medium access and interference cancellation
play

Medium Access and Interference Cancellation: Protocol and Evaluation - PowerPoint PPT Presentation

Medium Access and Interference Cancellation: Protocol and Evaluation Abishek Sankararaman and Franois Baccelli 1 Introduction Focus: Medium Access problem in Ad-hoc networks. Aim: Propose simple implementable protocols


  1. Medium Access and Interference Cancellation: Protocol and Evaluation Abishek Sankararaman and François Baccelli 1

  2. Introduction • Focus: Medium Access problem in Ad-hoc networks. � � � • Aim: Propose simple implementable protocols by incorporating observations and results from Information Theory. 2

  3. Motivation • Some key features of emerging wireless networks Dense Decentralized Control D2D Communication Vehicular Communication (802.11p) 3

  4. Motivation • Some key features of emerging wireless networks Dense Decentralized Control D2D Communication Vehicular Communication (802.11p) Managing Interference is a key challenge - primarily handled through Medium Access Control algorithms in ad-hoc networks. 4

  5. Popular Medium Access Solution • CSMA (Carrier Sense Multiple Access) - 802.11 standards • ‘Interference as Noise’ (IAN) paradigm. 5

  6. Popular Medium Access Solution • CSMA (Carrier Sense Multiple Access) - 802.11 standards • ‘Interference as Noise’ (IAN) paradigm. R No Interfering Transmitters T Rxr Guard Zone around a scheduled receiver Txr CSMA/CA Schematic • Simple Distributed Implementation (RTS/CTS) 6

  7. Ad-hoc Network - Interference Channel 1 T 1 R 1 a a 2 user interference channel T 2 R 2 1 • Capacity and achievability is unknown in general. 7

  8. Results from Information Theory 1 T 1 R 1 a a 2 user interference channel T 2 R 2 1 • Capacity and achievability is unknown in general. • , IAN is optimal. a → 0 • , SIC (Successive Interference Cancellation) a → ∞ decoding is optimal. (Receivers treat the transmitters as a MAC channel). 8

  9. Successive Interference Cancellation T 1 T 2 Rxr Gaussian Codebook T 3 Received Powers P i, Rates R i ⇣ ⌘ P i ≥ R i , i ∈ { 1 , 2 , 3 } . C N 0 + P 3 j = i +1 P j where , C ( x ) = 1 2 log 2 (1 + x ) P i > P j ∀ i < j 9

  10. Successive Interference Cancellation T 1 T 2 Rxr Gaussian Codebook T 3 Received Powers P i, Rates R i ⇣ ⌘ P i ≥ R i , i ∈ { 1 , 2 , 3 } . C N 0 + P 3 j = i +1 P j where , C ( x ) = 1 2 log 2 (1 + x ) P i > P j ∀ i < j • Separation of Powers needed to ensure decodability ! 10

  11. SIC - Separation of Powers T 1 T 2 Rxr T 3 Received Powers P i, Symmetric Rate R P i j = i +1 P j ≥ Q P i > P j ∀ i < j N 0 + I + P k 11

  12. SIC - Separation of Powers T 1 T 2 Rxr T 3 Received Powers P i, Symmetric Rate R P i j = i +1 P j ≥ Q P i > P j ∀ i < j N 0 + I + P k , • Separation of Powers needed to ensure decodability ! needsto be significantly larger than P i +1 P i 12

  13. Main Idea of an Improved Protocol R 3 T 2 General capacity region is unknown T 3 R 2 T 4 T 5 R 4 T 1 R 5 R 1 13

  14. Main Idea of an Improved Protocol R 3 T 2 General capacity region is unknown T 3 R 2 T 4 T 5 R 4 a 55 T 1 a 51 Any pair of links form a 2 user interference channel. R 5 a 15 a 11 R 1 14

