scispace - formally typeset
Search or ask a question

Showing papers on "Throughput published in 2010"


Journal ArticleDOI
Thomas L. Marzetta1
TL;DR: A cellular base station serves a multiplicity of single-antenna terminals over the same time-frequency interval and a complete multi-cellular analysis yields a number of mathematically exact conclusions and points to a desirable direction towards which cellular wireless could evolve.
Abstract: A cellular base station serves a multiplicity of single-antenna terminals over the same time-frequency interval. Time-division duplex operation combined with reverse-link pilots enables the base station to estimate the reciprocal forward- and reverse-link channels. The conjugate-transpose of the channel estimates are used as a linear precoder and combiner respectively on the forward and reverse links. Propagation, unknown to both terminals and base station, comprises fast fading, log-normal shadow fading, and geometric attenuation. In the limit of an infinite number of antennas a complete multi-cellular analysis, which accounts for inter-cellular interference and the overhead and errors associated with channel-state information, yields a number of mathematically exact conclusions and points to a desirable direction towards which cellular wireless could evolve. In particular the effects of uncorrelated noise and fast fading vanish, throughput and the number of terminals are independent of the size of the cells, spectral efficiency is independent of bandwidth, and the required transmitted energy per bit vanishes. The only remaining impairment is inter-cellular interference caused by re-use of the pilot sequences in other cells (pilot contamination) which does not vanish with unlimited number of antennas.

6,248 citations


Proceedings ArticleDOI
Jung-Il Choi1, Mayank Jain1, Kannan Srinivasan1, Phil Levis1, Sachin Katti1 
20 Sep 2010
TL;DR: In this paper, a single channel full-duplex wireless transceiver is proposed, which uses a combination of RF and baseband techniques to achieve FD with minimal effect on link reliability.
Abstract: This paper discusses the design of a single channel full-duplex wireless transceiver. The design uses a combination of RF and baseband techniques to achieve full-duplexing with minimal effect on link reliability. Experiments on real nodes show the full-duplex prototype achieves median performance that is within 8% of an ideal full-duplexing system. This paper presents Antenna Cancellation, a novel technique for self-interference cancellation. In conjunction with existing RF interference cancellation and digital baseband interference cancellation, antenna cancellation achieves the amount of self-interference cancellation required for full-duplex operation. The paper also discusses potential MAC and network gains with full-duplexing. It suggests ways in which a full-duplex system can solve some important problems with existing wireless systems including hidden terminals, loss of throughput due to congestion, and large end-to-end delays.

1,623 citations


Journal ArticleDOI
TL;DR: A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay and two energy management policies which minimize the mean delay in the queue are obtained.
Abstract: We study a sensor node with an energy harvesting source. The generated energy can be stored in a buffer. The sensor node periodically senses a random field and generates a packet. These packets are stored in a queue and transmitted using the energy available at that time. We obtain energy management policies that are throughput optimal, i.e., the data queue stays stable for the largest possible data rate. Next we obtain energy management policies which minimize the mean delay in the queue. We also compare performance of several easily implementable sub-optimal energy management policies. A greedy policy is identified which, in low SNR regime, is throughput optimal and also minimizes mean delay.

707 citations


Journal ArticleDOI
01 Jun 2010
TL;DR: An adaptive carrier sense multiple access (CSMA) scheduling algorithm that can achieve the maximal throughput distributively and is combined with congestion control to achieve the optimal utility and fairness of competing flows.
Abstract: In multihop wireless networks, designing distributed scheduling algorithms to achieve the maximal throughput is a challenging problem because of the complex interference constraints among different links. Traditional maximal-weight scheduling (MWS), although throughput-optimal, is difficult to implement in distributed networks. On the other hand, a distributed greedy protocol similar to IEEE 802.11 does not guarantee the maximal throughput. In this paper, we introduce an adaptive carrier sense multiple access (CSMA) scheduling algorithm that can achieve the maximal throughput distributively. Some of the major advantages of the algorithm are that it applies to a very general interference model and that it is simple, distributed, and asynchronous. Furthermore, the algorithm is combined with congestion control to achieve the optimal utility and fairness of competing flows. Simulations verify the effectiveness of the algorithm. Also, the adaptive CSMA scheduling is a modular MAC-layer algorithm that can be combined with various protocols in the transport layer and network layer. Finally, the paper explores some implementation issues in the setting of 802.11 networks.

697 citations


Proceedings ArticleDOI
15 Jun 2010
TL;DR: A system, called Wiffler, to augments mobile 3G capacity in mobile environments and significantly reduces 3G usage, using two key ideas leveraging delay tolerance and fast switching -- to overcome the poor availability and performance of WiFi.
Abstract: We investigate if WiFi access can be used to augment 3G capacity in mobile environments. We rst conduct a detailed study of 3G and WiFi access from moving vehicles, in three different cities. We find that the average 3G and WiFi availability across the cities is 87% and 11%, respectively. WiFi throughput is lower than 3G through-put, and WiFi loss rates are higher. We then design a system, called Wiffler, to augments mobile 3G capacity. It uses two key ideas leveraging delay tolerance and fast switching -- to overcome the poor availability and performance of WiFi. For delay tolerant applications, Wiffler uses a simple model of the environment to predict WiFi connectivity. It uses these predictions to delays transfers to offload more data on WiFi, but only if delaying reduces 3G usage and the transfers can be completed within the application's tolerance threshold. For applications that are extremely sensitive to delay or loss (e.g., VoIP), Wiffler quickly switches to 3G if WiFi is unable to successfully transmit the packet within a small time window. We implement and deploy Wiffler in our vehicular testbed. Our experiments show that Wiffler significantly reduces 3G usage. For a realistic workload, the reduction is 45% for a delay tolerance of 60 seconds.

680 citations


Posted Content
TL;DR: In this paper, the authors considered the problem of minimizing the transmission completion time for a given amount of data in a finite time horizon and derived the necessary conditions that the throughput-optimal allocation satisfies, and then provided the algorithm that finds the optimal transmission policy with respect to the short-term throughput and the minimum transmission completion times.
Abstract: Wireless networks with energy harvesting battery powered nodes are quickly emerging as a viable option for future wireless networks with extended lifetime. Equally important to their counterpart in the design of energy harvesting radios are the design principles that this new networking paradigm calls for. In particular, unlike wireless networks considered up to date, the energy replenishment process and the storage constraints of the rechargeable batteries need to be taken into account in designing efficient transmission strategies. In this work, we consider such transmission policies for rechargeable nodes, and identify the optimum solution for two related problems. Specifically, the transmission policy that maximizes the short term throughput, i.e., the amount of data transmitted in a finite time horizon is found. In addition, we show the relation of this optimization problem to another, namely, the minimization of the transmission completion time for a given amount of data, and solve that as well. The transmission policies are identified under the constraints on energy causality, i.e., energy replenishment process, as well as the energy storage, i.e., battery capacity. The power-rate relationship for this problem is assumed to be an increasing concave function, as dictated by information theory. For battery replenishment, a model with discrete packets of energy arrivals is considered. We derive the necessary conditions that the throughput-optimal allocation satisfies, and then provide the algorithm that finds the optimal transmission policy with respect to the short-term throughput and the minimum transmission completion time. Numerical results are presented to confirm the analytical findings.

659 citations


Proceedings ArticleDOI
30 Aug 2010
TL;DR: The evaluation results show that GPU brings significantly higher throughput over the CPU-only implementation, confirming the effectiveness of GPU for computation and memory-intensive operations in packet processing.
Abstract: We present PacketShader, a high-performance software router framework for general packet processing with Graphics Processing Unit (GPU) acceleration. PacketShader exploits the massively-parallel processing power of GPU to address the CPU bottleneck in current software routers. Combined with our high-performance packet I/O engine, PacketShader outperforms existing software routers by more than a factor of four, forwarding 64B IPv4 packets at 39 Gbps on a single commodity PC. We have implemented IPv4 and IPv6 forwarding, OpenFlow switching, and IPsec tunneling to demonstrate the flexibility and performance advantage of PacketShader. The evaluation results show that GPU brings significantly higher throughput over the CPU-only implementation, confirming the effectiveness of GPU for computation and memory-intensive operations in packet processing.

585 citations


Journal ArticleDOI
TL;DR: An overview of different techniques to optically transport mm-wave wireless signals and to overcome impairments associated with the transport of the wireless signals is presented and the different designs of subsystems for integrating fiber-wireless technology onto existing optical infrastructure are reviewed.
Abstract: Hybrid fiber-wireless networks incorporating WDM technology for fixed wireless access operating in the sub-millimeter-wave and millimeter-wave (mm-wave) frequency regions are being actively pursued to provide untethered connectivity for ultrahigh bandwidth communications. The architecture of such radio networks requires a large number of antenna base-stations with high throughput to be deployed to maximize the geographical coverage with the main switching and routing functionalities located in a centralized location. The transportation of mm-wave wireless signals within the hybrid network is subject to several impairments including low opto-electronic conversion efficiency, fiber chromatic dispersion and also degradation due to nonlinearities along the link. One of the major technical challenges in implementing such networks lies in the mitigation of these various optical impairments that the wireless signals experience within the hybrid network. In this paper, we present an overview of different techniques to optically transport mm-wave wireless signals and to overcome impairments associated with the transport of the wireless signals. We also review the different designs of subsystems for integrating fiber-wireless technology onto existing optical infrastructure.

510 citations


Proceedings ArticleDOI
18 Apr 2010
TL;DR: The evaluation results of the proposed mode selection procedure show that it enables a much more reliable device-to-device communication with limited interference to the cellular network compared to simpler mode selection procedures.
Abstract: Device-to-Device communication underlaying a cellular network enables local services with limited interference to the cellular network. In this paper we study the optimal selection of possible resource sharing modes with the cellular network in a single cell. Based on the learning from the single cell studies we propose a mode selection procedure for a multi-cell environment. Our evaluation results of the proposed procedure show that it enables a much more reliable device-to-device communication with limited interference to the cellular network compared to simpler mode selection procedures. A well performing and practical mode selection is critical to enable the adoption of underlay device-to-device communication in cellular networks.

476 citations


Proceedings ArticleDOI
01 Nov 2010
TL;DR: By studying the interaction between smartphone traffic and the radio power management policy, it is found that the power consumption of the radio can be reduced by 35% with minimal impact on the performance of packet exchanges.
Abstract: Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, media, and maps contribute roughly 10%. We also find that the overhead of lower layer protocols is high because of small transfer sizes. For half of the transfers that use transport-level security, header bytes correspond to 40% of the total. We show that while packet loss is the main factor that limits the throughput of smartphone traffic, larger send buffers at Internet servers can improve the throughput of a quarter of the transfers. Finally, by studying the interaction between smartphone traffic and the radio power management policy, we find that the power consumption of the radio can be reduced by 35% with minimal impact on the performance of packet exchanges.

438 citations


Journal ArticleDOI
TL;DR: Simulation results show that the proposed scheme outperforms the reference schemes, in which either coordination is not employed or employed in a static manner, in terms of cell edge throughput with a minimal impact on the network throughput and with some increase in complexity.
Abstract: Interference management has been a key concept for designing future high data-rate wireless systems that are required to employ dense reuse of spectrum. Static or semi-static interference coordination based schemes provide enhanced cell-edge performance but with severe penalty to the overall cell throughput. Furthermore, static resource planning makes these schemes unsuitable for applications in which frequency planning is difficult, such as femtocell networks. In this paper, we present a novel dynamic interference avoidance scheme that makes use of inter-cell coordination in order to prevent excessive inter-cell interference, especially for cell or sector edge users that are most affected by inter-cell interference, with minimal or no impact on the network throughput. The proposed scheme is comprised of a two-level algorithm - one at the base station level and the other at a central controller to which a group of neighboring base stations are connected. Simulation results show that the proposed scheme outperforms the reference schemes, in which either coordination is not employed (reuse of 1) or employed in a static manner (reuse of 3 and fractional frequency reuse), in terms of cell edge throughput with a minimal impact on the network throughput and with some increase in complexity.

Journal ArticleDOI
TL;DR: An Energy Efficient and QoS aware multipath routing protocol that maximizes the network lifetime through balancing energy consumption across multiple nodes, uses the concept of service differentiation to allow delay sensitive traffic to reach the sink node within an acceptable delay, reduces the end to end delay through spreading out the traffic across multiple paths, and increases the throughput through introducing data redundancy.

Proceedings ArticleDOI
05 Oct 2010
TL;DR: A novel approach that enables ZigBee links to achieve assured performance in the presence of heavy WiFi interference is proposed and a new ZigBee frame control protocol called WISE is developed, which can achieve desired trade-offs between link throughput and delivery ratio.
Abstract: Recent years have witnessed the increasing adoption of ZigBee technology for performance-sensitive applications such as wireless patient monitoring in hospitals. However, operating in unlicensed ISM bands, ZigBee devices often yield unpredictable throughput and packet delivery ratio due to the interference from ever increasing WiFi hotspots in 2.4 GHz band. Our empirical results show that, although WiFi traffic contains abundant white space, the existing coexistence mechanisms such as CSMA are surprisingly inadequate for exploiting it. In this paper, we propose a novel approach that enables ZigBee links to achieve assured performance in the presence of heavy WiFi interference. First, based on statistical analysis of real-life network traces, we present a Pareto model to accurately characterize the white space in WiFi traffic. Second, we analytically model the performance of a ZigBee link in the presence of WiFi interference. Third, based on the white space model and our analysis, we develop a new ZigBee frame control protocol called WISE, which can achieve desired trade-offs between link throughput and delivery ratio. Our extensive experiments on a testbed of 802.11 netbooks and 802.15.4 TelosB motes show that, in the presence of heavy WiFi interference, WISE achieves 4× and 2× performance gains over B-MAC and a recent reliable transmission protocol, respectively, while only incurring 10.9% and 39.5% of their overhead.

Journal ArticleDOI
TL;DR: In this paper, optimal multi-channel cooperative sensing strategies in cognitive radio networks are investigated and a polynomial-complexity algorithm is proposed to solve the problem optimally.
Abstract: In this paper, optimal multi-channel cooperative sensing strategies in cognitive radio networks are investigated. A cognitive radio network with multiple potential channels is considered. Secondary users cooperatively sense the channels and send the sensing results to a coordinator, in which energy detection with a soft decision rule is employed to estimate whether there are primary activities in the channels. An optimization problem is formulated, which maximizes the throughput of secondary users while keeping detection probability for each channel above a pre-defined threshold. In particular, two sensing modes are investigated: slotted-time sensing mode and continuous-time sensing mode. With a slotted-time sensing mode, the sensing time of each secondary user consists of a number of mini-slots, each of which can be used to sense one channel. The initial optimization problem is shown to be a nonconvex mixed-integer problem. A polynomial-complexity algorithm is proposed to solve the problem optimally. With a continuous-time sensing mode, the sensing time of each secondary user for a channel can be any arbitrary continuous value. The initial nonconvex problem is converted into a convex bilevel problem, which can be successfully solved by existing methods. Numerical results are presented to demonstrate the effectiveness of our proposed algorithms.

Journal ArticleDOI
TL;DR: This work considers the problem of throughput-optimal scheduling in wireless networks subject to interference constraints, and shows that a simple greedy algorithm can provide a 49-approximation, and the maximal matching scheduling policy achieves a guaranteed fraction of the capacity region for "all".
Abstract: We consider the problem of throughput-optimal scheduling in wireless networks subject to interference constraints. We model the interference using a family of K-hop interference models, under which no two links within a K-hop distance can successfully transmit at the same time. For a given K, we can obtain a throughput-optimal scheduling policy by solving the well-known maximum weighted matching problem. We show that for K > 1, the resulting problems are NP-Hard that cannot be approximated within a factor that grows polynomially with the number of nodes. Interestingly, for geometric unit-disk graphs that can be used to describe a wide range of wireless networks, the problems admit polynomial time approximation schemes within a factor arbitrarily close to 1. In these network settings, we also show that a simple greedy algorithm can provide a 49-approximation, and the maximal matching scheduling policy, which can be easily implemented in a distributed fashion, achieves a guaranteed fraction of the capacity region for "all K." The geometric constraints are crucial to obtain these throughput guarantees. These results are encouraging as they suggest that one can develop low-complexity distributed algorithms to achieve near-optimal throughput for a wide range of wireless networks.

Journal ArticleDOI
TL;DR: A cross-layer opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks, which is called the routing and dynamic spectrum-allocation (ROSA) algorithm, which aims to maximize the network throughput by performing joint routing, dynamic spectrum allocation, scheduling, and transmit power control.
Abstract: Throughput maximization is one of the main challenges in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hop by hop. For this reason, a cross-layer opportunistic spectrum access and dynamic routing algorithm for cognitive radio networks is proposed, which is called the routing and dynamic spectrum-allocation (ROSA) algorithm. Through local control actions, ROSA aims to maximize the network throughput by performing joint routing, dynamic spectrum allocation, scheduling, and transmit power control. Specifically, the algorithm dynamically allocates spectrum resources to maximize the capacity of links without generating harmful interference to other users while guaranteeing a bounded bit error rate (BER) for the receiver. In addition, the algorithm aims to maximize the weighted sum of differential backlogs to stabilize the system by giving priority to higher capacity links with a high differential backlog. The proposed algorithm is distributed, computationally efficient, and has bounded BER guarantees. ROSA is shown through numerical model-based evaluation and discrete-event packet-level simulations to outperform baseline solutions, leading to a high throughput, low delay, and fair bandwidth allocation.

Proceedings ArticleDOI
14 Mar 2010
TL;DR: A discrete-time version of the CSMA algorithm based on a generalization of the so-called Glauber dynamics from statistical physics, which generates collision-free transmission schedules while explicitly taking collisions into account during the control phase of the protocol, thus relaxing the perfect CSMA assumption.
Abstract: Recently, it has been shown that CSMA-type random access algorithms can achieve the maximum possible throughput in ad hoc wireless networks. However, these algorithms assume an idealized continuous-time CSMA protocol where collisions can never occur. In addition, simulation results indicate that the delay performance of these algorithms can be quite bad. On the other hand, although some simple heuristics (such as distributed approximations of greedy maximal scheduling) can yield much better delay performance for a large set of arrival rates, they may only achieve a fraction of the capacity region in general. In this paper, we propose a discrete-time version of the CSMA algorithm. Central to our results is a discrete-time distributed randomized algorithm which is based on a generalization of the so-called Glauber dynamics from statistical physics, where multiple links are allowed to update their states in a single time slot. The algorithm generates collision-free transmission schedules while explicitly taking collisions into account during the control phase of the protocol, thus relaxing the perfect CSMA assumption. More importantly, the algorithm allows us to incorporate delay-reduction mechanisms which lead to very good delay performance while retaining the throughput-optimality property.

Proceedings ArticleDOI
30 Aug 2010
TL;DR: FICA is introduced, a fine-grained channel access method that embodies a new PHY architecture based on OFDM that retains orthogonality among subchannels while relying solely on the coordination mechanisms in existing WLAN, carrier-sensing and broadcasting.
Abstract: Modern communication technologies are steadily advancing the physical layer (PHY) data rate in wireless LANs, from hundreds of Mbps in current 802.11n to over Gbps in the near future. As PHY data rates increase, however, the overhead of media access control (MAC) progressively degrades data throughput efficiency. This trend reflects a fundamental aspect of the current MAC protocol, which allocates the channel as a single resource at a time.This paper argues that, in a high data rate WLAN, the channel should be divided into separate subchannels whose width is commensurate with PHY data rate and typical frame size. Multiple stations can then contend for and use subchannels simultaneously according to their traffic demands, thereby increasing overall efficiency. We introduce FICA, a fine-grained channel access method that embodies this approach to media access using two novel techniques. First, it proposes a new PHY architecture based on OFDM that retains orthogonality among subchannels while relying solely on the coordination mechanisms in existing WLAN, carrier-sensing and broadcasting. Second, FICA employs a frequency-domain contention method that uses physical layer RTS/CTS signaling and frequency domain backoff to efficiently coordinate subchannel access. We have implemented FICA, both MAC and PHY layers, using a software radio platform, and our experiments demonstrate the feasibility of the FICA design. Further, our simulation results suggest FICA can improve the efficiency ratio of WLANs by up to 400% compared to existing 802.11.

Journal ArticleDOI
TL;DR: A simple cross-CC packet scheduling algorithm is proposed that improves the coverage performance and the resource allocation fairness among users, as compared to independent scheduling per CC.
Abstract: -In this paper we focus on resource allocation for next generation wireless communication systems with aggregation of multiple Component Carriers (CCs), i.e., how to assign the CCs to each user, and how to multiplex multiple users in each CC. We first investigate two carrier load balancing methods for allocating the CCs to the users- Round Robin (RR) and Mobile Hashing (MH) balancing by means of a simple theoretical formulation, as well as system level simulations. At Layer-2 we propose a simple cross-CC packet scheduling algorithm that improves the coverage performance and the resource allocation fairness among users, as compared to independent scheduling per CC. The Long Term Evolution (LTE)-Advanced is selected for the case study of a multi-carrier system. In such a system, RR provides better performance than MH balancing, and the proposed simple scheduling algorithm is shown to be effective in providing up to 90% coverage gain with no loss of the overall cell throughput, as compared to independent scheduling per CC.

Journal ArticleDOI
TL;DR: This paper uses TDMA as the MAC layer protocol and schedules the sensor nodes with consecutive time slots at different radio states while reducing the number of state transitions, and proposes effective algorithms to construct data gathering tree such that the energy consumption and the network throughput is within a constant factor of the optimum.
Abstract: A sensor in wireless sensor networks (WSNs) periodically produces data as it monitors its vicinity. The basic operation in such a network is the systematic gathering (with or without in-network aggregation) and transmitting of sensed data to a base station for further processing. A key challenging question in WSNs is to schedule nodes' activities to reduce energy consumption. In this paper, we focus on designing energy-efficient protocols for low-data-rate WSNs, where sensors consume different energy in different radio states (transmitting, receiving, listening, sleeping, and being idle) and also consume energy for state transition. We use TDMA as the MAC layer protocol and schedule the sensor nodes with consecutive time slots at different radio states while reducing the number of state transitions. We prove that the energy consumption by our scheduling for homogeneous network is at most twice of the optimum and the timespan of our scheduling is at most a constant times of the optimum. The energy consumption by our scheduling for heterogeneous network is at most ? (log Rmax/Rmin) times of the optimum. We also propose effective algorithms to construct data gathering tree such that the energy consumption and the network throughput is within a constant factor of the optimum. Extensive simulation studies show that our algorithms do considerably reduce energy consumption.

Journal ArticleDOI
TL;DR: DCAR, the distributed coding-aware routing mechanism which enables the discovery for available paths between a given source and destination and the detection for potential network coding opportunities over much wider network region, is proposed and implemented.
Abstract: Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of proposed the practical wireless network coding system called COPE, which demonstrated the throughput gain achieved by network coding. However, COPE has two fundamental limitations: (1) the coding opportunity is crucially dependent on the established routes and (2) the coding structure in COPE is limited within a two-hop region only. The aim of this paper is to overcome these limitations. In particular, we propose DCAR, the distributed coding-aware routing mechanism which enables: (1) the discovery for available paths between a given source and destination and (2) the detection for potential network coding opportunities over much wider network region. One interesting result is that DCAR has the capability to discover high throughput paths with coding opportunities, while conventional wireless network routing protocols fail to do so. In addition, DCAR can detect coding opportunities on the entire path, thus eliminating the ?two-hop? coding limitation in COPE. We also propose a novel routing metric called coding-aware routing metric (CRM) which facilitates the performance comparison between ?coding-possible? and "coding-impossible? paths. We implement the DCAR system in ns-2 and carry out extensive evaluation. We show that when comparing to the coding mechanism in, DCAR can achieve much higher throughput gain.

Journal ArticleDOI
TL;DR: This article compares interference management solutions across the two main 4G standards: IEEE 802.16m (WiMAX) and 3GPP-LTE and addresses radio resource management schemes for interference mitigation, which include power control and adaptive fractional frequency reuse.
Abstract: 4G cellular standards are targeting aggressive spectrum reuse (frequency reuse 1) to achieve high system capacity and simplify radio network planning. The increase in system capacity comes at the expense of SINR degradation due to increased intercell interference, which severely impacts cell-edge user capacity and overall system throughput. Advanced interference management schemes are critical for achieving the required cell edge spectral efficiency targets and to provide ubiquity of user experience throughout the network. In this article we compare interference management solutions across the two main 4G standards: IEEE 802.16m (WiMAX) and 3GPP-LTE. Specifically, we address radio resource management schemes for interference mitigation, which include power control and adaptive fractional frequency reuse. Additional topics, such as interference management for multitier cellular deployments, heterogeneous architectures, and smart antenna schemes will be addressed in follow-up papers.

Proceedings ArticleDOI
04 Oct 2010
TL;DR: A novel method to deal with the resource allocation and interference avoidance issues by utilizing the network peculiarity of a hybrid network to share the uplink resource is proposed and the implementation details are described in a real cellular system.
Abstract: It is expected that Device-to-Device (D2D) communication is allowed to underlay future cellular networks such as IMT-Advanced for spectrum efficiency. However, by reusing the uplink spectrums with the cellular system, the interference to D2D users has to be addressed to maximize the overall system performance. In this paper, a novel method to deal with the resource allocation and interference avoidance issues by utilizing the network peculiarity of a hybrid network to share the uplink resource is proposed and the implementation details are described in a real cellular system. Simulation results prove that satisfying performance can be achieved by using the proposed mechanism.

Proceedings ArticleDOI
30 Aug 2010
TL;DR: The paper shows that SourceSync improves the performance of opportunistic routing protocols, and increases the throughput of 802.11 last hop diversity protocols by allowing multiple APs to transmit simultaneously to a client, thereby harnessing sender diversity.
Abstract: Diversity is an intrinsic property of wireless networks. Recent years have witnessed the emergence of many distributed protocols like ExOR, MORE, SOAR, SOFT, and MIXIT that exploit receiver diversity in 802.11-like networks. In contrast, the dual of receiver diversity, sender diversity, has remained largely elusive to such networks.This paper presents SourceSync, a distributed architecture for harnessing sender diversity. SourceSync enables concurrent senders to synchronize their transmissions to symbol boundaries, and cooperate to forward packets at higher data rates than they could have achieved by transmitting separately. The paper shows that SourceSync improves the performance of opportunistic routing protocols. Specifically, SourceSync allows all nodes that overhear a packet in a wireless mesh to simultaneously transmit it to their nexthops, in contrast to existing opportunistic routing protocols that are forced to pick a single forwarder from among the overhearing nodes. Such simultaneous transmission reduces bit errors and improves throughput. The paper also shows that SourceSync increases the throughput of 802.11 last hop diversity protocols by allowing multiple APs to transmit simultaneously to a client, thereby harnessing sender diversity. We have implemented SourceSync on the FPGA of an 802.11-like radio platform. We have also evaluated our system in an indoor wireless testbed, empirically showing its benefits.

Journal ArticleDOI
01 Jun 2010
TL;DR: A common control channel design for CR ad hoc networks is proposed, called as adaptive multiple rendezvous control channel (AMRCC) based on frequency hopping, which achieves better performance than the other classic CCC solutions in terms of time to rendezvous and the resulting throughput.
Abstract: Cognitive radio (CR) technology enables the opportunistic use of the portions of the licensed spectrum by the CR users, while ensuring low interference to the primary user (PU) activity in the licensed bands. The spectrum is sensed locally by the CR users, and a specific channel that is acceptable to both the end nodes of the communication link is chosen. However, this necessitates a common control channel (CCC) for exchanging the sensing information and reserving the channel before actual data transfer. In this paper, a common control channel design for CR ad hoc networks is proposed, called as adaptive multiple rendezvous control channel (AMRCC) based on frequency hopping. Our scheme is scalable, and allows continuous connectivity between the CR users under dynamic PU activity. The contribution made in this paper is threefold: (i) a frequency hopping scheme is proposed that allows altering the hopping sequence based on the PU activity in the channels, (ii) a simple and low-overhead procedure is developed to aid new node-join and leave events, and (iii) a slot duration optimization is given that avoids a significant performance degradation with the number of available channels. Performance evaluation proves that our solution achieves better performance than the other classic CCC solutions in terms of time to rendezvous (TTR) and the resulting throughput, specifically in CR ad hoc networks.

Journal ArticleDOI
TL;DR: This work considers a point-to-multipoint cognitive radio network that shares a set of channels with a primary network and proposes two-phase mixed distributed/centralized control algorithms that require minimal cooperation between cognitive and primary devices.
Abstract: We consider a point-to-multipoint cognitive radio network that shares a set of channels with a primary network. Within the cognitive radio network, a base station controls and supports a set of fixed-location wireless subscribers. The objective is to maximize the throughput of the cognitive network while not affecting the performance of primary users. Both downlink and uplink transmission scenarios in the cognitive network are considered. For both scenarios, we propose two-phase mixed distributed/centralized control algorithms that require minimal cooperation between cognitive and primary devices. In the first phase, a distributed power updating process is employed at the cognitive and primary nodes to maximize the coverage of the cognitive network while always maintaining the constrained signal to interference plus noise ratio of primary transmissions. In the second phase, centralized channel assignment is carried out within the cognitive network to maximize its throughput. Numerical results are obtained for the behaviors and performance of our proposed algorithms.

Proceedings ArticleDOI
23 May 2010
TL;DR: This paper proposes two different ways (plain-CS and hybrid-CS) of applying CS to WSNs at the networking layer, in the form of a particular data aggregation mechanism, and illustrates two crucial insights: first, applying CS naively may not bring any improvement, and secondly, the hybrids can achieve significant improvement in throughput.
Abstract: Although compressed sensing (CS) has been envisioned as a useful technique to improve the performance of wireless sensor networks (WSNs), it is still not very clear how exactly it will be applied and how big the improvements will be. In this paper, we propose two different ways (plain-CS and hybrid-CS) of applying CS to WSNs at the networking layer, in the form of a particular data aggregation mechanism. We formulate three flow-based optimization problems to compute the throughput of the non-CS, plain-CS, and hybrid-CS schemes. We provide the exact solution to the first problem corresponding to the non-CS case and lower bounds for the cases with CS. Our preliminary numerical results are only for a low-power regime. They illustrate two crucial insights: first, applying CS naively may not bring any improvement, and secondly, our hybrid-CS can achieve significant improvement in throughput.

Proceedings ArticleDOI
19 Jun 2010
TL;DR: New router prioritization policies that exploit the available slack of interfering packets in order to accelerate performance-critical packets and thus improve overall system performance are proposed.
Abstract: Traditional Network-on-Chips (NoCs) employ simple arbitration strategies, such as round-robin or oldest-first, to decide which packets should be prioritized in the network. This is counter-intuitive since different packets can have very different effects on system performance due to, e.g., different level of memory-level parallelism (MLP) of applications. Certain packets may be performance-critical because they cause the processor to stall, whereas others may be delayed for a number of cycles with no effect on application-level performance as their latencies are hidden by other outstanding packets'latencies. In this paper, we define slack as a key measure that characterizes the relative importance of a packet. Specifically, the slack of a packet is the number of cycles the packet can be delayed in the network with no effect on execution time. This paper proposes new router prioritization policies that exploit the available slack of interfering packets in order to accelerate performance-critical packets and thus improve overall system performance. When two packets interfere with each other in a router, the packet with the lower slack value is prioritized. We describe mechanisms to estimate slack, prevent starvation, and combine slack-based prioritization with other recently proposed application-aware prioritization mechanisms. We evaluate slack-based prioritization policies on a 64-core CMP with an 8x8 mesh NoC using a suite of 35 diverse applications. For a representative set of case studies, our proposed policy increases average system throughput by 21.0% over the commonlyused round-robin policy. Averaged over 56 randomly-generated multiprogrammed workload mixes, the proposed policy improves system throughput by 10.3%, while also reducing application-level unfairness by 30.8%.

Proceedings ArticleDOI
23 May 2010
TL;DR: This work focuses on the data path and analyze the OpenFlow implementation in Linux based PCs, and compares OpenFlow switching, layer-2 Ethernet switching and layer-3 IP routing performance.
Abstract: OpenFlow is an open standard that can be implemented in Ethernet switches, routers and wireless access points (AP). In the OpenFlow framework, packet forwarding (data plane) and routing decisions (control plane) run on different devices. OpenFlow switches are in charge of packet forwarding, whereas a controller set up switch forwarding table on a per-flow basis, to enable flow isolation and resource slicing. We focus on the data path and analyze the OpenFlow implementation in Linux based PCs. We compare OpenFlow switching, layer-2 Ethernet switching and layer-3 IP routing performance. Forwarding throughput and packet latency in underloaded and overloaded conditions are analyzed, with different traffic patterns. System scalability is analyzed using different forwarding table sizes, and fairness in resource distribution is measured.

Journal ArticleDOI
TL;DR: This paper provides proofs of the rate stability, Harris recurrence, and ε-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically.
Abstract: This paper provides proofs of the rate stability, Harris recurrence, and e-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. These algorithms require only local information and they are easy to implement. The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. The paper studies two algorithms. The first algorithm schedules transmissions to keep up with given arrival rates of packets. The second algorithm controls the arrivals in addition to the scheduling and attempts to maximize the sum of the utilities, in terms of the rates, of the packet flows at different nodes. For the first algorithm, the paper proves rate stability for strictly feasible arrival rates and also Harris recurrence of the queues. For the second algorithm, the paper proves the e-optimality in terms of the utilities of the allocated rates. Both algorithms are iterative and we study two versions of each of them. In the first version, both operate with strictly local information but have relatively weaker performance guarantees; under the second version, both provide stronger performance guarantees by utilizing the additional information of the number of nodes in the network.