首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Ralf Irmer  Andreas Fischer 《PAMM》2004,4(1):610-611
Multiple access interference (MAI) limits the system capacity of wireless communications systems applying code division multiple access (CDMA). Provided that channel knowledge is available in the transmitter, the transmitted signal can be preprocessed by multiuser transmission (MUT) methods. As optimization criterion, the bit error probability/rate (BER) is chosen. On the transmit signal, a limited power constraint is imposed, which is a quadratic function of the transmit signal. The nonlinear optimization problem is modeled in this paper. Unfortunately, the problem is non‐convex. However, with iterative nonlinear optimization methods like SQP, local minima can be found with a performance outperforming other MUT methods. The main remaining challenge are low‐complexity optimization algorithms to allow for a real‐time implementation in highdata rate wireless communications. (© 2004 WILEY‐VCH Verlag GmbH & Co. KGaA, Weinheim)  相似文献   

2.
A central controller chooses a state-dependent transmission rate for each user in a fading, downlink channel by varying transmission power over time. For each user, the state of the channel evolves over time according to an exogenous continuous-time Markov chain (CTMC), which affects the quality of transmission. The traffic for each user, arriving at the central controller, is modeled as a finite-buffer Markovian queue with adjustable service rates. That is, for each user data packets arrive to the central controller according to a Poisson process and packet size is exponentially distributed; an arriving packet is dropped if the associated buffer is full, which results in degradation of quality of service. The controller forwards (downlink) the arriving packets to the corresponding user according to an optimally chosen transmission rate from a fixed set A i of available values for each user i, depending on the backlog in the system and the channel state of all users. The objective is to maximize quality of service subject to an upper bound on the long-run average power consumption. We show that the optimal transmission rate for each user is solely a function of his own packet queue length and channel state; the dependence among users is captured through a penalty rate. Further, we explicitly characterize the optimal transmission rate for each user. This project is partially supported by Motorola grant # 0970-350-AF24. The authors thank Phil Fleming,Randy Berry and Achal Bassamboo for helpful comments.  相似文献   

3.
We consider resequencing buffer content at receiver’s side where the selective repeat automatic repeat request scheme is implemented for retransmission of erroneous packets in wireless networks. The error process of the wireless channel due to the fading is described by a discrete-time Markov chain. The study is carried out assuming that the round-trip time of packet over the channel is constant. The main concern in this paper is to characterize the tail asymptotics of the probability mass function of the resequencing buffer content at receiver’s side. Numerical results show that this approximation matches well with simulation.  相似文献   

4.
With the increase in deployment of multi-hop wireless networks and the desire for seamless internet access through ubiquitous connectivity, the inter-working of heterogeneous multi-hop wireless networks will become prominent in the near future. To complement the quest for ubiquitous service access, multi-mode mobile terminals are now in existence. Inter-working heterogeneous multi-hop wireless networks can provide seamless connectivity for such multi-mode nodes but introduces a number of challenges due to its dynamic network topology. One of the challenges in ensuring seamless access to service through these terminals in an inter-working environment is the selection of reliable wireless point-to-point links by the multi-hop nodes. A wireless link is said to be reliable if its radio attribute satisfies the minimum requirements for successful communication. Successful communication is specified by metrics such as signal to interference and noise ratio (SINR), probability of bit error etc. However, the multi-hop wireless networks being inter-worked may operate with different link layer protocols. Therefore, how can the reliability of a wireless link be estimated irrespective of the link level technologies implemented in the networks being inter-worked so that optimal paths can be used for multi-hopping between nodes? In this paper, a generic framework which can estimate the reliability of a link in inter-working multi-hop wireless network is presented. The framework uses the relationship between inter-node interference, SINR and the probability of bit error to determine the reliability of a wireless link between two nodes. There is a threshold for the probability of bit error on a link for the link to be termed reliable. Using parameters such as the SINR threshold, nodes’ transmission power, link distance and interfering node density, the framework can evaluate the reliability of a link in an inter-working multi-hop network.  相似文献   

5.
This paper analyses the bit error rate (BER) of the spatial modulation orthogonal frequency division multiplex (SM-OFDM) system and derives the optimal power allocation between the data and the pilot symbols by minimizing the upper bound for the BER operating with imperfect channel estimation. Furthermore, we prove the proposed optimal power allocation scheme applies to all generalized linear interpolation techniques with the minimum mean square error (MMSE) channel estimation . Simulation results show that employing the proposed optimal power allocation provides a substantial gain in terms of the average BER performance for the SM-OFDM system compared to its equal-power-allocation counterpart.  相似文献   

6.
衰减信道下的决策融合问题   总被引:2,自引:0,他引:2  
本文针对国际上近几年兴起的研究热点——无线传感器网络在信道衰减下的决策融合问题进行探讨。分析了已有传感器决策融合问题算法的结构,在已知信道传输错误概率的条件下,将信道无传输错误的分析方法推广到信道衰减的情况,对传输错误和融合律的关系进行了深入分析。对给定融合律的网络决策融合问题,获得了最优容错传感器观测量化器的必要条件并设计了迭代算法。在没有增加问题的计算复杂度的情况下,得到了最优观测量化器。与国际上现有结果不同,新结果不要求传感器决策条件独立,也不要求各传感器与融合中心之间的信道相互独立,具有更加广泛的使用范围。  相似文献   

7.
In frequency-modulated dierential chaos shift keying (FM-DCSK), the separation of the chaotic reference and information-bearing wavelets is performed in time domain. This separation method not only limits the attainable data rate but also demands delay components in transceiver circuits. Due to the fact that wideband radio frequency (RF) delay lines are extremely diffcult to implement with CMOS technology in ultra wideband communications, a new phase-separated FM-DCSK modulation scheme is presented in this paper to increase the data rate and to avoid the use of delay lines in both the transmitter and the receiver circuits. The feasible congurations of transmit- ter and detector are given. Besides, bit error rate (BER) performance of the proposed system is evaluated by both analysis and Monte Carlo simulations over additive white Gaussian noise (AWGN) channel.  相似文献   

8.
The paper considers the problem of scheduling packets in wireless broadcast systems under uncertainty with the conditional value-at-risk (CVaR) constraints. In such systems, a server periodically transmits a stream of packets over a broadcast channel. The client that needs to access the data, tunes in to the channel and waits for the next packet. This allows one to serve a large number of clients in an efficient way and also keep clients’ location secret. We formulate and solve two alternative stochastic optimization problems that minimize the transmission time subject to CVaR constraints. Our results indicate that it is possible to derive an analytical solution to the problems in certain cases of practical interest. We also propose a methodology to obtain numerical solutions for the general case.  相似文献   

9.
We study the problem of scheduling packets from several flows traversing a given node which can mix packets belonging to different flows. Practical wireless network coding solutions depend on knowledge of overhearing events which is obtained either by acknowledgments or statistically. In the latter case, the knowledge about each packet improves progressively with feedback from the transmissions. We propose a virtual network mechanism in order to characterize the throughput region of such a system for the case where we allow only pairwise XORing. We also provide the policy which achieves the stability region and compare it to simple heuristics. The derived policy is a modification of the standard backpressure policy, designed to take into account the fact that in the proposed virtual network the destination of a transmitted packet is known only probabilistically. We demonstrate simulation results according to which scheduling with statistical information can provide significant throughput benefits even for overhearing probabilities as small as 0.6.  相似文献   

10.
Cognitive radio (CR) is a revolutionary technology in wireless communications that enhances spectrum utilization by allowing opportunistic and dynamic spectrum access. One of the key challenges in this domain is how CR users cooperate to dynamically access the available spectrum opportunities in order to maximize the overall perceived throughput. In this paper, we consider the coordinated spectrum access problem in a multi-user single-transceiver CR network (CRN), where each CR user is equipped with only one half-duplex transceiver. We first formulate the dynamic spectrum access as a rate/power control and channel assignment optimization problem. Our objective is to maximize the sum-rate achieved by all contending CR users over all available spectrum opportunities under interference and hardware constraints. We first show that this problem can be formulated as a mixed integer nonlinear programming (MINLP) problem that is NP-hard, in general. By exploiting the fact that actual communication systems have a finite number of available channels, each with a given maximum transmission power, we transfer this MINLP into a binary linear programming problem (BLP). Due to its integrality nature, this BLP is expected to be NP-hard. However, we show that its constraint matrix satisfies the total unimodularity property, and hence our problem can be optimally solved in polynomial time using linear programming (LP). To execute the optimal assignment in a distributed manner, we then present a distributed CSMA/CA-based random access mechanism for CRNs. We compare the performance of our proposed mechanism with reference CSMA/CA channel access mechanisms designed for CRNs. Simulation results show that our proposed mechanism significantly improves the overall network throughput and preserves fairness.  相似文献   

11.
针对恒模算法(CMA)收敛速度较慢、收敛后均方误差较大的缺点,提出一种新的双模式盲均衡算法.在算法初期,利用能快速收敛的归一化恒模算法(NCMA)进行冷启动,在算法收敛后切换到判决引导(DD-LMS)算法,减少误码率.计算机仿真表明,提出的新算法有较快的收敛速度和较低的误码率.  相似文献   

12.
One way to achieve reliability with low-latency is through multi-path routing and transport protocols that build redundant delivery channels (or data paths) to reduce end-to-end packet losses and retransmissions. However, the applicability and effectiveness of such protocols are limited by the topological constraints of the underlying communication infrastructure. Multiple data delivery paths can only be constructed over networks that are capable of supporting multiple paths. In mission-critical wireless networks, the underlying network topology is directly affected by the terrain, location and environmental interferences, however the settings of the wireless radios at each node can be properly configured to compensate for these effects for multi-path support. In this work we investigate optimization models for topology designs that enable end-to-end dual-path support on a distributed wireless sensor network. We consider the case of a fixed sensor network with isotropic antennas, where the control variable for topology management is the transmission power on network nodes. For optimization modeling, the network metrics of relevance are coverage, robustness and power utilization. The optimization models proposed in this work eliminate some of the typical assumptions made in the pertinent network design literature that are too strong in this application context.  相似文献   

13.
Analysis of Stop-and-Wait ARQ for a wireless channel   总被引:1,自引:0,他引:1  
In this paper, we study the behavior of the transmitter buffer of a system working under a Stop-and-Wait retransmission protocol. The buffer at the transmitter side is modeled as a discrete-time infinite-capacity queue. The numbers of information packets entering the buffer during consecutive slots are assumed to be independent and identically distributed random variables. The packets are sent over an unreliable channel and transmission errors occur in a correlated manner. Specifically, the probability of an erroneous transmission is modulated by a two-state Markov chain. An expression is derived for the probability generating function of the buffer content. This expression is then used to derive several queue-length characteristics and the mean packet delay. Numerical examples illustrate the strong effect of error correlation on the system performance. The obtained analytical results are also compared with appropriate simulations.   相似文献   

14.
The topology of a mobile wireless network changes over time. Maintaining routes between all nodes requires the continuous transmission of control information, which consumes precious power and bandwidth resources. Many routing protocols have been developed, trading off control overhead and route quality. In this paper, we ask whether there exist low‐overhead schemes that produce low‐stretch routes, even in large networks where all the nodes are mobile. We present a scheme that maintains a hierarchical structure within which constant‐stretch routes can be efficiently computed between every pair of nodes. The scheme rebuilds each level of the hierarchy periodically, at a rate that decreases exponentially with the level of the hierarchy. We prove that this scheme achieves constant stretch under a mild smoothness condition on the nodal mobility processes. Furthermore, we prove tight bounds for the network‐wide control overhead under the additional assumption of the connectivity graph forming a doubling metric space. Specifically, we show that for a connectivity model combining the random geometric graph with obstacles, constant‐stretch routes can be maintained with a total overhead of bits of control information per time unit. © 2015 Wiley Periodicals, Inc. Random Struct. Alg., 47, 669–709, 2015  相似文献   

15.
Quantized Frame Expansions with Erasures   总被引:1,自引:0,他引:1  
Frames have been used to capture significant signal characteristics, provide numerical stability of reconstruction, and enhance resilience to additive noise. This paper places frames in a new setting, where some of the elements are deleted. Since proper subsets of frames are sometimes themselves frames, a quantized frame expansion can be a useful representation even when some transform coefficients are lost in transmission. This yields robustness to losses in packet networks such as the Internet. With a simple model for quantization error, it is shown that a normalized frame minimizes mean-squared error if and only if it is tight. With one coefficient erased, a tight frame is again optimal among normalized frames, both in average and worst-case scenarios. For more erasures, a general analysis indicates some optimal designs. Being left with a tight frame after erasures minimizes distortion, but considering also the transmission rate and possible erasure events complicates optimizations greatly.  相似文献   

16.
针对JPEG2000图像压缩标准所具有的渐进传输、一次编码多次解码等特性,提出了一种基于图像特征的鲁棒性图像认证算法.该算法在JPEG2000编码过程中,先根据图像不变特征,生成认证水印,再根据实际的鲁棒性认证需求,在量化后的小波系数中确定每个子带的认证水印嵌入位平面,最后基于小波系数位平面的特征嵌入认证水印.算法不仅能适应JPEG2000各种灵活的编码方式,还能定位图像篡改的位置.实验结果验证了图像认证算法对可允许图像操作的鲁棒性以及对图像篡改的敏感性.  相似文献   

17.
In this paper, we present a game analysis of the Binary Exponential Backoff (BEB), a popular bandwidth allocation mechanism used by a large number of distributed wireless technologies. A Markov chain analysis is used to obtain equilibrium retransmission probabilities and throughput. Numerical results show that when the arrival probability increases, the behavior of mobile stations MSs become more and more aggressive resulting in a global deterioration of the system throughput. We then consider a non-cooperative game framework to study the operation and evaluate the performance of the BEB algorithm when a group of MSs competing with each other to gain access to the wireless channel. We focus our attention to the case when an MS acts selfishly by attempting to gain access to the channel using a higher retransmission probability as a means to increase its own throughput. As a means to improve the system performance, we further explore the use of two transmission mechanisms and policies. First, we introduce the use of multiple power levels (MPLs) for the data transmission. The use of multiple power levels results on a capture effect allowing the receiver to properly decode the message even in the presence of a collision. Under the proposed scheme, named MPL-BEB, the effect of the aggressive behavior, higher transmission probabilities, is diminished since the power level is chosen randomly and independently by each and every station. Second, we introduce a disutility policy for power consumption. The resulting mechanism, named MPL-BEB with costs, is of prime interest in wireless networks composed of battery-powered nodes. Under this scheme aggressive behavior is discouraged since each retransmission translates into the depletion of the energy stored in the battery. Via price of anarchy, our results identify a behavior similar to the well-know prisoner’s dilemma. A non-efficiency of Nash equilibrium is observed for all schemes (BEB, MPL-BEB, MPL-BEB with costs) under heavy traffic with a notable outperformance of MPL-BEB with costs over both MPL-BEB and BEB.  相似文献   

18.
This article studies the problem of observer‐based dissipative control problem for wireless networked control systems (NCSs). The packet loss and time delay in the network are modeled by a set of switches, using that a discrete‐time switched system is formulated. First, results for the exponential dissipativity of discrete‐time switched system with time‐varying delays are proposed by using the average dwell time approach and multiple Lyapunov–Krasovskii function. Then, the results are extended to drive the controller design for considered wireless NCS. The attention is focused on designing an observer‐based state feedback controller which ensures that, for all network‐induced delay and packet loss, the resulting error system is exponentially stable and strictly dissipative. The sufficient conditions for existence of controllers are formulated in the form of linear matrix inequalities (LMIs), which can be easily solved using some standard numerical packages. Both observer and controller gains can be obtained by the solutions of set of LMIs. Finally, numerical examples are provided to illustrate the applicability and effectiveness of the proposed method. © 2014 Wiley Periodicals, Inc. Complexity 21: 297–308, 2015  相似文献   

19.
The objective of this paper is to characterize the optimal use of redundancy in transmitting a signal that is encoded in terms of packets of linear coefficients. The signals considered here are vectors in a finite-dimensional real or complex Hilbert space. For the purpose of transmission, these vectors are encoded in a set of linear coefficients that is partitioned in packets of equal size. We investigate how the encoding performance depends on the degree of redundancy it incorporates and on the amount of data-loss when packets are either transmitted perfectly or lost in their entirety. The encoding performance is evaluated in terms of the maximal Euclidean norm of the reconstruction error occurring for the transmission of unit vectors. Our main result is the derivation of error bounds as well as the characterization of optimal encoding when up to three packets are lost.  相似文献   

20.
This paper presents a new traffic control algorithm for asynchronous transfer mode (ATM) switches composed of Clos network type switch fabric. In most traffic control algorithms previously proposed, an ATM switch has been considered as a single node, although the switch fabric of an ATM switch is usually of a network type. In this paper, we suggest a new control algorithm that is designed not only for the ATM network but also for the switch fabric and that can maintain high speed even in cases where buffer capacity of the switch fabric is limited. Main modules of the suggested algorithm are a traffic status detection mechanism based on non-parametric statistical tests, a cell-loss detection mechanism, and a cluster-based fair share computation procedure. Results of simulation experiments show that the suggested algorithm satisfactorily adjusts traffic rate of available bit rate services according to changes in traffic rate used by quality of service (QoS) guaranteed services. The results also show that the algorithm prevents cell losses relatively well and keeps the delay time of QoS guaranteed services short enough.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号