  15. Main Idea of an Improved Protocol R 3 T 2 General capacity region is unknown T 3 R 2 T 4 T 5 R 4 a 55 T 1 a 51 Any pair of links form a 2 user interference channel. R 5 a 15 a 11 R 1 If and , then a 51 >> a 11 a 15 >> a 55 • CSMA/CA will schedule at most one link. 15

  16. Main Idea of an Improved Protocol R 3 T 2 General capacity region is unknown T 3 R 2 T 4 T 5 R 4 a 55 T 1 a 51 Any pair of links form a 2 user interference channel. R 5 a 15 a 11 R 1 If and , then a 51 >> a 11 a 15 >> a 55 • CSMA/CA will schedule at most one link. • However if the receivers can perform SIC, then both links could potentially be scheduled. 16

  17. Main Idea of an Improved Protocol R 3 T 2 General capacity region is unknown T 3 R 2 T 4 T 5 R 4 a 55 T 1 a 51 Any pair of links form a 2 user interference channel. R 5 a 15 a 11 R 1 R 1 If and , then a 51 >> a 11 a 15 >> a 55 • CSMA/CA will schedule at most one link. • However if the receivers can perform SIC, then both links could potentially be scheduled. Need to define when a cross interference is ‘strong’. 17

  18. CSMA 1-SIC Protocol R 2 R 2 T 2 T 2 R 3 R 3 T 3 R 1 Guard Zone T 3 R 1 Guard Zone T 4 around a receiver around a receiver R 4 T 1 T 1 Schematic of proposed Schematic of CSMA/CA CSMA 1-SIC protocol. 18

  19. CSMA 1-SIC Protocol R 2 R 2 T 2 T 2 R 3 R 3 T 3 R 1 Guard Zone T 3 R 1 Guard Zone T 4 around a receiver around a receiver R 4 T 1 T 1 Schematic of proposed Schematic of CSMA/CA CSMA 1-SIC protocol. Separation of Received Powers - Donut Shaped Guard Zone. 19

  20. CSMA 1-SIC Signaling Assume time-slotted system. Rx Tx 20

  21. CSMA 1-SIC Signaling Each link (Tx) samples a Random Timer Value in say [0,1] Tx ‘ senses ’ channel till timer expires. t 3 t 1 t 6 Rx Tx t 0 t 5 t 2 t 4 21

  22. CSMA 1-SIC Signaling Tx ‘ senses ’ channel till timer expires. t 3 t 1 t 6 Rx Tx t 0 t 5 Send RTS t 2 t 4 22

  23. CSMA 1-SIC Signaling Rx ‘ senses ’ to hear a RTS. t 3 t 1 t 6 Rx Tx t 0 t 5 Send CTS t 2 t 4 23

  24. CSMA 1-SIC Signaling Rx ‘ senses ’ to hear a RTS. t 3 t 1 Rx Tx t 0 t 5 Send CTS t 2 t 4 24

  25. CSMA 1-SIC Signaling Tx broadcasts ‘ Established ’ to silence nearby receivers t 3 t 1 Rx Tx t 0 t 5 Send Established t 2 t 4 25

  26. CSMA 1-SIC Signaling Tx broadcasts ‘ Established ’ to silence nearby receivers t 3 t 1 Rx Tx t 0 t 5 Send Established t 2 t 4 26

  27. CSMA 1-SIC Signaling Tx transmits ‘ Established ’ signal t 3 t 1 Rx Tx t 0 t 5 Established t 2 t 4 27

  28. CSMA 1-SIC Signaling Rx transmits ‘ Blocked ’ signal to silence all other strong interferers t 3 t 1 Rx Tx t 0 t 5 t 2 t 4 28

  29. CSMA 1-SIC Signaling Summary • Randomized Protocol (Timers Chosen randomly). • 2 parameters to tune. � � � • Guarantees to any scheduled receiver that there will be at- most one ‘ strong ’ interfering transmitter. � 29

  30. CSMA k-SIC Protocol One$Interfering$Transmi/er$Allowed$ No$Interfering$Transmi/er$ r 1$ r 2$ r 4$ r 3$ � • The separation of powers leads to 2k parameter protocol. • One can then develop a similar signaling algorithm. 30

  31. CSMA /CA Versus CSMA 1-SIC Non-Monotonicity t 3 t 3 t 3 t 1 t 1 t 2 t 2 t 1 t 2 t 4 t 4 t 4 CSMA/CA CSMA 1-SIC 31

  32. CSMA /CA Versus CSMA 1-SIC Non-Monotonicity t 3 t 3 t 3 t 1 t 1 t 2 t 2 t 1 t 2 t 4 t 4 t 4 CSMA/CA CSMA 1-SIC • Averaged over timer values however, CSMA 1-SIC schedules more links. 32

  33. CSMA /CA Versus CSMA 1-SIC Non-Monotonicity t 3 t 3 t 3 t 1 t 1 t 2 t 2 t 1 t 2 t 4 t 4 t 4 CSMA/CA CSMA 1-SIC • Averaged over timer values, CSMA 1-SIC schedules more links. • This also means, that the interference levels are higher. 33

  34. Performance Evaluation - Setup • A Stochastic Network Model to compare the gains in adopting the protocol. Dipole Network Model - Each Tx has an unique Rx. Tx form a PPP and the corresponding Rx is located at an uniform and independent angle away. 34

  35. Performance Evaluation - Setup • A Stochastic Network Model to compare the gains in adopting the protocol. Dipole Network Model - Each Tx has an unique Rx. Tx form a PPP and the corresponding Rx is located at an uniform and independent angle away. No Power Control. All scheduled Tx transmit at unit power. Fading - Channel between any pair of devices is random and symmetric Path loss - l(r) = r -4 F xy l ( || x − y || ) 35

  36. Performance Evaluation - Metrics • The metrics MAP - (Medium Access Probability (p a ) ) 36

  37. Performance Evaluation - Metrics • The metrics MAP - (Medium Access Probability (p a ) ) SINR > Q Success Density - (Fraction of scheduled links successful (p s ) ) 37

  38. Performance Evaluation - Metrics • The metrics MAP - (Medium Access Probability (p a ) ) SINR > Q Success Density - (Fraction of scheduled links successful (p s ) ) Throughput - (Fraction of links that get scheduled and are successful) 38

  39. Performance Evaluation - Metrics • The metrics MAP - (Medium Access Probability (p a ) ) SINR > Q Success Density - (Fraction of scheduled links successful (p s ) ) Throughput - (Fraction of links that get scheduled and are successful) λ p s p a Throughput = 39

  40. Performance Evaluation - MAP Rayleigh Fading No fading 0.8 0.8 CSMA IAN CSMA IAN CSMA 1 − SIC CSMA 1 − SIC 0.7 0.7 0.6 0.6 0.5 0.5 MAP MAP 0.4 0.4 0.3 0.3 0.2 0.2 0.1 0.1 0 0.2 0.4 0.6 0 0.2 0.4 0.6 γ γ In large random networks, more links get scheduled on average . 40

  41. Performance Evaluation - Success Probability Rayleigh Fading No Fading 0.9 1 CSMA IAN 0.95 CSMA 1 − SIC Success Probability Success Probability 0.8 0.9 0.85 0.7 0.8 0.75 0.6 0.7 CSMA IAN 0.65 CSMA 1 − SIC 0.5 0.2 0.4 0.6 0.8 0.2 0.4 0.6 0.8 γ γ CSMA 1-SIC has higher interference since it schedules aggressively ! 41

  42. Performance Evaluation - Throughput Rayleigh Fading No Fading 0.2 0.28 0.18 0.26 0.16 0.24 Throughput Throughput 0.14 0.22 0.12 0.2 0.1 0.18 CSMA IAN CSMA IAN CSMA 1 − SIC 0.08 0.16 CSMA 1 − SIC 0.06 0 0.5 1 0 0.5 1 γ γ Nonetheless, CSMA 1-SIC has higher throughput ! 42

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend