knowledge
play

Knowledge Kejing Liu, Stephan Bohacek, and Javier Garcia-Frias - PowerPoint PPT Presentation

Interference Mitigating in Wireless Networks Using Prior Knowledge Kejing Liu, Stephan Bohacek, and Javier Garcia-Frias Department of Electrical and Computer Engineering University of Delaware Annual Conference on Information Science and System


  1. Interference Mitigating in Wireless Networks Using Prior Knowledge Kejing Liu, Stephan Bohacek, and Javier Garcia-Frias Department of Electrical and Computer Engineering University of Delaware Annual Conference on Information Science and System (CISS ‘07 ) -SANJAY JAYARAMAN (EE 555)

  2. Multihop Wireless Networks  Multihop Wireless Network (MWN): ◦ A wireless network adopting multihop wireless technology without deployment of wired backhaul links  Similar to Mobile Ad hoc Networks (MANET), but ◦ Nodes in MWN is relative ‘fixed’ ◦ MWN may introduce ‘hierarchy’ network architecture

  3. Multihop Wireless Networks  T wo categories: ◦ Relay:  Tree based topology, one end of the path is the base station  Dedicated carrier owned infrastructure ◦ Mesh:  Mesh topology, multiple connections among users  Routing by carrier owned infrastructure or subscriber equipment

  4. Multihop Wireless Networks  Benefit of multi-hop technology ◦ Rapid deployment with lower-cost backhaul ◦ Easy to provide coverage in hard-to-wire areas ◦ Under the right circumstances, it may  Extend coverage due to multi-hop forwarding  Enhance throughput due to shorter hops  Extend battery life due to lower power transmission  Price paid ◦ Routing complexity ◦ Path management ◦ Extra delay due to multihop relaying

  5. Objective  Framework to mitigate interference in high data rate mobile wirelesss networking.  Multihop wireless networking.  Correlation with previous available data in the decoding process.  Problem is interpreted as one of the transmission over multiple access channel with prior information.

  6. Introduction

  7. Introduction (Contd.)

  8. Introduction (Contd)  T wo decoding schemes to improve performance ◦ Interference aware decoding  Statistics of interference are different from noise. ◦ Interference mitigating decoding  Correlation existing between interference and previously available data to achieve improved performance.

  9. String T opology

  10. String T opology (Contd)  Signal received by node N ◦ Y = a -3 X k+l + X k + a 1 X k-1 + Z.  Behavior of node 3 ◦ time-slot 1: Y 1 = a -3 X 1 + Z 1 ◦ time-slot 3: Y 3 = a -3 X 2 + X 1 + Z 3 Y 5 = a -3 X 3 + X 2 + a 1 X 1 + Z 5 ◦ time-slot 5: Y 7 = a -3 X 4 + X 3 + a 1 X 2 + Z 7 . ◦ time-slot 7:

  11. String T opology (Contd)  Interference aware decoding ◦ During time slot 3, interference a -3 X 2 is not noise but data transmission. ◦ Multiple access decoding with two users allows U 1 to be decoded in the presence of a -3 x 2 .

  12. String T opology (Contd)  Interference mitigating decoding ◦ 2 steps are taken  First, during time- slot 1, node 3‘s estimate of U 1 is denoted U 1 . This estimate is based on the perhaps weak signal a -3 X 1 .  Next, during time-slot 3, node 3 makes a second estimate of U 1 , we denote this estimate as U 1 .

  13. String T opology (Contd)

  14. Star T opology

  15. Star topology (Contd)  1 st time slot ◦ Y 1 A =X 1 +Z 1 A ◦ Y 1 B =X 1 +Z 1 B ◦ Y 1 C =X 1 +Z 1 C ◦ Y 1 D =X 1 +Z 1 D  2 nd time slot ◦ Y 2 B =X 2 +aX 1 +Z 2 B ◦ Y 2 C =X 2 +bX 1 +Z 2 C ◦ Y 2 D =X 2 +bX 1 +Z 2 D

  16. Star T opology (Contd)  Interference aware decoding ◦ Interference during time slot 5 is not noise but data transmission. ◦ Mulitple access decoding allows U 5 to be decoded in the presence of bX 4 .

  17. Star T opology (Contd)  Interference mitigating decoding ◦ 3 steps are taken  During timeslot 3, node A's estimate of U 3 is denoted U 3 ’.  Next, during time-slot 4, node A uses U 3 ’ as a prior information to obtain an estimate of U 4 , denoted as U 4 ’.  Again, during time-slot 5, node A makes use of U 4 ’ to obtain the estimate of U 5 .

  18. Star T opology (Contd)

  19. Simulation Results (String)

  20. Simulation Results (String)

  21. Simulation Results (Star)

  22. Conclusion and Future Work  Both interference aware decoding and interference mitigating decoding perform better than traditional decoding schemes.  Model can be extended to complicated environment with multiple neighboring nodes with prior information.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend