S = 0.8, and this has been shown to hold in many different conditions of
traffic, mobile speeds in (9) and available resources. .
The exponential in (9) is a shaping function which also naturally affects the dynamics of the
system. In effect, it affects mobiles’ convergence speed differently given their needs, and this
translates into behavior diversity as no mobile will react in a precisely proportional manner.
The proposed function is of course not the only possible choice, but it has proved stable and
effective. Again, for MAS, effectiveness does not lie in the mathematical exactness of the
function, but in the interactions it will generate.
4.4.3 Homeostasis
Finally, this Need factor must be converted to a delta (step) value to adjust the power level.
Homeostasis is obtained by comparing the Need value to the current power level the mobile
uses to transmit. Hence, the delta value is in the form of Needm − pm . The mobile will then try
to converge to a Needm value which depends on local interactions given itself and neighbor-
ing mobiles’ Fneed values (given that these are indirectly linked via interference). Eventually,
a non-linear concave function helps convergence so that with Needm and pm close, the gen-
erated delta is kept small to slow down variations and help stabilize the convergence. We
postulate
∆m = β sign(Needm − pm ) (|Needm − pm |)1.5 , (10)
where the β factor is used to modify the dynamics of the system to attain the proper compro-
mise between convergence speed and stability.
4.4.4 Limitation
Experience shows that this function is too unstable with high values of β. Still, it can be sta-
bilized with additional scaling parameters, while maintaining fast adaptation in time with
large values of β ≥ 5, which is important for mobility (β = 5 is used in the presented simu-
lations). Therefore, it is proposed that ∆ be scaled according to the current power level and
also the desired power level (the Need value). That way, if these values are small, ∆ is also
kept small to prevent strong changes in the system that would otherwise suddenly generate
exaggerated interference. Indeed, such changes would lead to complications such as breaking
existing links or simply propagating exaggerated reactions throughout the system. Building
upon (10), the following function is used :
Finally, the delta value is constrained to not exceed the power level range:
− pm
∆m < 0 ⇒ ∆m = max{∆m , } (12)
2
1
∆m > 0 ⇒ ∆m = min{∆m , (1 − pm )}. (13)
2
As the mobile’s PC agent activates, its power level is adjusted as follows:
( ν +1) (ν)
pm = pm + ∆m . (14)
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 509
5. Evaluation
5.1 Simulation platform
For the channel and power agents, simulations are based on the following platform. The
results shown for the connection agents are based on a simpler scenario (detailed in the ap-
propriate subsection), in order to isolate the effect of connection management and observe its
convergence, while not confusing it with the effect of interference and power-level manage-
ment.
Physical parameters
A square field of 25 square kilometers is considered, in which 1000 mobiles evolve and 100
DBS are scattered randomly. Hence, the traffic’s and network resources’ geometry are not
uniform, thus generating good and bad coverage of different areas. A mobile moves in a ran-
dom direction at a random speed taken (at the start of a scenario) out of a uniform distribution
over [0, Vmax ]. DBS can relay 25 mobiles each, such that the mean number of macrodiversity
links per mobile is 2.5. A mobile’s maximum transmit power is 1W at 1 meter of its antenna,
and the propagation exponent is 4 (gij ∼ 1/d−4 ). Rayleigh fading is considered, except near
a DBS (closer than 100m) where a line of sight component is added with Rice factor K = 5
dB. Thermal noise at the receiver is considered for a bandwidth of 30kHz at a temperature of
20◦ C, hence N0 = −129 dBW. The number of available channels is denoted Ch.
Agents’ emulation
Simulations are run for 1000 seconds and repeated 10 times with different initializations of
the geometry (DBS positions and mobiles’ initial position, directions and speeds). Time is dis-
cretized with a time step of 1 second. At each time step, physical parameters are evaluated
(mobile’s position, propagation, interference, BER, connection outage). Agents activate ran-
domly given a Poisson distribution to estimate the next activation time with parameter λ = 3
time steps. At each time step, the agents which activate evaluate their local state and take
actions accordingly (adjust the power level, hop to a new channel, change connections of the
concerned mobile, etc.).
Results
At each time step, the set of QoS indexes (total BER level given on a logarithmic scale
PT (m) = log10 ( BER(m))) for each mobile are sorted, thus providing a snapshot in time of
the distribution of the network’s resources across all mobiles. These sorted distributions are
then averaged for all the time steps of the simulation. Given this information, it is then pos-
sible to compare how each algorithm distributes resources. The same is done for the power
level allocation. Also, to verify the stability in time (considering the dynamic properties) of
the algorithm, two factors are interesting to observe to understand how the system handles
outage :
1. the mean number N d of mobiles that loose all connections to the network per second,
and
2. the mean time tr it takes for the network to reconnect a mobile after it has been discon-
nected.
The latter also provides insight on how well the system is able to provide resources to mobiles
with high availability.
510 Radio Communications
This algorithm is optimum at maximizing the sum of QoS ∑m PT (m), given it only removes
the smallest values. However, and given its limited ability to make compromises, it will not be
efficient at balancing resources for mobiles and preventing disconnections of some mobiles if
the network is resources-constrained. Necessarily, it offers a different trade-off than the agent
algorithm provides.
Three cases are observed:
1. there are not enough resources (Fig. 3(a)),
2. there are enough resources for connections, but not enough headroom / margin and the
agent system is not able to achieve swarming and converge (Fig. 3(b)),
3. there are enough resources to connect all mobiles and provide sufficient QoS, i.e. the
connection agent is efficient (Fig. 3(c)).
In practice, only the third case should be relevant provided that the network is appropriately
scaled for the needs of the users.
For the results shown in Figs. 3 and 4, a trellis of 19 DBS is used with 200 mobiles. Channel
management is not considered and each mobile has its own channel.
In the third case (Fig. 3(c)), three successive phases in time can be observed :
1. a connection stage, where connections are established to the closest mobiles;
2. a connection optimization stage, where connectivity is maximized, and
3. a connection rearrangement stage, where QoS is maximized.
Figure 4 depicts a sort of the QoS PT (m) of mobiles to provide insight on how well resources
are balanced. In this simulation, two classes of QoS are created, each comprising 100 mobiles.
Compared to the centralized algorithm, it is obvious that some load balancing is performed
by the agent system.
Due to lack of space, figures for the dynamic behavior are not shown herein. However, it is im-
portant to note that, without requiring any information centralization or excessive signaling
(which would generate delays), and based only on local interactions induced by connection
and disconnection actions, the agent system is able to keep up (maintain the connection al-
location in a relatively optimal state) fast enough to sustain mobiles moving at speeds of 50
km/h with connection agents activating in the mean only once every 3 seconds. Above that
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 511
200 200
number of mobiles
number of mobiles without number of mobiles without
requested QoS requested QoS
100 100
number of mobiles not connected
50 50
0 0
0 100 200 300 400 500 0 100 200 300 400 500
time in seconds time in seconds
200
0
0 100 200 300 400 500
time in seconds
(c) Case 2
Fig. 3. Convergence of the connection management agents (horizontal dashed lines show
results of the centralized heuristic algorithm).
speed, performance in terms of QoS degrades smoothly as the agents are not able to converge
fast enough to the optimal state. The system still provides much headroom as activation of
agents could be much faster.
Given that the proposed design is bio-inspired, it is most interesting to observe “health pa-
rameters” (analogous to e.g. blood pressure in the human body) which give us insight on the
capacity of the agents to achieve their function. For the connection agents, the mean number
of connections should be close to the mean number of disconnections. This indicates that the
agents have sufficient headroom (when faced with changes in the network) to actually swap
connections for optimization. If there are more connections than disconnections, it means that
the system is not able to keep up with changes so that some of the relay links are disconnected
for physical reasons (e.g. loss of signal quality) instead of explicit decisions by the agents.
512 Radio Communications
−2
−4
−6
−8
−10
−12
−14
−16
−18
20 40 60 80 100
mobiles in class 1
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 513
(a) Comparing the number of lost connections (b) Comparing the mean number of connected
and the mean time before reconnection mobiles and the block rate
Fig. 5. Effect of the SINR threshold (Vmax = 5 m/s, Ch = 40, N = −129dBW).
1000
100
10
1
0.1 1 10 100
elapsed time before reconnection (seconds)
Fig. 6. Mean reconnection time with and without reserved channels. The Y axis represents the
number of mobiles remaining unconnected since their disconnection (for 1000 mobiles during
a 1000 seconds scenario length (Vmax = 5 m/s, Ch = 40, N = −129dBW).
Comparing the three different methods to select channels, little difference was observed in
terms of the mean number of connected mobiles. Differences appear as trade–offs between
mean number of disconnected mobiles and mean time of reconnection. The segregation
method seems more efficient at minimizing disconnection, but takes more time to reconnect,
compared to the random method. Differences appear most explicitly when looking at the
514 Radio Communications
785
775
770
765
760
755
750
Random
745
Segregation
740
provided QoS (Fig. 7). Choosing the channel with lowest interference power yields the best
results, followed by the random choice and the segregation method. We notice an increased
number of mobiles with their QoS demand met when the SINR threshold increases slightly.
This is simply due to the fact that fewer mobiles are connected, generating less interference
and higher QoS. However, this fact does not hold true for long, ince a further increase in the
threshold leads to a rapid increase of the agents’ block rate, showing that they are unable to
keep up with changes, and are not finding free channels to adapt the allocation pattern. This
leads to a fall in QoS (above 5-7 dB).
Finally, the maximum number of channel scans per allocation attempt Chmax , without power
management, reveals an exponential gain which saturates at around 5-6 channels scanned per
allocation attempt. However, combined with the effect of power management, no significant
gain is observed. It appears that with power management, mobiles adjust their footprint thus
offering more channel availability, such that only one channel test per allocation attempt is
sufficient. And, optimization of the channel allocation occurs naturally through the many dif-
ferent attempts from all surrounding DBS in time. Therefore, complexity is kept to a minimum
by having DBS only test and eventually allocate one channel per agent activation.
Connection management remains efficient as long as there are sufficient channel resources to
provide a large enough channel footprint for the macrodiversity links. However, this mini-
mum number of channels is low as macrodiversity links only require a small SINR to provide
sufficient QoS after macrodiversity combination.
In the current simulated scenarios, 25 channels2 shared by a 100 DBS for 1000 mobiles, includ-
ing 2 reserved channels (for (re)connection), are enough to provide sufficient flexibility to the
connection agents for them to be able to swap links for optimization (this is with the synergis-
tic effect of power level management). Below this threshold, there is too much interference for
the connectivity potential of DBS to be fully exploited for macrodiversity, and those resources
are left unused.
2 A cellular system with a channel reuse pattern of 7 hexagonal cells, would require 70 channels for 100
pico cells, without offering the flexibility the current architecture provides.
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 515
The power level for each mobile is then given by the eigenvector associated with the largest
positive eigenvalue of A.
Note that this algorithm is not trying to maximize each mobile’s SIR. Rather, it finds a set of
power levels which maximizes the lowest SIR, thus leading to each mobile’s SIR being equal
to the minimum (maximized) SIR. Also, the obtained power levels are proportional to at least
the eigenvector and thus need to be scaled to fit inside the mobiles’ power level range. This
is where the instability of this algorithm becomes apparent, since under certain interference
conditions, if a mobile is very close to its master DBS, its power level will be very low. Yet,
since its SIR is forced to be equal to the other mobiles’ SIR, proportionally, the noise at the
receiver will have a much stronger impact leading to very poor SINR. Supposing a mobile
faces 1W interference power and 0.1W noise power, and emits 10W to obtain a SIR of 10dB, it
has an SINR of 9.6dB. In contrast, consider a mobile faced with .1W of interference; it emits 1W
to obtain the same SIR of 10dB, but has an SINR of 7dB, hence an effective penalty of half. In
order to minimize this effect, the minimum power level should be high enough so that noise
remains as much as possible negligible. Hence, the power levels will be scaled such that the
maximum power level evaluated is set to the maximum mobile’s range.
On the other hand, a more complex evaluation of such effects would make it possible to lower
the maximum power level, keeping it as low as possible, and hence, maximizing the efficiency
of the link quality versus the power used per mobile.
In Fig. 13 and Fig. 14, the user and control planes of the proposed tight coupling architecture
are illustrated. W-RNC is assumed to cover the same Routing Area (RA) like the RNC. The
IW sublayer on the W-RNC communicates with its counterpart entity on the RNC in order
to execute inter-RAT handover to/from its control area. The main contents of the
communication between them are as follows:
GTP-U sequence numbers as well as GTP packets that need to be forwarded by the W-
RNC for PDP contexts requiring delivery order.
IW ARQ parameters, such as windows size, queue length, retransmission timer period,
and retransmission count.
The IW blocks stored in local retransmission buffer.
There are two reasons why add IW ARQ mechanism to W-RNC in addition to SRNS
(Serving RNS) context transfer of conventional RNC:
When an inter-RAT handover takes place, there may exist packet sequence number
asynchronization between the source RNC and the target WiMAX BS. It is necessarily
that there exists a common context transfer mechanism for these two systems to assure
a lossless handover.
The second reason is that the WiMAX supports cell reselection initiated by MS for
active traffics (like dedicated mode in UMTS), which is not the case in UMTS. Hence,
the packets that are lost during the cell reselection from WiMAX to UMTS, cannot be
retransmitted by the target network.
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 517
0 1
No PC
CPC
SBMPC
-2 MAPC
0.8
-4
0.6
Power levels
-6
0.4
-8
0.2
-10 No PC
CPC
SBMPC
MAPC
-12 0
0 200 400 600 800 1000 0 200 400 600 800 1000
mobiles mobiles
(a) Sorted BER profile averaged in time (b) Sorted power level ratio profile averaged
(meant (sortm ( PT (m)))) in time (meant (sorti ( pi i )) )
Figure 8(b) reveals how both CPC and SBMPC offer similar distributions of the power levels.
On the contrary, the MAPC power level allocation is radically different.
Faced with higher interference levels (Ch = 25), it can be seen that the centralized algorithms
break down (Fig. 9(a)). Indeed, in high interference levels, maximizing the minimum SIR
leads to very poor SIRs for all mobiles. In turn, this generates many disconnections. Figure
9(a) clearly shows that the traditional algorithms are here inefficient and even worse than
without PC. Still the MAPC algorithm manages to provide acceptable levels of QoS, while
still connecting more mobiles.
The situation deteriorates even more when noise is introduced. Figure 9(b) reveals how noise,
as explained previously, renders the traditional algorithms unstable, generating lots of dis-
connections. Indeed, the centralized algorithms, by maximizing the minimum SIR, force most
mobile power levels to be extremely low (c.f. Fig.8(b)) supposing thermal noise is not an im-
portant factor. This may be valid for a regular hexagonal cell geometry with homogeneous
traffic and high guaranteed SIR. However, it is not the case here, leading to very poor SINR,
and also significantly exacerbating the HTE as such mobiles’ presence on channels will not be
sensed by other DBS, rendering the PC algorithm completely inefficient.
Also, facing important mobility (Figure 9(c)), the CPC algorithm loses its strength (of mini-
mizing the outage probability) as Table 2 reveals. Indeed, with mobility, more interference is
present because mobiles do not obtain an optimal reallocation of channels at each iteration.
This implies far too many very low power levels with the CPC. This conflicts with the channel
agents trying to reorganize the channel allocation as it generates important hidden terminal
effects. This also shows that the CPC algorithm loses much of its capacity with even small
518 Radio Communications
0 0
-2 -2
-4 -4
-6 -6
-8 -8
-10 No PC -10 No PC
CPC CPC
SBMPC SBMPC
MAPC MAPC
-12 -12
0 200 400 600 800 1000 0 200 400 600 800 1000
mobiles mobiles
0 1
No PC
CPC
SBMPC
-2 MAPC
0.8
-4
0.6
Power levels
-6
0.4
-8
0.2
-10 No PC
CPC
SBMPC
MAPC
-12 0
0 200 400 600 800 1000 0 200 400 600 800 1000
mobiles mobiles
(a) Sorted BER profile averaged in time (b) Sorted power level ratio profile averaged in
(meant (sortm ( PT (m)))) time(meant (sorti ( pi i )))
centralized schemes by preventing them from assigning excessively low power levels, yet also
preventing them from achieving any proper resource balancing as the MAPC does.
Figure 10(b) shows the allocated power level over all mobiles in the discrete case.
Considering dynamics, it was found that tuning the different parameters mentioned in the
design (most specifically β and S) makes the agent system stable enough to prevent erratic
changes of the power levels, while still allowing fast adaptation in the wake of abrupt (dis-
crete) changes in interference levels.
It is also noteworthy that the power management proposed provides additional benefits to
the channel agents (lowering connection loss rate, block rate and mean time for reconnection)
and connection agents (offering them more headroom to swap links for optimization). Despite
being designed independently, the various described agents remain stable working together
in a synergistic way, such that one change induced by one type of agent (e.g. a connection
change) is correctly compensated by the other types of agents (e.g. an adaptation of the power
level) and not overcompensated, which would otherwise lead to erratic behaviors.
One of the great advantages of this approach is that each dimension of the problem can be
tackled independently, by its own class of agents, without affecting the performance of the
other classes. No explicit interaction mechanism between the agent classes needs to be de-
signed, yet they synergetically cooperate to achieve desirable results with a surprisingly low
implementation complexity.
520 Radio Communications
6. Conclusion
The proposed proof-of-concept design described herein demonstrates that minimalist multi-
agent systems do provide all expected qualities: scalability, dynamic properties, efficiency,
simplicity, adaptability and auto-configuration. Moreover, it represents a novel and surpris-
ingly simple solution to resource allocation. It is most obvious with the power allocation
scheme which results in drastically lower spatial power distributions when compared with
traditional algorithms.
The multi agent design approach, based on heuristics appears effective. It requires an under-
standing of the underlying mechanisms and compromises within the context of the problem
at hand, from which insights and intuition can be drawn and used to design the agents.
While it is unclear a priori to which end result the system will converge to, it should be noted
that it is also unclear a priori to which it should. Indeed, the current context is far different
from formal frameworks such as information theory which are often characterized by a single
uni-dimension criterion, e.g. the channel capacity. In our multi-dimensional context, infor-
mation theory remains too limited at the time to model and grasp the many possibilities and
compromises facing a multitude of mobiles and DBS with macrodiversity where limited re-
sources lead to interference. And in such a context, the proposed MA approach has the virtue
of demonstrating via simulation that some novel allocation solutions (which should be under-
stood as compromises) can lead to much higher efficiency of resource usage (where efficiency
is necessarily also a notion of compromise).
The design in itself is not so complicated, and one should keep in mind the fuzziness of such
an approach. Indeed, the utility functions proposed could have a variety of alternatives. What
matters is not their exactness, but that they provide certain properties that will sustain the in-
teractions of agents. These properties remain to be understood and studied to provide insights
on the inner workings of the agent system. For example, the shaping function in the utility
function of the connection agents uses a logarithm which could be replaced by a first degree
approximation (x − 1) and still converge, but a concave function with similar properties (e.g.
( x − 1)2 , null for x = 1 and strictly increasing for x > 1) would, despite providing some de-
gree of convergence, fall short of a more balanced solution. The shaping function is therefore
crucial to converge to certain Pareto solutions, and this remains to be studied in detail.
Concerning MA design, we considered more specifically the notion of homeostasis which is
not explicitly mentioned in Parunak’s methodology. The proposed design shows how the
search for such an equilibrium helps in designing and tuning the properties of the agents’
behavior to obtain the desired global function.
Considering future work, the proposed MA design and DBS architecture offers malleability
and vast margins for tuning, enhancing, or providing additional functionality. It was studied
in (Leroux et al., 2008) that the reuse of channels could be enhanced by pairing mobiles to
cooperate in exploiting a single channel while multiplying their diversity gain. Interesting
results have been found in this study. Yet, coupled with power-level control, the management
of cooperation between mobiles revealed counter synergistic effects. To date, finding a way to
have the cooperation and power-control agents interoperate in a synergetic manner remains
an open problem.
Another additional functionality to be studied is beamforming. Channel allocation agents
would need to be improved to account for dynamically-created directive beams and provide
network-wide gains by minimizing interference .
Channelization also needs to be further studied, including a model to implement the IEEE
802.11 shared random access mechanism (CSMA/CA on conjunction with the so-called dis-
Multi-Agent Design for the Physical Layer of a Distributed Base Station Network 521
tributed coordination function) which is now globally deployed, rather then relying only on
orthogonal channels (whether it be time/frequency/ or code division) as is the case in this
study. Finally, practical implementations should be tested, as discussed in Leroux (2008)
where it was shown that macrodiversity could be obtained through minimal terminals syn-
chronized at the packet level. It would then be possible to implement the proposed MA strate-
gies using consumer Wi-Fi terminals and perhaps connect such terminals to a wired network,
make them work in synergy and thus offer much more reliable and efficient connections.
The proposed system is therefore not a simple exercise for MA design. It represents a mean-
ingful starting point for a new design paradigm of mobile wireless networking. It offers vast
potential for improvements, new designs and additional functionality.
7. References
Akaiwa, Y. & Andoh, H. (1993). Channel segregation-a self-organized dynamic channel al-
location method: application to TDMA/FDMA microcellular system, IEEE J. Select.
Areas Commun. 11(6): 949–954.
Beongku, A., Dohyeon, K. & Innho, J. (2003). A modeling framework for supporting QoS in
mobile ad-hoc networks, Vehicular Technology Conference, 2003. VTC 2003-Spring. The
57th IEEE Semiannual 2: 935–939.
Brueckner, S. & Parunak, H. V. D. (2003). Self-organizing MANET management, in G. D. M.
Serugendo, A. Karageorgos, O. F. Rana & F. Zambonelli (eds), Engineering Self-
Organising Systems, Vol. 2977 of Lecture Notes in Computer Science, Springer, pp. 20–35.
Elwyn R. Berlekamp, John H. Conway & Richard K. Guy (1982). Winning Ways for your Math-
ematical Plays, New York: Academic Press.
Furukawa, H. & Akaiwa, Y. (1994). A microcell overlaid with umbrella cell system, Vehicular
Technology Conference, 1994 IEEE 44th, Stockholm, pp. 1455–1459.
Goldberg, D. E. (1989). Genetic Algorithms in Search, Optimization and Machine Learning, Kluwer
Academic Publishers, Boston, MA.
Grandhi, S., Vijayan, R., Goodman, D. & Zander, J. (1993). Centralized power control in cellu-
lar radio systems, Vehicular Technology, IEEE Transactions on 42(4): 466–468.
Leroux, P. (2008). Architecture d’un système de stations de base distribuées, PhD thesis, Université
Laval.
Leroux, P., Roy, S. & Chouinard, J.-Y. (2006). The Performance of Soft Macrodiversity Based
on Maximal-Ratio Combining in Uncorrelated Rician Fading, 17th annual IEEE inter-
national symposium PIMRC’06, Helsinki, Finland.
Leroux, P., Roy, S. & Chouinard, J.-Y. (2008). Synergetic cooperation in a distributed base
station system, Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008.
IEEE 19th International Symposium on, pp. 1–6.
Mackenzie, A. & Wicker, S. (2001). Game Theory and the Design of Self Configuring, Adaptive
Wireless Networks, IEEE Commun. Mag. .
Muraleedharan, R. & Osadciw, L. A. (2003). Balancing the Performance of a Sensor Network
Using an Ant System, 37th Annual Conference on Information Sciences and Systems (CISS
2003), Baltimore, MD. .
Parunak, H. V. D. (1997). “Go to the Ant” : Engineering Principles from Natural Agent Sys-
tems, Annals of Operations Research .
Tumer, K. & Wolpert, D. (2004). Collectives and the Design of Complex Systems, Springer-Verlag,
NY.
522 Radio Communications
Inter-RAT Handover Between UMTS And WiMAX 523
1. Introduction
The future beyond third generation (B3G) or fourth generation (4G) systems will consist of
different radio access technologies, such as GSM/GPRS, UMTS, WiFi, and WiMAX. Many
intensive efforts have been made to identify the unsolved issues about the future mobile
systems, and one important issue is what the future vertical handover management solution
will be. A variety of mobility management solutions have been proposed, such as
MIPv6/FMIPv6 (D. Johnson, et al., 2004; R. Koodli, 2005), SCTP (M. Afif, et al., 2006), inter-
RAT (Radio Access Technologies) handover of 3GPP (3GPP TS 43.129; 3GPP TR 25.931).
Among these solutions, the layer 2 inter-RAT handover solution of 3GPP is a promising way
for its high reliable handover procedure. Unfortunately, the 3GPP inter-RAT solutions only
support inter-RAT handover between cellular networks, and do not support inter-RAT
handover between WiMAX (Worldwide Interoperability for Microwave Access) and UMTS
(Universal Mobile Telecommunications System).
Another important issue is the interworking architecture and the coupling scenario that are
used to provide an efficient inter-RAT handover management. Depending on where is the
coupling point, there are several interworking architectures: no coupling, loose coupling,
tight coupling, very tight coupling (integrated coupling) (G. Lanpropoulos, et al., 2005). The
loose coupling and tight coupling architectures often use Mobile IP or part of Mobile IP as
the handover management protocol. So these two kinds of coupling architectures require
less complicated modifications to the existing protocol stacks and are more flexible than
integrated coupling. However, they often suffer from longer handover latency varying from
some hundreds of milliseconds to some seconds. The integrated coupling generally achieves
better handover performance at expense of adding complex modification to existing
network protocol stacks.
In recent years, the 3GPP and IEEE organizations have proposed their respective
interworking solutions for convergence of heterogeneous networks. For instance, the
ongoing 3GPP standard for interworking between UMTS and WiFi (3GPP TS 23.234) only
focuses on the control plane, and defines the interworking topologies, access gateways,
524 Radio Communications
AAA, charging, interfaces and so on. It does not provide a scheme to resolve the handover
problems in the user plane, like packet loss, long handover latency. Another promising
vertical handover solution is IEEE 802.21 (IEEE 802.21, 2006). This standard defines a generic
link layer to mask the heterogeneities of various RATs as well as three kinds of services.
How to resolve handover problems is still manufactures’ task. For these reasons, in this
chapter, we will only focus on the user plane instead of control plane, and propose an inter-
RAT handover solution to resolve some typical handover problems. Besides, our inter-RAT
handover solution can be applied to a variety of interworking scenarios in addition to the
integrated and tight coupling architectures. This solution is a novel solution for
interworking between UMTS and WiMAX, which has not been stated by other references or
standards.
In section 2, we firstly summarize the features of 3GPP Packet Switched (PS) network/cell
switch procedures, i.e. reselection and handover, and then we get some guides to the design
of inter-RAT handover mechanism between UMTS and WiMAX. The PS handover is
introduced in order to support real-time packet-switched traffics with strict QoS
requirements on low latency and packet loss. For one thing, the handover reduces the
service interruption of the user plane information when cell changes compared to the cell
reselection; for another, it enables buffer handling of user plane data in order to reduce
packet loss when cell changes. For unreal-time services with loose QoS requirements on
packet loss, or Mobile Station (MS) is not in dedicated state, the PS cell reselection is
introduced. Compared to PS handover, the cell reselection suffers from uncertain packet
loss, but benefits from the reduced signaling and resource overhead between cells or RATs.
Next, in section 3 and 4 respectively, based on the requirements of inter-RAT handover
between UMTS and WiMAX, we propose a novel layer 2 inter-RAT handover scheme by
introducing a novel common sublayer named IW (InterWorking) sublayer and SR ARQ
(Selective Repeat ARQ) mechanism in the integrated and tight coupling architectures to
resolve several typical inter-RAT handover problems, such as packet loss, long handover
latency. The better handover performance is validated by the simulation results carried out
on the NS2 emulator. In addition, this novel IW sublayer scheme also eliminates the false
fast retransmission, which is due to packet loss or out-of-order packet arrivals during a
handover period.
Finally, we come to our conclusions in section 5.
This section mainly describes procedures that are used by the MS to select a suitable cell to
be connected to in the 3GPP cellular networks. For details, please refer to references (3GPP
TS 25.331; 3GPP TS 43.129; 3GPP TS 44.060; 3GPP TR 25.931; J.P Romero, et al., 2005).
When a MS is switched on, it must first select a PLMN (Public Land Mobile Network) and a
RAT (Radio Access Technology) automatically or manually. It searches for the most
adequate cells so as to camp on a suitable cell. Then the MS will register its presence in the
registration area of the chosen cell if necessary. As long as the MS remains in idle mode, it
will continuously execute the cell reselection procedures in order to choose and camp on the
most suitable cell of the selected PLMN. The events triggering the cell reselection may due
to high path loss, downlink signaling failure and so on. If the new cell is in a different
registration area, a Location Registration (LR) request is performed (3GPP TS 23.122).
Inter-RAT Handover Between UMTS And WiMAX 525
When the MS is in the packet transfer or dedicated mode, the network use PS Handover to
command a MS to move from its source cell to a new cell, and continue the ongoing PS
service operation in the new cell. The handover trigger conditions could be serving cell
resource limitation, measurement reports from a MS, and the cell change notification from a
MS. This handover procedure between cells of the same RAT is also referred to as intra-RAT
handover.
Depending on the PLMN availability and network configuration, it is possible that cell
reselection and handover procedures involve a cell switch from one RAT to another RAT
(e.g., from 2G GSM/GPRS/EDGE to 3G UMTS networks). The handover procedure
between cells of different RATs is referred to as inter-RAT handover in 3GPP standards or
verticalhandover in IETF protocols.
In general, in contrast with the cell reselection, the intra-RAT handover and inter-RAT
handover of 3GPP have the following distinct features:
The network makes the handover decision depending on the measurement reports,
network states and negotiation with target base station or cell.
The network controls the whole handover procedure, including message transfer,
handover timing, handover target, resource allocation, and context transfer.
Only packet transfer mode or dedicated mode needs the handover procedure due to
handover overheads.
The handover can be considered as a kind of specific QoS-guaranteed cell reselection
procedure.
It should be stressed that Mobile IPv6 and its extensions (D. Johnson, et. al., 2004; R.Koodli,
2005) support both network-initiated and terminal-initiated handover procedures. In this
chapter, we only consider 3GPP inter-RAT handover procedures initiated by the network.
The conventional 3GPP inter-RAT handover procedure must involve the SGSN, whether for
handover from GSM/GPRS to UMTS or from UMTS to GSM/GPRS. This is because the
Link Control Sublayer (LLC) terminates at SGSN, which is in charge of making lossless
packets forwarding during the MS mobility thanks to its retransmission mechanism. This is
not a problem for GSM/GPRS or UMTS core network, because the SGSN is their common
network entity. But for inter-RAT handover between 3GPP cellular network and IEEE
wireless IP network like WiFi/WiMAX, it becomes a challenge for the packet lossless RAT
switch procedure due to the lack of SGSN in IEEE wireless network. In the following
sections, we utilize the 3GPP inter-RAT handover procedure, messages and signaling to
resolve this problem for two typical coupling network architectures: integrated coupling
and tight coupling.
schemes, the simulation results show the IW sublayer with ARQ mechanism can achieve a
lossless and prompt handover procedure. In addition, this IW sublayer scheme can
eliminate false fast retransmission of TCP traffics that is usually caused by packet losses or
out-of-order packet arrivals. In what follows, the IW sublayers in integrated and tight
coupling architectures are specified in this section and section 4 respectively.
Consider the UMTS as the center of the integrated system and preserve its signaling
and control procedures as many as possible.
In WiMAX access network, additional network components and new signaling and
primitives could be added.
The two integrated systems should guarantee seamless service continuity, and execute
mobility management processes (e.g., connection establishment, handover) as fast as
possible in order to maintain the required QoS.
As stated above, our inter-RAT scheme is first based on the integrated coupling architecture.
We assume UMTS to be the master home network with roaming privileges to WiMAX
network. A novel common network entity named interworking sublayer (IW) is introduced
on the top of PDCP (Packet Data Convergence Protocol) sublayer of UMTS and the Medium
Access Control (MAC) CS sublayer of 802.16e on the RNC and MS, as shown in Fig.1. The
WiMAX BS is integrated with the RNC (Radio Network Controller) through Iub interface.
The IW takes the role of LLC sublayer of conventional cellular networks, such as
retransmission mechanism and handover support. The main functions of IW sublayer are:
Determination of a suitable target network.
Primitive mapping between the IW and the UMTS network, or between the IW and the
WiMAX network in case of inter-RAT handover.
Support SR ARQ (Selective Repeat ARQ) mechanism, including packet segmentation
and re-sequencing, retransmission, and retransmission window size adjustment.
In Fig. 2 and Fig. 3, the user and control planes of the proposed architectures are illustrated.
It should be stressed that the SR ARQ retransmission mechanism is realized in the user
plane. While in the control plane, IW sublayer shall translate handover related signaling
Inter-RAT Handover Between UMTS And WiMAX 529
between source and target networks. When an inter-RAT handover is made, the IW
sublayer is activated according to the QoS requirements of a PDP (Packet Data Protocol). In
the control plane, we prefer to reuse the RRC protocol functionality in the MS and RNC
respectively, instead of building them from scratch. What is actually needed is to enhance
RRC protocol entities in order to forward inter-RAT handover primitives to IW sublayer. In
order to minimize the modifications to respective systems, IW sublayer also realizes some
essential WiMAX-related primitives and makes RNC act as another WiMAX BS to the
WiMAX network.
3.2.2.1 Overview
In order to have insight into IW sublayer working mechanism, this sub-clause describes the
inter-RAT handover signaling procedures and primitives among IW, PDCP, RRC (Radio
Resource Control) and WiMAX MAC. Some newly added cross-layer primitives are
complemented to the conventional inter-RAT handover signaling procedures of 3GPP (3GPP
TS 43.129; 3GPP TR 25.931). We suggest the future WiMAX and UMTS standards should
support these primitives and parameters for the seamless and smooth inter-RAT handover.
Generally, the inter-RAT handover consists of handover preparation phase and handover
execution phase. In the case of a handover from UMTS to WiMAX, when the inter-RAT
handover conditions e.g. low RSSI or load increase, are met, the MS is instructed by the
RNC to switch on its WiMAX transceiver. Then MS seeks and monitors the neighbor
WiMAX BSs given in System Information Block (SIB) on BCCH of serving cell. After the
WiMAX scanning intervals (IEEE 802.16e, 2005), the MS provides the network with its
measurement results of the target networks using Measurement Reports message.
Meanwhile, other important wireless link parameters, such as round trip time (RTT), BDP
are also calculated by the RNC. After that, the inter-RAT handover will enter into execution
phase if the RNC makes a positive handover decision.
Fig. 4 describes the inter-RAT handover from UMTS to WiMAX and shows the exchanged
messages and primitives.
1) Based on measurement reports and knowledge of the RAN topology, the RNC, more
precisely source RRC decides to initiate an inter-RAT PS handover.
2) The source RRC sends the CRrcRelocInd primitive (contains target WiMAX cell id) to
the IW sublayer.
3) Then the IW sends the CMacBuffInfoReq primitive to the target WiMAX MAC to
request the buffer characteristics. The WiMAX MAC shall return the CMacBuffInfoCnf
primitive to inform the IW of the buffer size in its MAC sublayer. According to this
information, the IW adjusts its retransmission window size. (Note that current WiMAX
MAC does not support this interface, so the IW may adjust its retransmission window
size to a default value).
4) At this stage, the IW sends the CMacBSSynchReq primitive to the WiMAX MAC to
negotiate the location of the dedicated initial ranging transmission opportunity for the
MS. This information is returned by primitive CMacBSSynchCnf.
5) After that, the IW begins to buffer data packets that require delivery order and sends a
CRrcRelocReq primitive (including Transparent Container (MOB_BSHO-REQ)) to the
source RRC.
6) The RRC sends the Handover from UTRAN Command message to the MS, which
includes a MOB_BSHO-REQ.
7) The MS performs hard handover and normal WiMAX network entry procedure.
8) After the provisioned service flow is activated (IEEE 802.16e, 2005), the target WiMAX
MAC sends CMacBSHOCmpInd primitive as a Link_Up (LU) trigger to the IW
sublayer. On this trigger, the IW shall restart data packet forwarding.
532 Radio Communications
Note that primitive CMacBSHOCmpInd and primitive CRrcRelocCmpInd are defined as the
Link_Up (LU) triggers for handover from UMTS to WiMAX and for handover from WiMAX
to UMTS respectively.
Fig. 7. Simulation topologies: integrated coupling (left) and tight coupling (right)
In order to analyze the performance of the IW sublayer during inter-RAT handover between
UMTS and WiMAX, network-level simulations are carried out using NS2. Several
extensions are made to this simulator, UMTS and WiMAX models, IW sublayer, multi-
channel model, IW ARQ mechanism and new signaling and primitives. The simulation
topologies for integrated and tight coupling scenarios are illustrated in Fig. 7. There is only
one MS with two transceivers and no other background traffics in this “clean” scenario. The
MS always has enough bandwidth to send packet whether it is in WiMAX region or in
UMTS region. Note that in this topology, the transmission delay in the wired network is set
very small deliberately to minimize its influence to handover procedure. An FTP session is
examined, with the CN designated as the sender and the MS designated as the receiver. In
UMTS module, a drop-tail policy is applied to radio network queues in PDCP and this
queue length is set to 25 IW blocks. As to the WiMAX module, the queue length is set to 50
IW blocks, which considers the fact that generally the bandwidth of WiMAX is much higher.
Other important simulation parameters are summarized in Table 1.
Inter-RAT Handover Between UMTS And WiMAX 535
The SDU Reconstruction scheme reconstructs the RLC PDUs stored in the RLC
retransmission buffer. However, if one PDU of a SDU is successfully transmitted, this PDU
is deleted from retransmission buffer and the remaining PDUs of this SDU cannot be
reconstructed and are discarded locally. The remaining RLC SDUs (TCP packets here) are
forwarded to WiMAX network after handover on RNC. These arrivals of out-of-order
packets generate several duplicate ACK and trigger TCP fast retransmission process. The
TCP congestion window size shrinks to half of congestion window of steady state, and the
average throughput is also reduced.
The IW ARQ scheme adjusts its retransmission window according to the target network’s
queue size and forwards the IW blocks in its retransmission buffer on receipt of Link_Up
trigger. After handover is over, there are no packet losses and the TCP ACK arrivals are not
as bursty as those of SDU Reconstruction scheme thanks to the IW ARQ window
mechanism (see Fig. 8 between 4 and 4.1 sec.).
A typical problem during handover process from high bandwidth data network WiMAX to
relative low bandwidth network UMTS is buffer overflow, which is caused by BDP
mismatch between these two networks. The UMTS network is likely to undergo buffer
overflow when a TCP congestion window for WiMAX is much larger than the buffer
allocation per MS in UMTS RNC.
538 Radio Communications
For SDU Reconstruction scheme, even though TCP congestion window is not larger than
buffer size of UMTS, the buffered packet forwarded from WiMAX to UMTS still may have
the probability to overflow the UMTS queue, because queue in WiMAX may buffer more
packets than the queue size of UMTS due to inflated transmission time. For SDU
Reconstruction scheme, in Fig.10, the buffer overflow in UMTS after handover leads to TCP
retransmission starting at about 6.0 sec. The corresponding TCP window shrinks, as shown
in Fig. 11.
For R-LLC scheme, the long status report period leads to TCP RTO and a segment is
retransmitted by the TCP sender three times before a status report timer expires. The period
of status report timer is set to 2.5 sec. in this scenario.
Whereas for IW ARQ scheme, the support of Link_Up trigger accelerates handover response
time, and the adaptive IW ARQ window size effectively eliminates buffer overflow in the
target UMTS network. It can be seen that the lossless handover of IW ARQ mechanism has a
“side effect”: eliminate the false fast retransmission caused by packet losses or out-of-order
packet arrivals during a handover.
Inter-RAT Handover Between UMTS And WiMAX 539
In the tight coupling scenario, the WiMAX network may emulate a RNC (Radio Network
Controller) or a SGSN (Serving GPRS Support Node). We only consider RNC emulation in
this chapter. Thus, we introduce a new network component called RNC emulator for
WiMAX (W-RNC) in the WiMAX access network, which connects with the UMTS CN (Core
Network) at the Iu-PS interface, as shown in Fig. 12. Actually, the W-RNC is an enhanced
WiMAX BS with a novel sublayer named IW sublayer, which lies on the top of WiMAX
MAC (Medium Access Control) sublayer. The W-RNC with the IW sublayer has the
following functions:
Realize Iu-PS interface.
Primitive mapping between the IW and the UTRAN network or between the IW and
the WiMAX network in case of an inter-RAT handover.
540 Radio Communications
When an inter-RAT handover takes place, the IW sublayer functions as the LLC
sublayer of conventional cellular networks by enabling the SR ARQ (Selective Repeat
ARQ) mechanism that includes packet segmentation, re-sequencing, retransmission,
and retransmission window size adjustment.
When a handover takes place, the IW sublayer transfers context to target RNC or W-
RNC where the counterpart sublayer locates. In order to provide a seamless inter-RAT
handover between UMTS and WiMAX, a peer IW sublayer shall also be realized on the
top of the PDCP sublayer on the conventional RNC. While on the MS, the IW sublayer
is a common sublayer on the top of the PDCP sublayer of UMTS and the MAC sublayer
of WiMAX.
In Fig. 13 and Fig. 14, the user and control planes of the proposed tight coupling architecture
are illustrated. W-RNC is assumed to cover the same Routing Area (RA) like the RNC. The
IW sublayer on the W-RNC communicates with its counterpart entity on the RNC in order
to execute inter-RAT handover to/from its control area. The main contents of the
communication between them are as follows:
GTP-U sequence numbers as well as GTP packets that need to be forwarded by the W-
RNC for PDP contexts requiring delivery order.
IW ARQ parameters, such as windows size, queue length, retransmission timer period,
and retransmission count.
The IW blocks stored in local retransmission buffer.
There are two reasons why add IW ARQ mechanism to W-RNC in addition to SRNS
(Serving RNS) context transfer of conventional RNC:
When an inter-RAT handover takes place, there may exist packet sequence number
asynchronization between the source RNC and the target WiMAX BS. It is necessarily
that there exists a common context transfer mechanism for these two systems to assure
a lossless handover.
The second reason is that the WiMAX supports cell reselection initiated by MS for
active traffics (like dedicated mode in UMTS), which is not the case in UMTS. Hence,
the packets that are lost during the cell reselection from WiMAX to UMTS, cannot be
retransmitted by the target network.
542 Radio Communications
Fig. 15 describes the inter-RAT handover from UMTS to WiMAX and shows the exchanged
messages.
1) Based on measurement reports and knowledge of the RAN topology, the RNC, more
precisely source RRC decides to initiate an inter-RAT PS handover.
2) The source RNC sends a Relocation Request (contains target WiMAX cell id) message to
the SGSN. The SGSN forwards Relocation Request message to target W-RNC.
3) Then the IW of target W-RNC sends the CMacBuffInfoReq primitive to the WiMAX
MAC to request the buffer characteristics. The WiMAX MAC returns the
Inter-RAT Handover Between UMTS And WiMAX 543
CMacBuffInfoCnf primitive to inform the IW of the buffer size in its MAC sublayer.
According to this information, the target IW adjusts its retransmission window size. It
should be mentioned at this point that current WiMAX MAC does not support this
interface, so the IW may adjust its retransmission window size to a default value.
4) At this stage, the target IW sends the CMacBSSynchReq primitive to the WiMAX MAC
to negotiate the location of the dedicated initial ranging transmission opportunity for
the MS. This information is returned by primitive CMacBSSynchCnf.
5) The target W-RNC sends the Relocation Request Acknowledge message to SGSN, and
the SGSN continues the handover by sending a Relocation Command to source RNC
(including Transparent Container (MOB_BSHO-REQ)).
6) Upon receipt of Relocation Command message, the IW of source RNC will forward IW
context to target IW of W-RNC. The IW context consists of IW ARQ parameters,
received IW ACK and remaining IW blocks that have not been transmitted successfully.
7) The RRC of the source RNC sends the Handover from UTRAN Command message to
the MS.
8) The MS performs hard handover and normal network entry procedure.
9) After the provisioned service flow is activated, the target WiMAX MAC sends
CMacBSHOCmpInd primitive as a Link_UP (LU) trigger to the IW sublayer. On this
trigger, the IW starts data packet forwarding.
The IW ARQ scheme adjusts its retransmission window according to the target network’s
queue size, and sends the IW blocks that are forwarded from the source IW on receipt of
Link_Up trigger. After the handover, there will be no packet losses and TCP congestion
window does not shrink thanks to the retransmission mechanism.
When a handover from WiMAX to UMTS happens, there exist some TCP segments and IW
blocks, which are forwarded from W-RNC to RNC through the tunnel for two schemes, as
shown in Fig.20. For B&F scheme, the arrivals of tunneled segments (about 8 segments)
trigger the fast retransmissions twice at time 4.31 sec. and 4.51 sec. for the lost segments
during the handover (see Fig. 19), and then congestion window size reduces significantly.
From then on, the TCP sender retransmits the segments numbering from the first lost
segment to the tunneled segments. The receiver will acknowledge again those segments that
have been tunneled before at about 6.18 sec, which herein trigger the bursty segment
arrivals. Furthermore, those retransmitted segments that have been tunneled during
handover procedure delay the ACK feedback of new segments, and in consequence lead to a
retransmission caused by RTO at 6.58 sec.. We can see that, the B&F scheme degrades the
handover performance instead of improving it for TCP traffics due to the lack of a
mechanism that recovers the lost packets.
For IW ARQ scheme, there is no packet loss during the handover. The support of Link_Up
trigger accelerates handover response time, and the adaptive IW ARQ window size
effectively eliminates buffer overflow in the target UMTS network. The only price for this
lossless handover procedure is that the IW sender may retransmit a couple of IW blocks that
possibly have been received by IW receiver but the corresponding ACKs are lost in the air
during the handover period.
5. Conclusion
This chapter focuses on introduction of proposed inter-RAT handover solution for
interworking UMTS with WiMAX. First, the 3GPP cell reselection and handover mechanism
are outlined in the first section. This section gives us main guideline for designing a new
mechanism to deal with typical problems of inter-RAT handover between UMTS and
WiMAX. Then, a novel Layer 2 inter-RAT handover scheme on basis of the integrated
coupling and tight coupling architectures for the seamless roaming between UMTS and
548 Radio Communications
WiMAX networks are elaborated. For instance, in integrated coupling architecture, a new
common sublayer named IW sublayer that lies on the RNC and MS is added on the top of
PDCP (UMTS) and MAC (WiMAX) sublayer. At this novel sublayer, a new retransmission
scheme called IW ARQ is also proposed to eliminate packet losses during handover
procedure and accelerate handover procedure. Compared with other context transfer
mechanisms, such as R-LLC, SDU Reconstruction and buffering-and-forwarding, IW ARQ
can achieve lossless and prompt handover procedure for TCP traffics thanks to the
introduction of SR ARQ mechanism. The better handover performance is validated by the
simulation results carried out on NS2 emulator. In addition, this novel IW sublayer scheme
also can eliminate the false fast retransmission due to packet loss or out-of-order packet
arrivals during a handover period. It also provides a suitable framework to solve the TCP
problem of BDP mismatch, premature RTO and so on.
6. References
3GPP TS 04.18. Technical Specification Group GSM/EDGE Radio Access Network; mobile
radio interface layer 3 specification; radio resource control protocol
3GPP TS 05.08. Technical Specification Group GSM/EDGE Radio Access Network; Radio
subsystem link control (release 99)
3GPP TS 23.060. Technical Specification Group Services and System Aspects; General Packet
Radio Service (GPRS); Service description, stage 2 (Release 7), v7.4.0
3GPP TS 23.122, “Technical Specification Group Core Network and Terminals; Non-Access-
Stratum (NAS) functions related to Mobile Station (MS) in idle mode”, (Release 7),
V7.2.0
3GPP TS 23.234. 3GPP system to Wireless Local Area Network (WLAN), interworking;
System description (Release 6), V6.5.0
3GPP TS 25.304. User Equipment (UE) procedures in Idle Mode and Procedures for Cell
Reselection in Connected Mode
3GPP TS 25.323. Technical Specification Group Radio Access Network; Packet Data
Convergence Protocol (PDCP) specification, (Release 7), V7.5.0
3GPP TS 25.331. Technical Specification Group Radio Access Network; Radio Resource
Control (RRC); Protocol Specification (Release 7), v7.5
3GPP TR 25.922. Technical Specification Group Radio Access Network; Radio resource
management strategies (Release 7), V7.10
3GPP TR 25.931. Technical Specification Group RAN; UTRAN functions, examples on
signaling procedures, (Realease 7), V7.4.0
3GPP TS 43.022, “Technical Specification Group GSM/EDGE; Radio Access Network;
Functions related to Mobile Station (MS) in idle mode and group receive mode”,
(Release 7), V7.2.0
3GPP TS 43.129. Technical Specification Group GSM/EDGE” Radio Access Network;
Packet-switched handover for GERAN A/Gb mode; Stage 2 (Release 7), V7.2.0
3GPP TS 44.060. Technical Specification Group GSM/EDGE Radio Access Network; General
Packet Radio Service (GPRS), Radio Link Control/Medium Access Control
(RLC/MAC) protocol (Release 7), V7.9.0
3GPP TS 45.008. Technical Specification Group GSM/EDGE; Radio Access Network; Radio
subsystem link control (Release 7), V7.8.0
Inter-RAT Handover Between UMTS And WiMAX 549
(i.e., between L2 and L3) of critical information that will enhance the performance of the
overall handover process.
In this chapter we present the details of one such cross-layer solution called Multi-Hop
Discovery of Candidate Access Router MHD- ( that
CAR)not only optimises the standard
Candidate Access Router Discovery (CARD) protocol (Liebsch et al., 2005) but it also offers
inherent cross-layer capabilities that can potentially contribute towards achieving low
latency handovers and hence enhance the operational efficiency of seamless mobility
management protocols in general.
The details of this novel solution will be presented in the context of Fast Mobile IPv6
protocol. A portion of the work presented in this chapter is based on our previous efforts
that has been recorded and published in (Yousaf et al., 2008(b)).
2. Technical Background
To provide mobility management to MNs, IETF has specified Mobile IPv6 (MIPv6) protocol
at L3 (Perkins et al., 2004). However, it is an established fact that the handover performance
of MIPv6 is not seamless, in that it incurs a high handover latency and packet delay. This is
because the MIPv6 operation is based on a break-before-make operation in which the MN will
initiate the MIPv6 protocol after it has disconnected from its serving AP as it moves out of
its coverage range. After the disconnection, the MN will search and connect to the
appropriate new in-range wireless AP. After establishing link connectivity (or performing
L2 handover), the MIPv6 handover process will be initiated which is based on a sequential
execution of a series of sub-processes; namely Care-of-Address configuration, Duplicate
Address Detection (DAD) test, Home Registration, Return Routability Test and
Correspondent Registration. Each of the sub-process will incur a finite amount of delay
(DAD test alone incurs a delay of 1 sec) contributing thereby to the total handover latency.
During the execution of the MIPv6 protocol, the MN remains disconnected from the Internet
and is unable to transmit or receive packets resulting in data losses. Hence, the MIPv6
handover latency, which is in excess of 1.5 seconds (Yousaf et al., 2008(c)), is unsuitable for
delay sensitive and throughput sensitive applications.
To provide seamless handover services, IETF has specified Fast Mobile IPv6 (FMIPv6)
protocol in RFC 5268 (Koodli, 2008) which extends the standard MIPv6 protocol. The main
operational concept of FMIPv6 is based on the ability of the MN to detect and negotiate a
handover with the New Access Router (NAR) in advance while the MN is still connected to
its Present Access Router (PAR). During handover negotiation with NAR, a bi-directional
tunnel is established between the PAR and NAR so that packets arriving at the PAR (and
destined towards the MN) are tunnelled towards NAR where they will get buffered. These
buffered packets will get forwarded to the MN soon after it establishes link connectivity
with the AP associated with the NAR and becomes IP capable on the NAR’s link. In other
words, FMIPv6 is based on a make-before-break concept which not only reduces handover
latency but also the packet loss by virtue of the tunnelling and buffering of packets.
However, the key to the success for the FMIPv6 handover operation is the ability of the MN
to detect and identify the presence of in-range Candidate Access Routers (CARs) and then
select an appropriate NAR from amongst the identified CARs. The FMIPv6 protocol
specification only specifies the handover operation by assuming that the MN has already
identified and selected a suitable NAR and hence does not provide any specific mechanism
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 553
to this end. The method of discovering CARs and selecting NAR is left to the discretion of
the user.
Candidate Access Router Discovery CARD) ( is one such standard solution (Liebsch et al., 2005)
the protocol facilities of which can be utilised by FMIPv6 to enable a MN to discover CARs
and hence select NAR.
The summary of the CARD protocol and its interaction with the protocol operation of
FMIPv6 is given in the following sub-section.
Fig. 1. Format of the CARD Request Message Carried as an Option in ICMPv6 Message
Fig. 2. Format of the CARD Reply Message Carried as an Option in ICMPv6 Message
554 Radio Communications
The CARD protocol is designed to perform the following two functions namely;
1. Reverse Address Translation (RAT)
2. Discovery of CAR Capabilities (DCC)
The RAT function enables a MN to map the L2 identifiers (L2-IDs) (e.g., a MAC address for
802.11 networks) of one or more in-range APs to the IP address (L3-IDs) of the associated
CAR connected to it. The L2-IDs are typically discovered during the scan operation initiated
by the MN as a reaction to the link condition going below a certain specified threshold value
of SNR or RSSI.
The DCC function on the other hand, allows the MN to acquire the capability’s information
of the discovered CARs. The notion of capabilities implies of the various QoS aspects offered
by a CAR that would then be used as input to the MN’s target AR (TAR) selection algorithm
to make optimal handover decisions. The DCC function will prevent the MN to make
inaccurate network selections and hence connections to the wrong one in case of many
available CARs.
Central to the CARD operation is a L2-L3 address mapping Table called a CARTable , which
is managed and maintained inside each AR. The information content of the CAR Tableis
used to resolve the L2-IDs of a Candidate AP (CAP) to the IP address and capabilities of the
associated CAR.
RFC 4066 suggests the use of a central entity called a CARD Serveras one of the strategy to
populate the CAR Table . During boot up time all ARs within the administrative domain of
the CARD Server will register their IP addresses and th e L2-IDs of the associated CAPs with
the CARDServer . The CARDServerwill then be queried during the RAT process.
The functionality of the CARD protocol extends many benefits which are outlined in
(Trossen et al., 2002). For example, the information that the MN acquires due to the CARD
operation will enable it to select and connect to an appropriate network that would provide
the necessary service to the MN based on its application requirements. This can be beneficial
to multi-homed MNs as it may also enable the MN to select the least-cost network and
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 555
was first presented in (Funato et al., 2002) which has been adopted by RFC 4066 as one of
the probable method.
The current AR, depending on the status of the C-flag (capabilities request flag) in the MN-
AR CARD Request message, will then directly contact the resolved CAR(s) and perform
capabilities discovery via AR-AR CARD Request/Reply message pair and then send the
resolved identities and capabilities of the CAR(s) to the MN via a MN-AR CARD Reply
message. It may be mentioned that the identity and capabilities information are carried in
specified message sub-options and containers the details and format of which is given in
(Liebsch et al., 2005). Based on the capabilities information and preset criteria, the MN will
select an appropriate TAR to which it will perform a handover with. This process will ensue
every time the handover is imminent.
Upon connecting to the target AR the MN will send a wildcard MN-AR CARD Requestto
obtain the information of its CAR Table in order to improve the prospects of the next CAR
discovery. It is observed that the maintenance and management of local CAR Tables is
critical to the effectiveness of CARD protocol in terms of assisting seamless and fast
handover by way of quick address resolution and capabilities discovery.
trigger which will initiate the CARD operation as described in Section 2.1.1. The PAR after
acquiring the identities and capabilities of the available CAR(s) against the L2-ID(s) provided by
the MN in the RtSolPr message will send this information as [L2-ID, AR-Info]1 tuple appended to
the PrRtAdv message. The MN will then select a suitable NAR from amongst the discovered
CAR(s) based on some TAR selection criteria which is beyond the scope of this chapter.
Based on the identity information of NAR, the MN will auto-configure (Thomson et al.,
2007) a prospective New Care of Address (pNCoA) and will send this in a Fast Binding
Update Message FBU) ( message to the PAR indicating the NAR to which the MN wishes to
handover its connection. The PAR will then notify the NAR of the pCoA and request for a
handover by sending a Handover Initiate message.
HI)
( The NAR in response will
acknowledge the handover request by transmitting a Handover Acknowledge (HAck) message
towards the PAR. The PAR upon receiving the HAck will immediately set up a forwarding
tunnel with the NAR (referred to as PAR-NAR tunnel) and will start tunnelling subsequent
packets destined for the MN towards NAR where they will get buffered. In the meantime
the PAR, upon processing the HAck, will inform the MN of the NAR’s decision via a Fast
Binding Acknowledgement (FBAck) message. It should be noted that all this operation is
executed while the MN is still connected to the PAR.
Fig. 4. The FMIPv6 Predictive Handover Operation Utilizing the CARD Protocol for NAR
Discovery
After the MN moves out of the communication range of PAR, it will establish link
connectivity with the New Access Point (NAP) and will announce its presence to the NAR
by sending an UnsolicitedNeighbourAdvertisement message(UNA)
(Narten et al., 2007) to the
NAR. The NAR will immediately forward all the buffered packets, and the subsequent
packets arriving via the PAR-NAR tunnel, towards the MN. The MN will then inform the
HA and the CN(s) of its new location as per the MIPv6 protocol rules (Perkins et al., 2004),
after the completion of which the handover is said to be complete.
It should be noted that the FMIPv6 protocol specifies two handover modes namely Predictive
Handover Mode and Reactive Handover , depending
Mode on whether the MN receives the
FBAck on the PAR’s link or not. Of the two modes, the Predictive Handover Mode is more
seamless and hence is the preferred and default mode.
Besides FMIPv6, the CARD protocol functionality can also be used by the MIPv6 protocol to
facilitate the MN’s decision to select the appropriate AR for handover that would best serve
its QoS requirements. For further details see (Liebsch et al., 2005).
3. Problem Statement
As described previously, central to the success of the FMIPv6 protocol is the ability of the
MN to discover and select NAR using the CARD protocol facilities. However the process to
discover and select NAR depends on two discovery processes namely:
1. CAP discovery, and
2. CAR discovery.
Both of these processes will influence the overall discovery process in consideration of the
inherent process limitations described below.
4. Related Work
Two approaches for discovering CARs worth mentioning is Push-Mode-Multicast based
Candidate Access Router Discovery (PMM CARD) (Dario et al., 2006(a)) and Access Router
Information Protocol (ARIP) (Kwon et al., 2005). PMM CARD introduces added complexity of
maintaining and managing multicast groups and addresses and its performance is restricted
within a single operator's domain, whereas ARIP does not scale to complex network
architectures and is not dynamic. Beside introducing additional signalling messages, ARIP
requires the ARs to maintain identity information of the adjacent AR's but , similar to (Ono et
al., 2003), suggests manual set up by the network administrator or by the automatic learning of
the AR's from the handover information offered by the MNs. This makes ARIP unscalable to
complex network architectures. Also both the above proposals do not provide any cross-layer
management capabilities and have not been designed keeping in view the requirements and
dynamics of a fast moving MN in the context of NGN.
In this chapter we present an enhanced and scalable mechanism for discovering CARs that
can enable a fast moving MN to discover the identity and capabilities of the CARs which
may not be geographically adjacent and/or directly linked to the PAR. We term this new
approach as Multi-hop Discovery of Candid ate Access Routers (MHD-CAR), which is a simple
approach that does away with the complexity and limitations of both PMM CARD and
ARIP. The MHD-CAR provides an inherent scalable cross-layer mobility management
solution that eliminates the performance issues discussed earlier by incorporating the
solution recommendations.
The protocol details of the MHD-CAR protocol is submitted to the IETF as an Internet Draft
(Yousaf, Wietfeld, 2008(a)) and the proof of concept presented in (Yousaf et al., 2008(b)).
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 559
At initialization, each AR will populate its CAR Table with its own (and associated AP(s))
identity and capabilities information and set the Distance'
' parameter to zero, indicating
local AR information.
For the MHD-CAR operation, it is imperative that each AR should be aware of the identity of
the neighbouring AR and the associated AP(s) and store this information in its local CAR
Table with a Distance value set to 1. The neighbour association can be established
dynamically using the handover information of a bootstrapping MN as an input to establish
a neighbour relationship. The first handover between any two neighbouring ARs will serve
as a bootstrapping handover that would invoke the discovery process between the two ARs.
This idea was first presented in (Shim, Gitlin, 2000), (Trossen et al., 2003) and also endorsed
by the official CARD protocol standard (Liebsch et al., 2005) , which is adopted by the
MHD-CAR operation for CAR Table initialisation and described as follows.
CAR Table
AP Information AR Information Capabilities
macaddrMAC Address IP Address
ipaddr Bitrate AP
double
int L2 Type Network Prefix
prefix SSID
string
int Channel Number int Prefix Length int Distance
User Defined QoS AV Pair
avpair
Table 1. Conceptual Design of the CAR Table
When some MN performs an inter-AR handover, it will inform its current AR about the
identity of the previous AR using a Router Identity message option appended to the MN-AR
CARD Requestmessage (Liebsch et al., 2005). The serving AR will acknowledge this with a
MN-ARCARDReply message and will store the identity of the MN’s previous AR in its CAR
Table and indicate it as its immediate neighbour. The serving AR will then send an
unsolicited AR-AR CARD Reply message to the previous AR informing it of its own identity
and identifying itself as its neighbour. The previous AR will thus store the identity
information of the MN’s current AR in its local CAR Table as an immediate neighbour
indicated by the Distance value of 1. In this way, all the ARs along the motion path of the
MN will bootstrap their local CAR Tables with the identity of the neighbouring ARs.
Besides the identity information, the two ARs must also exchange the capabilities
information with each other. This process will also eliminate the reliance on maintaining a
CARD Server. It may be noted that the identity information contains both the IP address of
the AR and the L2-Id(s) of the associated AP(s).
Fig. 6. Conceptual Representation of the Iterative CAR Table Distribution Process in MHD-
CAR
562 Radio Communications
This new entry will thus be marked with the Distance value of 3, indicating that the
corresponding CAR is at distance of three wireless-hops.
The above inter-exchange of unsolicited inter-AR Reply messages will continue until each
AR has the information about CAR, which is at the specified maximum distance from the
current AR, after which the CAR Tables are said to have converged. The maximum distance
for which an AR is supposed to maintain CAR information is a constant that depends on the
network topology and can be specified by the administrator. The ARs will then periodically
exchange their local CAR Table information with their neighbouring AR(s) after every 60
seconds, or when there is some change in the contents of it (for example, change in
capabilities information). During CAR Table initialisation d distribution
an process, the ARs will
transmit the unsolicited inter-AR uniformly
messages distributed
at a random time between 0 an
0msec
1 .
The iterative CAR Table distribution process is illustrated in Figure 6, which shows the
contents of the CAR Table of an AR for each iteration of the distribution process. The
distribution takes place for a Distance value of 4, i.e., the iterative distribution process will
continue till each AR has information about ARs which are up to 4 wireless hops away.
Figure 6 illustrates the process for the reference topology shown in Figure 7 composed of 12
Access Networks (AN) (from A to L ), where the domain of each AN is defined by an AR and
an associated AP. For the sake of demonstration and simplicity only the AN Identity and
Distance parameters of a CAR Table are considered in Figure 6. The identity (Id) is
characterised by the [L3-ID, L2-ID] pair and is denoted by the AN identifier, whereas the
Distance (D) signifies the topological distance of a CAR/CAP from the local AR in terms of
wireless hops. The entries indicated in red signify the new entries that get stored in the CAR
Table during the particular distribution iteration. Iteration # 0 signifies the contents of the
CAR Table during the initialisation process as explained above.
Figure 7 clearly shows how the ARs (e.g., F) acquire the information of CARs (for instance B
& J) that are not immediate neighbours through the iterative distribution of the CAR Tables.
NAN Cache
CAP Information CAR Information
boolReachability
macaddr MAC Address
ipaddrIP Address
int L2 Type
Network Prefix
prefix
int Channel Number
int Prefix Length
doubleBitrate
int Distance
doubleLast Received Beacon time
doubleRSSI
SSID
string
Table 2. Conceptual Design of New Access Network (NAN) Cache
is revisiting some previously visited CAR domain, a situation not very much likely in case of
high speed MNs.
MHD-CAR proposes a MN to maintain a local cache called New Access Network NAN) ( cache
(see Table 2) that maintains the identity and capabilities information of not only the
neighbouring CAR(s) and associated CAP(s) but those located multiple wireless-hops away.
This will allow the MN to perform RAT and DCC functions locally without the exchange of
any MN-AR CARD Request/Reply message pair with its current AR, or without involving a
CARD server, every time handover is imminent.
The information content of the NAN cache, that is expected to enhance the MN's TAR
selection process and handover related decision tasks, is derived mostly from the CAR Table
that is usually pulled by the MN on the fly from its current AR (via a wildcard MN-AR
CARD RequestMessage) when the MN senses that it is moving away from its current AR.
The MN will then add and/or refresh the relevant entries of its cache. The NAN cache also
derives some of the AP related information from the periodic beacon signals received from
the in-range wireless APs.
6. Performance Analysis
In this Section we present the results of the simulation experiments comparing and
analyzing the performance of the proposed MHD-CAR mechanism to that of the IETF's
CARD protocol using the CARD server. Both the protocols are modeled in our mobility
management framework (Yousaf et al., 2008(c)) developed in OMNeT++ (OMNeT++) and
using realistic message structures and timer implementations.
564 Radio Communications
The simulation experiments and its analysis is similar to the one presented by us in
(Yousaf et al., 2008(b)) with the difference that in this chapter we have extended our
simulation model to realise a more realistic hierarchical network instead of a flat
topology
networktopology in which all the ARs were directly connected to their immediate neighbours
via Ethernet links. In a flat network topology, the ARs will be able to derive the identity of
their neighbouring ARs by simply sending relevant messages directly and hence populate
their local CAR Tables. In contrast, to realise the MHD-CAR protocols in the hierarchical
network topology, we have extended our simulation framework with the bootstrapping
mechanism (see Section 4.1) that would enable the ARs to discover the IP address of the
neighbouring ARs. With this major difference, the same experiments were repeated and
found the results to match those presented previously in (Yousaf et al., 2008(b)).
The simulation network topology is shown in Figure 7 and the experiments are carried in a
homogeneous 802.11b wireless environment using a free space propagation model at 2.4
GHz for a radio channel over a total coverage area of 800m x 800m. To initialise the CAR
Tables, in ARs a bootstrapping MN is moved across the reference network at the beginning
of the simulation enabling each AR to become aware of the IP address of the previous
neighbouring AR. The results expressed in this Section will also apply equally to a
heterogeneous environment because the MHD-CAR operation is defined at the network
layer.
A single simulation run consists of a MN moving across 12 ARs, starting from ARA and
undergoing 11 handover instances, discovering and resolving the next CAP(s)/CAR(s)
while it is still connected to its current AR. The experiments are repeated 100 times for each
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 565
Messages
MN-AR AR-AR 2
Requests Replies Requests Replies 3
CARD
MHD-CAR
Message Load (%)
Total Load Reduction (%)
7DEOH01$5$5$50HVVDJH/RDG&RPSDULVRQ
7KHLQWHU$5PHVVDJHVDUHLQFOXVLYHRI
WKH$56HUYHUPHVVDJHVIRUWKH&$5’RSHUDWLRQ
7KH $5$5 5HSO\ PHVVDJHV WDNH LQWR DFFRXQW
RQO\ WKH UHSOLHV PHVVDJHV H[FKDQJHG DIWHU W
LQLWLDOL]DWLRQDQGGLVWULEXWLRQSURFHVV
594 Radio Communications
Nasir, A., & Mah-Rukh. (2006). Internet Mobility using SIP and MIP. In Proceedings of the
Third International Conference on Information Technology: (ppNew 334 Generation
-
339).
Perkins, C. (1997). Mobile IP. IEEECommunicationsMagazine , 35 (5), 84-99.
Perkins, C. (1998). Mobile Networking through Mobile IP. IEEEInternetComputing, (1),2 58-
69.
Perkins, C. (2002). IP Mobility Support for IPv4. Request for Comments RFC) ( 43 , Available
at: www.ietf.org/rfc/rfc3344.txt.
Prado, R., Zagari, E., Cardozo, E., Magalhaes, M., Badan, T., Carrilho, J., Pinto, R.,
Berenguel, A., Barboza, D., Moraes, D., Johnson, T., & Westberg, L. (2008). A
Reference Architecture for Micro-Mobility Support in IP Networks, Proceedings of
theThirteenthIEEESymposiumonComputersandCommunications (pp. 624 – 630).
Rekhter, Y., & Rosen, E. (2001). Carrying Label Information in BGP-4. Request for Comment
(RFC3107) , Available at: http://www.ietf.org/rfc/rfc3107.txt.
Ramjee, R., Porta, T. L., Thuel, S., Varadhan, K., & Wang S. (1999). Hawaii: A Domain-
Based Approach for Supporting Mobility in Wide-Area Wireless Network,
Proceedings the IEEEInternationalConferenceonNetworkProtocols (pp. 283-292).
of
Ren, Z., Tham, C.-K., Foo, C.-C., & Ko, C.-C. (2001). Integration of Mobile IP and Multi-
Protocol Label Switching. Proceedings of the IEEE International Conference o
Communications (pp. 2123–2127).
Rosen, E.,Viswanathan, A., & Callon, R. (2001). Multiprotocol Label Switching Architecture.
Request For Comments (RFC) 301 , Available at:
http://www.ietf.org/rfc/rfc3031.txt
Saha, D., Mukherjee, A., Misra, I., Chakraborty, M., & Subhash, N. (2004). Mobility Support
in IP: a Survey of Related Protocols. IEEENetwork, 18 (6), 34–40.
Salsano, S., Polidoro, A., Mingardi, C., Niccolini, S., & Veltri, L. (2008). Sip-based Mobility
Management in Next Generation Networks. IEEE WirelessCommunications , 15(2),
92–99.
Samprakou, I., Bouras, C., & Karoubalis, T. (2004). Fast and Efficient IP Handover in IEEE
802.11 Wireless LANs. Proceedings theof InternationalConferenceonWirelessNet
(pp. 249-255).
Samprakou, I., Bouras, C., & Karoubalis, T. (2007). Improvements on IP IAPP: A Fast IP
Handover Protocol for IEEE 802.11 Wireless and Mobile Clients. Wireless Network ,
13 (4), 497–510.
Schulzrinne, H., & Wedlund, E. (2000). Application-layer Mobility Using SIP. SIGMOBILE
MobileComputingandCommunications , 4 (3),Review
47–57.
Snoeren, A. C., & Balakrishnan, H. (2000). An End-to-end Approach to Host Mobility,
Proceedings the
of6th ACM/IEEE International Conference on Mobile Computing and
Networking (pp. 155-166).
Snoeren, A. C., Balakrishnan, H., & Kaashoek, M. F. (2002). The Migrate Approach to
Internet Mobility,ProceedingsofStudent the OxygenWorkshop (pp. 14-17).
Valko, A. G. (1999). Cellular IP: A New Approach to Internet Host Mobility. SIGCOMM
ComputerCommunication, Review 29 (1), 50-65.
Yang, T., & Makrakis, D. (2001). Hierarchical Mobile MPLS: Supporting Delay Sensitive
Applications Over Wireless Internet. Proceedings the
of International Conferences o
Info-techandInfo-(vol. net2, pp. 453-458).
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 567
number of MN-AR messages exchanged over the wireless link for both the protocols and
depicts the percentage reduction of message load induced by MHD-CAR with reference to
the scenario depicted in Figure 7.
The MHD-CAR based on the information available in the NAN Cache proposes to reduce
the scan delay by enabling a MN to perform targetscanning on selective frequency channels.
The MN, instead of waiting to disconnect from the current AP, will start to scan for only
those channels that correspond to the nearest CAP(s) as specified by the Distance parameter
in the NAN Cache, and if the CAP(s) are not located (or are out of range) will proceed to
select and scan the next set of frequency channels corresponding to next farther CAP(s). The
MN will typically start the scan process when the RSSI from the current AP falls below a
certain threshold. Figure 11 compares the performance of MHD-CAR's target scanning with
the 802.11 all-channel scan.
From the Figure 11 it is evident that the performance of MHD-CAR's target scanning incurs
less delay than the full channel scan, however the delay performance is a function of the size
596 Radio Communications
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 569
in the form of defining and developing new SAPs and primitives that would interface with
the generic SAP and primitives defined for the IEEE 802.21 before a MN can take advantage
of the MIH services (Eastwood & Migaldi, 2008). This would entail a major re-engineering
effort involving the upgrade of the whole network infrastructure and protocol standards.
Besides, the IEEE 802.21 model diverges from the standard ISO/OSI reference protocol
model by introducing an intermediate layer between L2 and L3.
(a) (b)
Fig. 12. Conceptual Models of (a) The IEEE 802.21 MIH Service Model, and (b) The MHD-
CAR Protocol
8. Conclusions
In this chapter we have provided operational and functional details of a proposed protocol
called MHD-CAR that has been designed in view of the stringent performance requirements
imposed by fast moving MNs in terms of seamless and fast handovers in a heterogeneous
wireless network environment. MHD-CAR optimises the standard CARD protocol in
enabling a MN to discover on the fly the identity and capabilities of not only the
neighbouring CARs but also CARs that may be located multiple hops away, and all this is
achieved with minimum reliance on the network. This is expected to augment the
performance of seamless handover protocols like FMIPv6 by ensuring accurate selection of
NAR with minimum discovery latency.
The MHD-CAR is a distributed mechanism in which the ARs are able to inter-communicate
their identities and capabilities information to neighbouring ARs and to ARs that are located
multiple wireless-hops away without relying on maintaining and managing a central CARD
server. Each AR stores this information in their local CAR Tables which are then
communicated to the MN upon request. Due to the distributed mechanism, MHD-CAR is
more efficient, reliable, survivable and scalable protocol than the CARD protocol. Since the
MHD-CAR does not introduce any new protocol messages it can therefore be easily
integrated into the present deployment infrastructure.
It exhibits far better performance over the IETF’s CARD protocol in terms of the substantial
reduction of signalling load over both the inter-AR links (by 17.5%) and crucially over the
error prone wireless link (by 48%), while utilizing the CARD protocol messages. This
reduction in signalling load is achieved because the MN is able to perform RAT and DCC
functions locally, based on the information content of the NAN cache, and without relying
on the network.
Another very important aspect of the MHD-CAR scheme is that it provides cross-layer
liaison between L2 and L3 mobility function. This is achieved by having a NAN cache in the
MN, which provides the MN with a topological snapshot of the identity and capabilities of
the access networks that may be multiple hops away from its present point of attachment.
This enables a MN to perform target scanning on selected channels greatly reducing the
CAP discovery latency and enhancing the accuracy of the TAR selection process. This alone
will have a direct impact on the overall handover latency and fast moving MNs will greatly
benefit from it.
In contrast to the IEEE 802.21 standard, it is observed that the MHD-CAR is a light weight
and much simpler alternative solution that provides the main functional services of the
802.21 MIHS. Although MHD-CAR has not been designed as an alternative to 802.21 but it
does share its motivational, operational and functional scope. The IEEE 802.21 WG was
developed to provide a unified global mechanism by defining a common MIH layer
sandwiched between the Network Layer and the Data Link Layer and defined common
triggers that would be generated independent of the underlying access technology. The
motivation was to enable the MN to make accurate selection of the network and to provide
triggers that would aid the IP mobility protocols like FMIPv6. However all this is being
introduced at the cost of high complexity while deviating from the base ISO/OSI prescribed
layered approach by introducing a new layer between the L2 and L3. Also it would mandate
changes to the existing access technologies to confirm to the MIHS scheme of signalling. For
example different SAPs are required to be defined for each of the access technology. It
MHD-CAR: A Distributed Cross-Layer Solution
for Augmenting Seamless Mobility Management Protocols 571
would also involve the exchange of signalling message between the network and the MN,
even over the air interface.
MHD-CAR therefore provides the same conceptual functionalities defined for MIHS but
without transgressing the functional boundaries of the standard OSI/ISO protocol reference
model and with a much simpler and scalable approach.
9. References
Dario, D.; Femminella, M.; Piacentini, L. & Reali, G. (2006(a)). Performance Evaluation of the
Push-Mode-Multicast based Candidate Access Router Discovery (PMM CARD),
Computer Networks , Volume 50, No. 3, (February 2006) page numbers (367-397),
ISSN 1389-1286.
Dario, D.; Femminella, M.; Piacentini, L. & Reali, G. (2006(b)). Target Access Router
Selection in Advanced Mobility Scenarios. Computer Communications , Volume 29,
No. 3, (February 2006), page numbers (337-357), ISSN 0140-3664.
Eastwood, L. & Migaldi, S. (2008). Mobility Using IEEE 802.21 in a Heterogeneous IEEE
802.16/802.11 –Based, IMT-Advanced (4G) Network, IEEEWirelessCommunications ,
Vol. 15, No. 2, (April 2008) pp. 26-34, ISSN: 1536-1284.
Funato, D.; He, X.; Williams, C.; Takeshita, A.; Ali, M. & Nakfour, J. (2002). Geographically
Adjacent Access Router Discovery Protocol. draft-funato-seamoby-gaard-01.txt,
Internet Draft (IETF), June 2002. Work in Progress.
George, L.; Salkintzis, A. & Passas, N. (2008). Media-Independent Handover for Seamless
Service Provision in Heterogeneous Networks. IEEE Communication Magazine , Vol.
46, No. 1, (January 2008) pp. 64-71, ISSN 0163-6804.
Haito, W.; Tan, K.; Zhang, Y. & Zhang, Q. (2007). Proactive Scan: Fast Handoff with Smart
Triggers for 802.11 Wireless LAN, Proceedings of th 62 IEEE International Conference
on Computer Communications INFOCOM) ( , pp. 749-757, ISBN 1-4244-1047-9, Alaska
(USA), May 2007, IEEE, USA.
IEEE Std 802.21. Draft D9.0, IEEE Standard for Local & Metropolitan Area Networks: Media
Independent Handover Services.
Koodli, R. (2008). Mobile IPv6 Fast Handovers, Request for Comments (Proposed Standard)
5268, Internet Engineering Task Force, June 2008.
Kwon, D.; Kim, Y.; Bae, K. & Suh, Y. (2005). Access Router Information Protocol with
FMIPv6 for Efficient Handovers and their Implementations. Proceedings of Global
Telecommunications nference
Co , pp. 3814-3819, ISBN 0-7803-9414-3,
GlobeCom)
(
St. Louis (Missouri), IEEE, December 2005, USA.
Liebsch, M.; Singh A.; Chaskar, H.; Finato, D. & Shim, E. (2005). Candidate Access Router
Discovery Protocol (CARD), Request for Comments roposed
(P Standard) , Internet
406
Engineering Task Force, July 2005.
Mishra, A.; Shin, M. & Arbaugh, W (2003). An Empirical Analysis of the IEEE 802.11 MAC
Layer Handoff Process, Proceedings ACM
of SIGCOMM Computer Communication
Review , Volume 33, No. 2, pp. 93-102, ISSN 0146-4833, April 2003.
Narten, T.; Nordmark, E., Simpson, W. & H. Soliman, (2007). Neighbor Discovery for IP
Version 6 (IPv6)”, RequestforComments(DraftStandard) , September
4861 2007.
OMNeT++. Community Site, http://www.omnetpp.org, July 2009.
572 Radio Communications
5) Based on the received signal strength (Received Signal Strength Indication – RSSI) – The
free space signal propagation is characterised with predictable attenuation dependent on
the distance from the source. Moreover, in real conditions, the attenuation also largely
depends on the obstacles and the configuration of the propagation path. That is why there
are various mathematical models which describe the wave propagation for diverse
surroundings and, ultimately, estimate the signal attenuation for the observed environment.
This approach grants the distance of the entity whose position is being determined, to one
or more transmitters.
6) Based on the fingerprint of the location (Database Correlation or Location Fingerprinting)
– With this approach, the certain, location dependant, information is acquired in as many
Reference Points (RPs) across the coverage area of the technique. This data is stored into so
called Location Fingerprints Database. Afterwards, when the actual position determination
process takes place, the information gathered at the unknown location is compared with the
pre-stored data and the entity’s position is estimated at a location of a pre-stored fingerprint
from the database whose data are “closest” to the measured data.
Most often, the estimated position with TOA and RSSI approaches is determined by
lateration. The process of lateration consists of determining the position of the entity when
the distance between the entity and one or more points with identified positions (i.e.
refernce points) is known. To uniquely laterate the position in N-dimensional space, the
distances to N+1 reference points ought to be known. With TDOA approach, the estimated
position is obtained as a cross-section of two or more hyperbolas in two-dimensional space,
or three or more hyperbolic surfaces in case of three-dimensional space. The process of
angulation is employed with AOA and DOA approaches. This process estimates the
location of a user as a cross-section of at least two rays (half-lines) originating at known
locations. The lateration and angulation processes are depicted in Fig. 1. As for the Location
Fingerprinting approach, the estimated location is obtained by utilizing the correlation
algorithm of some sort. This algorithm determines, following a certain metric, the
“closeness” of the gathered data to the pre-stored samples from the location fingerprinting
database.
Apart from these, basic, approaches, there are a number of other choices and hybrid
techniques that combine the aforementioned approaches when determining the estimated
position of the user.
574 Radio Communications
implementation on small mobile devices such as cell phones and handhelds unfeasible. In
fact, manufactures of such devices never considered supporting the present solutions
(Zagari et al, 2008).
After MIP, new protocols for mobility between networks in the same domain were
proposed. Micromobility protocols aim to improve localized mobility by reducing handover
overheads. Other approaches to allow seamless mobility also include mobility provided by
transport and session layer schemes.
The objective of this chapter is to provide a major review on mobility protocols and
architectures. The protocols and architectures will be classified according their mobility
range (intra and inter domain), layer in which it operates (from the link layer to the
application layer), and the support required from the mobile node. We will place emphasis
on the solutions called “network-centered”, that is, solutions where mobility is handled
entirely by the network without the need of installation of mobility protocols on the mobile
nodes. The protocols and architectures discussed in this chapter are being proposed by
standardization bodies, e.g., IETF, by industry-driven forums, e.g., 3GPP, by academy and
by the industry.
This chapter is divided into 10 more sections. Section 2 presents an overview of mobility
issues and a classification schema, which will be used in the protocols sections. Mobile IP is
presented in Section 3. Section 4 shows link layer based protocols. Section 5 presents
mobility solutions based on L2½ protocols. Section 6 presents network layer protocols.
Section 7 presents transport layer protocols. Section 8 presents mobility using application
layer protocols. Section 9 presents the Mobility Plane Architecture. Section 10 presents a
general classification of the mobility solutions seen in this chapter and future work related
to mobility in IP networks. Finally, Section 11 concludes this chapter.
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 575
2. Mobility Issues
The mobility process starts with the mobile node’s attachment to a local wireless network.
The node attachment process happens when a MN enters in the coverage of a wireless
access point. In this point a L2 (Layer 2) attachment process is performed. After that, the
MN must acquire its IP address from the network. After obtaining its new address, the
network is able to route packets to/from the mobile node (Johnson et al, 2008).
When the MN moves away from the current access point, it may detect another wireless
access point. Handover is “the process by which an active MN changes its point of
attachment to the network, or when such a change is attempted. The access network may
provide features to minimize the interruption to sessions in progress" (Manner & Cojo,
2004) by preserving the transport (or higher layers) connections such a way the packets are
forwarded to the MN via the new access point.
Mobility management is the key to enable this seamless mobility. It enables wireless or
mobile networks to search and locate mobile devices for network communications and to
maintain network/applications connections as the MN moves into a new service area. The
mobility management is composed of mainly two services: location management and
handover management.
Location management consists of two operations: registration or location update and
paging, to enable a network to discover the current point of attachment of an MN for
information delivery (Saha et al, 2004). Location update is used in support of idle users, and
paging is used in support of active communications (Campbell et al, 2002).
Location update procedures need the MN to periodically inform the system to update
relevant location databases with its up-to-date location information (Akyildiz et al, 2004).
Paging is the ability to track idle mobile hosts. For protocols using this kind of tracking, idle
MNs do not have to register if they move within the same paging area, but only if they
change paging area (Campbell & Gomez-Castellanos, 2000).
Handover management enables the network to maintain a MN’s connection as it continues
to move and change its access point to the network (Saha et al, 2004). There are many types
of handover, among which are:
horizontal and vertical: horizontal handover occurs between wireless cells of the
same technology; vertical handover occurs between two different networks of
different technologies. This chapter is dedicated to study horizontal handover
only.
mobile and network initiated: in MN initiated handovers the MN is responsible for
initiating handover requests, while in network initiated handover the network is
responsible for indicating that a handover must occur.
MN and network controlled: in MN controlled handover, the MN must participate
in the handover process, while in the network controlled handover the network
handles the entire process.
fast: fast handover tries to reduce the latency during a handover.
seamless: change the MN’s point of attachment to an IP-based network, without
losing ongoing connections and without disruptions in the communication.
The basic terminology for mobility is (Perkins, 2002; Manner & Kojo, 2004):
home network: a network having a network prefix matching that of a mobile
node's permanent address;
576 Radio Communications
home address: the IP address acquired when registering in its home network; a
stable address that belongs to the mobile node and is used by correspondent nodes
to reach mobile nodes;
home agent (HA): A router located on the home network that acts on behalf of the
mobile node while away from the home network;
correspondent node (CN): Any node that communicates with the mobile node;
foreign network: Any network (other than the home network) visited by a mobile
node;
foreign agent (FA): A router located on the foreign network that acts on behalf of
the MN in this network;
care-of-address (CoA): An address that is assigned to the mobile node when
located in a foreign link.
Tunnel based
In tunnel based schemes, the location database is maintained in distributed form by a set of
foreign agents in the access network. Each foreign agent reads the incoming packet's
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 577
original destination address and searches its visitor list for a corresponding entry. If the
entry exists then it contains the address of next lower level foreign agent.
The sequence of visitor list entries corresponding to a particular mobile host constitutes the
host's location information and determines the route taken by its downlink packets. Entries
are created and maintained by registration messages transmitted by mobile hosts (Campbell
& Gomez-Castellanos, 2000). Tunnels may be IP-IP (IP over IP) or MPLS (Multi-protocol
Label Switching).
Network Layer
All mobility management and signaling is carried out by L3 protocols, based or not in the
Mobile IP protocol.
Transport Layer
Mobility on transport layer intends to maintain TCP (Transmission Control Protocol)'s end-
to-end reliability and correctness semantics while allowing redirecting the endpoints of an
existing transport session (e.g., a TCP connection or a series of UDP – User Datagram
Protocol- packets) to arbitrary addresses (Maltz & Bhagwat, 1998).
Application Layer
Mobility provided by application layer protocols intends to allow communication end
systems to support mobility, heterogeneity, and multihoming. Terminal mobility also
allows a device to move between IP subnets, while continuing to be reachable for incoming
requests and maintaining sessions across subnet changes (Schulzrinne & Wedlud, 2000).
Session mobility also allows a user to maintain a media session even while changing
terminals. For example, a user may want to continue a session initiated on a MN on the
desktop PC when entering his/her office. IPv4 or IPv6 mobility does not directly support
such session mobility (Nasir & Mah-Rukh, 2006).
3. Mobile IP
The Mobile IP (MIP) (Perkins, 1997; Johnson et al, 2004) uses a stable IP address assigned to
mobile nodes. This home address is used to allow the MN to be reachable by having a stable
entry in the DNS service, and to hide the IP layer mobility from upper layers. A
consequence of keeping a stable address independently of the mobile node's location is that
all correspondent nodes try to reach the MN at that address, without knowing the actual
location of the mobile node. Therefore, if there are packets forwarded to the home address,
and the MN is not at its home network, its home agent is responsible for tunneling packets
to the MN’s new location.
MIPv4 (Mobile IP for IPv4 networks) solves the mobility problem by allowing the MN to
use a second IP address: the CoA. This address changes at each new point of attachment
and it indicates the network prefix, identifying the MN’s point of attachment with respect to
the network topology. The CoA is composed of a valid prefix in a foreign network. Thus,
the MN will have a home address and one or more CoAs when moving between networks.
MIPv4 works by the cooperation of three separable mechanisms (Perkins, 1998): discovering
the CoA, registering the CoA and tunneling to the CoA. The operation of Mobile IP protocol
can be briefly described by the following steps (Figure 2):
1. The mobility agents (HA and FA) announces their presence through messages called
Agent Advertisement (optionally, these messages can be requested by mobile agents
through messages called Agent Solicitation);
2. A MN receives these messages and determines whether it is on its home network or on
a foreign network;
3. When a MN detects it moved to a foreign network, it obtains a CoA in that network.
The CoA can be allocated by the foreign agent or some other address configuration
mechanism, such as DHCP (Dynamic Host Configuration Protocol);
4. When the MN is operating in the new network, it needs to register its CoA with its HA,
through the exchange of Registration Request and Registration Reply messages;
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 579
5. Datagrams sent to the MN’s home address by a CN are intercepted by the local HA and
tunneled to the MN’s CoA. The datagram is received at the exit of the tunnel, and
finally delivered to the mobile node in the new network;
6. Datagrams sent by the MN are generally delivered to the destination using standard
routing mechanisms, not necessarily through the HA.
The cooperation between MN, HA and CN is called triangular routing, as we can see in
Figure 2, which summarizes the MIPv4 operation.
The triangular routing generates a processing overhead on HA, in addition to this being a
single point of failure in the network. The MIPv6 solves this problem by optimizing the
route.
Mobile IPv6 (Johnson, 2004) is intended to provide mobility support in IPv6 networks. In
order to know where the MN is found, an association between home address and care-of
address should be performed (binding). This combination of CoA is made by the MN and
the HA. This association is achieved by a binding registration where the MN sends
messages called Binding Updates (BU) to HA, which responds with a message Binding
Acknowledgment (BA) (Figure 3).
The correspondent nodes may carry out route optimization, or they can store bindings
between MN’s home address and CoA. Thus, a MN can supply information about its
location to the corresponding nodes, through the Correspondent Binding Procedure, which
is a mechanism for authorizing the establishment of binding, called the return routability
procedure.
Using the Route Optimization process, the CN must support MIPv6 and the MN must
register with the CN. In this case, the CN, before sending a package, looks for a cached
association between MN’s HA and CoA. If there is an association, the package will be
580 Radio Communications
routed to the CoA of mobile node directly. This eliminates congestion at the home link and
the HA.
MIPv4 and MIPv6 only define means of managing macromobility but do not address
micromobility separately. Indeed, it uses the same mechanism in both cases. So, this
protocol is not suited for micro mobility management, because of its high signaling load and
long handover delay (Habaebi, 2006), namely movement detection, new CoA configuration,
and Binding Update, is often unacceptable to real-time traffic such as Voice over IP (Koodli,
2008).
Access Point (HAP) that is the AP to which the MN was last associated inside its home
network, similar to the Home Agent in MIP.
When the MN moves to a different network, it sends a modified IEEE 802.11
Reassociation.Request (IEEE, 1997) to an AP, the Foreign Access Point (FAP), informing IP
addresses of HAP, MN, and Previous FAP (PAP) and this message triggers the mobility
management procedure. The FAP communicates with the HAP to establish a bi-directional
HAP-FAP tunnel and the HAP starts mapping the MN IP address to the FAP IP address, the
Foreign Agent Care of Address (FACOA).
When the MN reassociates with a new FAP (NAP), the same procedure is performed with
the addition of a communication between the PAP e NAP to establish a temporary
unidirectional tunnel between them. The proposal has also been improved with the
provision of more advanced services: secure inter-AP IP-IAPP communications, zero
patching on the clients software, and support of clients which use a dynamic IP address
(Samprakou et al, 2007).
The IEEE 802 Executive Committee approved IAPP withdrawal in 2006, because “the trial
use period of 802.11F has expired, there has been no significant deployment of 802.11F
implementations and, the functionality provided by 802.11F is being addressed in other
standards fora“(IEEE P802.11, 2005).
is responsible for de-tunneling packets from the MPLS cloud and re-tunneling it inside the
IP cloud.
H-MPLS - Hierarchical Mobile MPLS (Yang & Makrakis, 2001) extends Mobile MPLS,
which is a macro mobility protocol, in order to introduce into it micro mobility features. The
main objective is to reduce the signaling overhead in creating a LSP from HA to FA, due to
MN frequent handover in a small-size cells wireless environment.
To do that, H-MPLS introduces a new element, called FDA (Foreign Domain Agent) whose
function is between that defined for HA and FA, as described in the MIP standards. The role
of FDA is to track MN local mobility inside a MPLS domain. There is only one FDA per
MPLS domain and many FA per subnetworks inside this domain.
The dynamics of the protocol is as follows: whenever a MN enters a foreign MPLS domain
and it is its first registration, it acquires a CoA from its FA LSR and registers with it. This FA
sends a Registration Request to its FDA, which has an equivalent function of a FA, but its
scope is for a domain. This FDA will send back a Label Request message to FA and put as
its FEC, the MN's CoA. At meanwhile, FDA will send a Registration Request message to
HA, in the same way that was described in Mobile MPLS, but putting its IP address as a
FEC for this LSP. So, at this point, there will be two LSPs, one from HA to FDA and another
one from FDA to FA.
Now, if a MN does a handover, but stays in the same domain as the previous FDA, only the
LSP from the new FA to FDA needs to be established. To avoid FDA sending packets to MN
via the old FA, due to an out-of-date entry cache, the new FA sends a Binding Update
message to old FA instructing it to create a LSP to the new FA in order to tunnel packets
arriving at the MN’s old location.
LEMA - Label Edge Mobility Agent (Chiussi et al, 2002) is a tunnel-based micro mobility
architecture that uses MPLS as a network transport technology. This network is composed
of an overlay network whose nodes are called LEMA, an LER that has its function
augmented with LEMA features. This overlay network tracks MN location by building a set
of LEMAs nodes from the highest to the lowest LEMAs that compound a path.
Highest LEMAs are the ingress node which registers its address in the HA database, and
acts as FA in the MIP protocol; while the lowest LEMA is the access router, which remove
the MPLS tunnel and delivers messages to the AP which the MN is connected to. This kind
of scheme makes a hierarchical network, where only the LEMAs that compose a path to
track the MN need to be aware of it.
Others features that can be attributed to it are fast handover capability, scalable design, QoS
capability and gradual deployment. It is the MN’s role to define the set of LEMAs that
compose its path inside a LEMA network. This path is chosen based on a set of parameters,
such as: available bandwidth, mobility patterns, and so on. The algorithm employed to
choose a particular set is an open issue, and could be of high complexity. Finally, all LEMAs
are connected to themselves by pre-established LSPs.
MM-MPLS - Micro Mobile MPLS (Langar et al, 2004) extends mobile MPLS with the
principles employed by MIP-RR (L3 protocol) to support micro mobility on MPLS
networks. It introduces a new component, called Label Edge Router/Gateway (LER/GW)
that resides between HA and FA agents, as defined in the MIP protocol. It acts as a foreign
domain agent to HA and it is this address that the MN must register at HA database when
it first gets into the domain at which LER/GW is administrating.
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 583
So, there is a tunnel/LSP from HA to LER/GW, and an LSP from LER/GW to FA, with MN
CoA's address as a FEC. FA here is an AR (Access Router) that remove the MPLS tunnel and
delivers the packet to MN that is registered on it. Whenever MN moves to another FA,
which is under the same LER/GW, only a regional registration is required that will create a
new LSP from LER/GW to the new FA, using the new MN CoA's address as FEC. MM-
MPLS uses LDP (Label Distribution Protocol) as signaling protocol in MPLS cloud.
I-LIB - Intermediate Label Information Base (Fowler & Zeadally, 2006) maintains the same
idea of MM-MPLS architecture in general, where a FDA is placed between HA and FA.
FDA has the same role as described early, i.e., its CoA address is registered at HA database
and a tunnel connect HA to FDA. On the other side, FDA keeps track of MN by establishing
a LSP to FA that is directly connected to it. Whenever a MN does a handover and
establishes a new connection to a new FA, this new FA will try to establish a LSP to FDA,
sending a Registration Request.
Here is where this proposal differs from the previous ones. Instead of establishing a new
LSP from scratch, linking the new FA to the FDA, any segments that are common between
the new path and the old path will be preserved. As such, any LSR that already has an entry
in its LIB could preserve it and just update it to show the new configuration (the new
segment that connects the MN). In order to do that, a new LIB is proposed which
augmented the old ones with new fields to contemplate mobility issues. Among the fields
that are required, the previous and new MN's CoAs must be accounted for. It is necessary to
modify the packet since the FDA and HA know the MN by its old CoA, while the FA knows
the MN by its new CoA.
6. Network Layer
Cellular IP – The CIP (Valko, 1999) architecture is composed of different wireless access
networks (CIP access networks) connected to the Internet through a gateway. MIP manages
mobility between these CIP access networks, while Cellular IP handles mobility within one
domain. The IP address of the gateway is used as the MIP CoA. Thus, packets are first
routed to the host‘s HA and then tunneled to the gateway, which “detunnels” packets and
forwards them toward base stations, using host-specific routing path.
Base station (BS) components serve as wireless access points and also route IP packets, but
IP routing is replaced by Cellular IP routing and location management. Base stations cache
the path taken by uplink packets from MN to gateway for a period of time and use the
reverse path to route downlink packets. In order to route packets to idle MNs, Cellular IP
employs paging.
HAWAII - HAWAII divides the network into a hierarchy of domains. All issues related to
mobility management within one domain are handled by a gateway called a domain root
router, which uses a specialized path setup scheme which installs host-based forwarding
entries in specific routers to support intra-domain micromobility (Ramjee et al, 1999). While
moving inside its home domain, the MN maintains its stable IP address.
MIP mechanisms are used when the MN moves into a foreign domain. However, if the
foreign domain is also based on HAWAII, then the MN is assigned a co-located CoA from
its foreign domain to which packets for the MN are tunneled. The domain root router routes
the packets to the MN using the host-based routing entries. When the MN moves between
different subnets of the same domain, only the route from the domain root router to the BS
584 Radio Communications
serving the MN is modified, and the remaining path remains the same, and connectivity is
maintained using dynamically established paths.
The protocol contains three different messages for establishing, updating and refreshing
host specific routes for the MN in the domain root router and any intermediate routers on
the path towards the mobile host. The protocol also has four different path setup schemes,
aiming to reduce disruption to the user traffic during a handoff, classified into two types
based on the way packets are delivered to MNs. In the first type, packets are forwarded
from the old base station to the new and, in the second type, they are diverted at the
crossover router.
MIP-RR - MIP-Regional Registration (Fogelstroem et al, 2007) is an optional extension to
the Mobile IPv4 protocol, and proposes a mean for mobile nodes to register locally within a
visited domain. By registering locally, the number of signaling messages to the home
network is kept to a minimum, and the signaling delay is reduced. This protocol introduces
a new network node called the Gateway Foreign Agent (GFA). Besides the regular MIP
Registration messages, a new pair of registration messages, Regional Registration
Requests/Replies, is used between MNs/FAs/GFAs.
There are two models of how the MN uses Regional Registration. In the first model, the FAs
in a visited domain advertise the address of the GFA, and, when a mobile node first arrives
at this visited domain, it performs a home registration. At this registration, the mobile node
registers the address of the GFA as its CoA with its HA. When moving between different
foreign agents within the same visited domain, the mobile node only needs to make a
regional registration to the GFA. In the second model, the FA can indicate that dynamic
assignment of GFA is to be used, if being the FA’s responsibility to choose the GFA after
receiving a Registration Request from the MN.
PMIP - The Proxy MIP (Gundavelli et al, 2008) is a network-centric micromobility approach
that relies on tunnels inside a domain to direct traffic to mobile nodes. PMIPv6 reuses many
concepts of MIPv6, like the HA functionality, and defines two new entities, the Mobile
Access Gateway (MAG) and the Local Mobility Anchor (LMA).
A MAG typically runs on the Access Router. It is responsible for detecting the mobile node
attachments, and, if security policies are fulfilled, establishes tunnels to the LMA for
directing traffic to the mobile nodes reached via this MAG. A MAG also emulates (via
Router Advertisements messages) the mobile node’s home network in such a way that the
mobile node may change the default router in a handover, but preserves the remaining L3
parameters. As the mobile node moves inside the domain, tunnels between MAG and LMA
and routes on the LMA are updated.
LMA maintains a binding cache entry for each currently registered MN, providing
reachability to the MN’s address. When the LMA receives a packet targeted to the mobile
node it forwards the packet via the tunnel ending on the MAG to where the node is
attached. PMIPv6 employs local binding update messages between MAG and LMA for
signaling purposes and only a single hierarchy of tunnels. Indeed, Proxy MIP considers
IPv4 support, but this requires an extension to the original protocol, since it uses some IPv6
features such as auto-configuration and extension headers.
HMIPv6 - To support local mobility, Hierarchical Mobile IPv6 (HMIPv6) extends Mobile
IPv6 and IPv6 Neighbor Discovery (Narten et al, 2007) and introduces Mobility Anchor
Point (MAP), a new Mobile IPv6 node. A mobile node entering an HMIP domain receives
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 585
Router Advertisements containing information about one or more local MAPs and
configures two CoAs: an on-link CoA (LCoA) and a Regional Care-of Address (RCoA).
The LCoA is configured on a mobile node's interface based on the prefix advertised by its
default router. It is a standard Mobile IP CoA and has a different name just to be
distinguished from RCoA. The RCoA is configured on the MAP's link and is obtained by
the MN from the MAP employing the address mechanisms described by RFC 4877
(Devarapalli & Dupon, 2007).
After configuration, the MN sends two binding update (BU) messages. The first is a local
BU to the MAP to bind the MN's RCoA to its LCoA and to establish a bi-directional tunnel
between them. The second is a BU to the home agent to bind the MN’s home address to its
RCoA. The MAP receives all packets on behalf of the mobile node it is serving and
encapsulates and forwards them directly to the mobile node's LCoA.
When the mobile node moves within the same MAP domain, it only needs to register its
new LCoA with its MAP, limiting the amount of Mobile IPv6 signaling outside the local
domain. The RCoA remains unchanged and the home agent (HA) or the correspondent
nodes (CNs) are not aware of the change in LCoA.
DMA - The Dynamic Mobility Agent (Misra et al, 2001) architecture uses the Intra-Domain
Mobility Management Protocol (IDMP) (Das et al, 2002) to manage intradomain mobility.
The architecture defines two entities to achieve mobility support: Mobility Agent (MA) that
acts as a domain-wide point for packet redirection, and the Subnet Agent (SA) that provides
subnet-specific mobility services. Two CoAs are associated with a MN: Global CoA (GCoA)
and Local CoA (LCoA).
The GCoA is the address used by macromobility protocols to redirect packets and remains
unchanged as long as the MN stays in the current domain. The LCoA is an address from the
subnet the MN is attached to. IDMP is used in the communication between the MN and the
SA, and between the MN and the MA.
When the MN first arrives at the domain, it obtains an LCoA and the SA assigns the MN a
MA. The MN registers its LCoA with the MA and obtains a GCoA. After the macromobility
updates process is performed by the MN, the packets from remote hosts, tunneled or
directly transmitted to the GCoA, are intercepted by the MA and tunneled to the MN’s
LCoA. When the MN moves to new subnet it obtains a new LCoA and informs its MA of
the new LCoA, updating the GCoA-LCoA mapping.
updates are performed as soon as the mobile routing protocol messages indicating the new
point of attachment are processed by the branch MARs.
The entries on the mobile routing table are soft state, meaning that the entries are dropped if
location update messages confirming them cease. Soft state is a clear way to drop routes to
mobile nodes when they no longer are reached through these routes. This scheme demands
that a mobile node perform network attachments periodically in order to generate location
update messages that will refresh the routes to it. A way to force the mobile nodes to perform
periodic attachments is to provide them L3 address with a short lease time. When the lease
time is close to expire, a mobile node performs address renewal that will trigger address
location update messages in its behalf.
As this work is a non-exhaustive selection of mobility solutions, our comments are limited
to these protocols revised in this chapter.
There are a majority of MN-centric solutions, since the beginning of mobility management
research, with the Mobile IP. Newer solutions, such as MPA and PMIP, work as network-
centric solutions, and it is our belief that this class of mobility signaling will have more
research focus and implementations, because of its advantages to the final user: they do not
need protocol installation of configuration on the MN, no overheads on devices to handle
mobility, and no intervention from the final user to adopt a particular mobility solution.
Another interesting issue is the network layer protocol. About 10 years ago nobody believed
in IPv4 for mobility, which is why both MIPv6 and its extensions appeared at that time.
Since then, however, the IPv6 protocol has not been massively adopted, so there is
reawakened interest in IPv4 (PMIP and MIPv4 raised again, for example). Now, 4G
researchers and professionals say IPv6 is inevitable because each cell phone and mobile
devices must have a fixed (stable) IP address. Solutions compatible only to IPv4 must
foresee this IPv6 adoption and implement a compatible version of their protocol, if intended
to be used in the next future.
Not mentioned in this chapter, solutions for mobility must adopt security mechanisms for
authentication, authorization and general security procedures. For example, for the MPA
architecture, the access points can be configured to authenticate mobile nodes based on
WPA2 employing Pre-Shared Keys (PSK) or RADIUS. PSK is easy to configure but is not as
secure as RADIUS-based authentication. RADIUS authentication can be strengthened by
using certificates installed on the mobile nodes. As RADIUS transactions take long time
(500ms in our testbed network), RADIUS-based authentication increases considerably the
handover overhead.
In order to speed up RADIUS-based authentication, a cache mechanism can be employed
such as PMK (Pairwise Master Key) caching (also called proactive key caching). In this
mechanism, once a mobile node completes successfully a RADIUS transaction, the access
point stores the PMK supplied by the RADIUS server in the cache. When the mobile node
connects to a new access point, the access point queries the cache (using the mobile node’s
MAC address as a search key) in order to recover the PMK assigned to the node. If an entry
is found, the access point accepts the mobile node without the need of a RADIUS
transaction. In this case, the PMK found on cache is used to secure the communication
between the mobile node and the access point.
As suggestions for future research directions in mobility management, we
can point out the development of architectures able to:
integrate macro and micro mobility into a single mobility solution;
support both vertical and horizontal handover (e.g., between WiFi and 4G
networks);
support clean slate solution, by designing the network from the mobility
requirements (and not to incorporate mobility extensions over the existing
networks).
These solutions decouple host identity from network address as suggested by HIP
(Host Identity Protocol) and other related solutions;
restrict handover within the L2, employing, for instance, tunneling over Ethernet
(instead of over IP or MPLS), flat routing (based on MAC – Media Access Control -
address), etc.
592 Radio Communications
11. Conclusion
This chapter was intended to present a major review on mobility architectures and
protocols. Many solutions were shown, ranging from link layer related solutions to
application layer solutions, including network, transport and intermediary layer protocols.
We also presented MPA, which is our solution for mobility management, using a network
centric paradigm.
Some of the reviewed solutions were abandoned, some were investigated till today. But
mobility management solution still needs investigation, to allow massive deployment and use.
Although the new mobility architectures and protocols are permanently under
investigation, all new solutions are constrained by factors such as: be deployable over
existing IPv4 (and future IPv6) fixed networks, operate without upgrading with the mobile
nodes already in the marked, comply with current network operation practices, be scalable
without degrade quality of service, and allow the introduction of new services with
stringent communication requirements such as media streaming (e.g., IP TV), location, and
entertainment services. The challenge in mobility for IP networks is to comply with these
factors that, unfortunately, are not restricted only to the technical issued commonly
addressed by the network architects.
12. References
Akyildiz, I., Xie, J., & Mohanty, S. (2004). A Survey of Mobility Management in Next-
Generation All-IP-Based Wireless Systems. IEEE Wireless Communications, (4),1
16–28.
Badan, T., Zagari, E., Prado, R., Cardozo, E., Magalhaes, M., Carrilho, J., Pinto, R.,
Berenguel, A., Moraes, D., Johnson, T., & Westberg, L. (2009). A Network
Architecture for Providing Micro-Mobility in MPLS/GMPLS Networks. Proceedings
ofIEEEWirelessCommunicationsandNetworkingConference pp. 1-6). (
Campbell, A. T., & Gomez-Castellanos, J. (2000). IP Micro-Mobility Protocols. ACM
SIGMOBILEMobileComputingandCommunicationsReview , 4 (4), 45 – 53.
Campbell, A. T., Gomez, J., Kim, S., Wan, C.-Y., Turany, Z. R., & Valko, A. G. (2002).
Comparison of IP Micromobility Protocols. IEEE Wireless Communications , 9 (1), 2–
12.
Chiussi, F. M., Khotimsky, D. A., & Krishnan, S. (2002). A Network Architecture for MPLS-
Based Micro-Mobility, Proceedings the of IEEE Wireless Communications and
NetworkingConference , vol. 2, pp. 549-555.
Chiussi, F., Khotimsky, D., & Krishnan, S. (2002). Mobility Management in Third-
Generation All-IP Networks. IEEECommunicationsMagazine , 40 (9), 124–135.
Das, S., Mcauley, A., Dutta, A., Misra, A., Chakraborty, K., & Das, S.K. (2002). IDMP: an
intradomain mobility management protocol for next-generation wireless
networks. IEEEWirelessCommunications, (3), 9 1536-1284.
Devarapalli, V., & Dupon, F. (2007). Mobile IPv6 Operation with IKEv2 and the Revised
IPsec Architecture. Request For Comment RFC) ( 784 , Available at:
www.faqs.org/rfcs/rfc4877.html.
Fogelstroem, E., Jonsson, A., & Perkins, C. (2007). Mobile IPv4 Regional Registration.
RequestForComments(RFC)4857 , Available at: www.ietf.org/rfc/rfc4857.txt.
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 593
Fowler, S., & Zeadally, S. (2006). Fast Handover over Micro-MPLS-based Wireless
Networks, Proceedings of the 1th Symposiu m on Computers and Communications (pp.
181-186).
Gundavelli, S., Leung, K., Devarapalli, V., Chowdhury, K., & Patil, B. (2008). Proxy Mobile
IPv6. Request For Comment (RFC) 5213, Available at:
http://tools.ietf.org/html/rfc5213.
Habaebi, M. H. (2006). Macro/Micro-Mobility Fast Handover in Hierarchical Mobile IPv6.
ComputerCommunications , ( 92 51), 611– 617.
IEEE Document P802.11/D6.1.97/5 Wireless LAN, MAC and Physical Specifications, June
1997.
IEEE Recommended Practice for Multi-Vendor Access Point Interoperability via an Inter-
Access Point Protocol Across Distribution Systems Supporting IEEE 802.11TM
Operation. Mar, 2003.
IEEE P802.11 Working Group. (2005). Approved Minutes of the IEEE P802.11 Full Working
Group. Available at: https://mentor.ieee.org/802.11/dcn/05/11-05-1136-00-0000-
minutes-working-group-nov-2005.doc.
Johnson, D., Perkins, C., & Arkko, J. (2004). Mobility Support in IPv6. Request For Comments
RFC)
( 3775, Available at: www.ietf.org/rfc/rfc3775.txt.
Johnson, T., Zagari, E., Prado, R., Badan, T., Cardozo, E., & Westberg, L. (2008). Performance
Analysis of a New Architecture for Mobility Support in IP Networks, Proceedingsof
the International Wireless Communications and Mobile Computing pp. 706- Confere
711).
Kempf, E. (2007). Problem Statement for Network-Based Localized Mobility Management.
Request For Comments RFC)
( 4830, Available at
http://www.ietf.org/rfc/rfc4830.txt.
Koodli, R., & Perkins, C. (2007). Mobile IPv4 Fast Handovers. Request For Comment RFC) (
498, Available at: www.faqs.org/rfcs/rfc4988.html.
Koodli, R. (2008). Mobile IPv6 Fast Handovers. Request For Comment (RFC) 5268 , Available
at: www.faqs.org/rfcs/rfc5268.html.
Langar, R., Le Grand, G., & Tohme, S. (2004). Micro Mobile MPLS Protocol in Next
Generation Wireless Access Networks, Proceedings of the IEEE Symposium on
ComputerandCommunication pp. 14-17).
(
Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., & Jones, L. (1996). SOCKS Protocol
Version 5. Request For Comment (RFC) 1928 , Available at:
ww.faqs.org/rfcs/rfc1928.html.
Maltz, D.A., & Bhagwat, P. (1998). Msocks: an Architecture for Transport Layer Mobility,
Proceedingsthe of Seventeenth Annual erence Joint Conf of the IEEE Computer and
CommunicationsSocieties, vol.3, pp. 1037-1045.
Manner, J., & Kojo, M. (2004). Mobility Related Terminology. Request For Comment (RFC)
375, Available at: www.faqs.org/rfcs/rfc3753.html.
Misra, A., Das, S., McAuley, A. & Das, S.K. (2001). Autoconfiguration, Registration and
Mobility Management for Pervasive Computing. IEEE Personal Communications
Magazine,8 (4), 24-31.
Narten, T., Nordmark, E., Simpson, W., & Soliman, H. (2007). Neighbor Discovery for IP
version 6 (IPv6). Request For Comment RFC) ( ,1684 Available at:
www.faqs.org/rfcs/rfc4861.html.
594 Radio Communications
Nasir, A., & Mah-Rukh. (2006). Internet Mobility using SIP and MIP. In Proceedings of the
Third International Conference on Information Technology: (ppNew 334 Generation
-
339).
Perkins, C. (1997). Mobile IP. IEEECommunicationsMagazine , 35 (5), 84-99.
Perkins, C. (1998). Mobile Networking through Mobile IP. IEEEInternetComputing, (1),2 58-
69.
Perkins, C. (2002). IP Mobility Support for IPv4. Request for Comments RFC) ( 43 , Available
at: www.ietf.org/rfc/rfc3344.txt.
Prado, R., Zagari, E., Cardozo, E., Magalhaes, M., Badan, T., Carrilho, J., Pinto, R.,
Berenguel, A., Barboza, D., Moraes, D., Johnson, T., & Westberg, L. (2008). A
Reference Architecture for Micro-Mobility Support in IP Networks, Proceedings of
theThirteenthIEEESymposiumonComputersandCommunications (pp. 624 – 630).
Rekhter, Y., & Rosen, E. (2001). Carrying Label Information in BGP-4. Request for Comment
(RFC3107) , Available at: http://www.ietf.org/rfc/rfc3107.txt.
Ramjee, R., Porta, T. L., Thuel, S., Varadhan, K., & Wang S. (1999). Hawaii: A Domain-
Based Approach for Supporting Mobility in Wide-Area Wireless Network,
Proceedings the IEEEInternationalConferenceonNetworkProtocols (pp. 283-292).
of
Ren, Z., Tham, C.-K., Foo, C.-C., & Ko, C.-C. (2001). Integration of Mobile IP and Multi-
Protocol Label Switching. Proceedings of the IEEE International Conference o
Communications (pp. 2123–2127).
Rosen, E.,Viswanathan, A., & Callon, R. (2001). Multiprotocol Label Switching Architecture.
Request For Comments (RFC) 301 , Available at:
http://www.ietf.org/rfc/rfc3031.txt
Saha, D., Mukherjee, A., Misra, I., Chakraborty, M., & Subhash, N. (2004). Mobility Support
in IP: a Survey of Related Protocols. IEEENetwork, 18 (6), 34–40.
Salsano, S., Polidoro, A., Mingardi, C., Niccolini, S., & Veltri, L. (2008). Sip-based Mobility
Management in Next Generation Networks. IEEE WirelessCommunications , 15(2),
92–99.
Samprakou, I., Bouras, C., & Karoubalis, T. (2004). Fast and Efficient IP Handover in IEEE
802.11 Wireless LANs. Proceedings theof InternationalConferenceonWirelessNet
(pp. 249-255).
Samprakou, I., Bouras, C., & Karoubalis, T. (2007). Improvements on IP IAPP: A Fast IP
Handover Protocol for IEEE 802.11 Wireless and Mobile Clients. Wireless Network ,
13 (4), 497–510.
Schulzrinne, H., & Wedlund, E. (2000). Application-layer Mobility Using SIP. SIGMOBILE
MobileComputingandCommunications , 4 (3),Review
47–57.
Snoeren, A. C., & Balakrishnan, H. (2000). An End-to-end Approach to Host Mobility,
Proceedings the
of6th ACM/IEEE International Conference on Mobile Computing and
Networking (pp. 155-166).
Snoeren, A. C., Balakrishnan, H., & Kaashoek, M. F. (2002). The Migrate Approach to
Internet Mobility,ProceedingsofStudent the OxygenWorkshop (pp. 14-17).
Valko, A. G. (1999). Cellular IP: A New Approach to Internet Host Mobility. SIGCOMM
ComputerCommunication, Review 29 (1), 50-65.
Yang, T., & Makrakis, D. (2001). Hierarchical Mobile MPLS: Supporting Delay Sensitive
Applications Over Wireless Internet. Proceedings the
of International Conferences o
Info-techandInfo-(vol. net2, pp. 453-458).
Mobility in IP Networks: From Link Layer to Application Layer Protocols and Architectures 595
Zagari, E., Prado, R., Cardozo, E., Magalhaes, M., Badan, T., Carrilho, J., Pinto, R.,
Berenguel, A., Barboza, D., Moraes, D., Johnson, T., & Westberg, L. (2008). MPA: a
Network-Centric Proposal for Micro-Mobility Support in IP Networks, Proceedings
of Theth
6 Annual Communication Networks and Services Research Conference (
616).
Zagari, E., Prado, R., Badan, T., Cardozo, E., Magalhaes, M., Carrilho, J., Berenguel, A.,
Moraes, D., Dolphine, T., Johnson, T., & Westberg, L. (2009). Design and
Implementation of a Network-Centric Micro-Mobility Architecture. IEEE Wireless
CommunicationsandNetworkingConference (pp. 1-6).
596 Radio Communications
Positioning in Indoor Mobile Systems 597
1. Introduction
At present times people travel far greater distances on daily bases than our not so distanced
ancestors had travelled in their lifetimes. Technological revolution had brought human race
in an excited state and steered it towards globalization. Nevertheless, the process of
globalization is not all about new and faster means of transportation or about people
covering superior distances. Immense amount of information, ubiquitous and easily
accessible, formulate the essence of this process. Consequently, ways through which the
information flows are getting too saturated for free usage so, for example, frequency
spectrum had become a vital natural resource with a price tagged on its lease. However, the
price of not having the information is usually much higher. By employing various wireless
technologies we are trying to make the most efficient use of frequency spectrum. These new
technologies have brought along the inherent habit of users to be able to exchange
information regardless of their whereabouts. Higher uncertainty of the user’s position has
produced increase in the amount of information contained in its position. As a result,
services built on the location awareness capabilities of the mobile devices and/or networks,
usually referred to as Location Based Services (LBS, also referred to as LoCation Services –
LCS), have been created. Example of services using the mobile location can be: location of
emergency calls, mobile yellow pages, tracking and monitoring, location sensitive billing,
commercials, etc. With the development of these services, more efforts are being pushed
into producing the maximum of location-dependent information from a wireless
technology. Simply, greater the amount of information available – more accurate the location
estimate is.
Whereas in outdoor environment the satellite-based positioning techniques, such as the
Global Positioning System (GPS), have considerable advantages in terms of accuracy, the
problem of position determination in an indoor environment is much farther from having a
unique solution. Cellular-based, Computer vision, IrDA (Infrared Data Association),
ultrasound, satellite-based (Indoor GPS) and RF (Radio Frequency) systems can be used to
Sometimes, in literature, the words position and location have different meaning. Most often, position
translates to the set of numerical values (such as geographical coordinates) which describe the user’s
placement, whereas the location usually refers to the descriptive information depicting the user’s
whereabouts (such as Picadilly Circus, London, UK). Nevertheless, this work treats both words
interchangeably.
598 Radio Communications
obtain the user’s position indoors. Positioning technologies, specific for indoor
environment, such as computer vision, IrDA and ultrasound require deployment of
additional infrastructural elements. On the other hand, the performances of the satellite-
and cellular-based positioning technologies are often unsatisfactory for typical LBSs in an
indoor environment. Due to the proliferation of IEEE 802.11 clients and infrastructure
networks, and the fact that a broad scope of LBSs can be brought into an existing WLAN
network without the need for additional infrastructure, WLAN positioning techniques are
relevant and established subjects to intensive research.
to the edge of the furthest boundary of this area. In other words, the Uncertainty value can
be seen as the maximum potential Distance Error. The value of uncertainty is expressed
with the same unit as for the Distance Error.
However, the Uncertainty value is not sufficient to describe the Accuracy of a positioning
technique. The determination of the Uncertainty value goes through a statistical process and
does not enable to guarantee that 100% of the calculated positions have a Distance Error
lower than the Uncertainty value. That is the reason why the Uncertainty value is usually
associated with a Confidence value, which expresses the degree of confidence that one can
have into the position estimate. This degree of confidence is generally expressed in
percentage or as a value of probability.
As a consequence, it is the combination of Uncertainty and Confidence that validly describe
the accuracy of a positioning technique.
The other way of expressing the Accuracy, i.e. the performance or requirements associated
to location determination, is through the Distance error’s Cumulative Distribution Function
(CDF). This approach is more comprehensive and inclusive due to the fact that a particular
Uncertainty, Confidence pair can always be read of the graph for each and every
Confidence or Uncertainty value. When assessing the technique's suitability for LBSs,
expressing the Accuracy of a positioning technique through an Uncertainty, Confidence
pair might be descriptive enough for a certain LBS. On the other hand, stating a positioning
technique's CDF is more general and depicts the technique's accuracy for all potential LBSs.
Coverage and Availability – Accuracy is not the only parameter to be considered in order
to characterise a location estimate. Coverage and Availability must be considered too. These
two parameters are linked together:
The Coverage area for a positioning method corresponds to the area in which the
location service is potentially available, and
The Availability expresses the percentage of time during which the location service
is available in the coverage area and provides the required level of performance.
Latency – Location information makes sense only if it is obtained within a timeframe which
remains acceptable for the provision of the LBSs. Latency represents the period of time
between the position request and the provision of the location estimate and it is generally
expressed in seconds.
Direction and Velocity – Although the herein presented work is restrained to the initial
position determination algorithms, there are additional tracking algorithms that rely on
multiple sequential position determinations in order to estimate the speed vector of the
user. In such cases, two additional parameters have to be calculated: the Direction followed
by the user and his/hers Velocity. These parameters are generally expressed in degrees and
meters per second, respectively.
Scalability – The scalability is a desired and welcomed characteristic of a positioning
system. It represents the positioning system’s ability to readily respond to any
augmentation. The augmentation can be in terms of Coverage area, Availability, frequency
and total number of positioning requests, etc.
Complexity – There are many definitions for complexity depending on the domain of
application. Nevertheless, in terms of positioning systems, complexity is most often referred
to as the property that describes the difficulty of setting up the positioning system.
Cost effectiveness – This abstract characteristic of a positioning system is not entirely
independent of its other performance parameters (e.g. Complexity and Scalability).
600 Radio Communications
For example, the greater the Complexity of the system, the lower the Cost effectiveness. One
of the ways of describing it is as a ratio between the benefits it provides (how broad range of
LBSs it enables) and the costs it induces for the user.
As can be seen from the aforementioned, the latter three parameters don’t have
standardized units and are usually of descriptive nature.
The approaches and metrics used in order to obtain the user’s position are also worth
discussing. There are a few fundamental methods of acquiring the user’s location:
1) Based on the identification of “base station” to which the user is associated (Cell-ID or
Cell of Origin – COO) – This simple approach assumes that the estimated location of a user
is equal to the location of a “base station” to which the user is associated. In other words,
the user is estimated to be in a location of the “nearest” node of the network. This method is
used both in indoor and outdoor environments (GSM, UMTS). Its popularity, despite
inferior performances, is due to the simplicity of implementation. Obviously, the accuracy is
proportional to the density of the network nods.
2) Based on the time of signal arrival (Time of Arrival – TOA) – Being that the waves
(electromagnetic, light and sound) are propagating through the free space at constant speed,
it is possible to asses the distance between the transmitter and a receiver based on the time
that the wave propagates in-between those two points. This approach assumes that the
receiver is informed of the exact time of signal’s departure. Being that this is not always
easily accomplished, the alternative approach takes into account the time needed for signal
to propagate in both directions (Round Trip Time – RTT). This way, one station is
transmitting the predefined sequence. The other station, upon receiving the sequence, after
a strictly defined time interval (used for allowing the stations of different processing power
to process the received information), resends the sequence. The station that initially sent the
sequence can now, by subtracting the known interval of time that the signal was delayed at
second station from the measured time interval, asses the time that signal propagated to the
other station and back and, consequently, the distance between the stations. This approach
is less dificoult to implement than TOA, since it does not require the stations to be
synchronised.
3) The distance between the stations can be measured based on the differences in times of
signal arrival (Time Difference of Arrival – TDOA) – With this approach, the problem of
precisely synchronised time in transmitter and receiver is resolved by using several
receivers that are synchronised whereas the transceiver, whose location is being
determined, does not have to be synchronised with the receivers. Upon receipt of the
transmitted signal, a network node computes the differences in times of the signal’s arrival
at different receivers. Based on that calculation, the user’s location is determined as a cross
section of two or more hyperboles. Owing to that, these techniques are often referred to as
hyperbolic techniques.
4) Based on the signal’s angle of arrival (Angle of Arrival – AOA or Direction of Arrival –
DOA) – The idea, with this approach, is to have directional antennas which can detect the
angle of arrival of the signal with the maximal strength or coherent phase. This procedure
grants the spatial angle to a point where the signal originated (and whose location is
determined). Vice versa, the mobile terminal can determine the angle of arrival of the signal
from the known reference transmitters. Being that this approach is often implemented
through the use of antenna arrays, the latter approach can have significant impact on the
mobile terminal and is, therefore, less commonly exercised.
Positioning in Indoor Mobile Systems 601
5) Based on the received signal strength (Received Signal Strength Indication – RSSI) – The
free space signal propagation is characterised with predictable attenuation dependent on
the distance from the source. Moreover, in real conditions, the attenuation also largely
depends on the obstacles and the configuration of the propagation path. That is why there
are various mathematical models which describe the wave propagation for diverse
surroundings and, ultimately, estimate the signal attenuation for the observed environment.
This approach grants the distance of the entity whose position is being determined, to one
or more transmitters.
6) Based on the fingerprint of the location (Database Correlation or Location Fingerprinting)
– With this approach, the certain, location dependant, information is acquired in as many
Reference Points (RPs) across the coverage area of the technique. This data is stored into so
called Location Fingerprints Database. Afterwards, when the actual position determination
process takes place, the information gathered at the unknown location is compared with the
pre-stored data and the entity’s position is estimated at a location of a pre-stored fingerprint
from the database whose data are “closest” to the measured data.
Most often, the estimated position with TOA and RSSI approaches is determined by
lateration. The process of lateration consists of determining the position of the entity when
the distance between the entity and one or more points with identified positions (i.e.
refernce points) is known. To uniquely laterate the position in N-dimensional space, the
distances to N+1 reference points ought to be known. With TDOA approach, the estimated
position is obtained as a cross-section of two or more hyperbolas in two-dimensional space,
or three or more hyperbolic surfaces in case of three-dimensional space. The process of
angulation is employed with AOA and DOA approaches. This process estimates the
location of a user as a cross-section of at least two rays (half-lines) originating at known
locations. The lateration and angulation processes are depicted in Fig. 1. As for the Location
Fingerprinting approach, the estimated location is obtained by utilizing the correlation
algorithm of some sort. This algorithm determines, following a certain metric, the
“closeness” of the gathered data to the pre-stored samples from the location fingerprinting
database.
Apart from these, basic, approaches, there are a number of other choices and hybrid
techniques that combine the aforementioned approaches when determining the estimated
position of the user.
602 Radio Communications
a) b)
r2
r1
d
r3
Fig. 1. The processes of estimating a user location: a) Lateration and b) Angulation (Green
circles represent the known positions and the red cross stands for the estimated location)
The first group, which is known by the largest audience, is the “Satellite positioning” group.
This group relates to the positioning methods which are based on the use of orbiting
satellites, such as the GPS, Glonass or Galileo. Many applications and services based on
satellite positioning have been developed during the past years (e.g. in-vehicle navigation,
fleet management, tracking and tracing applications, etc). They generally require the use of
dedicated receivers. Today, more and more devices such as PDAs or mobile phones include
a satellite positioning capability, and this trend should persist in the future.
The second group, the “PLMN positioning” group, corresponds to the location techniques
which have been developed for public land mobile networks. Initially deployed in the US
under the pressure of the FCC mandate which forces US carriers to locate users placing calls
to the 911 emergency number, location technologies are now being implemented in most of
European wireless telecommunication networks for commercial purposes. Most of cellular
positioning methods are incorporated in mobile telecommunication standards
(2G/2.5G/3G/3.5G), but some solutions remain based on proprietary techniques.
The third and last group, the “Other positioning” group, corresponds to those technologies
which have not been developed specifically for positioning purposes, but that can be used,
in addition to their primary function, for determining user’s location. These technologies
encompass WLAN and Bluetooth for instance.
Another distinction can be made, depending on the “place” where the position calculation
is made. In some cases, the main processing is performed at the terminal level. In other
cases, the main processing is performed in the network. Therefore, the positioning
techniques can be classified into:
Network-based (also referred to as mobile-assisted), and
Terminal- or Mobile-based (also referred to as network-assisted).
Satellite technologies, as a rule, fit in the Terminal-based positioning techniques. As for the
positioning techniques from the PLMN and other groups, they can not be apriori associated
to either of the Terminal- or Network-based groups.
Finally, the positioning techniques can be classified according to the environment of their
coverage. Hence, the positioning techniques can be divided into:
Outdoor, and
Indoor.
Although there are intense research efforts to adopt the Satellite-based positioning
techniques for Indoor environment, thay are still considered to fit into Outdoor groop.
PLMN-based positioning can be implemented in both Indoor and Outdoor envornments,
whereas techniques from “Other” group usually fit Indoor environments.
Positioning techniques designed for a particular Indoor environment in most cases fit into
Relative positioning group.
Bearing in mind the ongoing convergence process of telecommunication systems and
numerous, newly developed, hybrid positioning techniques, the indoor/outdoor
categorization as well as other aforementioned classifications ought to be regarded more as
guidelines than as strict lines that divide techniques into disjoint sets.
accuracy is on the level of the room. These systems are commercially available for some
time now.
More sophisticated ultrasound positioning systems invoke the use of a greater number of
transmitters in each room as well as the use of RF (seldom IR) signals for precise
determining the time delay (Fraser, 2006). In this case, the controlling unit, which is
connected to all the ultrasound emitters in one room as well as with RF transmitter,
determines the exact time when each of the transmitters is about to send its chirps.
Commonly, the RF signal is emitted first and then the chirps from all ultrasound
transmitters are emitted separated by known time intervals. The receiver, knowing the
separating time intervals and the propagation speed of RF and ultrasound waves, can now
calculate, based on the time it received each of the chirps, the distance to each of the
ultrasound emitters. The position is then determined by lateration. Consequently, for three-
dimensional positioning at least four transmitters per room are required. The accuracy is in
range of 10cm in 90% of the cases.
Furthermore, the system that eliminates the need for RF transmitter has been developed
(McCarthy & Muller, 2003). With this system, the processing power of the receiver can be
reduced, and the whole system is less complex. The transmitters are cyclically emitting
chirps in constant time intervals whereas the receiver is employing an extended Kalman
filter for resolving the chirp transmission and receipt times.
Semi-active tags are equipped with battery power supply. Recent constructions
enable a battery life span of more than 10 years.
RFID devices can operate in different frequency bands: 100 – 500 kHz, 10 - 15 MHz, 850 –
900 MHz, and 2.4 – 5.8 GHz (Don Chon et al., 2004).
RFID positioning techniques are based on knowing the position of the reader. When the
tagged object enters the range of the reader, its position is assumed to be equal to the
position of the reader (similar to Cell-ID). Correspondingly, it is possible to deploy tags
across the coverage area. In that case the reader is mounted on the entity whose position is
being determined. The accuracy depends on the density of deployed objects (tags/readers)
across the coverage area. With active tags, the positioning accuracy can be upgraded with
the RSSI information.
Most common application areas of RFID technology are in replacing the barcode readers,
product tracking and management, personal documents identification, identification
implants for humans and animals, etc. It is interesting to mention that the latter
aforementioned application raises numerous ethical issues and there are organized groups
worldwide opposing the implementation of this technology.
positioning system uncertainty is increased as well, therefore the accuracy is worsened. The
improvement of accuracy can be achieved through communicating with more than one
Bluetooth nodes and possibly utilizing some of the aforementioned parameters (RSSI, Link
Quality, BER). Finally, the major application of Bluetooth technology is expected in ad-hoc
networks and the positioning techniques and LBS should be conceived and designed
accordingly.
Positioning with the use of RSSI parameter can be, in its essence, regarded as the path loss
estimation problem. The nature of the path loss prediction in an indoor environment is
extremely complex and dependent on a wide variety of assumptions (e.g. type of the
building, construction, materials, doors, windows, etc.)(Nešković et al, 2000). Even if these
basic parameters are known, precise estimation of the path loss remains a fairly complex
task.
Depending on the side on which the position calculation process takes place, positioning in
WLAN networks with the use of RSSI parameter can be either network-based or client-
based. Whereas the client-based solutions gather the RSSI vector from the radio-visible APs,
the network-based solutions have a central positioning engine which collects the client’s
signal strength vector from the APs and produces the position estimate. The network-based
solutions do not require clients to have a specific software installed which is of great essence
for security purposes. Moreover, the client does not need to be associated with the network
– the positioning can be done solely based on the probe requests the client sends (in case of
active scanning). Network-based solutions could also have an important advantage over the
client-based ones when used in WLAN networks employing the Automatic Radio
Management (ARM). This centralized mechanism is used to obtain the optimal radio
coverage by changing the channel assignment and adjusting the output power and/or
radiation pattern of the APs. Contrary to the client-based solutions, the network-based
positioning engine could take into account the changes made by ARM mechanism while
the ARM mechanism would present a setback for the client-based solutions. On the other
hand, client’s Network Interface Cards do not have to be consistent regarding the radiated
power which may, depending on the positioning algorithm used, present an analogue
problem for network-based solutions. In this work, for explanatory purposes, usually the
client-based solution will be presented. However, the reader should keep an open mind
towards the analogue network-based option.
Regarding the approach used to determine the user’s position, WLAN positioning
techniques can be categorised as: propagation model based, fingerprinting based or hybrid.
Propagation model based techniques rely on statistically derived mathematical expressions
that relate the distance of an AP with the client’s received signal strength. The estimated
position of the user is then obtained by lateration. Therefore, if there are less than three
radio-visible APs (for two-dimensional positioning) the estimated user’s position is
ambiguous. Also, the model derived for one specific indoor environment is usually not
applicable to other indoor environments.
Fingerprinting techniques are most commonly used for WLAN positioning. They are
conducted in two phases: the off-line or training phase, and the on-line or positioning
phase. The off-line phase comprises collecting the RSSI vectors from various APs and
storing them, along with the position of the measurement, into a fingerprinting database. In
the on-line phase, the estimate of the user’s position is determined by “comparing the
likeliness” of the RSSI vector measured during the on-line phase with the previously stored
vectors in the database. The fingerprinting process is shown in Fig. 2. These techniques have
yielded better performance than other positioning techniques, but are believed to have a
longer set-up time.
Positioning in Indoor Mobile Systems 609
a) measurement
location fingerprint database
b)
(?,?) RSSI1,RSSI2,... algorithm (x,y)
user (client) at unknown position user’s location
Fig. 2. Two phases of positioning: a) training phase – mobile client is recording RSSI vectors
across RPs and stores them in fingerprint database, and b) positioning phase – based on the
measured RSSI vector and database access, the algorithm estimates the user’s location
Hybrid techniques combine features from both propagation modelling and fingerprinting
approaches, opting for better performances than propagation model techniques and shorter
set-up time than fingerprinting techniques (Wang & Jia, 2007).
The prospects of using RSSI parameter for indoor positioning were first systematically
analysed in “RADAR” (Bahl & Padmanabhan, 2000). According to this research, it is better
to use RSSI than SNR (Signal to Noise Ratio) for positioning purposes since the RSSI
parameter is much more dependent on the client’s position than SNR. Two algorithms to
establish the user’s location were proposed. The first one is the Nearest Neighbour (NN)
algorithm which compares the RSSI vector of a mobile client against the RSSI vectors
previously stored in the fingerprinting base. An extension to the proposed algorithm was
also considered: the estimated location is not identified as only one RP whose RSSI vector is
closest to the observed RSSI vector, but calculated as a “middle” point of kclosest RPs (kNN
algorithm). This analysis has shown that algorithm performance improved for k= 2 and k=
3. For larger k, the performance had started to decrease. The second algorithm is based on a
simple propagation model with Rician distribution assumed. It ought to be emphasized that
both approaches require a minimum of three radio visible access points (APs). The
measuring campaign comprised 70 RPs. At each RP measurements were made for four
orientations of the receiver, and each measurement was averaged from 20 samples.
To produce the maximum amount of information from the received RSSI vectors, the
Bayesian approach was proposed (Li et al., 2006). This concept yields better results than the
NN algorithm. The Bayes rule can be written as:
p l |o
t t
p ot | lt p lt N (1)
where ltis location at time t,otis the observed RSSI vector at time t, whileN is a normalizing
factor that enables the sum of all probabilities to be equal to 1. In other words, at a given
610 Radio Communications
time t, the probability that a client is at locationlt, if the received RSSI vector is ot, is equal to
the product of the probability to observe RSSI vector otat location ltand the probability that
the client can be found at location lt. The process of estimating client’s location is based on
calculating the conditional probability p lt |ot for each RP. The estimated client’s location is
equal to the RP with the greatest conditional probability. To accomplish this task, two terms
on the right hand side of Eq. (1) ought to be calculated. The first term, also referred to as the
likelihood function, can be calculated based on the RSSI map (for all RP) using any
approach that will yield probability density function of observation otfor all RPs. As for the
a priori probability p lt , it ought to be calculated according to the client’s habits. However,
for most cases the assumption of uniform distribution across all RPs is valid. The
measurements were made at 70 RPs. As with the previously discussed techniques, the
measurements were made for four orientations of a receiver, and each measurement was
averaged from 20 samples.
Another project, named Horus (Youssef & Agrawala, 2005; Eckert, 2005), had the goal of
providing high positioning accuracy with low computational demands. This is also a
probabilistic approach in which time series of the received signal strength are modelled
using Gaussian distributions. Due to the time dependence of the signal strength from an
observed AP, the authors of this project have shown that the time autocorrelation between
the time adjacent samples of signal strength can be as high as 0.9. To describe and benefit
from such behaviour, they have suggested the following autoregressive model:
s s 1 , 0 1 (2)
t t 1 t
where t is the noise process and st is a stationary array of samples from the observed AP.
Throughout the off-line phase, the value of parameter a is assessed at each RP and stored
into the database along with Gaussian distribution parameters m and s . In the on-line
phase, Gaussian distribution is modified according to the corresponding values of a
retrieved from the fingerprinting database. Alike to the kNN algorithm, the Horus system
estimates the client’s location as a weight centre of kRPs with the highest probabilities. The
principal difference to the kNN algorithm is that, in case of Horus system, the kmost likely
RP are multiplied with their corresponding probabilities. For verification purposes, the
authors made measurements at 612 RPs, and each measurement was averaged from 110
samples.
More relevant information about the statistical modelling approach towards location
estimation can be found in (Roos et al., 2002) and in the references found therein.
Battiti et al. (2002) were the first to consider using Artificial Neural Networks (ANNs) for
positioning in WLAN networks. This approach does not insist upon a detailed knowledge
of the indoor structure, propagation characteristics, or the position of APs. A multilayer
feedforward network with two layers and one-step secant training function was used. The
number of units in the hidden layer was varied. No degradation in performance was
observed when the number of units grew above the optimal number. For verification
purposes, measurements were made at 56 RPs, and each measurement was averaged from
100 samples.
In most studies, WLAN positioning techniques are compared on the subject of their
accuracy while other attributes of a positioning technique such as latency, scalability, and
Positioning in Indoor Mobile Systems 611
complexity are neglected. Another aspect that is seldom analyzed is size of the environment
in which the technique is implemented.
It also ought to be pointed out that averaging the RSSI vectors in the on-line phase has an
immense impact on the technique’s latency, so the scope of location based services that
could be utilized with such techniques is significantly narrowed. Moreover, bearing in mind
that all presented approaches require at least three radio-visible APs in each RP (which is
seldom the case in most WLAN installations), feasibility of sound frequency planning is
uncertain. Consequently, the degradation of packet data services is inevitable with respect
to positioning in larger indoor areas (i.e. large number of APs is required). Enabling the
radio-visibility of three APs across the indoor environment is usually constructively
irrational and economically unjustified. Hence, the presented techniques cannot be applied
to the majority of existing WLAN networks optimized for packet data services.
Finally, there are other studies that accompany the research for sophisticated positioning in
WLAN networks. Other relevant research efforts comprise the impact of Network Interface
Card on the RSSI parameter, compensation of small-scale variations of RSSI, clustering of
locations to reduce the computational cost of positioning, use of spatial and frequency
diversity, methods for generating a larger location fingerprinting database by interpolation,
and unequal fusing of RSSI from different APs (Kaemarungsi, 2006; Youssef & Agrawala,
2003; Ramachandran & Jagannathan, 2007; Li et al., 2005; Zhang et al.,2008).
process. However, being aware of the fact that these procedures can be complex and that
determining the most optimal structure was not the central scope of this research, we
intentionally slightly oversized our network’s inner structure knowing that an oversized
network will not yield degradation in performance. We also adopted that the first hidden
layer ought to have more perceptrons than the input layer so that the input information is
quantified and fragmented into smaller pieces (Shang & Wah, 1996). The number of
perceptrons in the following hidden layers ought to decrease, converging to the number of
perceptrons in the output layer. Bearing that in mind, the chosen structure for single ANN
(type 1) approach consisted of the input layer, three hidden layers and the output layer. The
number of perceptrons per layer was (from input to output) 8-15-9-5-2.
When utilizing space partitioning, the positioning process is split into two stages where
each stage could be implemented with the most suitable model. In this case, the two-step
space partitioning is implemented utilizing cascade-connected ANNs. The block scheme of
this system is shown in Fig. 2.
8 8 2 2
8 No. of
SubSps (n) 8 2
8 2
In the first stage, an ANN (type 2) is used to determine the likeliness of a measured RSSI
vector belonging to one of the subspaces. This ANN (type 2) has 8 inputs and the number of
outputs is equal to the number of subspaces the environment is partitioned to. Each output
corresponds to the likeliness that a received RSSI vector originates from a particular
subspace. The outputs of the type 2 ANN, SubSp Ln, are connected to the Forwarding
block which, depending on the inputs, employs only one of the second stage networks by
forwarding the APs RSSI vector.
The inner structure of ANN (type 2) is designed using the same guidelines as with the
single ANN model. Therefore, it also has three hidden layers and the number of perceptron
units in those layers is varied to fit the different number of subspaces. The second stage
ANNs are type 1 networks with structure identical to the previously described ANN used
with the single ANN approach.
In the off-line phase, type 2 ANN is trained with the fingerprinting database that originates
from the whole environment. The targeted output vector has only one non-zero element
(equal to 1). The index of that element corresponds to the number of the subspace from which
the RSSI vector originates. Type 1 networks are trained following the training methodology
from the single ANN approach with the only difference being that each type 1 ANN is trained
with only the part of the fingerprinting database which originates from a particular subspace.
Positioning in Indoor Mobile Systems 613
In the on-line phase, the first stage ANN estimates the likeliness that the received RSSI vector
originates from a particular subspace. The Forwarding block then determines the most likely
subspace by searching for the maximum value in the output vector from the ANN (type 2)
and forwards the APs RSSI vector only to the second stage ANN that correspond to that
subspace. The appropriate second stage ANN then determines the estimated position of the
user and, finally, the collecting block forwards that estimate to the structure output.
Several space separation patterns were chosen yielding a different number of subspaces ranging
from 4 to 44. The space partitioning patterns that have been employed are shown in Fig. 3.
a) b) c)
d) e) f)
g) h) i)
Fig. 3. Space partitioning patterns: a) no space partitioning (1x1), b) 2x2, c) 2x3, d) 2x4, e)
3x4, f) 4x6, g) x24, h) x32, and i) x44
The partitions with a smaller number of subspaces were made on geometrical bases.
However, with the increase in the number of subspaces, the subspace size decreased until it
came to a room size level. It was then worth to consider partitioning space in an other
manner. Starting with 24 subspaces (which was also portioned on geometrical bases), the
partitions were made on “logical” bases (i.e. x24, x32 and x44). This logical separation opted
for subspaces to be as homogeneous in the propagation manner as possible (e.g.
partitioning was made trough walls wherever possible). Note, the single ANN model is
herein referred to as 1x1 partitioning.
For the purpose of determining the optimal training parameters, as well as the optimal
training duration, the complete set of measurements was split into two subsets. The larger
subset was used to train the ANNs, while the smaller, containing measurements from a 100
randomly chosen RPs, was used to validate the obtained models.
The results obtained for different space partition patterns, for optimally trained ANNs, are
presented in Table 1.
From Table 1, it can be seen that, with geometrical partitioning, the overall median and
average distance errors decrease with the increase in number of subspaces. This behaviour
is even more emphasized with the distance errors in the correctly chosen subspace which
confirms the influence of environment size on positioning accuracy. When concerning the
logical partitioning, slightly better results are obtained for 24 subspaces (4x6 vs. x24) but,
with the further increase in the number of subspaces, the average distance error is starting
to rise again. Also, with the increase in the number of subspaces the probability of correct
614 Radio Communications
subspace being chosen declines as expected while the probability of correct room estimation
rises from 26% for a 1x1 positioning to as much as 66% for a x24 configuration, after which
it starts declining a little.
Pattern 1x1 2x2 2x3 2x4 3x4 4x6 x24 x32 x44
Overall Average DEa [m] 9.26 9.00 8.97 8.91 8.54 8.28 8.14 8.58 9.11
Overall Median DEa [m] 7.75 7.49 6.87 5.86 5.59 5.10 4.57 4.70 4.44
Average DEa in ISb [m] - 21.3 22.7 21.2 19.0 18.0 18.4 19.5 19.2
Median DEa in ISb [m] - 15.4 17.4 15.3 16.3 14.7 17.5 15.8 16.1
Average DEa in CSc [m] 9.26 8.35 6.99 6.96 5.76 4.20 4.07 3.78 3.72
Median DEa in CSc [m] 7.75 7.33 6.13 5.52 4.40 3.87 3.56 3.39 3.32
Probability of CSEd 1.00 0.95 0.87 0.86 0.79 0.71 0.72 0.69 0.65
Probability of CREe 0.26 0.42 0.48 0.52 0.58 0.62 0.66 0.62 0.61
a Distance Error, b Incorrect Subspace, c Correct Subspace , d Correct Subspace
Estimation, e Correct Room Estimation
Table 1. Performance overview for different partitioning patterns
To better understand and discuss the performances of cascade-connected ANNs with space
partitioning, we observed and compared the distance error’s Cumulative Distribution
Function (CDF) of a single ANN approach with the cascade-connected ANNs. Fig. 4. shows
the obtained CDFs for representative space partitioning patterns.
a) b)
90 90
1x1 1x1
80 2x2 80 2x3
2x2H 2x3H
70 70
60 1x1 60
CDF [%]
CDF [%]
2x2
50 2x2 H 50
2x3
2x3 H
40 40
2x4
2x4 H
30 30
3x4
3x4 H
20 20
10 10
0 5 10 15 20 25 0 5 10 15 20 25
c) d)
Distance Error [m] Distance Error [m]
90 90
80 1x1 80 1x1
2x4 3x4
2x4H 3x4H
70 70
60 60
CDF [%]
CDF [%]
50 50
40 40
30 30
20 20
10 10
0 5 10 15 20 25 0 5 10 15 20 25
Distance Error [m] Distance Error [m]
Positioning in Indoor Mobile Systems 615
e) f)
90 90
80 1x1 80 1x1
4x6 x24
4x6H x24H
70 70
60 60
CDF [%]
CDF [%]
50 50
40 40
30 30
20 20
10 10
0 5 10 15 20 25 0 5 10 15 20 25
g) Distance Error [m]
h) Distance Error [m]
1x1 1x1
x32 x44
x32H x44H
Fig. 4. Cumulative Distribution Function of distance error: a) 1x1and 2x2 partitioning and
correct subspace estimation – 2x2 H; b) 1x1and 2x3 partitioning and correct subspace
estimation – 2x3 H; c) 1x1and 2x4 partitioning and correct subspace estimation – 2x4 H; d)
1x1and 3x4 partitioning and correct subspace estimation – 3x4 H; e) 1x1and 4x6 partitioning
and correct subspace estimation – 4x6 H; f) 1x1and x24 partitioning and correct subspace
estimation – x24 H; g) 1x1and x32 partitioning and correct subspace estimation – x32 H; h)
1x1and x44 partitioning and correct subspace estimation – x44 H
The green filled areas on Fig. 4. could be considered as a partitioning gain in comparison to
1x1 positioning, while the red filled areas could be considered as partitioning loss. It can be
seen that, with geometrical partitioning, Fig. 4. a) – e), the gain areas are increasing with the
increase in the number of subspaces. When concerning logical space partitioning Fig. 4 f) –
h), it can be noticed that the best performances are obtained with x24 pattern – average
distance error 8.14m, median error 4.57m. With the further increase in the number of
subspaces, the benefit of decreasing the median error has faded, even though the median
error in correct subspace continues to decrease, whereas the average distance error is
starting to rise again due to the augmentation in probability of incorrectly chosen subspace.
In other words, with the further increase in the number of subspaces, the partitioning gain
surfaces are still expanding however, the partitioning loss surfaces are rising as well.
Furthermore, it should be noticed that with the increase in the number of subspaces, the
CDF is starting to create a knee roughly around 60th percentile. This has two effects: the
green surfaces are getting larger as discussed and the crossing angle between the space
616 Radio Communications
partitioning model and 1x1 positioning is increasing while the crossing point between the
two is being pushed towards lower percentiles. The latter of the two effects has a negative
impact on positioning performances.
Finally, if the Average DE in correct subspace, from Table 1, is compared with the average
subspace area (the total area size divided by the number of subspaces), it can be seen that
with the increase in size of the subspaces the increase in average error is getting saturated.
So, given the constant RPs and APs density, the further increase in size of the test bed
should induce only the minor rise of the DE. This also goes to say that the chosen
verification environment was large enough to comprehensively explore the influence of the
test bed size on positioning accuracy.
7. References
Bahl, P. & Padmanabhan, V. (2000). „Radar: An in-building RF_based user location and
tracking system“, Proceedings of the IEEE Infocom 2000, Tel-Aviv, Israel, vol. 2,
Mar. 2000, pp. 775-784.
Battiti, R., Nhat, T. L., Villani, A. (2002). Location-aware Computing: A Neural Network
Model For Determining Location in Wireless LANs. Technical Report # DIT-02-
0083 (Feb. 2002)
Bluetooth Special Interest Group (2001). Specification Volume 1, Specification of the
Bluetooth System, Core. Version 1.1, February 22, 2001.
Bluetooth Special Interest Group (2001). Specification Volume 2, Specification of the
Bluetooth System, Profiles. Version 1.1, February 22, 2001.
Hae Don Chon, Sibum Jun, Heejae Jung, Sang Won An, (2004). „Using RFID for Accurate
Positioning“, Journal of Global Positioning Systems, 2004, Vol. 3, No. 1-2: 32-39
Collomb Frédéric, (2002). Location Service Study Report (Loc_Serv_Study_Rep_PU.doc),
Mobile and Vehicles Enhanced Services, 2002.
Eckert, K. (2005). Overview of Wireless LAN based Indoor Positioning Systems, Mobile
Bussines Seminar, University of Mannheim, Germany, (2005)
Eltaher A., Kaiser T., (2005). „A Novel Approach based on UWB Beamforming for Indoor
Positioning in None-Line-of-Sight Environments“, RadioTeCc, October 26-27, 2005,
Berlin, Germany.
Esko O. Dijk, (2004). „Indoor ultrasonic position estimation using a single base station“,
Technische Universiteit Eindhoven, 2004. October 6, 2004, p44-45
Fahlman, S., Lebiere, C. (1990). The cascade-correlation learning architecture. Advances in
Neural Information Processing Systems 2, pp. 524–532 (1990)
Fraser M., (2006). „Mobile and Ubiquitous Computing: Sensing Location Indoors.“,
COMSM0106, 2006.
Hallberg, Nilsson, Synnes, (2003). „Positioning with Bluetooth“, Telecommunications, 2003.
ICT 2003. 10th International Conference on, Volume 2, Issue , 23 Feb.-1 March 2003
Page(s): 954 - 958 vol.2
Harmer D., (2004).„Ultra Wide-Band (UWB) Indoor Positioning“, Thales Research and
Technology UK Ltd. ARTES 4 Project. ESTEC December 2004.
Hasoun H. M. (1995). Fundamentals of Artificial Neural Networks. Massachusetts Institute
of Technology (1995)
Positioning in Indoor Mobile Systems 617
Sayrafian-Pour, K., Kaspar, D. (2005). Indoor positioning using spatial power spectrum.
IEEE PIMRC 2005. Volume: 4, pp. 2722- 2726 (Sept. 2005)
Shang Y., Wah W. B. (1996). Global Optimization for Neural Network Training, IEEE
Computer Society, pp. 45-56 (March 1996)
Thapa K., Case S., (2003). „An indoor positioning service for Bluetooth Ad Hoc networks“,
in: MICS 2003, Duluth, MN, USA.
Wang, H., Jia, F. (2007). A Hybrid Modeling for WLAN Positioning System. International
Conference on Wireless Communications, Networking and Mobile Computing,
2007. pp.2152 - 2155 (Sept. 2007)
Youssef, M., Agrawala, A. (2005). The Horus WLAN Location Determination System. Int.
Conf. on Mobile Systems, Applications And Services, pp.205–218 (2005)
Youssef, M., Agrawala, A. (2003). Small-scale compensation for WLAN location
determination systems. Wireless Communications and Networking, 2003. Volume
3, 20-20 pp.1974 – 1978 (March 2003)
Youssef, M.A., Agrawala, A., Shankar, A. U. (2003). WLAN location determination via
clustering and probability distributions. Proceedings of the First IEEE International
Conference on Pervasive Computing and Communications. pp.143 – 150 (March
2003)
Zhang, M., Zhang, S., Cao, J. (2008). Fusing Received Signal Strength from Multiple Access
Points for WLAN User Location Estimation. International Conference on Internet
Computing in Science and Engineering, 2008. pp.173 - 180 (Jan. 2008)
Location in Ad Hoc Networks 619
1. Introduction
An adhoc 1 network is defined as a decentralised wireless network that is set up on-the-fly for
a specific purpose. These networks were proposed years ago for military use, with the
purpose of communicating devices in a highly constrained scenario. Under such a network,
devices join and leave the network dynamically; thus, it cannot be expected to have any
kind of network infrastructure. This wish for decentralised on-the-fly networks has
subsequently expanded to cover several fields besides the military. Today, there are several
mobile services requiring the self-organising capabilities that ad hoc networks offer.
Examples include packet tracking, online-gaming, and measuring systems, among others.
Ad hoc networks have obvious benefits for mobile services, but they also introduce new
issues that regular network protocols cannot cope with, including optimum routing,
network fragmentation, reduced calculation power, energy-constrained terminals, etc.
In ad hoc networks, positioning takes a significant role, mainly due to the on-the-fly
condition. In fact, several services require nodes to know the position of the customers in
order to perform their duty properly. Wireless sensor networks concentrate most of the
services that need positioning to perform their duty. Such networks constitute a subset of ad
hoc networks involving dense topologies operating in an ad hoc fashion, and they are
composed of small, energy and computation constrained terminals. In ad hoc networks, and
especially in wireless sensor networks, nodes are spread over a certain area without a
precise knowledge about the topology. In fact, this topology is variable. Accordingly, there
are several unknowns (e.g., node density and coverage, network’s energy map, the presence
of shadowed zones, nodes’ placement in the network coverage area) that are likely to
constrain the performance of ad hoc services. Knowledge of the terminals’ locations can
substantially improve the service performance.
Positioning is not only important for the service provisioning; it is also crucial in the ad hoc
protocol stack development. Due to the changes in the topology and the lack of
communication infrastructure, ad hoc protocols have to address several issues not present in
regular cellular networks. Routing is one of the best examples of the dependence of ad hoc
networks on positioning. Studies such as (Stojmenovic, 2002) demonstrate that only
position-based routing protocols are scalable, i.e., able to cope with a higher density of
1 "Ad hoc" is actually a Latin phrase that means "to this (thing, purpose, end, etc.)"
620 Radio Communications
nodes in the network. The same seems to apply to other management and operation tasks in
ad hoc networks.
1.2.1 Accuracy
Ad hoc positioning requires good accuracy since most of the networks in ad hoc mode are
deployed in constrained scenarios, often indoors. In such environments, accuracy is
especially relevant, since a few meters of error in the position may cause the node to be
identified in another room, floor, or even building. Furthermore, nodes are expected to be
very close (e.g., in medical applications), and inaccurate positions could hinder operation
and maintenance tasks or even prevent location-based applications from performing their
duty. Thus, location algorithms for ad hoc networks must produce positions for settled
nodes of the highest possible accuracy.
1.2.2 Latency
The location solutions must be able to converge, i.e., to produce as many settled nodes as
possible in the shortest time. Ideally, the location solutions for ad hoc networks should turn
all the unknown nodes into settled nodes in a defined time. However, optimality in terms of
accuracy (and many other factors) may collide with latency, which means that the
convergence (and hence the latency) of the location solution depends on the accuracy
requested, among many other factors. Latency is also modulated by the mobility of the
nodes in the network. The faster the nodes move, the shorter the convergence period needs
to be. It must be noted that, in the case that convergence is not achieved, estimated positions
would not involve the actual location of nodes, and this lack of accuracy would be spread by
Location in Ad Hoc Networks 621
the network according to the location algorithm used. Hence, it would degrade the accuracy
of the location solution.
1.2.7 Scalability
The algorithm should minimise the impact of adding a new terminal to the network. This
means that the amount of resources consumed by the network due to the addition of the
new node should be as low as possible. Scalability does not necessarily involve the use of
simple algorithms. However, it should allow as many ad hoc devices as possible to be
positioned with the same amount of resources.
2. Location metrics
There are several metrics than can be used as input for location techniques. Those metrics
are usually known as observables, since they refer to what can be observed and
subsequently measured. Timestamps, angles, and signal strength are metrics commonly
used by location techniques to compute the position of the nodes. The former usually
involves timestamps for the sending and receiving moments associated with one or several
signals. Precision of timestamps directly depends on the clock present in the ad hoc devices.
These clocks are usually low-profiled, mainly due to the small form-factor and the cost of
devices. Consequently, this impacts the accuracy of the time-based observables and
ultimately the positions fixed by the location solution. Furthermore, accessing the hardware
clock is rather difficult in most of the current devices and technologies. The same does not
apply to signal strength, which is usually available in most of the ad hoc technologies.
Consequently, there are several location techniques that use this metric for positioning.
Furthermore, this metric provides accurate observables, even though it does not mean that
positions computed from these observables achieve the same degree of accuracy.
Finally, angular information is proposed for positioning in several solutions. This metric
consists of measuring the angle or direction of arrival (AoA / DoA) of signals coming from
several nodes to the target one, or vice versa. Fig. 1 illustrates this metric, where the red-
coloured angles (i.e., ˘ 1 and ˘ 2 ) stand for the error produced in the angle-of-arrival estimate.
y i y jk
k tan 1 , (1)
x i x jk
where (x i, y i) is the position (in two dimensions) of the node to be positioned and (x jk ) is
, y jk
the position (in two dimensions) of the landmark k.
The use of this metric involves using arrays of antennas in order to capture the angle in
which the signal is being received. Furthermore, the positioning error derived from the
angle-estimation error depends on the distance between the pair of entities involved in the
angle estimation. Consequently, this metric is rarely used; the hardware is costly, the error is
range-dependent, and this metric often involves the customisation of network equipment.
3. Location techniques
Ad hoc networks use a subset of the location techniques proposed for other cellular
technologies (e.g., UMTS, IEEE 802.11, etc.). These techniques can be classified into two
main groups: ranging-based and angle-based. The following sections describe the
techniques in detail.
where P rx and P txare, respectively, the received and transmitted power in dB(m), P m1 stands for
the losses at 1 meter from the transmitter location, d is the distance in meters between the
transmitter and receiver placements (i.e., the ranging), and ´ is the path-loss gradient (or slope).
Modelling the radio path losses, such as those in Equation (2), is a difficult task. Obstacles in
the propagation path affect the signal in several ways, namely, reflection, diffraction, and
absorption. The consequence is that signals reach the receiver following more than a single
path (a phenomenon known as multi-path), and, consequently, the received signal strength
suffers random variations. Accordingly, different radio path models are proposed
depending on the scenario in which the network is going to be deployed. However, the
propagation conditions are likely to change (even dramatically) with time as new obstacles
appear. Hence, such models would need to be recalibrated periodically (constantly in the
624 Radio Communications
worst case). Indoors is one of the most constrained scenarios, and, consequently, most of the
location solutions based on signal strength ranging are proposed for such an environment.
An example of a radio propagation model used in location is proposed in (Seidel & Rapport,
1992), where the free space model was adapted to indoor environments by adding several
parameters, such as the number of floors in the path or the number of walls. However, it is
demonstrated not to be a satisfactory approach since the number of obstacles is not known a
priori. Other approaches tried to improve radio signal propagation models for indoors
(Wang et al., 2003; Lassabe et al., 2005), but accurate distance estimates are not yet available.
Despite all these issues, several proposals are available for signal ranging. One of the first
approaches was presented in (Bahl & Padmanabhan, 2000), where several models
specifically addressed to ranging-based location solutions were proposed and tested
experimentally. Due to the randomness of the received signal, poor results were obtained with
all models, if compared with other location techniques based on signal fingerprinting. Better
results are reported in (Kotanen et al., 2003), where the authors propose processing the signal-
strength observables prior to position computation. This previous stage aims to reduce the
noise of the measurements so that more accurate positions can be fixed. Furthermore, an
extended Kalman filter is used to compute the position, which minimises the variance of the
distance estimation. This solution provides accuracy figures of less than three metres, even
though worse results are expected under arbitrary propagation conditions.
d c· t tx
rx t (3)
to compute the distance, where c stands for the propagation time (usually the speed of
light). Equation (3) can only be applied if timestamps are taken under the same time line,
i.e., when all nodes in the network are time-synchronised. However, this is not the normal
case. Thus, the 2-way time-of-arrival approach was proposed to overcome this issue. This
approach computes the propagation time under a round-trip-time approach, i.e., measuring
the time spent by the signal in travelling the forward (Node1 to Node2 ) and backward (Node
2 to Node1 ) paths. Fig. 2 illustrates this procedure, which is explained in detail in (Ciurana et
al., 2007). Since all timestamps are taken using the same clock (in Node 1), propagation time
(Tprop) can be computed as half the time meas ured for both paths (RTT), as long as
processing time (Tproc ) is negligible (or calibrated). The position of the target node (i.e., the
one to be located) can be computed by multilateration once enough measurements are
achieved (e.g., 3 or more for 2D positioning). The accuracy of time of arrival directly
depends on the precision of the time estimations. Accordingly, there are several works
addressing improvements in the accuracy of time of arrival observables.
Location in Ad Hoc Networks 625
Some examples can be found in (Ibraheem & Schoebel, 2007) and (Reddy & Chandra, 2007),
which present approaches improving the traditional correlation-based methods.
Time-difference of arrival consists of observing ranging differences, rather than just
observing distances. Therefore, the node that is going to be positioned measures the ranging
difference between its position and the position of a pair of landmarks (or even settled
nodes). Time difference of arrival is also known as hyperbolic multilateration, since it
superposes several hyperbolas in order to fix the node’s position. It provides better accuracy
than time of arrival and hence is preferred in cellular networks (3GPP, 2002; 3GPP, 2004).
However, time-difference solutions present the same issue as time of arrival: nodes have to
be time-synchronised. Furthermore, the 2-way approach cannot easily be applied to the
time-difference of arrival technique, and hence synchronisation error has to be estimated (by
means of specific measurement devices) or removed (taking the location measurements with
a common clock).
yi y jk
x i x jktan k , (4)
where ´ k is computed according to Equation (1). There are several (and more complex)
proposals based on numerical approach and closed forms to carry out positioning with
angulation, as presented in (Pages-Zamora et al., 2002).
626 Radio Communications
4. Location algorithms
Local positioning has been widely addressed for cellular networks, and the main methods
and procedures remain valid for ad hoc networks. Hence, positioning algorithms draw the
greatest amount of interest from the research community for location in ad hoc networks.
information of all nodes that can be reached from the node in a certain number of hops,
usually two. Muti-hop techniques allow more accurate positions to be computed and fewer
beacon nodes to be deployed in the system (Savvides et al., 2001). The main drawbacks are
the overhead generated by the multi-hop estimation and the subsequent use of additional
resources in the nodes to store such data.
j i
x i
x j2 y i y
j
2
ci , (5)
h
j i j
Location in Ad Hoc Networks 629
where ci indicates the hop distance calculated by the landmark i, (x,y,z) are the coordinates
of a landmark and hjstands for the amount of hops from landmark ito j .
This average (i.e., ci) is then flooded in the network using a singleton approach: once a node
receives an announcement packet from a landmark containing the average value computed
by such a landmark, it discards any other further announcement packet. The average
distance is then stored in the nodes, which then use it to turn distances in hops into real
ranges. Finally, nodes compute their position using a multilateration approach. The
advantage of this approach is that it is insensitive to the ranging error, since ranging is
based on hop counting. However, it introduces more overhead than other algorithms.
Moreover, accuracy is degraded in non-dense networks.
The DV-distance approach is similar to DV-Hop but exchanges real distances instead of
distances in hops. Multi-hop distances are computed as the sum of the distances between
nodes involved in the path. Thus, this approach becomes more sensitive to ranging error.
Normally, the denser the ad hoc network is, the better the accuracy. On the other hand, it
improves the consistency of the DV-Hop approach, working similarly in isotropic and non-
isotropic networks.
The Euclidean approach involves a multi-hop algorithm, which gathers ranging information
up to 2 hops. Thus, the algorithm generates quadrilaterals involving one unknown node,
two neighbours, and a landmark, and it infers the distance from the node to the landmark
using trigonometric formulation. The advantage of this approach is that the ranging error
can be estimated, stored, and subsequently flooded together with the distance; this allows
distance-weighted approaches to be used and hence more accurate positions to be achieved.
The main drawback is that a 2-hop approach involves additional traffic in the network (even
more than in DV-Hop and DV-Distance algorithms) as well as more resources needed in the
node to store the additional information, resulting in more quickly depleting node batteries
running.
The last approach presented in (Niculescu & Nath, 2003) is the so-called DV-Coordinate ,
which is similar to the solution proposed in (Capkun et al., 2001). DV-Coordinate is based
on each node computing the position of its neighbourhood according to a local coordinate-
system. Then in a second step, called the registration stage, nodes exchange information to
build the transformation matrices, which allow coordinates of local systems to be
transformed from one local system to another. A global transformation matrix is necessary
to achieve global coherence. DV-Coordinate performs almost the same as Euclidean.
However, this approach impacts the scalability of the location system, since it depends on
the square of the nodes in the network and involves sending two pieces of data instead of
just a distance. In (Niculescu & Nath, 2003/2), the authors extend DV-Coordinate and
presented the Local Positioning System LPS) ( , which uses ranging and angle of arrival
information to compute the position of unknown nodes, in a fashion similar to the DV-
Coordinate. However, the LPS reduces the overhead of the DV-Coordinate systems, thus
improving the scalability and updating only a reduced number of nodes each time, not the
whole network.
The Amorphous Localisation algorithm (Nagpal et al., 2003) is similar to APS. It consists of
computing the distance from nodes to beacons in terms of hops. However, the hop-distance
is calculated offline according to the node density expected in the network. Then, a
multilateration approach is followed to compute the position. The main drawback of this
630 Radio Communications
algorithm is the offline stage, which seriously constrains the scalability of the algorithm in
dynamic ad hoc networks.
A one-hop range-based concurrent pure-distributed algorithm is proposed in (Fu et al.,
2006) for networks based on DSSS, such as those based on IEEE 802.11. This algorithm is
based on propagating the clock from node to node so that the nodes involved in the
positioning work in a synchronised fashion. Then the ranging to neighbour nodes is
estimated, and a multilateration algorithm is applied. The synchronisation is achieved by
means of the pseudo-noise code used in the DSSS, and, consequently, the time-resolution
achieved matches with the code duration. Accordingly, the algorithm only works if times-
of-flight are much longer than the code duration, which is expected to be the usual case.
The Approximation of the Point- -Triangulation
In Testis presented in (He et al., 2003) as
(APIT)
another example of a one-hop range-based location algorithm. It is based on generating as
many triangles as possible involving three beacons. Then, the APIT algorithm evaluates
whether the unknown node is inside each triangle. Finally, it overlaps all the triangles,
reducing the final positioning error. The authors evaluate the algorithm through simulation
and conclude that this approach outperforms the centroid algorithm. Furthermore, this
approach achieves accuracy figures similar to those obtained in the APS and Amorphous
Localisation algorithms but requiring a lower node density and introducing less overhead.
On the other hand, it requires beacons with a radio range longer than that of regular nodes.
All these approaches to the ad hoc location rely on active multilateration; i.e., positioning an
unknown node involves a certain amount of location traffic in order to estimate the
distances to landmarks. Active location constrains the scalability of location algorithms in ad
hoc networks, in which topology and mobility are inherent to the network definition. The
next sections introduce a passive algorithm for location in collaborative networks (e.g., ad
hoc, wireless sensor networks, etc.), which aims to boost the scalability on positioning
systems.
5. Passive positioning
Recent advances in indoor positioning have led to proposals that time-of-arrival (TOA)
techniques for locating users are preferable to other techniques, such as fingerprinting.
Time-of-arrival solutions achieve accuracy figures that are similar to those obtained by other
techniques, but they do not require additional assistance for setup and maintenance.
Conversely, time-of-arrival techniques need to calculate a client’s range from at least three
receivers at known positions in order to obtain a 2D position. In addition, all the signal
transmitters involved in the TOA positioning system must be synchronised. Two-way TOA
techniques, such as those presented in (Ciurana et al., 2007) and (Yang et al., 2008), cope
with this issue by computing the range from the client (i.e., unknown node) to the base
station (i.e., landmark) using a round-trip-time (RTT) procedure. Since only the client's clock
is used to calculate the range, synchronisation between base stations is no longer necessary.
The drawback is that more traffic is generated on the network, thus reducing the available
throughput.
A recent proposal on ad hoc location presented in (Martin-Escalona & Barcelo-Arroyo, 2008)
extends the capabilities of time-of-arrival location techniques, allowing unknown nodes in a
network to position themselves in a passive fashion, i.e., without injecting traffic into the
network. The following sections explain this technique, namedpassiveTDOA, in detail.
Location in Ad Hoc Networks 631
The performance of the positioning algorithm is described in Fig. 3, which shows a network
with three anchors or landmarks (i.e., Anchor 1 to Anchor 3 ) and two regular nodes with
positioning capabilities (i.e., Node 1 and Node 2 ). At a given time, Node 1 begins a TOA
positioning process to locate itself. Thus, Node 1 sends data message (Data 1 ) to Anchor 1 at t
1 ,
which replies with an acknowledgement Ack ( 1 ), which reaches Node 1 at t 2 . The
corresponding RTT is hence calculated as t 2 – t 1 . Note, however, that other nodes in the
network also listen to all these messages, since it is a diffusion network. Thus, Node 2 hears
the Data 1 message at t 3 and the reply to that message, i.e., Ack1 , at t 4 . Therefore, a TDOA
measurement is generated as t 4 – t3 . The same process is followed by Node 1 to range with
Anchor 2 and Anchor 3 . Based on the assumption that Node 2 is only covered at Anchor 1 and
Anchor 2 , Node2 is able to calculate two TDOAs: t 4 –t 3 and t 7 –t 6 . These two measurements are
enough to position Node 2 using a multilateration TDOA algorithm. Note that the TDOA
position calculated at Node 2 involves hearing just two access points, which makes it possible
632 Radio Communications
for positioning to take place where TOA techniques would be ineffective. The only datum
needed by MS 2 in addition to the TDOA measurements is the position of Node 1 . This
information can be supplied by the unknown node once it becomes settled (e.g., by
broadcasting), or it can be estimated in the passive-TDOA node. Simulation analysis
demonstrates that, under line-of-sight (i.e., visibility between nodes), the positioning error
achieved by this algorithm is often below 1.4 times the error achieved by the 2-way TOA.
Better results are achieved if the technique is deployed under non-line-of-sight conditions,
providing figures similar to those achieved by the 2-way TOA technique (Martin-Escalona &
Barcelo-Arroyo, 2008). This behaviour is especially relevant for location since non-line-of-
sight is the usual condition for location-system operation; hence, the best performance is
desired in such scenarios.
RTT estimate in the passive-TDOA node will be noisier than the ones made in the TOA
node, but it is expected to be accurate enough to allow the passive-TDOA algorithm to
compute its own position.
Fig. 4 shows the procedure that constitutes the autonomous operational mode of the passive-
TDOA algorithm. The explanation is based on the scenario proposed in Fig. 3, but reduced
to one 2-way TOA node (i.e., Node 1 ), a landmark (i.e., Landmark), and a passive-TDOA node
(i.e., Node 2 ). As explained for the case of the assistedoperational mode, Node 1 starts a ping-
fashion procedure to compute the range between the landmark and itself. As a result, the
RTT 1 (i.e., t 2 –t1 ) is measured. Consequently, TDOA 1 is deducted from the ping procedure as
t4 – t 3 . Until this point, the procedure is exactly the same as that presented in the case of
assisted mode.
Then, it is assumed that Node 1 starts a new 2-way TOA procedure involving the same
entities (i.e., Landmarkand Node 2 ) after a predefined time ( ), which is known by all nodes in
the network. This new procedure provides new estimates for Node 1 and Node 2 , i.e., RTT 2 and
TDOA 2 , respectively. Furthermore, autonomous mode benefits from this redundancy in the
measurements by using it to estimate the ranging between Landmark and Node 1 in Node 2 .
This can be done by simply measuring a new time-difference in Node 2 : TDOA’ . This time-
difference corresponds to the difference between the arrival time to Node 2 of the first TOA
response and the second TOArequest messages, subtracting the time elapsed between the two
7 – t
ping processes (i.e., t 4 – in Fig. 4), which is assumed to be known by all nodes in the
network. This information, together with the TDOA 1 and TDOA 2 measurements, allows the
634 Radio Communications
network to deduce the ranging information concerning Node 2 and the Landmark
. The
formulation starts from
, k R i, k ,
T i, j R i, j R j (6)
which computes the TDOA from the ranging information. R in Equation (6) computes the
distance between two nodes, T stands for the distance-difference, and subscripts i, j
, kstand
for the TOA node, the landmark, and the passive-TDOA node, respectively (as in the rest of
the document). According to Equation (6) and the scenario presented in Fig. 4, two TDOAs
are computed as
1 1 1 1
T i, j R i, j R j
, k R i, k (7)
and
2 2 2 2
T i, j R i, j R j
, k R i, k , (8)
where the superscript indicates the ping procedure involved in the measurement. These two
TDOAs (in distance) are then averaged (under the assumption of providing the same QoS)
as
1
2
2 2
T i, j T i, j T i, j . (9)
1 2 1
TDOA ' T j
, i R i, j R i, k R j
,k . (10)
Under the assumption of noiseless measurements, TOA ranging can be estimated in the
passive-TDOA node as
1
R i, j T i, j T j
2
,i . (11)
Finally, once R<i,j> is estimated, the same algorithm as used in the assisted mode is used to
compute the position of the passive-TDOA node.
Simulation results indicate that estimating the ranging of the 2-way TOA node results in less
accurate positions, as expected. However, under non-line-of-sight conditions, which are the
usual case, passive-TDOA provides positions with only 20% more error than the 2-way
TOA, with the benefit of no traffic injection. This is especially relevant for group location,
i.e., those applications that involve more than a single location process.
Another application of passive TDOA is the capability of the algorithm to position unknown
nodes in environments where TOA techniques cannot. For instance, Fig. 3 shows how
passive-TDOA is able to position a customer who only has two access points in sight. Under
the same conditions, the TOA technique is not able to provide a location, since this
technique requires at least three transmitters (even more depending on the algorithm) to
perform a 2D trilateration. The passive-TDOA algorithm would be able to go further in
positioning under constrained scenarios. In fact, this technique would be able to compute
the position of a station with just one access point in sight, whenever enough settled nodes
are in sight and their positions are known. This makes the passive-TDOA algorithm a very
interesting solution for positioning under extreme conditions (e.g., scenarios in which there
is interference), eventually mitigating the impact of some access points being down (e.g.,
due to maintenance, fire damage, etc.). Since passive-TDOA can work with fewer
landmarks, it helps the system continue to offer location-based services in those
circumstances where TOA is not able to provide some positions.
Passive-TDOA can also be used to improve the accuracy of TOA positions. The passive-
TDOA node is able to estimate its position and the positions of other TOA nodes involved as
long as enough measurements are available. Subsequently, these positions can be coupled to
reduce the noise and improve the final accuracy. Furthermore, this operational mode can be
used to locate unknown nodes with no location capabilities at all, as explained in more
detail previously in this document.
All these applications of the passive-TDOA algorithm give rise to dramatic improvements in
the scalability of the system, since more customers can be located while only a few TOA
positioning processes are running. Note, however, that all the applications of the passive-
TOA algorithm depend on their expected accuracy, since a large error in the positions
computed by passive-TDOA will make these positions useless, and, therefore, system
scalability will not increase at all. This work analyses the accuracy expected from passive-
TDOA under several conditions and compares it with the positioning error achieved by a
regular 2-way TOA algorithm.
It must be noted that, even though the algorithms are addressed to ad hoc networks, they
can be implemented in other networks based on infrastructure, such as those operating
under the standard IEEE 802.11. In these networks, the anchors would be the access points,
and the terminal nodes would be the 802.11 clients. This demonstrates the capabilities of the
algorithm presented and the wide range of applications for which it can be used.
6. Conclusion
This chapter presents the positioning problem in the ad hoc context. According to the
current literature, ad hoc algorithms are predominantly focused on this topic, since location
techniques used for other cellular technologies remain valid in the ad hoc environment. The
main algorithms proposed for ad hoc positioning are presented, giving special attention to
the passive-TDOA. This algorithm is proposed to improve the scalability of 2-way TOA
solutions and while at the same time providing good accuracy figures. Two operational
modes are explained in detail, and the main applications for this algorithm are discussed.
636 Radio Communications
7. References
Stojmenovic, I. (2002). Position-based routing in ad hoc networks, IEEE Communications
Magazine , vol. 40, July 2002, pp. 128-134, ISSN: 0163-6804.
Bourkerche, A.; Oliveira, H.; Nakamura, E. & Loureiro, A. (2007). Localization Systems for
Wireless Sensor Networks, IEEE Wireless Communications , Vol. 14, December 2007,
pp. 6-12, ISSN: 1536-1284.
Seidel, S.Y. & Rapport, T.S. (1992). 914 MHz path loss prediction Model for Indoor Wireless
Communications in Multi-floored buildings. IEEETrans.onAntennas&Propagation ,
vol. 40, no. 2, February 1992, pp. 207-217, ISSN: 0018-926X.
Wang, Y.; Jia, X. & Lee, H.K. (2003). An Indoors Wireless Positioning System Based on
Wireless Local Area Network Infrastructure, Proceedings of the thInternational
6
Symposium on Satellite Navigation , pp. 1-13, University of New South Wales,
Melbourne (Australia), July 2003.
Lassabe, F.; Canalda, P.; Chatonnay, P. & Spies, F. (2005). A Friis-based calibrated model for
WiFi terminals positioning, Proceedings th ofIEEE
6 International Symposium on a
World of Wireless Mobile and ltimedia
Mu Networks WOWMOM), ( pp. 382-387, ISBN:
0-7695-2342-0, Giardini Naxos, Messina (Italy), June 2005.
Bahl, P. & Padmanabhan, V. (2000). Radar: An In-Building RF-based User Location and
Tracking System, Proceedingsofthe th IEEEConference
91 onComputerCommunications
(INFOCOM) , vol. 2, pp. 775-784, ISBN: 0-7803-5880-5, Tel Aviv (Israel), March 2000.
Kotanen, A.; Hannikainen, M.; Leppakoski, H. & Hamalainen, T.D. (2003). Positioning with
IEEE 802.11b wireless LAN. Proceedings of the thIEEE 41 International Sympossium on
Personal, Indoor and Mobile Radio Communi cations PIMRC) ( , vol. 3, pp. 2218-2222,
ISBN: 0-7803-7822-9, Beijing (China), September 2003.
Ciurana, M.; Barcelo-Arroyo F. & Izquierdo, F. (2007). A ranging system with IEEE 802.11
data frames, Proceedings of the IEEE Radio
st 1 and Wireless Symposium , pp. 133-136,
ISBN: 1-4244-0445-2, Long Beach, California (USA), January 2007.
Ibraheem, A. & Schoebel, J. (2007). Time of Arrival Prediction for WLAN Systems Using Prony
Algorithm, Proceedingsofth Workshop
the 4 onPositioning,NavigationandCommunicatio
WPNC)
( , pp. 29-32, ISBN: 1-4244-0871-7, Hannover (Germany), March 2007.
Reddy, H. & Chandra, G. (2007). An improved Time-of-Arrival estimation for WLAN-based
local positioning, Proceedings of the ndInternational
2 Conference on Communicati
Systems software and middleware COMSWARE) ( , pp. 1-5, ISBN: 1-4244-0613-7,
Bangalore (India), January 2007.
3GPP. (2004). Functional stage 2 description of LCS; Technical Specification Group Services
and System Aspects, 3GPPTS23.71 , version 6.8.0, June 2004.
3GPP. (2002). Location Services (LCS); Functional description; Stage 2, 3GPP TS 03.71,
version 8.7.0, September 2002.
Pages-Zamora, A., Vidal, J. & Brooks, D.H. (2002). Closed-form solution for positioning based
on angle of arrival measurements. Proceedings of the IEEE International
th 31 Symposium
on Personal, Indoor and Mobile Radio Communications , vol. 4,PIMRC)
( pp. 1522-1526,
ISBN: 0-7803-7589-0, Pavilhão Atlântico, Lisbon (Portugal), September 2002.
Savvides, A.; Han, C.C. & Srivastava, M.B. (2001). Dynamic Fine-Grained Localization in
Ad-Hoc Wireless Sensor Networks. Proceedings of the thACM7 International
Conference on Mobile Computing and Networking , pp. 166-179, ISBN: 1-58113-422-3,
Rome (Italy), July 2001.
Location in Ad Hoc Networks 637
Sun, G.; Chen, J.; Guo, W. & Ray-Liu, K.J. (2005). Signal processing techniques in network-
aided positioning: a survey of state-of-the-art positioning designs, IEEE Signal
ProcessingMagazine , vol. 22, no. 4, July 2005, pp. 12-23, ISSN: 1053-5888.
Doherty, L.; Ghaoui, L.E. & Pister, K.S.J. (2001). Convex Positioning Estimation in Wireless
Sensor Networks.Proceedingsofthe IEEE02 ConferenceonComputerCommunications
th
1. Introduction
In order to enable the delivery of last mile wireless broadband access, the IEEE 802.16-2004
standard (IEEE Std 802.16-2004, 2004) for the wireless metropolitan area networks (WMAN)
is designed to fulfill various demands for higher capacity, higher data rate, and advanced
multimedia services. Furthermore, the IEEE 802.16e standard (IEEE Std 802.16e-2005, 2006)
enhances the original IEEE 802.16-2004 specification by addressing the mobility issues for
the mobile stations (MSs). Recently, the IEEE 802.16-2009 standard (IEEE Std 802.16-2009,
2009) has been specified as an integrated version of the IEEE 802.16 specification by the IEEE
802.16 maintenance task group. The IEEE 802.16-2009 standard is as known as the revision of
IEEE 802.16-2004 and consolidates material from IEEE 802.16e-2005, IEEE 802.16-2004/Cor1-
2005, IEEE 802.16f-2005, and IEEE 802.16g-2007. In order to fulfill the requirement of the E911
phase II requirement advanced by Federal Communications Commission, the location-based
services (LBSs) (Perusco & Michael, 2007) are considered one of the key functions of the IEEE
802.16-2009 standard. Moreover, for fulfilling the resource management purpose, location
update is also essential to other numerous functions such as the paging processes.
Based on the IEEE 802.16 standard, it is required to provide satisfactory location estimation
performance under a wide-range of MS’s moving speeds. Location tracking is designed as
one of the options to provide feasible estimation performance in order to trace the MS’s mov-
ing behaviors. However, there are several issues required to be considered before enabling
the location tracking scheme within IEEE 802.16 system. It is noted that timing informa-
tion, i.e., the time-difference-of-arrival (TDOA) measurements, from at least four base stations
(BSs) is required to perform a two-dimensional location estimation and tracking for an MS.
With the stringent synchronization requirement for the IEEE 802.16 OFDMA-based system,
the frequent TDOA measurements with other neighbor (a.k.a. non-serving) BSs can be time-
consuming and impractical processes for location estimation and tracking. It is a waste of
the bandwidth to scan for the neighbor BSs frequently, especially under broadband wireless
communication.
In this book chapter, two location tracking schemes are proposed to alleviate the problem that
requires frequent connections between the MS and the neighbor BSs. The kinematics-assisted
location tracking (KLT) scheme adopts the kinematic relationship to estimate the MS’s loca-
tion at the time instant with unavailable neighbor BSs; while the geometry-assisted location
tracking (GLT) algorithm utilizes the geometric constraints for the prediction of MS’s posi-
tion. The two schemes are proposed to interpolate the location of an MS between two direct
640 Radio Communications
location estimations from the MS to the neighbor BSs. It will be shown in the simulations that
both proposed schemes can provide feasible performance with significantly reduced commu-
nication overhead.
OFDMA Frames
Granted Slot #2
Neighbor
BS
UL Burst #2
t 1 = ( t_adj1 + t_adv) /2 received
Timing Adjustment t_adj 2
Granted Slot #1
Serving
BS
UL Burst #1
t 2 = ( t_adj2 + t_adv)/2
received
Timing Adjustment t_adj 1 t 21 = ( t_adj2 - t_adj 1 )/2
UL Burst #1 UL Burst #2
Propagation transimitted transimitted
Delay
Timing Advance t_adv Timing Advance t_adv
Fig. 1. Timing Diagram of the general U-TDOA measurement proposed in the IEEE 802.16-
2009 standard.
not make any timing adjustments while conducting ranging with both the serving and the
neighbor BSs. Therefore, serving BS calculates the time difference t21 = (t_adj2 − t_adj1 )/2
and the difference of the MS’s distance to the serving BS and neighbor BS is obtained by
multiplying this difference by the speed of light.
Fig. 2 illustrates the message exchange sequences for the general U-TDOA measurement.
The serving BS requests neighbor BSs to assign a dedicated ranging opportunity for the MS.
The MS will first conduct ranging with the serving BS in order to perform the U-TDOA mea-
surement. Through the ranging response (RNG-RSP) message, the serving BS will assign a
Rendezvous time, a CDMA code, and a Tx opportunity offset for the MS. It is noted that the
Rendezvous time specifies the frame in which the BS transmits an UL-MAP containing the
definition of the dedicated ranging region. As the Rendezvous time is expired, the MS will
transmit the allocated CDMA code within the regular ranging region. The time-of-arrival
(TOA) measurement t1,k performed at the serving BS (BS1 ) is obtained as an average value of
both the timing adjustment t_adj1,k from the measurement and the timing advance t_advk ac-
quired from the periodic ranging, i.e., t1,k = (t_adj1,k + t_advk )/2 where the subscript denotes
the kth time step.
Moreover, the dedicated ranging process is repeated through the neighbor BS (e.g. BS2 ) by
sending the mobile scanning response (MOB_SCN-RSP) message. The neighbor BS measures
t_adj2,k and reports the value to the serving BS. The TOA measurement for BS2 can therefore be
acquired as t2,k = (t_adj2,k + t_advk )/2. As a result, the U-TDOA measurement calculated at
the serving BS is obtained as t21,k = (t_adj2,k − t_adj1,k )/2. Similar process can be performed
to obtain the timing information from the other neighbor BSs. Nevertheless, with the TDOA
measurements, at least four BSs should be involved to perform a 2-D location estimation.
There is a significant overhead to perform location tracking scheme as depicted in Fig. 2. In
the following section, the proposed location tracking schemes are proposed to alleviate the
overhead of frequent ranging with neighbor BSs.
642 Radio Communications
Measure t_adj1,k
t = ( t_adj + t_adv )/2
1,k 1,k k
Fig. 2. The message exchange sequences of the general U-TDOA measurement method pro-
posed in the IEEE 802.16-2009 standard.
where ti,k denotes the TOA measurement obtained from the ith BS at the kth time step, and
c is the speed of light. ri,k is contaminated with the TOA measurement noise mi,k due to the
imprecision of the measuring device. The non-line-of-sight (NLOS) error ni,k is assumed to be
existent in the considered environments, which is inherently a parameter with positive value.
si,k denotes the unknown asynchronous clock time offset between the MS and the BS. The
noiseless relative distance ζ i,k between the MS and the ith BS can be obtained as
1
ζ i,k = [( xk◦ − xi,k )2 + (y◦k − yi,k )2 ] 2 (2)
Location Tracking Schemes for Broadband Wireless Networks 643
where x◦k = [ xk◦ y◦k ] T represents the MS’s true position at the kth time step, and xi,k = [ xi,k yi,k ] T
is the location of the ith BS. On the other hand, the relative distance rij,k from the TDOA
measurement tij,k can be obtained by computing the time difference between the MS w.r.t. the
ith and the jth BSs as
rij,k = (ri,k − r j,k ) = c · (ti,k − t j,k ) = c · tij,k
= (ζ i,k − ζ j,k ) + (mi,k − m j,k ) + (ni,k − n j,k ) (3)
It is noted that in IEEE 802.16-2009 standard each BS equips a GPS in order to achieve time
synchronization. Therefore, the relationship si,k − s j,k = 0 is true since the frames at the serv-
ing and the neighbor BS are synchronized. As depicted in the previous section for the general
U-TDOA method, the TOA measurement (in (1)) is acquired for the purposed of obtaining the
TDOA measurement (in (3)).
1 sec
TI / TE
TI
TE
t=k t = k+1 t = k+2 t = k+3 t = k+4
Fig. 3. The timing diagram for the relationship between the dedicated and non-dedicated
ranging states.
Fig. 3 illustrates the relationship between the dedicated and the non-dedicated ranging
states. The location estimation period (TE ) is defined as the time duration between two ded-
644 Radio Communications
icated ranging states. On the other hand, the location information period (TI ) is designed as
TI = TE /m with m ≥ 1, which represents the time interval either between two non-dedicated
ranging states or between a dedicated and a non-dedicated states. In other words, TI is de-
fined as the interleaved period where the MS’s location information becomes available, either
obtained from the general U-TDOA method of the proposed KLT/GLT scheme. In other word,
the U-TDOA method is utilized at the dedicated ranging state; while the KLT/GLT scheme
interpolates the position information at the non-dedicated ranging state. Moreover, the sam-
pling time ∆t is denoted as the time interval between the kth and the (k − 1)th time steps as
in (1) to (3) It is selected the same as the location information period, i.e. ∆t = TI .
Fig. 4. The schematic diagram of the proposed KLT and GLT algorithms.
Fig. 4 illustrates the schematic diagram of the proposed KLT and GLT algorithms. Either the
dedicated or the non-dedicated ranging can happen for obtaining the MS’s estimated position
x̂k = [ x̂k ŷk ] T . For the dedicated ranging case, the cascaded location tracking (CLT) scheme
as proposed in (Chen & Feng, 2005) is exploited. The CLT algorithm is cascaded by two
functional components, i.e. the two-step least square (LS) method for location estimation and
the Kalman filtering technique for location tracking. The two-step LS method obtains the
initial location estimation x̂kLS = [ x̂kLS ŷkLS ] T from the TDOA measurement input tij,k (in (3))
within two computing iterations. Furthermore, the Kalman filter is utilized to smooth out and
trace the estimation errors and finally acquires the MS’s estimated location x̂k = [ x̂k ŷk ] T . On
the other hand, since the TDOA measurements are not available during the non-dedicated
ranging state, two schemes are proposed to substitute the functionality of the two-step LS
method as follows.
By adopting the updates from the kinematic relationship, the MS’s predicted position x̂k+1 at
the (k + 1)th time step can by acquired as
1
x̂kKLT
+1 = x̂k + v̂k · ∆t + · â · ∆t2 (4)
2 k
where ∆t is the sampling interval as ∆t = TI . The location estimation and tracking at the
non-dedicated ranging state can therefore be performed.
BS estimates
MS’s position.
Similar to the KLT algorithm as described in the previous subsection, the proposed GLT
scheme is utilized to provide location estimation during the non-dedicated ranging state. The
concept of the GLT algorithm is to utilize the frequent periodic ranging between the MS and
the serving BS. Based on the periodic ranging, the relative distance r1,k between the serving
BS and the MS can be obtained from the corresponding TOA measurements t1,k . Fig. 5 depicts
the message exchange sequences of the proposed GLT schemes within the IEEE 802.16-2009
network. It is noticed that the flowchart is the same as the general U-TDOA scheme as in Figs.
1 and 2 at the dedicated ranging state. However, at the non-dedicated ranging state, the TOA
measurement is obtained through periodic ranging scheme as shown in Fig. 5.
646 Radio Communications
y=yk
r1,k
BS 1 ( x1,k , y1,k )
y
Geometric e ctor
Traj
Constrained ing
Mo v
Region MS’s
x=xk
MS
( xk , y k ) ( xGLT
k+1
, y GLT )
k+1
Fig. 6. The schematic diagram of the geometric constraints for the proposed GLT scheme.
As shown in Fig. 6, the circular region can be formed according to the center point x1,k =
[ x1,k y1,k ] T with radius of r1,k . Meanwhile, two additional linear equations can be acquired
from the feedback of the Kalman filter at the kth time instant, i.e. x = x̂k , y = ŷk . As a result,
the two linear and one circular equations can be utilized to provide the geometric constraints
for obtaining the MS’s position estimation. Based on the constrained region, the LS method is
employed to minimize the sum of the square errors for the MS’s position. Therefore, the MS’s
estimated position by adopting the GLT scheme is acquired as
−1 T
x̂kGLT T
+1 = G · (H H) H J (5)
where
1 0 0
G= (6)
0 1 0
−2x1,k −2y1,k 1
H= 1 0 0 (7)
0 1 0
2
r1,k − x1,k − y21,k
2
4. Performance Evaluation
Simulations are performed to show the effectiveness of the proposed KLT and the GLT
schemes. Different noise models (Greenstein et al., 1997) are considered in the simulations
in order to represent various environments, including the urban, the suburban, and the rural
cases. In the cellular-based network, an exponential distribution is assumed for the NLOS
model with the distribution of pni,k (υ) as
−υ
1 υi,k
pni,k (υ) = υi,k e υ>0 (9)
0 υ≤0
Location Tracking Schemes for Broadband Wireless Networks 647
where υi,k = c · τi,k = c · τm ζ i,k ε ω is the RMS delay spread between the ith BS to the MS at the
kth time step; τm is the median value of τi,k whose value depends on various environments, i.e.
τm = 0.4, 0.3, and 0.1 for urban, suburban, and rural respectively. ε is the path loss exponent
which is assumed to be 0.5. The shadow fading factor ω is a lognormal random variable
with zero mean and standard deviation σω chosen as 4 dB in the simulations. Moreover, the
measurement noises (i.e. mi,k in (1)) is considered Gaussian-distributed as N ∼(0, σm 2 ) with σ
m
= 10 m. The asynchronous offset (i.e. si,k in (1)) between the MS and the BS clock time is also
assumed to be Gaussian-distributed with σs = 7.5 m.
1500
BS
MS’s trajectory
1000
Y Axis (m)
500
0
−1500 −1000 −500 0 500 1000 1500
X Axis (m)
Fig. 7. The geometric layout of the simulation (Green Line: MS’s True Trajectory; Red Empty
Circles: the Position of the BSs)).
Fig. 7 illustrates the MS’s trajectory with the Manhattan street scenario in the simulation.
The MS’s true trajectory is illustrated via the green lines; while the locations of the BSs are
represented by the red empty circles as in Fig. 7. The acceleration is designed to vary at time
t = 21, 26, 31, 47, 63, 76, and 89 sec from ak = (a x,k , ay,k ) = (0, -1), (4, 0), (-4, 0), (0, 2), (0, -2), (-3,
0) to (3, 0) m/sec2 . The corresponding MS’s velocity lies between (0, 70) km/hr.
Fig. 8 shows the performance comparison between the proposed KLT and GLT schemes un-
der the urban environment (with TI = 1 sec and TE = 1, 2, and 4 sec). It is noted that the
position error is defined as Pe = x̂k − x◦k . The case with TI = TE = 1 sec indicates that
the non-dedicated ranging does not exist, which is served as the lower bound of the estima-
tion errors. As shown in the figure, comparably inferior performance is observed with larger
values of TE , which indicates that the dedicated ranging with the TDOA measurement is not
frequently available. Moreover, the proposed GLT algorithm outperforms the KLT scheme for
each specific case, e.g. around 50 m less of the position error under the case of TE = 4 sec with
67% of position errors.
648 Radio Communications
100
90
Average Position Error <= Abscissa (%)
80
70
60
50
40
KLT / GLT (T=T =1sec)
30 I E
KLT (T =1sec. T =2sec)
I E
20 GLT (TI=1sec. TE=2sec)
KLT (T =1sec. T =4sec)
10 I E
GLT (TI=1sec. TE=4sec)
0
0 100 200 300 400 500
Position Error (m)
Fig. 8. Performance comparison between the proposed KLT and GLT schemes under the urban
environment (TI = 1 sec).
Fig. 9 shows the performance comparison with 67% of position errors between the proposed
KLT and GLT schemes under the different noise environment. It is noticed that the KLT
scheme performs similar to GLT scheme at the smaller NLOS environment, e.g. τm = 0.1
(rural environment). However, the performance of KLT is comparably worse than the per-
formance of GLT scheme under the excessive NLOS errors. The effectiveness of adopting the
periodic ranging in GLT scheme can be observed in the case.
In order to evaluate the overhead of the frequent location tracking, serving BS unavailable
time (i.e. TU ) is defined for the percentage of the frame communicating between the MS and
the neighbor BSs. In the dedicating ranging period, the MS should synchronize with other
BSs and therefore the ongoing transmission should be buffered in serving BS. Although the
more frequent the dedicating ranging performed brings higher location estimation accuracy,
the total usage in the serving BS’s point of view would decrease. In the Fig. 2, the MS needs
to synchronize to the neighbor BSs first and then performs the ranging process. The following
parameter is defined to perform a dedicated ranging with the other BSs:
- Tsyn : average time to synchronize with the new BS
- Trng : average time to perform range process with a BS
The values for Tsyn and Trng are chosen as 20 millisecond (msec) and 30 msec in average as
reported in (Jiao et al., 2007). As the dedicated ranging specified for the LBS, the time of Trng
might be shorter. In terms of the Tsyn and Trng , the serving BS unavailable time counts in
percentage is:
3 ∗ ( Tsyn + Trng )
TU = (10)
TE
Location Tracking Schemes for Broadband Wireless Networks 649
200
KLT/GLT (T=T =1sec)
I E
180 KLT (T =1sec. T =2sec)
I E
GLT (TI=1sec. TE=2sec)
160
KLT (T =1sec. T =4sec)
I E
GLT (T =1sec. T =4sec)
67% Position Error (m)
140 I E
120
100
80
60
40
20
0.1 0.15 0.2 0.25 0.3 0.35 0.4
Median Value of NLOS Noise τ (µs)
m
Fig. 9. Performance comparison between the proposed KLT and GLT schemes under different
NLOS noise (TI = 1 sec).
18
KLT/GLT (TI=1 sec, TE=1 sec)
16 KLT/GLT (T=1 sec, T =2 sec)
I E
KLT/GLT (TI=1 sec, TE=4 sec)
14
Serving BS Unavailable Time (%)
12
10
0
5 10 15 20 25 30 35 40
T (msec)
rng
Fig. 10. Serving BS unavailable time via the average time to perform range process.
650 Radio Communications
It is noted that at least three neighbor BSs participate a dedicated ranging. Fig. 10 shows the
percentage of the BS unavailable time via the Trng from 5 to 40 msec. As the curves shows
that the KLT/GLT scheme with TE = 2sec has half unavailable time than TE = 1sec. While
the overhead of the serving BS is considered as the important factor, comparing to the per-
formance of location estimation in Fig. 9, the KLT/GLT scheme with TE = 2sec is a better
solution with a tradeoff.
5. Conclusion
Two assisted location tracking schemes are proposed in this paper. The schemes are capable
of estimating the position, velocity, and acceleration of the MS during the dedicated rang-
ing state. With the non-dedicating ranging state, the assisted methods utilizing the tracking
information and the periodic ranging information are proposed. It is shown in the simula-
tion results that the proposed location tracking schemes provide consistent performance and
reduces the overhead of the serving BS.
6. References
Chen, C.-L. & Feng, K.-T. (2005). Hybrid location estimation and tracking system for mobile
devices, Proc. IEEE 61st Vehicular Technology Conferencec 2005-Spring, Vol. 4.
Greenstein, L. J., Erceg, V., Yeh, Y. S. & Clark, M. V. (1997). A new path-gain/ delay-spread
propagation model for digital cellular channels, IEEE Trans. Veh. Technol. 46: 477 –
485.
IEEE Std 802.16-2004 (2004). IEEE standard for local and metropolitan area networks - part
16: Air interference for fixed broadband wireless access systems.
IEEE Std 802.16-2009 (2009). IEEE Standard for Local and metropolitan area networks Part 16:
Air Interface for Broadband Wireless Access Systems, pp. 1–2082.
IEEE Std 802.16e-2005 (2006). IEEE Standard for Local and Metropolitan Area Networks - Part
16: Air Interference for Fixed Broadband Wireless Access Systems, Amendment 2:
Physical and Medium Access Control Layers for Combined Fixed and Mobile Oper-
ation in Licensed Bands and Corrigendum 1.
Jiao, W., Jiang, P. & Ma, Y. (2007). Fast handover scheme for real-time applications in mobile
wimax, Proc. IEEE International Conference on Communications, pp. 6038–6042.
Perusco, L. & Michael, K. (2007). Control, Trust, Privacy, and Security: Evaluating Location-
based Services, IEEE Technol. Soc. Mag. 26: 4–16.
Wireless Multi-hop Localization Games for Entertainment Computing 651
1. Introduction
Ad-hoc networking capabilities have provided the flexibility needed to construct various
types of networks without infrastructure base stations. Emerging products for sensor net-
works, such as Zigbee (1), use ad-hoc networking capabilities to construct networks. These
sensor nodes can construct the network such as in outdoor fields and inside buildings with-
out much effort on establishing the base stations, and monitor neighbor information on area
where people usually cannot stay for the monitoring. The technique of ad-hoc networking
has been discussed within the Internet Engineering Task Force (IETF) by the Mobile Ad-hoc
Network (MANET) Working Group (2). MANET is a promising technique to provide the
alternative network infrastructure such as in the disaster case that the existing network infras-
tructures are destroyed because of fires and earthquakes. The wireless terminals with radio
capabilities relay data and deliver to a desired destination. Recently, mobile game consoles
with ad-hoc networking capabilities have been produced by companies such as Nintendo (3)
and Sony Computer Entertainment (SCE) (4). Networking capabilities play an important role
in enabling multiple players to join together to play games. Since the ad-hoc networking
technique is independent of the infrastructure network, it is easy for a player to join a game
through a wireless network. To utilize this functionality, some games using ad-hoc network-
ing capabilities have been developed. However, the games released thus far only use ad-hoc
networking capabilities for joining the game.
We have developed two wireless multi-hop localization games with ad-hoc networking capa-
bilities, and have presented several initial results in (29). The proposed games, a war game
and a tag game, are based on classical field games. Players use mobile game consoles with
ad-hoc networking capabilities to move around a field. The games use wireless multi-hop lo-
calization to estimate node positions. Players on one team jointly establish an ad-hoc network
to estimate their positions and compete for positioning accuracy with the other team. We
used a previously developed multi-hop localization technique called ROULA (28). We used
simulation to evaluate the multi-hop localization games and analyze their characteristics. We
found that node velocity and obstruction position controlled the win rate for the games, and
maintaining connectivity and local rules led to higher win rates for the games. The results
revealed that the proposed games worked well as localization applications using the ad-hoc
networking capabilities.
652 Radio Communications
The purpose of this paper is to present new localization applications using ad-hoc networking
capabilities. The concept behind multi-hop localization games is presented. Wireless multi-
hop localization games are evaluated to find out how well localization-based games with ad-
hoc networking capabilities perform in a simulation. These main results obtained from the
simulation are summarized as follows.
• The win rate for the games depends on node velocity and obstruction position.
• A higher connectivity constraint leads to a higher win rate for the games.
• Enforcing the local rule of the death penalty enables the win rate to be controlled for the
games.
We will next describe the multi-hop localization technique and the current state of mobile
games. The localization technique of ROULA is reviewed in Section 3. Section 4 describes our
wireless multi-hop localization games, and our evaluation of these is discussed in Section 5.
Section 6 concludes the paper with a brief summary and mentions future work.
hop-count distances. In AFL (15), the positions of unknown nodes are estimated without us-
ing anchor nodes. The basic idea behind AFL is to utilize reference nodes that represents the
relative axis in a network. The five reference nodes are automatically selected in the manner
described in (15), and they determine relative node positions based on the hop-counts from
their reference positions. In REP (19), the hop-count distance in a network with holes is cal-
culated by using boundary detection (20). Boundary detection is a technique that can detect
the network boundary with only information on network connectivity. In (21), boundary de-
tection and a Delaunay graph were jointly used to prevent node positions from flipping. The
localization scheme without using ranging devices enables nodes to estimate node positions
while only using the radio capabilities of a sensor node. Hence, it has great flexibility to enable
nodes to be applied to localization in the network.
We previously developed optimized link state routing-based localization (ROULA) (28).
ROULA does not require the use of extra ranging devices for any nodes and precisely esti-
mate the node distance by using multipoint relay (MPR) nodes. We thus used ROULA in
our proposed games to enable the nodes to estimate their positions. ROULA is described in
Section 3.
Game names Scoring Player’s Networking Real No. of partici- Required equipment
metrics behavior for capabilities field use pants, Np
game win
Hot shots Golf game Individual Used to connect to No 1 ≤ NP ≤ 8 Mobile console
golf™ (6) score other players
Classical war Hitting with Individual Not used Yes 2 ≤ NP Model guns and gog-
game model gun gles
Classical tag Avoiding oni Individual Not used Yes 2 ≤ NP None
game and elapsed
time
Geocaching (22) Collecting Individual Used to display loca- Yes 1 ≤ NP Mobile console and
geocaches tions of geocaches GPS receiver
Human Pac- Collecting vir- Individual or Used to record Yes 8 ≤ NP HMD, mobile con-
man (24) tual cookies group player’s trajectory sole and GPS receiver
CYSMN (25) Avoiding Individual Used to display loca- Yes 4 ≤ NP Mobile console and
runners and tions of players GPS receiver
elapsed time
Proposed Increasing Group Used for ad-hoc con- Yes 20 NP Mobile console and
games positioning nections and position GPS receiver
accuracy and estimations
elapsed time
Table 1. Comparisons of conventional mobile games with proposed games.
654
Wireless Multi-hop Localization Games for Entertainment Computing 655
information with GPS. Three runners are visible to players’ locations through an virtual online
map and they run through actual city streets. Players avoid the runners and compete for the
time elapsed since joining the game. If a runner gets within five virtual meters of a player, the
player is seen and is excluded from the game.
Table 1 summarizes the features of current mobile games and the proposed multi-hop local-
ization games. Our proposed game has novel distinct aspects from the other works. First,
our proposed games use ad-hoc networking capabilities. Conventional mobile games use net-
working capabilities such as wireless local area network (WLAN) to access the game server
that provide the players’ location information or a virtual map through the Internet. Our pro-
posed games have novel uses for ad-hoc networking capabilities to conduct multi-hop local-
ization in mobile games. Second, the scoring metric for the game is based on the positioning
accuracy of the multi-hop localization technique. In some of the literature, localization is de-
scribed as being “cooperative” (8). Nodes in the wireless network help to connect with one
another to establish their relative positions. The positioning accuracy depends on the number
of nodes in the network. Hence, nodes are required to cooperate to achieve higher positioning
accuracy. Players must cooperative with their own team in the games.
Finally, let us discuss the number of participants in the proposed games. The proposed games
require large numbers of participants compared with other games. This is because multi-hop
localization without ranging devices requires a large number of nodes to estimate the posi-
tions of the nodes (28). ROULA is guaranteed to estimate all node positions when connectiv-
ity is about 20 (28). Connectivity indicates how many nodes are connected to other nodes in
1-hop on average. The least number of participants can be reduced further by using localiza-
tion with ranging devices although improving the performance of the localization algorithm
is beyond the scope of this paper.
nodes in OLSR always hold and update the latest 2-hop node information and MPR nodes in
a proactive action that periodically floods hello packets. Node in ROULA localize MPR nodes
as their 1-hop nodes without having to make any modifications to the MPR selection. Flood-
ing hello packets and the computational task of MPR selection can be integrated by using the
underlying network layer processes.
3.2 Algorithm
The four operations for ROULA are summarized below (28).
1. Estimating MPR node distances: Nodes flood hello packets containing their own 1-
hop nodes list to their 1-hop nodes. Once a node has a 2-hop nodes list, it selects MPR
nodes and estimates the distances between them.
2. Estimating farthest 2-hop node distances: Each node selects the farthest 2-hop node
for each MPR node and estimates the distances between them.
3. Estimating relative node positions on regular triangles: Nodes flood TRI_NOTICE
packets to their farthest 2-hop nodes with their farthest 2-hop nodes list. Then, nodes
that received TRI_NOTICE packets match regular triangles by using the received far-
thest 2-hop nodes lists. Nodes then obtain sets of local coordinates by merging their
overlapping regular triangles.
4. Estimating one set of relative coordinates of network: Sets of relative coordinates are
collected and merged into one set of relative coordinates for the network. After that,
nodes that have not estimated their positions estimate these by using the Centroid for-
mula (28). If at least three anchor nodes are in the network, the relative coordinates can
be converted into absolute coordinates that have the correct network orientation.
Wireless Multi-hop Localization Games for Entertainment Computing 657
We assume that nodes are deployed in a two-dimensional plane, and a sink node for the
network merges all sets of local coordinates in the network. Routing protocol operations are
assumed to be done without requiring additional time.
Fig. 3. Initial node placements of (a) war and (b) tag games. Teams 1, 2, 3, and 4 correspond to
circles, triangles, squares, and diamonds. Oni is represented by star. Arrows indicate locations
of enemy lines.
exponential distribution, E (v), with a mean of v. If a node reaches the enemy line, its team
is declared the winner. The nodes on each team periodically run multi-hop localization to
estimate their positions. The nodes cannot communicate with the nodes on the other team.
We used the positioning error obtained by multi-hop localization as the metric to determine
whether a node transitions to a dead state. In the proposed game, all nodes are assumed to
be anchor nodes to enable relative coordinates to be converted into absolute coordinates and
obtain the positioning error. The positioning error, ei , is normalized by the communication
range, R:
( x̂i − xi )2 + (ŷi − yi )2
ei = , (1)
R
i = 1...N,
where N is the total number of nodes, ( xi , yi ) represents the true position of node i, and ( x̂i , ŷi )
is the estimated position. The true position can be obtained by using GPS. When a node
cannot estimate its own position, it is assigned a positioning error of 100%. A node transitions
to a dead state depending on its positioning error. State transitions algorithm for node i is
described in Algorithm 1. In the proposed games, nodes periodically flood hello packets.
When a node senses a hello packet, the node receives the packet only if it has arrived from
a node on the same team. Otherwise, the node drops the packet and decides whether to
transition to the dead state on the basis of positioning errors (lines 5–8 of Algorithm 1). The
U ( a, b) represents a random variable with a uniform distribution in the interval [ a, b). If the
node has the same positioning error, it transitions to a dead state with a probability of 50%
(line 5 of Algorithm 1). Otherwise, the node transitions to a dead state if it has a greater
positioning error. Once the node transitions to the dead state, it stops moving and receiving
packets for localization. If all the nodes on a team transition to dead states, the other team is
declared the winner.
own positioning error. The basic operation of this metric is that if the positioning error is 60%,
the probability to transition to the dead state is 60%. In line 1 of Algorithm 2, we introduced
design parameter κ to mitigate the impact of positioning error. Our evaluation of the impact
of κ is discussed in Section 5.3. We defined max_step, which denotes the maximum length of
time for the tag game. The conditions to finalize the tag game are cases where only one team
survives or max_step time is up. When max_step is out of time, the winner is the team that
has the maximum survival time. The survival time is defined as
max_step
Tsurvive = ∑ number of alive nodes. (2)
t =0
5. Evaluation
5.1 Simulation setting
The simulation environment we used was a discrete event simulation environment, OM-
NeT++ (31) with Mobility Framework (32). Existing network simulators do not have local-
ization functionality. We implemented localization functionality into OMNeT++. Our local-
ization simulation platform enables to test the localization performance with discrete event
simulation. The simulation trials were conducted 30 times with random seeds, and the results
were averaged.
Fig. 4. Snapshots of war games for time steps (a) 500 and (b) 1000 (N=160, v T1,T2 ={1,1}). Nodes
for team 1 are represented by circles, and those for team 2 are represented by triangles. Cross
on node represents dead state.
percentage of nodes that could estimate their positions out of all alive nodes. The number of
alive nodes decreased over time. A small number of nodes makes it difficult to estimate node
positions using multi-hop localization. Therefore, the ratio of estimated nodes decreased as
the number of nodes decreased. The number of alive nodes on both teams remained approx-
imately the same over time. This is because all the nodes had the same velocity and used the
same strategy to proceed to the enemy lines.
Figure 6 plots the results for 160 nodes. Compared with the results for 120 nodes, the ratio of
estimated nodes was better, confirming that the number of nodes contributed to the ratio of
estimated nodes.
Table 3 lists the number of wins by team for 30 trials with the different parameter settings. The
row for scenario A in Table 3 shows that the number of wins for teams 1 and 2 for 120 and 160
nodes, corresponded to 16 and 14, and 15 and 15. The number of nodes did not significantly
affect the number of wins.
Although the results presented here were for basic scenarios, we observed that the multi-hop
localization game using ROULA worked well as a game with ad-hoc networking capabilities.
T1 (v=1) T2 (v=1)
45 100 60
80
40
35
60 30
30
20
40
25 10
20 20 0
0 500 1000 0 500 1000 0 500 1000
Time step Time step Time step
Fig. 5. Positioning error, ratio of estimated nodes, and number of alive nodes (N=120,
v T1,T2 ={1,1}).
T1 (v=1) T2 (v=1)
45 100 80
Ratio of estimated nodes (%)
80 60
35
60 40
30
40 20
25
20 20 0
0 500 1000 0 500 1000 0 500 1000
Time step Time step Time step
Fig. 6. Positioning error, ratio of estimated nodes, and number of alive nodes (N=160,
v T1,T2 ={1,1}).
Figure 8 plots the positioning error, ratio of estimated nodes, and number of alive nodes when
the velocities of nodes on team 1 were 1 and those on team 2 were 2. The ratio of estimated
nodes of team 2 was slightly lower than that on team 1. This is because the nodes on team 2
were more spread out because they moved more quickly, making it more difficult to estimate
their node positions using multi-hop localization.
However, the goal of the war game was to reach the enemy line. The row for scenario B in
Table 3 indicates the number of wins for teams 1 and 2 for velocities of 1 and 2 [m/step].
Although the ratio of estimated nodes on team 2 was slightly lower than that for team 1,
team 2 had more wins. This is because the condition for finalizing the war game was reaching
the enemy line; the team with the higher average node velocity had the greater number of
wins.
Figure 9 plots the positioning error, ratio of estimated nodes, and the number of alive nodes
when the velocities of nodes on team 1 were 1 [m/step] and those on team 2 were 4 [m/step].
The ratio of estimated nodes on team 2 was lower than that on team 1. However, team 2 had
Wireless Multi-hop Localization Games for Entertainment Computing 663
Team 1 Team 2
Scenario A: 120 16 14
N 160 15 15
Scenario B: {1,2} 12 18
v T1,T2 {1,4} 9 21
Scenario C: 250 15 15
y coord. of obst. 100 29 1
Table 3. Number of team wins in war game. In scenario A, number of nodes N was varied
and for v T1,T2 = {1, 1}. In scenario B, the velocity v T1,T2 was varied for N=160. In scenario C,
y coordinate of obstruction was varied for N=160 and v T1,T2 = {1, 1}.
more wins as can be seen from the scenario B results in Table 3. This result suggests that the
win rate for the war game depends on the node velocity of nodes.
Fig. 7. Snapshots of war games for time steps of (a) 250 and (b) 500 (N=160, v T1,T2 ={1,4}).
Nodes for team 1 are represented by circles, and those for team 2 are represented by triangles.
Cross on node represents dead state.
moving to prevent the current connectivity from being violated. The rule of the connectivity
constraint can be easy to accomplish in an actual game, because each node can know the cur-
rent connectivity due to the use of mobile game consoles with ad-hoc networking capabilities.
First, we evaluated the impact of local rule of the connectivity constraint. Table 4 presents
the simulation parameters for the tag game. Figure 13 shows snapshots of a tag game with
the local rule of the connectivity constraint (C). Teams 1, 2, 3, and 4 are located at the top left,
bottom left, top right, and bottom right, respectively. The connectivity constraints correspond
to 0 (not applied), 2, 5, and 8. As shown in Fig. 13(a), the nodes on team 1 spread over the
field while those on team 4 are bunched together. Those on teams 3 and 4 spread gradually,
as shown in Fig. 13(b).
Figure 14 plots the results for positioning error, ratio of estimated nodes, and number of alive
nodes. The higher the connectivity constraint, the lower the positioning error. This is because
the positioning accuracy using multi-hop localization depends on the connectivity (28). The
greater the connectivity constraints, the higher the ratio of estimated nodes.
Wireless Multi-hop Localization Games for Entertainment Computing 665
T1 (v=1) T2 (v=2)
50 100 80
80 60
40
35 60 40
30
40 20
25
20 20 0
0 100 200 300 400 500 0 100 200 300 400 500 0 100 200 300 400 500
Time step Time step Time step
Fig. 8. Positioning error, ratio of estimated nodes, and number of alive nodes (N=160,
v T1,T2 ={1,2}).
T1 (v=1) T2 (v=4)
50 100 80
Ratio of estimated nodes (%)
45
80 60
40
35 60 40
30
40 20
25
20 20 0
0 100 200 300 400 500 0 100 200 300 400 500 0 100 200 300 400 500
Time step Time step Time step
Fig. 9. Positioning error, ratio of estimated nodes, and number of alive nodes (N=160,
v T1,T2 ={1,4}).
Table 5 summarizes the survival time for the tag game. As seen from the row for scenario D in
Table 5, team 1 with a connectivity constraint of 0, had the longest survival time even though
it had the lowest localization rate. This is because nodes with a lower connectivity constraint
could more readily move around the field. Since the probability of their encountering an oni
was lower, nodes with a lower connectivity constraint could survive longer. This result is not
suitable for playing the game, because there is no advantage to cooperate for localization, and
it does not support the fairness of the game. We thus examined the introduction of a design
parameter and a local rule to control the win rate for the game.
Fig. 10. Snapshots of war game for time steps (a) 200 and (b) 400 with obstruction at (250,
100) (N=160, v T1,T2 ={1,1}). Nodes for team 1 are represented by circles, and those for team 2
are represented by triangles. Cross on node represents dead state. Obstructions are drawn as
large gray squares.
Table 5. Survival time in tag game for CT1,T2,T3,T4 ={0,2,5,8}. Scenario D enabled the rule of
connectivity constraint. Scenario E enabled the rule of death penalty.
Figure 15 shows snapshots of the tag game with the local rule of the death penalty enabled.
Nodes on team 1 with a connectivity constraint of 0 are still widely spread out, however, their
death rate is higher due to the local rule of the death penalty.
Figure 16 plots the results for positioning error, ratio of estimated nodes, and number of alive
nodes with the local rule of the death penalty. The κ was set to 0.5, and ω was set to 2. The
number of alive nodes on team 1 decreased over time, because nodes with a lower connectivity
constraint had wider dispersion. As we can see from the row for scenario E in Table 5, the
higher the connectivity constraint, the longer the survival time. This result demonstrates that
the local rule of the death penalty and the design parameters κ, ω effectively maintained the
fairness in the tag game.
Wireless Multi-hop Localization Games for Entertainment Computing 667
T1 (v=1) T2 (v=1)
50 100 80
80 60
40
60 40
35
40 20
30
25 20 0
0 500 1000 0 500 1000 0 500 1000
Time step Time step Time step
Fig. 11. Positioning error, ratio of estimated nodes, and number of alive nodes with obstruc-
tion at (250, 250) (N=160, v T1,T2 ={1,1}).
T1 (v=1) T2 (v=1)
50 100 80
Ratio of estimated nodes (%)
80 60
40
60 40
35
40 20
30
25 20 0
0 500 1000 0 500 1000 0 500 1000
Time step Time step Time step
Fig. 12. Positioning error, ratio of estimated nodes, and number of alive nodes with obstruc-
tion at (250, 100) (N=160, v T1,T2 ={1,1}).
6. Conclusion
We developed two wireless multi-hop localization games, i.e., a war game and a tag game,
based on classical field games. The proposed games are played using mobile game consoles
with ad-hoc networking capabilities. The fundamental concept underlying a wireless multi-
hop localization game is that players on a team establish an ad-hoc network to estimate their
positions and then compete for positioning accuracy with other teams obtained using a multi-
hop localization technique. Using simulation, we found that node velocity and obstruction
positions were parameters to control the win rate for the war game. In the tag game, the higher
connectivity constraint led to be surviving longer. The simulations demonstrated that the win
rate for the proposed games depends on obstruction positions and connectivity constraint.
We also demonstrated that introducing a design parameter and enforcing local rules were
needed to control the win rate for the game. The results demonstrated that the proposed
games worked well as games with ad-hoc networking capabilities.
In this work, we simply assumed that nodes had random motion to investigate the primi-
tive operations of proposed wireless multi-hop localization games. In the real world, players
668 Radio Communications
Fig. 13. Snapshots of tag game for time steps (a) 500 and (b) 1000 (N=200,
CT1,T2,T3,T4 ={0,2,5,8}). Teams 1, 2, 3, and 4 correspond to circles, triangles, squares, and di-
amonds. Oni is represented by star. Cross on node represents dead state.
would cooperate to minimize their positioning errors, or oni would employ a strategy to track
alive nodes. These motions can be embedded into node mobility in simulations to obtain
more realistic game results. Since the presented study only covered a range of application
proposals on combining ad-hoc networking and multi-hop localization, we suggest that there
is a need for further research in terms of appropriateness and effectiveness for the games.
Our future work includes detailed evaluations of games with various location-based strate-
45
Number of alive nodes
80
Positioning error (%)
40
40
60
35 35
40
30
30
20 25
25 0 20
0 500 1000 0 500 1000 0 500 1000
Time step Time step Time step
Fig. 14. Positioning error, ratio of estimated nodes, and number of alive nodes (N=200)
Wireless Multi-hop Localization Games for Entertainment Computing 669
Fig. 15. Snapshots of tag game for time steps (a) 500 and (b) 1000 with local rule of death
penalty enabled (N=200, CT1,T2,T3,T4 ={0,2,5,8}). Teams 1, 2, 3, and 4 correspond to circles, tri-
angles, squares, and diamonds. The oni is represented by a star. A cross on a node represents
a dead state.
gies with positioning errors, actual game testing in the real field, and verifying the degree of
user satisfactions when they actually play the proposed games.
90 40
Positioning error (%)
50
80 30
40
70 20
30
60 10
20 50 0
0 500 1000 0 500 1000 0 500 1000
Time step Time step Time step
Fig. 16. Positioning error, ratio of estimated nodes, and number of alive nodes with local rule
of death penalty (N=200, κ = 0.5 and ω = 2).
670 Radio Communications
7. References
[1] Zigbee Alliance, http://www.zigbee.org/.
[2] MANET Working Group, http://www.ietf.org/html.charters/manet-charter.html.
[3] Nintendo Co.,Ltd, http://www.nintendo.com/.
[4] Sony Computer Entertainment Inc., http://www.scei.co.jp/index_e.html.
[5] Namco Limited, http://www.namco.co.jp/.
[6] Hot Shots Golf: Open Tee, http://www.us.playstation.com/PSP/Games/Hot_Shots_Golf_Open_Tee.
[7] J. Navas and T. Imielinski, “GeoCast - Geographic Addressing and Routing,” Proc.
ACM/IEEE Mobicom, pp. 66–76, 1997.
[8] N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero III, R. L. Moses, and N. S. Correal,
“Locating the Nodes–Cooperative Localization in Wireless Sensor Networks,” IEEE Signal
Processing Magazine, vol. 22, pp. 54–69, 2005.
[9] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less Low Cost Outdoor Localization For
Very Small Devices,” IEEE Personal Communications Magazine, vol. 7, no. 5, pp. 28–34, 2000.
[10] D. Niculescu and B. Nath, Ad Hoc Positioning System (APS), Proc. IEEE Globecom, vol. 5,
pp. 2926–2931, 2001.
[11] A. Savvides, C. Han, and M. B. Strivastava, “Dynamic Fine-grained Localization in Ad-
hoc Networks of Sensors,” Proc. ACM/IEEE Mobicom, pp. 166–179, 2001.
[12] C. Savarese, J. Rabaey, and K. Langendoen, “Robust Positioning Algorithms for Dis-
tributed Ad-hoc Wireless Sensor Networks,” Proc. USENIX Technical Annual Conference,
pp. 317–327, 2002.
[13] T. He, C. Huang, B. M. Blum, J. A. Stankovic, and T. Abdelzaher, “Range-free Localization
Schemes for Large Scale Sensor Networks,” Proc. ACM/IEEE Mobicom, pp. 81–95, 2003.
[14] D. Niculescu and B. Nath, Ad Hoc Positioning System (APS) Using AoA, Proc. IEEE
Infocom, vol. 3, pp. 1734–1743, 2003.
[15] N. B. Priyantha, H. Balakrishnan, E. Demaine, and S. Teller, “Anchor-free Distributed
Localization in Sensor Networks,” Technical Report TR-892, MIT LCS, 2003.
[16] D. Moore, J. Leonard, D. Rus, and S. Teller, “Robust Distributed Network Localization
with Noisy Range Measurements,” Proc. ACM Sensys, pp. 50–61, 2004.
[17] D. K. Goldenberg, P. Bihler, M. Cao, J. Fang, B. D. O. Anderson, A. S. Morse, and Y. R.
Yang, “Localization in Sparse Networks using Sweeps,” Proc. ACM Mobicom, pp. 110–121,
2006.
[18] J. Liu, Y. Zhang, and F. Zhao, “Robust Distributed Node Localization with Error Man-
agement,” Proc. ACM Mobihoc, 2006.
[19] M. Li and Y. Liu, “Rendered Path: Range-free Localization in Anisotropic Sensor Net-
works with Holes,” Proc. ACM Mobicom, pp. 51–62, 2007.
[20] Y. Wang, J. Gao, and J. S.B. Mitchell, “Boundary Recognition in Sensor Networks by
Topological Methods,” Proc. ACM Mobicom, pp. 122–133, 2006.
[21] S. Lederer, Y. Wang, and J. Gao, “Connectivity-based Localization of Large Scale Sensor
Networks with Complex Shape,” Proc. IEEE Infocom, pp. 13–18, 2008.
[22] Geocaching, http://www.geocaching.com/.
[23] S. Bjork, J. Holopainen, P. Ljungstrand, and K. Akesson, “Designing Ubiquitous Com-
puting Games – A Report from a Workshop Exploring Ubiquitous Computing Entertain-
ment,” Personal and Ubiquitous Computing, vol. 6, pp. 443–458, 2002.
[24] A. D. Cheok, K. H. Goh, W. Liu, F. Farbiz, S. W. Fong, S. L. Teo, Y. Li, and X. Yang,
“Human Pacman: A Mobile, Wide-area Entertainment System Based on Physical, Social,
and Ubiquitous Computing,” Personal and Ubiquitous Computing, vol. 8, pp. 71–81, 2004.
Wireless Multi-hop Localization Games for Entertainment Computing 671
1. Introduction
The motive for this research has been the famous quote of Lord Kelvin “You can not
improve what you can not measure”. Today’s information era has given new interpretations
to this, expressing the need to measure abstract concepts such as Information Security.
There are multiple sources, ranging from academic research to industrial reports, such as
(Danahy, 2004), (Fisher, 2009) and (Sonnenreich et al., 2006) that share the same view and
highlight the importance of measuring security within the context of Information
Technologies.
This chapter provides the necessary information as well as the proper tools to measure the
security of both IT Systems and business services are based on IT Systems. The main target
of the methodologies that described is to provide a better way for managing the security of
IT Systems and Infrastructures.
The first section of this chapter covers the basic requirements of any security measurement
methodology. The second section of this chapter introduces a taxonomy of the existing
security measurement methodologies. The third section highlights the limitations of the
existing security measurement methodologies and supports that security should be
calculated instead. The fourth and final section of the chapter elevates the need of new
measurement methodologies for network security. New methodologies should be taking
into account business needs apart from the traditional information technology
requirements.
Focusing on the research area of IT (Maizlitsh, 2005) distinguishes between metrics that are
used to quantify values that act as a control of proper functionality and those that act as a
performance indicator. Security measurement is a topic that falls under the first category of
controlling the proper functionality of security processes.
674 Radio Communications
Although IT Security measurement is very interesting and useful topic in both academic
and industrial environments, it deals with the quantification of an abstract concept.
Similarly to any other abstract concept, security measurements tend to have rather vague
implementations. This is justified by the fact that is hard to provide a figure that could
express the current level of security. Thus, the difficulty of measuring security leads to the
research of proper methodologies that could define the appropriate metrics as well as
describe the necessary measurement process.
The expected benefits from the measurement of security are:
Enable business strategy: IT Security is essential for the development and the
support of trust between organizations, partners, customers and employees. This
implies that there measuring the current level of security can held the alignment of
business and technology strategies with security aspects and requirements.
Support the daily business activities: Security measurement can accommodate the
increases of the value of information and thus the increased risk levels related to
each organizational asset.
Facilitate risk management: The provision of a better toolset for managing risks can
improve decision making as well as taking advantage of business opportunities.
Comply to regulatory and legal requirements: Being able to present and report the
current status of security and risks is the basic condition for compliance.
Aid an analyst to diagnose the issues that are related to security and evaluate the
performance of the existing mechanisms and processes.
Focus the measurement interest to the causes, the media and the meaning of the
results instead of the methodologies that were used.
According to (Jaquith, 2007) each measurement methodology should have as many of the
following characteristics as possible:
Consistently measured
Cheap to gather
Expressed as a number
Contextually specific
Partial weight
Repetitiveness
Comparability
A measurement methodology can ensure its consistence by recording the individual steps
of measurement using a way that will be transparent and explicit to the person that will be
asked to measure. Each measurement methodology should explain “how” each step should
be applied and “why” it is applied with this particular way.
The high cost of measurement methodology can be caused by a series of factors such as the
frequency of measurements, the complexity of process and its non automated nature.
It is therefore reasonable for a model of measurement to also make proposals on the most
optimal candidate sources of data, in the light of saving time and money
Thus, measurement methodologies that are not expressed as numbers are not suitable for
the measurement of security. Indicators such as traffic lights with the three possible values
“red, yellow, green” they do not constitute some type measurement since they do not
include some kind of numerical scale.
It should be noted that the colors of traffic lights can be used as depiction or presentation of
the current state but in a more abstract level accompanying the necessary numerical data
that should remain the main objective of security measurement.
In certain cases it is better to use more than one measurement units aiming to facilitate the
comparison of different applications. In the previous example the more general
measurement unit can be also mentioned as the “number of individuals that tried to invade
in the IT building”, which is also another unit of measurement. The use of this unit can be
Measuring Network Security 677
more suitable for the comparison with another measurable size, that of “total number of
individuals that enters in the IT building”.
Another requirement for the good measurement methodologies is that they mean
something to the persons that examine them. They could reveal issues of infrastructure or
service under review improving or demonstrating the value of persons and processes for
the organisation. Even if the close relation to the general context does not constitute a main
requirement for a good measurement, it helps to maintain measurement results inside the
framework of the organisation under discussion while making the results more useful. This
should benefit the end recipients (which are usually the management executives of
organisation) to comprehend the current security status and decide with rational way based
on results of the measurements.
As an example it can be mentioned the use of measurement as "the mean number of attacks"
for the entire organisation. This measurement can have the all above characteristics
(consistence, numerical price etc.) but it does not help anyone to improve his work. If this
measurement is differentiated and connected with the enterprising services that it offers, as
the servers of an electronic trade service, it will be a much more important tool for the
decision-making process of more specific sectors, such as the protection of specific servers
but also the physical protection of personnel.
This characteristic is related with the previous paragraph (“Contextually Specific”) due of
the relativity that is implied between measurable sizes and the overall security of the
organisation. It differs however in the fact that the requirement of overall estimation
includes the way and the size with which a specific measurement influences the security
and the operation of organisation.
It should also be clarified that the requirement of an overall estimate could also be
considered an extension of measurements, which could even require some form of
calculation.
3.6 Repetitiveness
The requirement of repetitiveness includes the measurement of same factors while applying
the same measurement methods in different time periods. This repetition aims in the
verification of previous measurements as well as in the observation and recording of the
evolution of a particular size.
678 Radio Communications
Thus, this repetition should not constitute measurement from one only person but be also
verified from the measurements of different persons.
Regarding the evolution of factors that are measured, the measurements should be
performed periodically, in order to detect unexpected changes, or immediately after a
particular known change which will probably influence security.
So, the measurements should be calculated with a frequency proportional with the rate of
change of process. The methodologies that use samples at regular time intervals can help
the organisations to analyze the effectiveness of security in precise time intervals and
prepare them to be in the position to react in time in case of a new security incident. As
expected, in a decision for whether a measurement should be calculated often, the cost of
measurement should be taken into account in terms of time and money. Alternatively
measurements could be performed only before and after each change.
3.7 Comparability
Also, it is very important that one should measure and observe the improvement or the
deterioration of security as time advances. For this reason, the results of measurements
should comparable to corresponding results of other organisations or different situations for
the same organisation so that they can be contrasted to the current security status.
As reported above, a way to do that is to use common sizes and units of measurement.
Additionally, is possible to measure in equivalent or relevant time periods points that share
common characteristics, such as measurement of number of robberies during the last and
first day of each month.
an entire organization because they do not take into account many factors such as
operational flaws and personnel security. Moreover, the results are not related at all to the
number of actual security incidents.
The main issues regarding this kind of approach are that it is very subjective and tends to
change every time the Auditor changes. Again the outcome is more like a rating than a
proper measurement.
An effort that could be included in this category is that of (Knorr, 2000). Within its
framework, is proposed a structured approach for the analysis of metrics of security and for
the quantification of the overall security of Electronic Business Applications. It uses a table
that represents “overall security” and divides it to smaller parts. These parts correspond to
680 Radio Communications
sites, potential targets and mechanisms of application security and are connected with the
participating parts of an Electronic Business Application (customer, tradesman, means of
communication). This process aims to the calculation of a quantifier of an Electronic
Business Application, which functions as a means for the analysis, planning and
comparison tool of similar applications.
Another approach that falls under this category is the one by (Serrelis, 2007) that aims to
offer the foundation for a model that could help security analysts to quantify and measure
security. Comparing to the requirements that were initially set, the suggested model has
supported the consistency requirement throughout the document by the use of questions
with objective answers. The questions also aimed to answers which would be cheap to
gather, since the answers could come from automated systems such as IPSs. Additionally
the model has managed to express security as a number (percentage). Security calculation
has used at least one unit of measure (such as blocked spam emails) satisfying another
requirement of a proper quantification model. The last requirement has also been covered
since the level of security of the overall enterprise or the individual services makes a lot of
sense to management people. Thus the model can also claim to be contextually specific. On
the downside, it should be pointed out that the model is not considered so much with the
new products, but with the existing services. Other type of questions should be posed to
calculate the security level of new services and/or products.
A typical example of this category is the approach that is presented in (Campbell, 2003),
where the economic impact of incidents of security it is examined. The economic impact is
translated in fall of the stock prices of an organisation, as a result of the negative image that
is created in the investment public. Thus the stock price constitutes a factor which can
indirectly be related to the level of security of organisation.
This approach has been an important factor for the development of the approach proposed
and presented in paragraph 6, which also aims in the development of methodology for the
objective measurement of security using factors that are related indirectly to security.
Another, alternative way of calculation of sizes is also the statistical analysis, eg. the
calculation of likely results of an electoral result.
In every case the calculation of a factor is advisable in cases where his direct measurement
or the quantification of its size is not feasible. These cases mainly include abstract concepts
that are not straightly measurable, with security being a very representative example.
The calculation of security is differentiated from the measurement of security. While the
measurement is based on the collection and representation of primary data, the calculation
uses primary data with a combinational way so that it produces a result which represents
security.
Because of the abstract nature of IT security, a direct measurement will not have real and
usable results since it will be based on the limitations of the methods reported in the
previou chapter. The calculation of however of security can be more efficient by overcoming
these limitations using measurable sizes.
There are various methods for the calculation of security. These can depend on the
judgments and estimates of researchers thus they are labelled as classifications or
gradations. A second category of methods can be based on statistical methods, which could
lead to an estimate of the level of security. Other methods can combine the measurement of
values with the co-calculation of which the value of security could be deduced.
It should be also clarified that the methods of calculation and the methods of measurement
of security do not constitute alternative solutions from each other, but complementary.
Precise measurement of security should not be considered feasible, due to its abstract
nature, but due to the fact that calculation of security cannot be reliable if it is not based on
measurable factors. The researcher of security should therefore use measurement
methodologies that would result measurable factors. From the combination of these sizes
the value of security will also be deduced.
It becomes easily understood that the calculation of security can be realised with two ways.
These are the quantification of non measurable factors and abstract significances, such as
security and the use of measurable factors that are measured with the appropriate security
measurement methodologies. The latter involve measurable factors and are applied as a
type of quantitative analysis. Also, the level of security can result as an estimate of the
researchers which is applied as a type of qualitative analysis.
related indirectly with security as well as with the level of security of specific business
services.
This approach is based on the principle that the abstract concepts can be calculated with the
combination of factors that is related indirectly with them and themselves can be easily
measured. At the same time it seeks the satisfaction of following general requirements:
For the application of the particular methodology of calculation of security, the sources of
primary data should be determined in order to be combined for security calculation. This
particular methodology considers that the value of security can result from the combination
of parameters that are related with it. The factors that were selected are five and they all
concern certain business, functional or commercial value. These five factors are mentioned
as CARLS from initial their names in the English language. These are:
Return: It expresses the size of profits that results from the particular service.
Liabilities: It expresses the size of economic losses due to the particular service.
Stock price: It expresses the price of stock of the company that offers the service.
All factors are essentially different aspects of business services and should be available in
order be composed in a value that would represent the level of security for each of the
business services. The usage of these specific factors has two basic advantages, which are
the main reasons for their choice in this model.
The first advantage is the fact that all factors are already have been measured by
organisations for reasons of operational evaluation. This means that there is no need for
additional effort in order to assemble the information required. The second advantage is the
fact that each factor provides an objective image of the organisation and its particular
business services, which objectivity can not disputed.
The measurement and monitoring of all factors is considered essential for the development,
viability and proper operation of each organisation. It is exceptionally usual, in the great
majority of organisations, to monitor and collect all the above factors. In many cases these
factors are also measured for each business service separately. This fact makes the collection
Measuring Network Security 683
of the necessary elements a simple, easy and feasible process. Moreover, the CARLS factors
have a lot more meaning for the persons that are found in not technical positions and their
mentality is directed form the operational needs of their organisations. Compared to other
approaches this can be seen as an advantage because using this methodology the
understanding but also the usability of the value of security is facilitated which is based on
familiar notions and no on technical terms as “integrity” and “confidentiality”.
The main objective remains the calculation of the value of security of a specific service. This
is implemented with the determination, the quantification and the combination of factors
that can be measured easily and that is related indirectly with the security. This value
portrays the level of security of specific service. Τhe following paragraphs present the
arguments in favour the choice of the particular factors, sating why CARLS factors are
considered suitable for the calculation of security as well as an analysis for each one from
them.
Compliance: The impact of non-compliance is profound. While many small issuers can
operate with inconsistent compliance processes, problems eventually arise. Instead of
focusing on the regulatory and punitive aspects of incomplete or ineffective compliance, this
white paper will examine the functional impact of not remaining compliant with security
regulations. Compliance can impact liquidity, which can affect your ability to raise funds for
growth. The difficult aspect of compliance is knowing everything you have to do, when and
how. Ongoing compliance requires an investment – for the same reasons as the initial
compliance work you did when going public. The liquidity opportunities that initially
attracted your company to the publicly traded arena are the same reasons for remaining
compliant.
Availability: Government organizations and businesses of all sizes need to create and
implement comprehensive business and operations continuity plans. Most organizations
understand that they need to protect their data and systems -an activity known as disaster
recovery. The disaster recovery is only half the battle-enterprises need also be prepared to
quickly and seamlessly restart business processes in order to continue operations.
Return: The owners of a company and the company’s creditors share a similar goal: to
increase wealth. They are thus very concerned about profitability in all phases of operations.
Creditors are specifically concerned that the company use its resources profitably so that it
can pay interest and principal on its debt. Owners are concerned that the company be
profitable so that stock values will increase. Company managers must show they can
manage the owners’ investment and produce the profits that owners and creditors demand.
Because top management must meet the profit expectations of company owners, it passes
down to the lower levels of management those profitability goals, which are then spread
throughout the company. All managers, therefore, are expected to meet profitability goals,
which are often increased and tightened as each level of management seeks a margin of
security.
Liabilities: Most health related businesses would agree that securing insurance is one of the
basic costs of doing business. As responsible business owners, they have budgeted for the
appropriate coverages as a precautionary measure in the event of a loss— especially a
catastrophic loss. However, there are a few optimistic souls who think of business insurance
684 Radio Communications
as an option. These risk takers appear perfectly content to operate their salons with little or
no coverage in place. Unfortunately, most financial experts agree that this is a very
dangerous practice, as those who gamble and lose usually pay a much higher price in the
long run. The bottom line is, while none of us ever expects to get sued, we’ve all got to
accept that even the most adept operator may face litigation for any number of reasons.
While there are a wide variety of insurance coverages available for protecting yourself and
your business, one of the most essential is liability. Liability is an especially important issue
for those in the tanning industry, whose business is providing customers a service which
may pose some risk of injury to them. Liability risks come in many more forms than might
be expected. In addition to liability arising specifically from the use of tanning equipment,
salon owners also may be held accountable for a variety of other kinds of business liabilities,
such as a customer slipping and falling.
Stock Market: By using a stock market return framework to examine the economic
implications of information security breaches, [3] study contributes to the literature
examining the economic effects of information security breaches. We find there evidence of
an overall negative stock market reaction to announcements of information security. The
economic cost of publicly announced information security breaches 445 breaches in major
newspapers, although this finding is not robust across all specifications. Nevertheless, these
results provide some support for the argument that information security breaches adversely
affect the future economic performance of affected firms.
The choice of the above factors satisfies the two of the three basic requirements that had
been placed within framework of the current approach of for the calculation of security, that
is to say to appreciate security as a factor that is part of the business production
environment as well as to use and combine measurable factors that can be quantified with
objectively.
Based on the ideas described in the previous paragraph, a figure that would represent the
level of security for a specific service should take into account all security factors presented.
In order to mathematically express a formula that calculates security, several assumptions
have been made.
Firstly, the notion of Target level for each factor is introduced. The target level is set by the
upper management who is responsible for the overall operating constrains, such as security,
of each business service offered. Within this context, the target level of Compliance,
Availability, Returns and Stock Price are set. The target level of compliance can be the
compliance to a specific industry directive or governmental law or even an international
standard. Similarly, the target level of Availability should be defined taking into account the
business needs of each service.
The Current level of Compliance will be represented as a “Yes” or “No” factor in order to
keep the model as simple as possible. A future extension to that model can express the
current compliance level as a percentage, signifying that a service does or does not cover all
compliance needs (e.g. covers a law but not a specific international standard).
So, the Security figure for each service can expressed as a function of independent variables
by the use of following formula:
Measuring Network Security 685
C A RL S
SS (1)
CT AT RT ST
Where:
Having expressed security using the formula above, a proper usage of the results could be
to a financial motivated one. Our target is to balance the spending in Security for each
Business Service in order to maximize the organisation’s Return on Investment:
subject to
(R
i 1
i I i Li ) 0 (3)
Where:
Using the last formula another objective is achieved. This is the connection of results of
calculation of security with the business decisions that are related to security investments.
In other words this formula aims to answer the question whether a security investment
would cost more than the expected benefits.
7. Conclusion
The question that was analyzed in this chapter is whether and how the principles of the
security measurement methodologies can be applied so that the objective measurement of
security of business services can be achieved. The motives that support this question are
focused in the justification of expenses and investments that are related with to security.
Thus, although the management of security is closely related to technical and organisational
686 Radio Communications
level it is often difficult to define a quantified “version” of security that would be more
comprehensible and usable in operational level.
This chapter also presents a critical evaluation and categorisation of the requirements of
measurement and calculation methods of security, on which the restrictions of approaches
that exist are based. Additionally a new security calculation approach is developed that
attempts the quantification of security with the use of factors that are related indirectly to
security.
The basic principle that was followed is that the research focus should be moved from the
measurement of security to the calculation of security. Other principles were:
The approach for the quantification of security is implemented via calculation. The variables
that are used for the calculation are the CARLS factors, that is to say Compliance C with the
legal and regulatory framework, Availability A of business services, Return R of each
business service, Liabilities L due to specific services and the Stock price S of the
organisation that reflects its fame and public image. The methodology supports that the
security is mirrored in each one from these factors and hence the factors are related
indirectly to that. This connection is expressed with a mathematic formula through the use
of which the factors are considered equivalent.
An important advantage of the methodology is that through its use the management
executives can comprehend more immediately the values that are produced by this and
evaluate better where they should focus and support the security investments. This is
particularly important because Security is an abstract concept which it is not easy to eb
expressed as a measurable value.
One of the restrictions of method is the fact that the all factors they are considered
equivalent during the calculation of security. A future research could investigate further the
degree that security is influenced from every parameter as well as how this is altered in
terms of service, organisation or market type.
Measuring Network Security 687
8. References
Danahy, J. (2004) The Need for Metrics and Measurement in Application Security, OWASP
Metrics and Measurement Standards
Fisher, D. (2009) Experts call for better measurement of security, Blog, recovered: 14/6/09,
http://www.threatpost.com/blogs/experts-call-better-measurement-security
Sonnenreich, W.; Albanese, J. & Stout, B. (2006) Return On Security Investment (ROSI) – A
Practical Quantitative Model, Journal of Research and Practice in Information
Technology, Vol. 38, No. 1, February 2006
Maizlitsh, B. & Handler, R. (2005) IT Portfolio Management: Step by Step, John Wiley &
Sons, ISBN: 978-0-471-64984-7, US
Sommerville, I. (1996) Software Engineering, Fifth Edition, Addison-Westley, ISBN: 978-
0201427653, UK
Tipton, H. & Krause, M. (2008) Information Security Management Handbook, Sixth edition,
Auerbach Publications, ISBN 978-1420067088
Olzak, T. (2007) The Pros and Cons of Security Risk Management, Tech Republic, recovered:
14/6/09, http://blogs.techrepublic.com.com/security/?p=180
Parker, D. (2007) Risks of risk-based security, Communications of the ACM, Volume 50,
Issue 3 , March 2007, pp 120.
Jaquith, A. (2007) Security Metrics: Replacing Fear, Uncertainty, and Doubt, Addison-
Wesley Professional, ISBN 978-0321349989
Campbell, K.; Gordon, L. A.; Loeb, M. P. & Zhou L. (2003) The economic cost of publicly
announced information security breaches: empirical evidence from the stock
market, Journal of Computer Security, Volume 11, Issue 3 (March 2003) pp 431–
448
Serrelis, Em. & Alexandris, N (2007) An Empirical Model for Quantifying Security Based on
Services, IEEE Computer Society, Proceedings of the International Multi-
Conference on Computing in the Global Information Technology, pp 30
Knorr, K.; Rohrig, S. (2000) Security of Electronic Business Applications: Structure and
Quantification, Proceedings of the 1st International Conference on Electronic
Commerce and Web Technologies EC-Web 2000, pp 25-37
688 Radio Communications
A testing process for Interoperability and Conformance of secure Web Services 689
1. Introduction
The design, development and implementation of electronic (e-) services relying on XML and
Web Service (WS)-based technologies is the current trend in achieving interoperability. E-
services can be offered either as autonomous Web Services or embedded in Service Oriented
Architectures (SOAs) (High et al., 2005).
In this context, despite the fact that applications with similar business goals adopt the same
technical standards, quite often their interactions capabilities are extremely limited. Thus,
application developers show an increasing concern for evaluating interoperability between
common services which are offered either autonomously or through a SOA. The creation of
a proper framework (EIF) has a significant importance in the evaluation of interoperability
of such services and is accomplished by the precise definition of the applied standards and
guidelines which guarantee the interaction of the services. Existing testing methodologies
developed by various organizations (e.g ISO/IEC 9646, ESTI) treat the interoperability of
services as a generic problem. They merely provide guidelines and describe high level
testing procedures that can be applied to test interoperability of various telecommunication
as well as software and data communication systems. Most Web Service-oriented
methodologies (i.e. WS-I, ebXML IIC framework) demonstrate weaknesses as they are not
capable of testing all the required aspects that compose an interoperability framework and
mostly the security aspects of the message content.
Additionally, in literature, specific testing types (Saglietti et al., 2008) have been presented
defining diverse testing approaches that treat the applications under test either as white
boxes having full knowledge of the software or as black boxes without any understanding of
their internal behaviour or even as grey boxes with limited knowledge of their internal
architecture. The nature the WSs (e.g. geographic distribution of the examined WSs and
dependencies with external trusted third parties) plays an important role in the adoption of
the most appropriate testing type as they raise specific challenges that should be underlined
and taken into account.
Therefore, there is a specific need for targeted methodologies and frameworks that check
and guarantee the end-to-end application interaction capabilities of common Web Services
and follow and deploy the most appropriate testing strategies covering all WSs aspects.
Identifying this need, this paper proposes a well-formed grey box testing methodology
690 Radio Communications
entitled ICoM, able to test whether various services achieve communication effectively
based on the adopted standards. It defines the precise structure of the involved parties,
specifies distinct steps to follow, describes concrete tests that should be applied, and enables
the execution of specific testing suites. ICoM has been applied in order to evaluate the
interoperability of the existing autonomous SELIS e-invoicing service (Kaliontzoglou et al.,
2006) and the SWEB e-invoicing service embedded in a SOA-based platform (SWEB),
(Karantjias et al., 2008).
2. Prior Work
This section presents the existing testing methodologies and frameworks illustrating their
weaknesses and indicating the need for a more holistic methodological framework. Widely
used types of testing are also described identifying the most appropriate method that
should be applied to WSs due to their inherent characteristics.
Currently, there are only two widely used WSs testing methodologies, WS-I and ebXML:
The Web Service Interoperability Standardization Organization (WS-I) (Seely & Lauzon,
2005), (Ehnebuske, 2003) is an industry consortium chartered to promote WS
interoperability across platforms, operating systems, and programming languages. It has
released a number of profiles and testing tools that compose a scalable testing environment.
The shortcomings of this methodology are the following:
1. WS-I does not support the definition of specific and discrete test cases that should be
followed during the tests.
2. WS-I tools achieve to monitor only the message flow, without being able to control the
testing execution.
3. WS-I tools do not achieve to support a wide range of evaluation criteria
(interoperability areas or multiple types of testing). They achieve to test only the
conformance of the exchanged messages and the defined services’ descriptions against
the appropriate standards. They fail to cover criteria regarding the interoperability and
the conformance of the applied security features of the message content and the
transformation of the exchanged documents between different formats.
OASIS ebXML (ebXML, 2001) is an end-to-end B2B XML framework that provides concrete
specifications for dynamic B2B collaborations. It has specified the Implementation,
Interoperability, and Conformance (IIC) test framework (OASIS, 2003), (Lee, 2005), (Kim &
Yun, 2003) describing the required architecture and providing the necessary test material to
be processed by the architecture, a mark-up language and format for representing test
requirements, and test suites (set of Test Cases). This approach has the following
shortcomings:
1. ebXML IIC is intended to support conformance and interoperability testing only for
ebXML specifications and implementations.
2. ebXML IIC does not impute the responsibility of a communication failure to the
corresponding system.
3. ebXML IIC does not cover criteria regarding the interoperability and the conformance
of the applied security features of the message content and the transformation of the
exchanged documents between different formats.
Despite their weaknesses, the above frameworks can be used as the basis for the
development of enhanced and more targeted methodologies to test and guarantee the inter-
working of common WS-based applications.
In White box testing, the tester has access and knowledge of the internal data structures,
code, and algorithms of the software. A White Box tester typically analyzes source code,
derives the corresponding test cases and targets specific code paths to achieve a certain
level of code coverage.
In recent years the term Grey Box testing has come into common usage and it refers to a
technique of testing the system with limited knowledge of its internal architecture. The
tester usually has access to specification documents (beyond simple requirements) and
generates tests based on information such as state-based models or architecture
diagrams.
The selection of the most appropriate testing type relies on the nature of the application
under test. Web Services (WSs) are composed by a set of related and integrated services
(High et al., 2005). The main characteristics of these services are the following (Rizwan &
Mamoon, 2007):
They can be distributed in the sense that they are located in different geographic areas,
having independent capabilities and are accessible only via specific interfaces that are
described by WSDL documents.
They can be implemented in diverse programming languages and support independent
operating systems.
They can be chained with dependencies on other trusted third parties such as PKI and
timestamp authorities.
The business design of WSs is essentially a composition of these repeatable services which
represents and forms the desired business logic. The above features of the WSs introduce
several challenges with respect to testing. White box testing especially in a SOA
environment is quite impractical to perform due to the nature of the WSs that make access to
source code or binaries very difficult. On the other hand, the WS interoperability testing
methodologies (WS-I, ebXML IIC) adopted in the frameworks analyzed in the previous
paragraph only enable black box testing of WS, leading to limited and inefficient test
coverage due to the “blind” nature of that type of testing.
The distributed nature of Web Services makes Grey Box testing ideal for detecting
interoperability flaws on the communication channels between WSs, mostly by leveraging
the rich information contained in the descriptions of the services interfaces (WSDL
documents). A Grey Box Tester is able to identify at a high level the internal structure of the
tested WSs, defining the composed services and accessing the provided interfaces having
limited or even no access to the actual code. Additionally, several test cases regarding the
deployment of the security features and the communication protocols can be performed
covering all the aspects of the WSs. Therefore grey box testing has been adopted as the most
appropriate type to use in the methodology proposed in this paper.
Clarity: the methodology specifies concisely the evaluated entities and the required
information items for the testing process (e.g. test cases and test data).
Adaptability & Extensibility: the methodology is extensible in the sense it may easily
evaluate new aspects of the WSs and adopt and integrate new testing tools and
libraries.
Flexibility: the methodology is parameterizable in the sense that different parts of the
methodology can be adopted for the realization of specific sets of test suites.
Structural: the methodology is structured and comprises a definite and precise set of
implementation steps.
Independency & scalability: the methodology offers a high level of independency from
testing technologies, the number of entities involved and the platforms hosting systems
under test. This fact will offer the possibility of testing interoperability on several
different WSs.
In order for the methodology to accomplish its objective goals comprises of four district
phases:
Phase 1“Entity identification and setting”: the entities involved are identified and their
specific setting and order for the tests is defined. The involved entities are the Systems
under Test (SuTs) being evaluated for interoperability and conformance and the Test
Coordination Infrastructure (TCI) which monitors the testing suites applied by the SuTs
in order to identify any erroneous behaviour.
Phase 2“Entity structure definition”: the structure of the involved entities is identified.
This includes the SuTs, which consist of the actual WS under evaluation and the specific
structural additions of the testing infrastructure that are required in the testing
procedure. The internal structure of the WS is immutable and an analysis of the
available services is carried out. This phase also includes the specification of the precise
structure of the TCI.
Phase 3 “Conformance testing”: the definition and generation of the executed
conformance test cases for each SuT, based on which the parameterization of the SuTs
structural additions and the TCI is completed. Each SuT is evaluated against the
adopted standards.
Phase 4 “Interoperability testing”: the formulation and the derivation of the
interoperability test cases, performing the necessary parameterization of the the SuTs
structural additions and the TCI. The actual interoperability testing between all SuTs’
communications takes place during this phase.
x 7HVWLQJ6FHQDULR
x 5ROH GHWHUPLQDWLRQ
Example 1
A testing process for Interoperability and Conformance of secure Web Services 695
acting as the Invoice Issuer (role: Issuer) that invokes SWEB SuT, which acts as the Invoice
Recipient (role: Recipient) handling the dispatched invoice and responding with an
acknowledgment. This scenario covers specific aspects of an invoicing transaction such as
the issuance, dispatch and receipt of an invoice document. The TCI triggers, monitors the
execution of the applied testing suites.
All these services, following concrete procedures, manage and derive data that are based on
specific standards. The factual conformance of these data to the individual requirements
specified by the corresponding specifications and the ability of other systems to handle these
data correctly constitute factors that are able to leverage and infer the interoperability and
the conformance capabilities of a WSuT. Take for example the case where the security
service of a “WSuT A” signs a XML document according to the W3C XML Digital Signature
696 Radio Communications
standard. Initially, the produced signed document should be tested for compliance with the
principles of this standard and then there should be test that another “WSuT B” is able to
successfully verify that signature. The conclusion that comes from this example is that the
“WSuT A” produces signed documents that conform to the W3C XML Digital Signature
standard and is able to interoperate successfully with the “WSuT B” on the application of
signature at the business level.
Thus, in order for a WSuT to derive the required evaluation data, it should perform a certain
number of activities as represented and indicated by specific test cases. A test case comprises
a set of conditions and variable and depicts the test control logic which is sufficient for the
execution of a testing suite.
ICoM deals with the execution of test cases and the collection of the respective data defining
two structural components the 6HUYLFH2UFKHVWUDWLRQ(QJLQH and the 5HSRUW(QJLQH as seen on
the following figure. These components are part of the testing infrastructure and along with
the WSuT compose an integrated SuT.
The Service Orchestration Engine is responsible to coordinate the available WSuT’s services
to perform specific workflows. Each workflow is represented by a predefined BPEL process
which imprints the logic of an executed test case. The BPEL test cases that will be adopted
and executed are designed during phases 3 and 4 where the actual conformance and
A testing process for Interoperability and Conformance of secure Web Services 697
Concluding, ICoM defines four major steps that lead to the definition of a SuT.
1. serviceidentification: Identification of the primary services of the WSuT.
2. interface analysis
: Analysis of the services’ interfaces and data types used per service,
extracting the messages types of the inputs and outputs as described in the WSDL
documents. This may include an extensive analysis of several WSDL documents.
3. standardsdefinition
: definition of the standards that each WSuT adopts and implements.
4. testing components adaptation: adaptation of the two structural testing components, the
Service Orchestration Engine and the Report Engine to the WSuT.
It should be noted that the above steps are completely independent of the underlying
infrastructure and the WSuT implementation language and do not bind ICoM to a specific
technological solution. The application of these steps in our demonstrated case study is
depicted in the following example:
Example 2
The SELIS and SWEB SuTs are setup following the aforementioned four basic steps. In
SELIS, we have identified three specific areas of services with diverse functions. These
services are divided into:
Basic services, which provide the basic functions used to perform primitive tasks. SELIS
includes document management services, message and document transformation
services, message forwarding services, publication and query services and notification
services.
Security mechanisms and services that address the security requirements of SELIS-
invoicing. It supports the following security mechanisms: digital signatures, advanced
electronic signatures, encryption, timestamping and credential management.
Infrastructuresupportservices, which manage the connection with the back-office system
such as databases, wrapper software on top of legacy systems, existing ERPs etc.
Each of these services has specific known interfaces as described by the corresponding
WSDL documents having concise inputs and giving a concrete output. The standards that
adopted in the services implementations are the following:
the XML common business library version 4.0 (xCBL 4.0) and the Exact ERP XML
schema, for the representation of the invoice information,
the Extensible Stylesheet Language (XSL) Transformations, for the transformation of the
invoice documents,
several security standards such as W3C XML Encryption, W3C XML Digital Signature
and XML Advanced Electronic Signature (XAdES) for the application of the appropriate
security features on the business level and
SOAP and the WS-Security standard for Web Services invocation and
the Web Services Description Language (WSDL) for the description of invoked services.
698 Radio Communications
Figure 5 depicts the overall form of the defined SELIS SuT which is composed by the two
proposed structural testing components, the Service Orchestration Engine and the Report
Engine and the SELIS WSuT. The process is similar in the case of SWEB.
The general structure and functionality of the TCI is depicted in the Figure 6. Three
fundamental layers, the Testing Layer
, the Interoperability andLayer
the Conformance Layer
compose the TCI at a high level.
A testing process for Interoperability and Conformance of secure Web Services 699
The Testing Layer (Figure 7) consists of the Test Data Repository and the Test Executor . The
Test Executor orchestrates the execution of the deployed BPEL test cases in ICoM phases 3
and 4, based on a predefined schedule formed during these phases. Following this schedule,
the Executor invokes sequentially the interfaces provided by the SuT Service Orchestration
Engine in order to initiate the execution of the corresponding BPEL process. The invocation
of the interfaces may require as input specific parameters (test data) which are retrieved
from the Test Data Repository. As we will see in the following Section, the required test data
rely on the nature of the deployed BPEL processes and are created along with the definition
of the test cases.
The next layer of the TCI is the Conformance Layer (Figure 8) its main responsibility is to
evaluate the conformance of each SuT against the adopted standards in phase 3. The
evaluation process is performed based on the data produced by the SuT during the
execution of the BPEL test cases. This layer contains two sub-components, the Conformance
Engineand the ConformanceTester .
The Conformance Tester consists of a set of testing tools and libraries that actually assess the
conformance of these data to the corresponding standards. The exact tools and libraries that
should be adopted depend on the SuT’s standards that have been defined during the
formulation of a SuT (step 3). These range from tools that verify the conformance of a XML
document to the corresponding XML schema and libraries that validate the security features
of the XML documents to tools that check the conformance of the exchanged SOAP
messages and message descriptions against the respective standards. Therefore, ICoM as
methodology is quite extensible allowing the integration of new more updated
tools/libraries in the Conformance Tester.
In the current phase, the steps that should be performed are the following:
the identification and the integration of the required tools in the Conformance Tester,
the implementation of the appropriate tools’ interfaces that enable Conformance Engine
to invoke them. In case that the required interfaces can not be implemented due to the
700 Radio Communications
nature of the testing tools, a manual process is performed for the communication of
these components.
In this layer, the Conformance Engine acts as the recipient and the analyzer of the log files
that are produced by the SuTs in order to specify the tools that should be used for the
evaluated data respectively.
The Interoperability Layer (Figure 9) is the last but equally important layer comprising the
Message Handler and Interoperability . The Message Handler operates as the
Engine
intermediate node during Interoperability testing (phase 4) that intercepts and delegates the
exchanged messages to the SuTs. It comprises the Monitor Engine which intercepts the
SOAP messages exchanged among the SuTs and the Analyzer Engine that determines
whether these messages conform to their corresponding message descriptions.
The second subcomponent of the layer, the Interoperability Engine, is the actual
interoperability consolidation point. It obtains as input the log files that are produced by the
SuTs and the Analyzer Engine’s conformance results providing them to the test operator.
Based on these results, the test operator is able to do the following:
notify the SuTs’ interaction possibilities,
detect the inaccurate points and
impute the responsibility of the communication failure to the corresponding SuT.
Deductions are made by carrying out a process that consists of three main steps. The first
one is to verify that the SuTs possess and handle the evaluated data without the detection of
any erroneous behaviour. This means that the evaluated data are valid for all the SuTs. The
second step includes a comparison process. During this process the exchanged data (e.g.
exchanged SOAP messages and documents) are compared in order to acknowledge that the
SuTs possess the same data. In the last step, the test operator confirms that the exchanged
messages are part of the business processes that the SuTs have defined in their service
descriptions. These steps enable the operator to identify whether the SuTs are interoperable
and to what extent during the last phase of the proposed methodology.
In the following example we present the form of the TCI in our working example.
A testing process for Interoperability and Conformance of secure Web Services 701
Example 3
The TCI has been shaped as presented in Figure 10. All the layer’s components,
Conformance Engine, Test Executor and Interoperability Engine have been implemented in
Java technology. In the Testing Layer, a native XML Database, eXist has been adopted as the
Test Data Repository enabling the storage of XML-based test data. The Conformance Tester
of the Conformance Layer is shaped based on the SELIS and SWEB standards adopting
testing tools that perform the conformance evaluation. Representative tools include testing
environment and libaries for XML signature validation (IBM XML security suite (IBM XML),
IAIK XML signature library (IAIK XML), IAIK XAdES toolkit (IAIK XAdES)) and tools for
XML Schema document conformance (Altova XMLSpy).
The WS-I Tools (Brittenham, 2003), monitor (Brittenham et al., 2005) and analyzer
(Brittenham, 2005), have been used in order to operate as the two subcomponents of the
Interoperability Layer’s Message Handler, Monitor and Analyzer Engine correspondingly.
These tools provide an unobtrusive and automated way to log and analyze Web Service
messages producing the respective conformance results that will be used for the
interoperability evaluation.
Based on the above mentioned form of the TCI, the SELIS and SWEB SuT are able to be
assessed taking into account the corresponding evaluation results that are derived from the
execution of the defined test case in phase 3 and 4 of the proposed methodology.
As depicted in Figure 11, a BPEL test case is a partially-ordered list of basic activities that
that should be executed during a specific test run. The structural definition of a BPEL test
case is as follows:
test data that are fed by the TCI during the initiation of a BPEL process,
outputs of other primary services,
parameters that have been defined and are included in the BPEL
process.
An activity graph diagram is also able to provide a visualization of the BPEL test cases
(Figure 12). It illustrates and reflects the activity flow of the BPEL process in an effective
manner. A test case activity diagram is composed by {N, E, Ns, Nf} where
N is a set of nodes {N1, …, Nn} that correspond to the applied activities,
E is a set of edges {E1, …, En} that are the implicit sequence concatenations as defined by the
performed workflow,
Ns is the Start Node and Nf is the Final Node of the workflow.
In conformance testing, the designed (conformance) test cases include only internal
activities. This means that merely the services of the examined SuT interact with each other
in order to derive the evaluated data. Usually, in this type of test these data come from the
final node of the test case.
The main objective of the current step focuses on the definition of the deployed BPEL
processes based on the standards evaluated against. In this sense, the ICoM is quite
adaptable since it is able to evaluate different aspects of the WSuT.
The test operator is able to create these processes utilizing existing BPEL test case generation
frameworks or any other BPEL creation engine (ActiveBPEL, 2006). The processes are
embedded in the SuT Service Orchestration Engine and the appropriate interfaces are
implemented. During the BPEL generation phase, the required test data for each test case
are specified and produced by the conformance evaluated tools of the TCI or by any other
process.
Additionally, the test operator constructs a test case execution schedule taking into account
the complexity of the applied processes. The schedule is a XML document that consists of
the URLs of the BPEL processes interfaces and the corresponding required test data. This
schedule along with the test data is stored in the Test Data Repository of the TCI. The steps
that follow present and include the actual conformance testing sequence of the proposed
methodology.
704 Radio Communications
Execution of test : In this step, the TCI Test Executor automatically initiates the
cases
testing procedure by invoking the interface of the Service Orchestration Engine
following the execution schedule. This action triggers the execution of the
corresponding BPEL process running the defined test case. In Figure 13, the Ss is the
initial service that is invoked and Si is a set of services that contribute to the derivation
of the evaluated data by the Sf.
Collection of :results At the end of the test case, the Service Orchestration Engine has
accumulated the evaluated data that are produced as outputs by the involved service of
the WSuT. The Report Engine collects and consolidates these data in log files which are
prepared for evaluation.
Resultsanalysis . Initially, the Conformance Engine analyzes the log files and extracts the
produced data. Then, the Engine specifies the tools (tool1, … ,tooli) of the Conformance
Tester that should be used based on the nature of these data. The Engine feeds the data
via the implemented interfaces to the corresponding tools, which in turn infer the
conformance of the implementation to the respective standard. Suggestions concerning
any corrections to the implementation are also provided to the SuT, enabling the
deployment of a fine-tuning process that will correct discrepancies.
Corrective actions : Corrective actions by the WSuTs’ developers may include both re-
design and re-implementation or only updates of specific services within the WSuT.
Re-executionoffailed : When
teststhe corrective actions are complete, the SuT undergoes a
new test round to check if the previously failed tests are now successfully passed.
At the end of the last step, the process begins again from “Execution of test cases” step in
subsequent iterations until all tests are successful.
In the example that follows, it is illustrated an instance of the execution of the current
phase’s steps in our demonstrated case study.
A testing process for Interoperability and Conformance of secure Web Services 705
Example 4
Figure 14 depicts an activity diagram representing an example test case for the conformance
testing of the SELIS XAdES implementation against the XAdES standard. The actions that
compose the test case are the following:
creation of a XML Invoice Document based on the xCBL standard,
application of Advanced Digital Signature on the produced document. This process
includes four separate sub-processes which occur transparently:
o certificate retrieval of the certificate that will be used for the signature process,
o digital signing of the invoice and certain other properties according to the W3C
XML Digital Signature standard,
o time stamping by requesting, and embedding a time stamp token on the
generated signature according to the IETF 3161 standard, and finally
o revocation information inclusion by embedding certificate revocation status data
after requesting them on-line from the server of the Certification Authority that
has issued the signer’s certificate.
The above test case is to be used as follows: initially the TCI Test Executor initiates the
execution of the corresponding BPEL process of the SELIS Service Orchestration Engine
invoking the appropriate interface. The choreography of the required WSuT services derives
an xCBL invoice document signed according to the XAdES standard as illustrated in Figure
15. The Report Engine embeds the signed document to a log file which is retrieved by the
TCI’s Conformance Engine. The Engine delegates the document to the integrated IAIK
toolkit to validate the applied signature.
706 Radio Communications
During our testing effort, in the actual first execution of this test case the toolkit indicated an
incompatibility of the produced signature to the corresponding XML schema. This
discrepancy was pointed out to the developers of the SELIS-invoicing which performed the
necessary corrections. The re-execution of the test case denoted the conformance of SELIS
with the XAdES standard.
constitute instance of this scenario taking into account the variants of this scenario
based on the adopted standards.
BPEL processes should be formulated merely for the SuTs that initiate the execution of a
testing suite. For example, the specified scenario, as depicted in Figure 16, is that the “SuT
A” interacts with the “SuT B” retrieving a response. Therefore, based on a defined test case,
the “WSuT A” orchestrates its corresponding services e.g. As and Ak to execute a specific
process that enables service Ai to communicate with the service Bj of the “WSuT B”
expecting a reply which is handled it appropriately. The BPEL process that corresponds to
the above test case includes merely the actions which are executed by the “WSuT A”.
“WSuT B” reacts to this interaction creating the reply according to the logic that is included
in the implementation.
Identically to the conformance testing, the BPEL processes are created via BPEL generation
framework or any other available BPEL engine and are embedded in the Service
Orchestration Engine of the respective SuT. The execution of the test cases is defined by a
testing schedule that is prepared.
Collection of:results
The Service Orchestration Engines of the SuTs taken part in the test
case accumulate the whole of the evaluated data that are produced by all the involved
WSuTs’ services. Then the corresponding Report Engines collect and consolidate them
in log files.
Results analysis. The test results are analyzed and conclusions are made on the
interoperability capabilities of the SuTs, as presented in Section 0.
: Corrective actions may include both re-design and re-implementation
Corrective actions
or only updates of specific areas within the SuT.
Re-execution of failed : As soon as the corrective actions have finished, the SuTs
tests
undergo a new test round to check if the previously failed tests are now successfully
passed.
At the end of last step, the process begins again from second one in subsequent iterations
until all tests are successful. In the Example 5 that follows the operation of the
interoperability testing is described in detail.
Example 5
Figure 17 represents the activity diagram of an interoperability test case that is an instance of
our working demonstration scenario, as implemented by the SELIS and SWEB SuTs. This
test case includes only the actions performed by SELIS which is the actual initiator of the
testing procedure.
As depicted in Figure 18 the process begins from the service A1 of SELIS WSuT that creates a
xCBL invoicing document (I1). The document is signed by service A2 according to the
XAdES standard (SI1) gathering the required time stamps and related certificate revocation
status information data from their respective sources. Service A4 packages the signed invoice
in a SOAP message (M1) where the WS Security features are applied (SM1) using the service
A3. Finally, the service A5 dispatches the message to the to the SWEB.
A testing process for Interoperability and Conformance of secure Web Services 709
SWEB handles the received SOAP message according to its predefined internal processes
without following any steps specified by the test operator. Thus, SWEB receives the SOAP
message, decrypts it and verifies the WS Security features. Then, the invoice document is
extracted and the XAdES signature is verified (along with the rest of the cryptographic
information it encompasses like any time stamps). A notification (N1) is created that is
packaged in a new SOAP message (M2) where the WS-Security extensions are applied (M2)
and is sent to SELIS.
The latter as soon as receives the response, handles it according to the test case actions.
Service A5 retrieves the SOAP message and using the service A3 validates the applied
security features. Finally, the service A6 manages the notification.
It should be noted that, the exchanged SOAP messages (SM1 and SM2) are intercepted by the
TCI Message Handler. The Handler analyzes them checking that these messages conform to
the defined SuTs’ WSDL documents and produces the appropriate conformance results.
The SuT Report Engines of both SuTs collect all the evaluation results and import them in
log files. These consist of the exchanged SOAP messages (M1, SM1, M2, and SM2), the
exchanged documents (I1, SI1, N1) and any erroneous behaviour that was reported during
the whole process e.g. the application and validation of the applied security features of the
invoice document.
The TCI Interoperability Engine receives the SuTs’ log files and the Message Handler
conformance results that are provided to the test operator which is responsible to analyze
A testing process for Interoperability and Conformance of secure Web Services 711
Papastergiou, S.; Karantjias, A. & Polemi, D. (2007a). Innovative, Secure and Interoperable
E/M-Governmental Invoicing. 18th Annual IEEE International Symposium on
Personal,IndoorandMobileRadioCommunications , Athens.
PIMRC)
(
Secure, interoperable, cross border m-services contributing towards a trustful European
cooperation with the non-EU member Western Balkan countries (SWEB), IST-2006-
2.6.5, 6th Framework Programme, Priority 2, Information Society Technologies
(2007), www.sweb-project.org/.
OSI - Open System Interconnection, Conformance testing methodology and framework
(1997), ISO/IEC 9646.
European Telecommunications Standards Institute (ETSI), available at
http://portal.etsi.org/mbs/Testing/testing.htm
Moseley, S.; Randall, S. & Wiles, A. (2003). Experience within ETSI of the combined roles of
conformance testing and interoperability testing. Standardization and Innovation in
InformationTechnology , pp 177- 189, IEEE Press.
ETSI 300 406 (1995). Methods for testing and Specification (MTS); Protocol and profile
conformance testing specifications; Standardization methodology.
ETSI ES 201 873 (2002): The Testing and Test Control Notation version 3, v2.2.0.
Dibuz, S. & Kremer, P. (2003). Interoperability Testing - Framework and Model for
Automated Interoperability Test and Its Application to ROHC. TestCom203 , LNCS
vol 2644, pp. 243–257, Computer Science.
ETSI EG 202 237 V1.1.2 (2007-04): Methods for Testing and Specification (MTS); Internet
Protocol Testing (IPT); Generic approach to interoperability testing.
Kulvatunyou, B.; Ivezic, N.; Martin, M. & Jones, A.T. (2003). A Business-to-Business
Interoperability Testbed: An Overview. The Fifth International Conference on
ElectronicCommerence , Pittsburg, PA October.
Seely, S. & Lauzon, D. (2005). WS-I monitor tool functional specification , ver. 1.1. Technical
report, WS-I.
Ehnebuske, D. et al. (2003). WS-I Overview. Available at www.ws-
i.org/docs/20021003.wsi.introduction.pdf
ebXML Technical Architecture Project Team, (2001). ebXML Technical Architecture
Specification v1.0.4, February 16.
OASIS ebXML Implementation, Interoperability and Conformance Technical Committee:,
(2003). ebXML Test Framework v0.3, 07 March.
Lee, Y. (2005). ebXML Test Framework on Dually Coupled Asynchronous MSH. Fourth
Annual ACIS International Conference on Computer and Information , Science IC
(
pp. 198-203, IEEE Press.
Kim, D. & Yun, J.H. (2003): Development -of an ebXML Conformance Test System for e-
Business Solutions. EC-Web 203 , LNCS, vol 2738, pp. 145-154, Springer-Verlag
Berlin Heidelberg
IBM XML security suite, available at http://www.alphaworks.ibm.com/tech/
xmlsecuritysuite.
IAIK XML signature library, available at http://jce.iaik.tugraz.at/sic/products/
xml_security.
IAIK XAdES library, http://jce.iaik.tugraz.at/sic/products/xml_security/xades
712 Radio Communications