Recent Advances in Wireless Communications and Networks
Recent Advances in Wireless Communications and Networks
IN WIRELESS
COMMUNICATIONS
AND NETWORKS
Edited by Jia-Chin Lin
Recent Advances in Wireless Communications and Networks
Edited by Jia-Chin Lin
Published by InTech
Janeza Trdine 9, 51000 Rijeka, Croatia
Statements and opinions expressed in the chapters are these of the individual contributors
and not necessarily those of the editors or publisher. No responsibility is accepted
for the accuracy of information contained in the published articles. The publisher
assumes no responsibility for any damage or injury to persons or property arising out
of the use of any materials, instructions, methods or ideas contained in the book.
Preface IX
Chapter 16 Dealing with VoIP Calls During “Busy Hour” in LTE 345
Angelos Antonopoulos, Elli Kartsakli,
Luis Alonso and Christos Verikoukis
Many exciting impacts on our daily life are shortly anticipated due to recent advances
in wireless communication networks that enable real-time multimedia services to be
provided via mobile broadband Internet on a wide variety of terminal devices. The
trend is mainly driven by the evolution of wireless networks and advanced wireless
information and communication technology (ICT). The progression to fourth-
generation (4G) or IMT-advanced systems is expected to significantly change usage
habits and introduce new services, such as the services supported by higher spectral-
efficiency communication technology and self-configurable, high-feasibility networks.
The Third Generation Partnership Project (3GPP) Long-Term Evolution (LTE)
continues to be enhanced as this book is being written.
Although there have been many journal and conference publications regarding
wireless communication, they are often in the context of academic research or
theoretical derivations and sometimes omit practical considerations. Although the
literature has many conference papers, technical reports, standard contributions and
magazine articles, they are often fragmental engineering works and thus are not easy
to follow up. The objective of this book is to accelerate research and development by
serving as a forum in which both academia and industry can share experiences and
report original studies and works regarding all aspects of wireless communications. In
addition, this book has great educational value because it aims to serve as a virtual,
but nonetheless effective bridge between academic research in theory and engineering
development in practice, and as a messenger between the technical pioneers and the
researchers who followed in their footstep.
This book, titled Recent Advances in Wireless Communications and Networks, focuses
on the current hottest issues from the lowest layers to the upper layers of wireless
communication networks and provides “real-time” research progress on these issues.
In my endeavor to edit this book, I have made every effort to ask the authors to
systematically organize the information on these topics to make it easily accessible to
readers of any level. The editor also maintains the balance between current research
results and their theoretical support. In this book, a variety of novel techniques in
wireless communications and networks are investigated. The authors attempt to
present these topics in detail. Insightful and reader-friendly descriptions are presented
to nourish readers of any level, from practicing and knowledgeable communication
X Preface
This book is composed of twenty chapters that were authored by the most
knowledgeable and successful researchers in the world. Each chapter was written in
an introductory style beginning with the fundamentals, describing approaches to the
hottest issues and concluding with a comprehensive discussion. The content in each
chapter is taken from many publications in prestigious journals and followed by
fruitful insights. The chapters in this book also provide many references for relevant
topics, and interested readers will find these references helpful when they explore
these topics further. These twenty chapters are arranged in order from the lowest layer
to the upper layers of wireless communication. This book was naturally partitioned
into 3 main parts. Part A consists of eight chapters that are devoted to physical layer
(PHY) and medium access control (MAC) layer research. Part B consists of five
chapters that are devoted to upper layer research. Finally, Part C consists of seven
chapters that are devoted to applications and realizations.
In summary, this book covers broad areas of communications and networks. The
introductions, derivations, discussions and references in this book significantly
improve the readers’ understanding of communications and networks and encourage
them to actively explore these broad, exciting and rapidly-evolving research areas.
Jia-Chin Lin
Distinguished Professor
Dept. of Commun. Engr.
National Central University,
Taiwan, R.O.C.
Part 1
1. Introduction
Estimation theory has been developed over centuries. There are several approaches to
utilizing this theory; in this chapter, these approaches are classified into three types. Type I
includes the oldest two methods, the least squares (LS) and moment methods; both of these
methods are non-optimal estimators. The least squares method was introduced by Carl
Friedrich Gauss. Least squares problems fall into linear and non-linear categories. The linear
least squares problem is also known as regression analysis in statistics, which have a closed
form solution. An important feature of the least squares method is that no probabilistic
assumptions of the data are made. Therefore, the linear least squares approach is used for
parameter estimation, especially for low complexity design (Lin, 2008; 2009). The design
goal of the least squares estimator is to find a linear function of observations whose
expectation is a linear function of the unknown parameter with minimum variance. In
addition, the least squares method corresponds to the maximum likelihood (ML) criterion if
the experimental errors are normally distributed and can also be derived from the moment
estimation. As an alternative to the LS method, the moment method is another simple
parameter estimation method with probabilistic assumptions of the data. The general
moment method was introduced by K. Pearson. The main procedure in the moment method
involves equating the unknown parameter to a moment of distribution, then replacing the
moment with a sample moment to obtain the moment estimator. Although the moment
estimator has no optimal properties, the accuracy can be validated through lengthy data
measurements. This is mainly because the estimator based on moment can be maintained to
be consistent. Type II includes the methods of minimum variance unbiased estimator
(MVUE) and the Bayesian approach, which are both optimal in terms of possible minimum
estimation error, i.e., statistical efficiency. MVUE is the best guess of an unknown
parameter. The standard MVUE procedure includes two steps. In the first step, the Cramer-
Rao lower bound is determined, and the ability of some estimator to approach the bound. In
the second step, the Rao-Blackwell-Lehmann-Scheffe (RBLS) theorem is applied. The MVUE
can be produced by these two steps. Moreover, a linear MVUE might be found under more
restricted conditions.
In the Bayesian method, the Bayesian philosophy begins with the cost function, and the
expected cost with respect to the parameter is the risk. The design goal of Bayesian
philosophy is to find an estimator that minimizes the average risk (Bayes risk). The most
4 Recent Advances in Wireless Communications and Networks
common cost function is a quadratic function because it measures the performance of the
estimator in terms of the square of the estimation error. In this case, the Bayes risk is the
mean square error (MSE), and thus, the Bayes estimate is a minimum mean square error
(MMSE) estimator. Another common cost function is the absolute function, which regards
the absolute estimate error as the Bayes risk. In this case, the Bayes estimate is a minimum
mean absolute error (MMAE) estimator. Another estimation, which is not a proper Bayes
estimation but fits within Bayes philosophy, is the maximum a posteriori (MAP) estimation.
The MAP criterion considers the uniform cost function, and the parameter is discretely,
randomly distributed under this assumption. Although this estimate usually only
approximates the Bayes estimate for uniform cost, the MAP criterion is widely used for
estimator design. Type III includes the maximum likelihood (ML) estimate, which is the
most important estimation theory in the 20th century. The ML estimate can be referred to as
an alternative MAP without knowledge of apriori probability of the parameters. The ML
estimator is the most popular approach for obtaining a practical estimator, which was
previously used by Gauss. The general method of estimation was first introduced by R. A.
Fisher with the concepts of consistency, efficiency and sufficiency of the estimation function.
The ML estimator is required when MVUE does not exist or cannot be found. An advantage
of the ML estimator is that a practical estimation is easy to obtain through the prescribed
procedures. Another advantage of this approach is that MVUE can be approximated due to
its efficiency. Thus, from the theoretical and practical perspectives, the ML approach is the
most important and widely used estimation method of this century (Lin, 2003).
Because the ML estimator is essential in estimation theory, the analysis of its performance is
a benchmark of estimator design. This benchmark is commonly known as the Cramer-Rao
lower bound (CRLB), which is named after Harald Cramer and Calyampudi Radhakrishna
Rao. In section 2, the definition of the CRLB is introduced with several examples. A general
case of CRLB under two common communication channels is then introduced in section 3.
To establish basic knowledge of hybrid parameter estimation, random parameter estimation
is presented in section 4. In section 5, Cramer-Rao-like bounds for hybrid parameter
estimation are introduced and compared with each other. Lastly, we summarize some
practical cases and compare these cases with modified CRB which is most common used
Cramer-Rao-like bounds.
Here, the index n refers to the n ’th observation. In this problem, the transmitted signal s is
assumed to be an unknown parameter that is deterministic during n observations. The first
idea estimate s takes one observation as our estimation, e.g., the n ’th observation,
namely sˆ = r[n] . To analyze the estimation accuracy, we check the likelihood function of
r[n] as shown.
1 ⎡ 1 2⎤
p( r[ n]; s ) = exp ⎢ − 2 ( r[ n] − s ) ⎥ (2)
2πσ 2⎣ 2σ ⎦
1 ⎡ 1 2⎤
p( sˆ ; s ) = exp ⎢ − 2 ( sˆ − s ) ⎥ (3)
2πσ 2 ⎣ 2σ ⎦
Now, the mean value is the target parameter s , and the estimation variance is σ 2 . The
estimation accuracy can then be determined as
−1
⎛ ∂ 2 ln p( r[ n];s ) ⎞
var(sˆ ) = σ 2 = −E ⎜⎜ ⎟⎟ . (4)
⎝ ∂s 2 ⎠
1 ⎡ 1 N −1 2⎤
p( r[n]; s ) = N
exp ⎢ − 2 ∑ ( r[n] − s ) ⎥ . (5)
⎢⎣ 2σ n = 1
( 2πσ 2 2 ) ⎥⎦
A ML estimator can be derived in the same way as for a single observation to yield
N −1
∑ r[ n]
n=1
sˆ = , (6)
N
which is an unbiased estimator, namely E{sˆ} = s . We can also find the estimation variance
using equation (4); the result is similar to the single observation MLs with a factor N in the
denominator:
σ2
var(sˆ ) = . (7)
N
An extreme case occurs when N approaches ∞ , and the process reduces the estimation
variance to 0. From this simple example, we can summarize that the ultimate goal of
estimator design is to find the minimum variance unbiased estimator (MVUE), and if we
wish to illustrate the performance of our estimator, then estimation variance can be found
through the likelihood function. Now, we are ready to define the CRLB (Kay, 1998).
6 Recent Advances in Wireless Communications and Networks
<Theorem>
Assume the pdf, p( r ;θ ) ,satisfies the regularity condition
⎡ ∂ ln p(r ;θ ) ⎤
Er ;θ ⎢
∂θ ⎥ = 0 for all θ . (8)
⎣ ⎦
1
var(θˆ ) ≥ . (9)
⎡ ∂ 2 ln p(r ;θ ) ⎤
−Er ;θ ⎢ ⎥
⎣⎢ ∂θ 2 ⎦⎥
An unbiased estimator may be found that attains the bound for all θ if and only if
∂ ln p(r ;θ )
= I (θ )( g( r ) − θ ) (10)
∂θ
for some function I (θ ) and g(r ) . This estimator can be stated as θˆ = g( r ) , which is a MVUE with
variance 1 / I (θ ) . To attain the variance lower bound, Fisher’s information is defined as
⎡ ∂ 2 ln p(r ;θ ) ⎤
I (θ ) = −Er ;θ ⎢ ⎥, (11)
⎣⎢ ∂θ 2 ⎦⎥
which is used to calculate the covariance matrices associated with maximum-likelihood estimates.
An unbiased estimator that achieves the variance lower bound is referred to as “efficient”.
In other words, an unbiased estimator that achieves the CRLB is an efficient estimator and
must be MVUE. Figures 1 and 2 are illustrations of the relationship between a MVU
estimator and the CRLB.
In this example, the Bayesian MSE estimator is an unbiased estimator. The performance
comparison in figure 3 shows that within a certain parameter interval, the biased Bayesian
estimator may have lower estimation variance than MVUE’s. However, this comparison also
shows that the biased estimator performs terribly outside this interval. Thus, the unbiased
estimator has an advantage in terms of consistent performance.
rn (t ) = s(t ;θ ) + wn (t ) , (12)
where n indicate the n th observation. Following the general CRLB derivation steps, the
likelihood function is found first and differentiation with respect to θ is then performed
twice.
1 ⎡ 1 N −1 2⎤
p( rn (t ); s(t ),θ ) = N
exp ⎢ − 2 ∑ [ rn (t )−s(t ;θ )] ⎥ (13)
⎣ 2σ n = 1
( 2πσ 2 2 ) ⎦
∂ 2 ln p( rn (t );s(t ),θ )
Taking the expectation of with respect to p(r ; s ,θ ) into Fisher’s information
∂θ 2
yields
2
⎪⎧ ∂ ln p(rn (t );s(t ),θ ) ⎪⎫ 1 N − 1 ⎛ ∂s(t ;θ ) ⎞
2
I (θ ) = −Er ;s ,θ ⎨ ⎬= 2 ∑ ⎜ ⎟ (16)
⎭⎪ σ n = 0 ⎝ ∂θ ⎠
2
⎩⎪ ∂θ
Finally, the inverse recipocal of the Fisher‘s information produced by the CRLB in the
AWGN channel.
A Study of Cramér-Rao-Like Bounds and Their Applications to Wireless Communications 9
1 σ2
var(θˆ ) ≥ = (17)
I (θ ) N − 1 ⎛ ∂s(t ;θ ) ⎞
2
∑ ⎜ ⎟
n=0 ⎝ ∂θ ⎠
− jφ0
rn (t ) = α 0 e s(t ;θu ) + wn (t ) (18)
Alternatively, using complex coordinates, i.e., the Gaussian distributed α I and αQ with
mean η A and variance σ A2 yields
Because the α I , αQ and wn (t ) terms are Gaussian distributed, the received signal rn (t ) is
also Gaussian distributed. To find the joint likelihood function, the mean mr and variance
σ r2 of the received signal should be derived.
mr = η A (1 + j )s(t ;θ ) (20)
σ r2 = 2σ A2 Ps (t ;θ ) + 2σ N2 (21)
Here, Ps (t ;θ ) = s(t ;θ )s(t ;θ )* is the power of the transmitted signal. The joint likelihood
function turns out is then described by
1 ( r (t )−mr )2
pr (r (t ); s(t ;θ )) = exp( − ) (22)
2πσ r2 2σ r2
r (t ) = s + w(t ) (23)
1 ⎛ 1 N −1 ⎞
p( r (t ); s ) = exp ⎜ − ∑ ( rn (t )−s )2 ⎟ (24)
2πσ 2⎝ 2 n = 0 ⎠
p(s ;r (t ))p(r (t ))
p( r(t ); s) = (25)
p(s )
After certain computations, the conditional pdf with a posteriori information is obtained as
1 ⎛ 1 ⎞
p(s ; r (t )) = exp ⎜ − 2 (s − μs ;r )2 ⎟ , (26)
2πσ s2; r ⎜ 2σ ⎟
⎝ s ;r ⎠
where
1
σ s2;r = ; (27)
N 1
2
+
σ σ s2
⎛N μ ⎞
μs ;r = ⎜⎜ 2 x + s2 ⎟⎟σ s2;r . (28)
⎝ σ σ s ⎠
where
σ s2
α= 2
(30)
σ 2 +σ
s
N
The Bayesian mean square error is defined as
⎛ ⎞
σ2 ⎜ σ s2 ⎟ σ2
Bmse(sˆ ) = E[( s −sˆ ) ] =
2
⎜
N ⎜ σ 2 +σ 2 ⎟≤ N (31)
s ⎟
⎝ N ⎠
As σ s2 → ∞ i.e., without any information from a prior knowledge, the bound would be the
same with the sample mean estimator. This result can be compared with that of the first
example in this chapter, and an important concept of Bayesian estimator is revealed: any
prior knowledge will result in higher accuracy of the Bayesian estimator.
T
θ = ⎡⎣θTr θTu ⎤⎦ , (32)
rn (t ) = s(t ; θ) + wn (t ) (33)
p( rn (t ), θr ; s(t ), θu ) =
1
exp( −
[rn (t )−s(t ;θ)]2 ) . (34)
2πσ 2 2σ 2
Because we assumed that the pdf is well-known and these denoted parameters are
unimportant, the marginal likelihood function is derived first, and the nuisance parameters
are integrated out of the equation.
12 Recent Advances in Wireless Communications and Networks
Now, the resultant problem becomes a classical estimation problem, and the CRLB can be
derived step by step.
2
∂ 2 ln p(rn (t );s(t ,θu )) 1 N − 1 ⎛ ∂s(t ,θu ) ⎞ ∂ 2 s(t ,θu )
2.
2
= 2 ∑ ⎜ ⎟ +[ rn (t )−s(t ,θu )] (37)
∂θu σ n = 0 ⎝ ∂θu ⎠ ∂θu 2
⎧ ⎫
3. I ( θ ) = Er ⎪⎨ ∂ ln p(rn (t );s(t ,θu )) ∂ ln p( rn (t );s(t ,θu )) ⎪⎬ (38)
i, j
⎪⎩ ∂θ i ∂θ j ⎪⎭
⎡ ⎤
4. CRLB(θˆi ) = ⎢ 1 ⎥ ≤ var(θˆi ) (39)
⎣⎢ I ( θ ) ⎦⎥ i ,i
rn (t ) = s(t ; θ) + wn (t ) (40)
p(rn (t ), θr ; s(t ), θu ) =
1 [r (t )−s(t ;θ)] )
exp( − n
2
(41)
2πσ 2 2σ 2
2
∂ 2 ln p( rn (t ),θr ;s(t ),θu ) 1 N − 1 ⎛ ∂s(t ;θ) ⎞ ∂ 2 s(t ;θ )
2
= 2 ∑ ⎜ ⎟ +[ rn (t )−s(t ;θ)] (43)
∂θ σ n = 0 ⎝ ∂θ ⎠ ∂θ 2
Because the joint pdf is considered, the expection of Fisher’s information should be taken
with respect to p( r (t ),θr )
⎡ 1 ⎤
HCRB(θˆi ) = ⎢ ⎥ ≤ var(θˆi ) . (47)
⎣⎢ I ( θ ) ⎦⎥ i ,i
⎡ 1 ⎤
MCRB(θˆi ) = ⎢ ⎥ ≤ var(θˆi ) (48)
⎣⎢ ( )i ,i ⎦⎥
I θ
An previously reported example can help distinguish the difference between these CR-like
bounds (F. Gini, 2000).
Example 5.2
When considering a data-aided joint frequency offset estimation case, the signal model can
be described as
rn (t ) = Ae − j 2π f Dt s(t ) + wn (t ) (49)
− jφ
Here, A is the complex channel, which can be rewritten as A = α 0 e 0 = α I + jα Q , and
e − j 2π f Dt represents the frequency offset. The estimation parameter matrix
θ = [ f D α I α Q ]T can be defined. Because this is a data-aided case, s(t ) can be a pilot or
preamble, and we can assume that s(t )s(t )* = 1 without loss of generality. Then the signal
after pilot removal is
xn (t ) = rn (t )s(t )*
(50)
xn = (α I + jαQ )e j 2π f Dt + vn (t )
14 Recent Advances in Wireless Communications and Networks
xn (t ) is also Gaussian distributed. Following the derivation of S. M. Kay (1998) and F. Gini
(2000), we can find the conditional Fisher’s information matrix.
I ( f D ) = Eα {I (θ 0 )} (52)
1 3
MCRB( f D ) = = (53)
⎡⎣ I ( f D ) ⎤⎦ 4π 2
N ( N − 1)(2 N −1)ρ
11
where ρ = (η A2 + σ A2 ) / σ N2 is the SNR. Now, the difference between the MCRB and the HCRB
can be checked. As mentioned previously, the HCRB is
⎡ 1 ⎤
HCRB( f D ) = ⎢ ⎥
⎣⎢ I ( f D ) ⎦⎥ 11 , (54)
3(K R + 1)(K R + 1+ N ρ ) 1
= 2
2π N ( N −1) 2(2 N −1)(K R + 1)(K R + 1+ N ρ )−3N ( N −1)ρ K R
where K R = η A2 / σ A2 is the Rice factor, which is the power ratio between direct path signal
and other scatter path signals. A comparison of the HCRB and MCRB can be evaluted as.
Based on the equation above, in the general case, the ratio is always larger than 1, which
means that the HCRB is generally a tighter bound than the MCRB. Conversely, when
K R → 0 or K R → ∞ , the ratio of HCRB to MCRB approaches 1. It is interesting that these
two bounds only meet for two extreme scenarios, namely the Rayleigh channel and direct
path.
⎧⎪ 1 ⎫⎪
MCB(θˆi ) = Eθ ⎨ ⎬. (56)
r I(θ )
⎩⎪ 0 i ,i ⎭⎪
The MCB has a similar form to the MCRB, but the MCB is always tighter than the MCRB.
More directly, the MCB applies to more restricted estimators than the CRLB, which implies
that the MCB is tighter than CRB, and the MCRB is looser than the CRB, which was derived
by A. N. D’Andrea (1994). Therefore, the MCB is tighter than the MCRB. Alternatively, we
can also explain this relationship using Jensen’s inequality for any convex function ϕ and
random variable x
ϕ ( E[ x ]) ≤ E ⎡⎣ϕ ( x ) ⎦⎤ . (57)
In our case, the inverse function for a positive defined matrix is a convex function, so
1 ⎪⎧ 1 ⎪⎫
MCRB(θˆi )= ≤ Eθ ⎨ ⎬ =MCB(θˆi ) . (58)
{
Eθ I ( θ0 )i , i
r
} r I(θ )
⎪⎩ 0 i , i ⎪⎭
Now, from example 5.2 in the MCRB subsection, the MCB of the joint estimated frequency
offset is
3σ N2 ⎧⎪ 1 ⎪⎫
MCB( f D ) = Eα ⎨ ⎬
2π N ( N −1)(2 N −1) ⎩⎪α I2 +α Q2 ⎭⎪
2
(59)
⎪⎧ 2(η 2 +σ 2 ) ⎪⎫
MCB( f D ) = MCRB( f D )Eα ⎨ 2A 2A ⎬
⎩⎪ α I +α Q ⎭⎪
The final result still remains the expectation term, so it cannot be derived into a closed form.
Although the MCB is a tighter bound than the MCRB, the MCRB is more likely to derive
into a closed form. In addition, the MCB requires a locally unbiased estimator, which is also
a harsh restriction for estimator design, so the MCRB is more popular for theoretical
analysis.
3( K R +1+ N ρ ) (60)
CRB( f D ) = 2
2π N ( N −1)ρ[ N ( N + 1)ρ + 2(2 N −1)K R ]
Then, this result is compared with that for the HCRB, which was derived in equation (55).
After calculations, the CRB can be summarized into the HCRB multiplied by a function. We
simplified the fraction in equation (62) and found that it is larger than 1 only if N < 1 . This
result implies that CRB( f D ) ≥ HCRB( f D ) , and the relationship HCRB( f D ) ≥ MCRB( f D ) has
been proven by equation (56). Another way to prove this is to use a corollary.
“For any positive defined matrix M , ⎡ M −1 ⎤ ≥ [ M11 ]−1 , an equal occur if M is diagonal”.
⎣⎢ ⎦⎥ 11
Finally, we summarize the relationship between CRB, HCRB and MCRB as
However, the relationship between the MCB and MCRB was also derived in equations
(58-59) using Jensen’s inequality. Because the MCRB seems to be a looser bound in the
Cramer-Rao-like bounds family, we normalized all other bounds to the MCRB, as shown
in figure 4.
communication environment, which is another reason that the MCRB is more popular than
the MCB. In multiple parameters estimation, joint estimation techniques have been a
popular topics recently. In terms of hybrid parameter joint estimation, the benchmark for
comparison with is the HCRB. Based on equation (56) and figure 3, the HCRB has a feature
that approaches the MCRB when K → 0 or K → ∞ . As mentioned previously, the
R R
scenario K R → 0 implies the Rayleigh channel. The analysis shows that the MCRB is quite
sufficient as a benchmark to design an estimator in the Rayleigh channel environment.
Some prior research has been reported on the relationship among the joint estimate initial
phase, timing delay and frequency offset (D'Andrea , 1994). The author summarized and
derived some cases in which the CRB is equal to the MCRB.
i. Estimation of φ when f D , τ and data are known
ii. Estimation of τ when f D , φ , and data are known
iii. Estimation of f D with M-PSK modulation, when τ and differential data are available
but φ is unknown.
Here, φ , f D and τ are the initial phase , frequency offset and timing delay. Other cases
may exist in which the CRB is equal to the MCRB, but these cases are difficult to analyze. An
important conclusion here is that if an estimator approaches the MCRB, then the MCRB
must be closed to the CRB.
6. Advanced topics
6.1 Carrier phase and clock recovery
As summarized by A. N. D’Andrea (1994), there are several synchronization techniques that
can attain or approach the MCRB for a carrier phase θ and timing τ estimation. Under the
assumption that the frequency offset and timing are known, MCRB(θ ) can be attained
using two algorithms.
i. Maximum likelihood decision-directed (ML-DD), proposed in H. Kobayashi (1971)
ii. Ad hoc non-data-aided (ad hoc NDA) method, proposed by A. J. Viterbi (1983).
The MCRB(τ ) can also be attained using the ML-DD algorithm with derivative-matched
filters (DMFs); however, the use of DMFs also makes the estimator impractical to
implement. Several alternative algorithma have been found that can approach MCRB(τ )
without using DMFs.
i. DD early-late scheme with T / 2 sample space, proposed by T. Jesupret (1991).
ii. DD scheme, proposed by K. H. Mueller (1976).
iii. NDA scheme, proposed by F. M. Gardner (1986).
Although these alternative algorithms can approach MCRB(τ ) without using DMFs, they
are subject to some restrictions that require θ to be known and a roll-off factor α that
should be small.
ek = Re{ x k y k* } . (63)
Then, the frequency error passes through a loop filter and triggers the voltage-control
oscillator (VCO) to compensate for the frequency offset. If the loop filter is implemented by
a simple digital integrator, then the VCO output can be written as
4α BLT 1 ⎛ 1 ⎞,
σ 2fD = ⎜ 1+ ⎟ (65)
π 2T 2 Es /N 0 ⎝ Es /N 0 ⎠
where BL is the loop noise bandwidth and T is the symbol duration.
B. Differential decision-directed algorithm
The second algorithm is a differential decision-directed (DDD) algorithm that is used on
PSK signals; the block diagram for this algorithm is shown in figure 5. This algorithm is
similar to the NDA algorothm except for the frequency error generator. The assumptions for
this algorithm include the following:
i. The frequency errors are small compared to the symbol rate.
ii. G * ( f ) is the same as was defined previously.
iii. Timing is perfectly synchronized.
Because we are discussing the M-PSK signal, we can denote our symbol by
A Study of Cramér-Rao-Like Bounds and Their Applications to Wireless Communications 19
c k = exp( jϕ k ) , (66)
where
ϕ k = 2π n / M , n = 1, 2...M . (67)
{
ek = Im xk x k* − 1 exp( − jΔϕˆ k )} (69)
BLT 1 ⎛ 1 ⎞
σ 2f = ⎜ 2 BLT + ⎟ (70)
D π 2T 2 Es /N 0 ⎝ Es /N 0 ⎠
Prior to the simulation, we assume that BLT = 5 × 10 −3 and the QPSK signals have a roll-off
factor α = 0.5 . The result is compared with the MCRB in figure 7.
As shown in figure 7, these two algorithms yield much greater variance than the MCRB,
which indicates that there is still room for improvement.
C. Feed-forward NDA
The third algorithm is the feed-forward NDA for M-PSK signal modulation; the block
diagram for this algorithm is shown in figure 8. The F function in the middle of the block
diagram is a 4th-powered non-linear function. Similar to the previous analyses , the received
phase can be separated into three parts:
i. A step-wise increasing quantity 2π Mf D kT due to the frequency error f D .
ii. A constant initial phase.
20 Recent Advances in Wireless Communications and Networks
iii. A phase noise caused by thermal noise and inter-symbol interference that is uniformly
distributed from −π to π .
Fig. 7. Comparison of the variance of the two algorithms with that of the MCRB
3 1
σ2 ≈ (71)
fD 2π 2T 2 L(L2 -1)m Es /N 0
3T 1
MCRB( f D ) = (72)
2π 3
( LT ) 3
Es /N 0
Thus, when L 1 and m = 1 ,the algorithm performance will attain the MCRB. However,
this result is obtained under very high SNR. Further research is needed to design estimators
that can approach or attain the estimation bounds with less restriction.
7. References
Bellimi, S., Molinari, C. and Tartara, G. (1990). Digital Frequency Estimation in Burst Mode
QPSK Transmission, IEEE Trans. Commun., Vol.38, No.7 , (July 1990), pp. 959-961,
ISSN: 0090-6778
Cramer, H. (1946). Mathematical Method of Statistics, Princeton University Press, ISBN-13:
978-0691005478, Uppsala, Sweden.
D’Andrea, A. N., Mengali, U. and Reggiannini, R. (1994). The Modified Cramer-Rao Bound
and Its Application to Synchronization Problems, IEEE Trans. Commun., Vol.42,
No.2/3/4, (Febuary 1994), pp. 1391-1399, ISSN: 0090-6778
Gini, F. and Reggiannini, R. (2000). On the Use of Cramer-Rao-Like Bounds in the Presence
of Random Nuisance Parameters, IEEE Trans. Commun., Vol.48, No.12, (December
2000), pp. 2120-2126, ISSN 0090-6778.
Gardner, F. M. (1986). A BPSK/QPSK Timing Error Detecor for Samples Receivers, IEEE
Trans. Commun., Vol.34, No.5, (May 1986), pp. 423-429, ISSN: 0090-6778
Jesupret, T., Moeneclaey, M. and Ascheid, G. (1991). Digital Demodulator Synchronization,
ESA Draft Final Report, ESTEC No. 8437-89-NL-RE., (Febuary 1991)
Kay, S. M. (1998). Fundamentals of Statistical Signal Processing, Prentice Hall, ISBN 0-13-
345711-7, Upper Saddle River, New Jersey
Kobayashi, H. (1971). Simultaneous Adaptive Estimation and Decision Algorithm for
Carrier Modulated Data Transmission Systems, IEEE Trans. Commun., Vol.19, No.3,
(June 1971), pp. 268-280, ISSN: 0018-9332
Kotz, S. and Johnson, N. L. (1993). Breakthroughs in Statistics: Volume 1: Foundations and Basic
Theory, Springer-Verlag, ISBN: 0387940375, New York.
Lin, J. C. (2003). Maximum-Likelihood Frame Timing Instant and Frequency Offset
Estimation for OFDM Communication Over A Fast Rayleigh Fading Channel, IEEE
Trans. Vehic. Technol., Vol.52, No.4, (July 2003), pp. 1049-1062.
Lin, J. C. (2008). Least-Squares Channel Estimation for Mobile OFDM Communication on
Time-Varying Frequency-Selective Fading Channels, IEEE Trans. Vehic. Technol.,
Vol.57, No.6, (November 2008), pp. 3538-3550.
Lin, J. C. (2009). Least-Squares Channel Estimation Assisted by Self-Interference
Cancellation for Mobile PRP-OFDM Applications, IET Commun., Vol.3, Iss.12,
(December 2009), pp. 1907-1918.
22 Recent Advances in Wireless Communications and Networks
1. Introduction
Recently, orthogonal frequency division multiplexing (OFDM) techniques have received
great interest in wireless communications for their high speed data transmission. OFDM
improves robustness against narrowband interference or severely frequency-selective
channel fades caused by long multipath delay spreads and impulsive noise. A single fade or
interferer can cause the whole link to fail in a single carrier system. However, only a small
portion of the subcarriers are damaged in a multicarrier system. In a classical frequency
division multiplexing and parallel data systems, the signal frequency band is split into N
nonoverlapping frequency subchannels that are each modulated with a corresponding
individual symbol to eliminate interchannel interference. Nevertheless, available bandwidth
utilization is too low to waste precious resources on conventional frequency division
multiplexing systems. The OFDM technique with overlapping and orthogonal subchannels
was proposed to increase spectrum efficiency. A high-rate serial signal stream is divided
into many low-rate parallel streams; each parallel stream modulates a mutually orthogonal
subchannel individually. Therefore, OFDM technologies have recently been chosen as
candidates for fourth-generation (4G) mobile communications in a variety of standards,
such as 802.16m and LTE/LTE-A.
2. OFDM fundamentals
2.1 System descriptions
The block diagram of an OFDM transceiver is shown in Fig. 1. Information bits are grouped
and mapped using M-phase shift keying (MPSK) or quadrature amplitude modulation
(QAM). Because an OFDM symbol consists of a sum of subcarriers, the n − th N × 1 mapped
signal symbol Xn is fed into the modulator using the inverse fast Fourier transform (IFFT).
Then, the modulated signal xn can be written as
1 N −1
xn = ∑ X k e j 2π kn
N k =0
N
, n = 0,1, ,N - 1 (1)
where N is the number of subcarriers or the IFFT size, k is the subcarrier index, n is the
time index, and 1 N is the normalized frequency separation of the subcarriers. Note that xn
and X k form an N − point discrete Fourier transform (DFT) pair. The relationship can be
expressed as
24 Recent Advances in Wireless Communications and Networks
1 N − 1 − j 2π kn /N
Xn = DFTN {xn } = ∑ xk e
N k =0
, n = 0,1, ,N - 1 (2)
⎧x , n = −L , −L + 1, , −1
sn = ⎨ N + n (3)
x
⎩ n , n = 0,1, ,N − 1
The transmitted signal may pass through a channel h depending on the environments. The
receiver signal rn can be written as
rn = sn ⊗ h + w (4)
where w denotes the additive white Gaussian noise (AWGN). The data symbol Yn can be
recovered by using a DFT operation and is determined as
1 N −1
Yn = ∑ y k e j 2π kn
N k =0
N
, n = 0,1, ,N - 1 (5)
Fig. 2 (a) shows the spectrum of an OFDM subchannel, and (b) shows an entire OFDM
signal. At the maximum value of each subcarrier frequency, all other subcarrier spectra are
null. The relationship between the OFDM block and CP is depicted clearly in Fig. 3.
The OFDM technique offers reliable effective transmission; however, it is far more
vulnerable to symbol timing error and carrier frequency offset. Sensitivity to symbol timing
offset is much higher in multicarrier communications than in single carrier communications
because of intersymbol interference. The mismatch or instability of the local oscillator
inevitably causes an offset in the carrier frequency that can cause a high bit error rate and
performance degradation because of intercarrier interference. Therefore, the unknown
Synchronization for OFDM-Based Systems 25
OFDM symbol arrival times and mismatch/instability of the oscillators in the transmitter
and the receiver are two significant synchronization problems in the design of OFDM
communications. A detailed description of symbol timing error and carrier frequency offset
is given in the following sections.
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
0 0
-0.2 -0.2
-0.4 -0.4
-6 -4 -2 0 2 4 6 -6 -4 -2 0 2 4 6
Frequency Frequency
(a) (b)
Fig. 2. Spectra of (a) an OFDM subchannel and (b) an OFDM signal
frequency does not sample an accurate position; the sensitivity to symbol timing offset
increases in OFDM systems. Receivers have to be tracked time-varying symbol timing offset,
which results in time-varying phase changes. Intercarrier interference comes into being
another attached problem. Because an error in the sampling frequency means an error in the
FFT interval duration, the sampled subcarriers are no longer mutually orthogonal. The
deviation is more severe as the delay spread in multipath fading increases; then, the tolerance
for the delay spread is less than the expected value. As a result, timing synchronization in
OFDM systems is an important design issue to minimize the loss of robustness.
3. Application scenarios
The major objectives for OFDM synchronization include identifying the beginning of
individual OFDM symbol timing and ensuring the orthogonality of each subcarrier. Various
algorithms have been proposed to estimate symbol timing and carrier frequency offset.
These methods can be classified into two categories: data-aided algorithms and non-data-
aided (also called blind) algorithms. By using known training sequences or pilot symbols, a
data-aided algorithm can achieve high estimation accuracy and construct the structure simply.
Data-aided algorithms require additional data blocks to transmit known synchronization
information. Nevertheless, this method diminishes the efficiency of transmission to offer the
possibility for synchronization. Non-data-aided (blind) algorithms were proposed to solve
the inefficiency problem of the data-aided algorithm. Alternative techniques are based on
the cyclic extension that is provided in OFDM communication systems. These techniques
can achieve high spectrum efficiency but are more complicated.
In the data-aided technique, several synchronization symbols are directly inserted between
the transmitted OFDM blocks; then, these pilot symbols are collected at the receiving end to
extract frame timing information. However, the use of pilot symbols inevitably decreases
the capacity and/or throughput of the overall system, thus making them suitable only in a
startup/training mode. The data- aided technique can provide effectively synchronization
with very high accuracy. Thus, it can be used to find coarse timing and frequency offset in
the initial communication link. Several data-aided techniques have been proposed (Classen
& Meyr, 1994, Daffara & Chouly, 1993, Kapoor et al., 1998, Luise & Reggiannini, 1996, Moose,
1994, Warner & Leung, 1993). Moreover, the SNR at the front end in the receiver is often too
Synchronization for OFDM-Based Systems 27
low to ineffectively detect pilot symbols; thus, a blind approach is usually much more
desirable. A non-data-aided technique can adjust the fine timing and frequency after the
preamble signal. Some non-data-aided techniques have been proposed (Bolcskei, 2001, Daffara
& Adami, 1995, Lv et al., 2005, Okada et al., 1996, Park et al., 2004, Van de Beek et al., 1997).
where r ( t ) is the received OFDM signal, x(t ) is the correlator output, τ denotes the timing
offset. The correlator output can be utilized to estimate the carrier frequency offset when the
symbol timing is found. The phase drift between T seconds is equivalent to the phase of the
correlator output. Therefore, the carrier frequency offset can be estimated easily by dividing
the correlator phase by 2π T . The carrier frequency offset denotes the frequency offset
normalized by the subcarrier spacing. Fig. 4 shows the block diagram of the correlator.
4. Examples
4.1 Example 1: Non-data-aided, CP-based, fractional/fine frequency offset
According to previous researches, very high computational complexity is required for joint
estimation for timing and frequency synchronization. Moreover, one estimate suffers from
performance degradation caused by estimation error of the other. Thus, an effective
technique is proposed (Lin, 2003).
The proposed technique which employs a two-step method that estimates the frame timing
instant and frequency offset by the maximum-likelihood (ML) estimation criterion. First, it
estimates a frame timing instant such that the estimate is completely independent of the
frequency offset estimation with no prior knowledge of the frequency offset; thus, a much
lower estimation error of the frame timing instant is achieved by avoiding any power loss or
phase ambiguity caused by frequency offset. The main reason for this arrangement is that
frame timing instant estimation has to take place completely before frequency offset
estimation because the latter actually requires frame timing information.
The block diagram of the OFDM system investigated here is depicted in Fig. 6. The received
signal can be expressed as
rk = α k sk −θ e j 2πε k /N + nk (7)
where θ is the unknown delay time; α k denotes a channel fade, which has a Rayleigh-
distributed envelope and a uniformly distributed phase; ε denotes the carrier frequency
offset in a subcarrier spacing; and 1 N is the normalized frequency. In accordance with
Jake’s model of a fading channel (Jakes, 1974), α k can be expressed as a complex Gaussian
random process with the autocorrelation function given as
{ }
⎛ T ⎞
E α k1 α k∗2 = J 0 ⎜ 2π f D k1 − k2 u ⎟
⎝ N⎠
(8)
where E{} ⋅ denotes the statistical expectation operation; ∗ denotes taking complex
conjugation; J 0 ( ⋅) is the zeroth-order Bessel function of the first kind; f D is the maximum
Doppler frequency caused directly by relative motion; and Tu is the OFDM block duration,
which actually corresponds to the time interval of an N -sample OFDM block. In a previous
work (Van de Beek et al., 1997), the log-likelihood function for θ and ε can be written as
Λ (θ , ε ) = log f ( r θ , ε )
⎛ ⎞
= log ⎜ ∏ f ( rk , rk + N ) ∏ f ( rk ) ⎟ (9)
⎜ ⎟
⎝ k∈I k∉I ∪ I ′ ⎠
⎛ f ( rk , rk + N ) ⎞
= log ⎜ ∏ ∏ f ( rk ) ⎟
⎜ ⎟
⎝ k∈I f ( rk ) f ( rk + N ) k ⎠
where f ( ⋅) denotes the probability density function; r = [ r1 r2 r2 N + L ] is the
T
⎪ { }
⎧E r 2 = σ 2 + σ 2 ,
k s n m=0
⎪
∀k ∈ I : E {
rk , rk∗+ m } { }
= ⎨E rk , rk∗+ m = σ s2 J 0 ( 2π f DTu ) e − j 2πε , m = N (10)
⎪
⎪0, otherwise
⎩
where σ s2 = E ⎡ sk ⎤ is the average signal power and σ n2 = E ⎡ nk ⎤ is the average noise power.
2 2
⎣ ⎦ ⎣ ⎦
30 Recent Advances in Wireless Communications and Networks
⎡θ + L − 1
{
Λ (θ , ε ) = c1 + c 2 ⎢ ∑ Re rk rk∗+ m e − j 2πε −
⎣ k =θ
ρ θ + L −1
2
}
∑ rk + rk + N ⎥
k =θ
2 2 ⎤
⎦
( ) (11)
= c1 + c 2 ⎣Re {λ1 (θ )} cos ( 2πε ) − Im {λ1 (θ )} sin ( 2πε ) − ρλ2 (θ ) ⎤⎦
⎡
where
ρ=
{
E rk rk∗+ N } =
σ s2 J 0 ( 2π f DTu )
{ } E{ r }
E rk
2
k+N
2 σ s2 + σ n2
θ + L −1
c1 = − ∑
k =θ
(
log 1 − ρ 2 )
2ρ
c2 =
( )(
1 − ρ 2 σ s2 + σ n2 )
θ + L −1
λ1 (θ ) = ∑ rk rk∗+ N
k =θ
λ2 (θ ) =
1 θ +L −1
∑
2 k =θ
2
{
rk + rk + N
2
}
In the above equation, it is assumed that the random frequency modulation caused by a
time-varying channel fade and the phase noise of the local oscillator are negligible; thus,
{ }
rk rk∗+ N has almost the same phase within the range k ∈ [θ ,θ + L − 1] ; therefore, rk rk∗+ N { }
can be coherently summed up in the term λ1 (θ ) . If the partial derivative of Λ (θ , ε ) is taken
with respect to ε , one can obtain the following equation:
∂
Λ (θ , ε ) = −2π c 2 ⎡⎣Re {λ1 (θ )} sin ( 2πε ) + Im {λ1 (θ )} cos ( 2πε ) ⎤⎦ (12)
∂ε
To obtain the value of εˆ that maximizes Λ (θ , ε ) , the above partial derivative is set to zero
and equality stands only when
Re {λ1 (θ )} Im {λ1 (θ )} 1
= = (13)
cos ( 2πε ) − sin ( 2πε ) c3
where c 3 is set as a constant 1 L for simplicity. As a result, the carrier frequency offset
estimate can be expressed as
1 ⎛ Im {λ1 (θ )} ⎞
εˆ = − tan −1 ⎜ ⎟ (14)
2π ⎜ Re {λ1 (θ )} ⎟
⎝ ⎠
Synchronization for OFDM-Based Systems 31
The carrier frequency offset estimator derived above actually requires accurate frame timing
information to effectively resolve the carrier frequency offset by taking advantage of a
complete cyclic prefix. As a result, accurate frame timing estimation has to be performed
before a carrier frequency offset is estimated.
To develop a frame timing estimation scheme without prior knowledge of frequency offset,
the log-likelihood function in (11) can be approximated as follows:
⎣ ( )
= c1 + c 2 ⎡c 3 Re 2 {λ1 (θ )} + Im 2 {λ1 (θ )} − ρλ2 (θ ) ⎤
⎦
(15)
⎡ 2
= c1 + c 2 c 3 λ1 (θ ) − ρλ2 (θ ) ⎤
⎢⎣ ⎥⎦
Thus, one can obtain a frame timing estimator independent of frequency offset estimation.
The proposed technique provides a more practical estimate of the frame timing instant
because frame timing estimation is very often performed before frequency offset is
estimated or dealt with. As a result, the proposed estimator of the frame timing instant and
frequency offset can be expressed as
p
θ
3 1{
⎧Step 1: θˆ = arg max c λ (θ ) 2 − ρλ (θ )
⎪ 2 }
⎪
⎨
⎪Step 2: εˆp = −
1
⎛ Im λ θˆ ⎞
tan −1 ⎜
1 p ⎟ { ( )} (16)
⎪
⎩
2π ⎜⎜ Re λ θˆ ⎟⎟
⎝ 1 p
⎠ { ( )}
Its structure is depicted in detail in Fig. 7. The proposed frame timing estimator inherently
exploits the highest signal level by disregarding any phase ambiguity caused by residual
error in frequency offset estimation. Therefore, the proposed technique performs frame
timing estimation in a manner independent of frequency offset estimation; then, frequency
offset estimation can be properly achieved in the next step by effectively taking advantage
of accurate timing information.
{
θˆp′ = arg max λ1 (θ )
θ
2
} (17)
In addition, several techniques for combining multiple frames have also been investigated
(Lin, 2003) to increase the robustness of the proposed technique under low SNR conditions.
Other simulation experiments show that the proposed techniques can effectively achieve
lower estimation errors in frame timing and frequency offset estimation.
K
1 ⎛ kl ⎞ ⎛ l ⎞
rl =
N
∑ ck Np
exp ⎜ j 2π ⎟ exp ⎜ j 2π ( d + ε ) ⎟ + n′′′l ,
⎝ N⎠ ⎝ N⎠
l = 0,1,… , N − 1 (18)
k =− K
where l denotes the time index, the term exp ( j 2π ( d + ε ) ( 1 N ) ) represents the effect of
the CFO that is mainly caused by instability or mismatch that occurs with the local
oscillator at the front-end down-conversion process, d and ε are the integral and fractional
parts of the CFO, respectively, which are normalized by the subcarrier spacing (i.e., frequency
separation between any two adjacent subcarriers), c k is the k N p th chip value of the PN code
Np
and n′′p has a noise term. If the demodulation outputs {Yp , p = 0, 1,… , N p − 1; N p < K} are
cross-correlated with a locally generated PN sequence with a phase delay d̂ using PN MF,
then the output of the PN MF can be obtained.
Np
Z0 =
σ0
( ) ⎛ N −1
g d − dˆ + ε exp ⎜ jπ
⎝ N
( ⎞
d − dˆ + ε ⎟ + n0
⎠
) (20)
The detailed derivation has been shown elsewhere (Lin, 2006a). As a result, coarse frequency
offset can be detected through subcarrier acquisition. The detection procedure is equivalent
to testing the following two hypotheses:
⎧ f 2 (η A1 , H 1 ) ∼ χ 2
⎪ Zo
⎪ sin (πε )
⎪ A1 = g1 ( ε ) = = g ( ε ) , H 1 : d = dˆ ,
⎪⎪ N sin (πε N )
⎨ (21)
⎪ f Zo 2 (η A0 , H 0 ) ∼ χ
2
⎪
⎪ sin (π ( d′ + ε ) )
⎪ A0 = g0 ( ε ) = g ( d′ + ε ) = , H 0 : d ≠ dˆ
N sin (π ( d′ + ε ) N ) d ′= d − d ≠ 0
ˆ
⎪⎩
where H 1 and H 0 denote the two hypothesis that the local PN sequence has been
aligned (i.e., d = dˆ ) and has not been aligned in-phase (i.e., d ≠ dˆ ), respectively, with respect
to the post-FFT-demodulation PN sequence.
The previous derivations show that the major difficulty with the ordinary likelihood
functions results from the very complicated probability density functions of the derived
34 Recent Advances in Wireless Communications and Networks
f S ⎛⎜ s H 0 ,max g0 ( ε ) ⎞⎟ ds
∞
≤∫ (22)
tnc ⎝ ε ⎠
= Q1 ( λnc ,0 , tnc )
nc
Pms ( tnc ) = P ( S ≤ tnc H 1 )
f ⎛⎜ s H 1 ,min g1 ( ε ) ⎞⎟ ds
∞
≤1−∫ (23)
tnc S ⎝ ε ⎠
= 1 − Q1 ( λnc ,1 , tnc )
where
(( ))
2
sin π d − dˆ + ε Np
λnc ,0 = max 2 g 2 ( 1.5 ) N p ⋅ SNR
N sin (π ( d − dˆ + ε ) N )
ε ≤ 0.5 σ0
d ≠ dˆ
2
Np
λnc ,1
ε ≤ 0.5
(
= max g d − dˆ + ε ) σ0
= 2 g 2 ( 0.5 ) N p ⋅ SNR
d = dˆ
and
( μ −2)
( )
4
∞ 1⎛ x ⎞ ⎛ x + a2 ⎞
Qμ ( a, b ) = ∫b ⎜ ⎟ ⋅ exp ⎜⎜ − ⎟Iμ a2 x dx
2 ⎟⎠ 2 − 1
2
2 ⎝ a2 ⎠ ⎝
is the generalized Marcum Q-function, which is defined as the complementary cumulative
density function of a noncentral χ 2 random variable with μ degrees of freedom and
noncentrality parameter a 2 , and where tnc is a design parameter representing the decision
threshold of the derived noncoherent detection.
The above noncoherent detector can be further improved by a differentially coherent
detection technique that consists of coherent accumulation of cross-correlations subchannel-
by-subchannel by means of PN MFs. The detailed derivation has been provided elsewhere
(Lin, 2006a). As a result, the probability of false alarm and miss for the proposed differentially
coherent subcarrier-acquisition technique is given by
1 −s 2
( )
∞ ∞ ∞
Pfadc = P ( γ a − γ b > tdc H 0 ) = ∫ fγ b ( s H 0 ) ∫ f (η H 0 )dη ds = ∫0 e Q1 λdc ,o , s + tdc ds (24)
0 s + tdc γ a 2
1 −s 2
( )
∞
Pfadc = P ( γ a − γ b ≤ tdc H 1 ) = 1 − ∫ e Q1 λdc ,1 , s + tdc ds (25)
0 2
where
Synchronization for OFDM-Based Systems 35
and tdc is a design parameter denoting the decision threshold when the above differentially
coherent detection is used.
It can be easily seen from simulation results (Lin, 2006a) that no matter what values of the
decision threshold are chosen, the proposed techniques can achieve sufficiently low
probabilities of false alarm and miss and that differentially coherent detection can achieve
lower probabilities than its noncoherent counterpart. The main reason for this difference is
that differentially coherent detection primarily tests two more distantly separated
distributions than does the noncoherent detection.
Although the previous derivations were conducted only on an AWGN channel, similar
results and conclusions hold for a flat-fading channel or in an environment whose coherence
bandwidth is wide enough to accommodate several subchannels. The relative contexts are
shown completely in the reference paper (Lin, 2006a).
synchronization signals for the cell search procedure. One is the primary synchronization
signal (P-SCH), and the other is the secondary synchronization signal (S-SCH). P-SCH and
S-SCH are inserted into the last two OFDM symbols in the first slot of the sub-frame zero
and sub-frame five, where the frame structure is shown in Fig. 9. The P-SCH signal is
transmitted twice in each 10-ms frame. It can provide frame timing synchronization with a
tolerance of 5 ms. The main goal of the P-SCH is to conduct timing synchronization, coarse
frequency-offset detection and sector identification. Each frame has a pair of S-SCH signals
that can be chosen from the 168 different cell identifications. Therefore, the S-SCH signal is
used to determine the cell ID.
sequences with lengths of 62 in the frequency domain. Each sequence represents a sector
identification. The ZC sequences employed in the LTE (3GPP LTE, 2005) are written as
⎧ π un(n + 1)
⎪ −j 63
⎪e , n = 0,1,...., 30
du (n) = ⎨ (26)
⎪ −j π u( n + 1)( n + 2)
⎪e 63 , n = 31, 32,....,61.
⎩
N (2)
ID Root index u
0 25
1 29
2 34
Table 1. Root index u of sector identification (3GPP LTE, 2005)
where u is the root index for which values are set to 25, 29, and 34, which correspond to
(2)
N ID =0,1 or 2, respectively. A ZC sequence is a chirp-like sequence and is symmetric both in
the time domain and frequency domain. The sequence has good correlation properties.
Therefore, the P-SCH signal employing the ZC sequence is utilized to help coarse timing
synchronization and frequency-offset detection.
using carrier aggregation, a peak data rate up to 1 Gb/s is possible in future 4G mobile
communications. Because of the flexibility of effective transmission, the user can exploit
numerous carriers at the same time. In addition, these carriers may lie in the same or
different band and may have different bandwidths. Carrier aggregation provides diverse
combinations and flexible spectrum usability and has attracted attention. Carrier aggregation
techniques can be classified into two categories: continuous and discontinuous as shown in
Fig. 10. These two categories can be subdivided into three types: intraband contiguous,
intraband discontinuous and interband. A diagram describes their difference in Fig. 11.
Fig. 10. Carrier aggregation types: (a) intraband contiguous; (b) intraband discontinuous;
(c) interband (Iwamura et al., 2010)
Fig. 11. Carrier aggregation categories: (a) continuous; (b) discontinuous (Yuan et al., 2010)
6. Summary
In this chapter, the authors intend to introduce the OFDM communication systems and take
care of the main issue, frequency offset, can lead to severe performance degradation. Two
classifications of synchronization techniques are introduced. Several novel techniques have
been thoroughly discussed in great detail in this chapter. LTE/LTE-A systems have been
chosen as candidates for 4G mobile communication. The concept of LTE-LTE-A systems is
mentioned in the end of this chapter.
Synchronization for OFDM-Based Systems 39
7. References
3GPP LTE (2005). TS 36.211 V8.3.0: Technical Specification Group Radio Access Network;
Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and
Modulation (Release 8)
Bolcskei, H. (2001). Blind estimation of symbol timing and carrier frequency offset in
wireless OFDM systems, IEEE Transactions on Communications, Vol.49, No.6, (June
2001), pp.988-999
Chen, Y., Wen, X., Zheng, W. & Lin, X. (2009). Symbol timing estimation and sector detection
algorithm based on LTE TDD system, Proceedings of IEEE Network Infrastructure and
Digital Content Conference, 2009 (IC-NIDC 2009), Beijing, China, pp.828-832.
Classen, F. & Meyr, H. (1994). Frequency synchronization algorithms for OFDM systems suitable
for communication over frequency selective fading channels, Proceedings of IEEE
Vehicular Technology Conference, 1994 (VTC’94), Stockholm, Sweden, pp. 1655-1659
Daffara, F. & Chouly, A. (1993). Maximum likelihood frequency detectors for orthogonal
multicarrier systems, Proceedings of IEEE Communications Conference, 1993 (ICC’93),
Geneva, Switzerland, pp. 766-771
Daffara, F. & Adami, O. (1995). A new frequency detector for orthogonal multicarrier
transmission techniques, Proceedings of IEEE Vehicular Technology Conference, 1995
(VTC’95), Chicago, USA, pp. 804-809
Dahlman, E., Parkvall, S., Skold, J. & Beming, P. (2007) 3G Evolution HSPA and LTE for Mobile
Broadband, Academic Press
Iwamura, M., Etemad, K., Fong M.-H., Nory, R. & Love, R. (2010) Carrier aggregation
framework in 3GPP LTE-advanced [WiMAX/LTE update], IEEE Communications
Magazine, Vol.48, No.8, (August 2010), pp.66-67
Jakes, W. C. & Cox, D. C. (1994). Microwave Mobile Communications. Wiley-IEEE Press
Kapoor, S., Marchok, D. J. & Huang, Y.-F. (1998). Pilot assisted synchronization for wireless
OFDM systems over fast time varying fading channels, Proceedings of IEEE Vehicular
Technology Conference, 1998 (VTC’98), Ottawa, Canada, pp. 2077-2080
Lin, J.-C. (2002a). Noncoherent sequential PN code acquisition using sliding correlation for
chip-asynchronous DS/SS, IEEE Transactions on Communications, Vol.50, No.4,
(April 2002), pp.664-676
Lin, J.-C. (2002b). Differentially coherent PN code acquisition with full-period correlation in
chip-asynchronous DS/SS receivers, IEEE Transactions on Communications, Vol.50,
No.5, (May 2002), pp.698-702
Lin, J.-C. (2002c). Differentially coherent PN code acquisition based on a matched filter for
chip-asynchronous DS/SS communications, IEEE Transactions on Vehicular
Technology, Vol,51, No.6, (November 2002), pp.1596-1599
Lin, J.-C. (2003). Maximum-likelihood frame timing instant and frequency offset estimation
for OFDM communication over a fast Rayleigh-fading channel, IEEE Transactions
on Vehicular Technology, Vol,52, No.4, (July 2003), pp.1049-1062
Lin, J.-C. (2004). Frequency offset estimation by differentially coherent frequency error
characterization for OFDM wireless communications, Proceedings of IEEE
Communications Conference, 2004 (ICC’04), Paris, France, pp. 2387-2391.
Lin, J.-C. (2005). Frequency offset acquisition based on subcarrier differential detection for
OFDM communications on doubly-selective fading channel, Proceedings of IEEE
Communications Conference, 2005 (ICC’05), Seoul, Korea, pp. 1952-1956.
40 Recent Advances in Wireless Communications and Networks
Lin, J.-C. (2006a). Coarse frequency-offset acquisition via subcarrier differential detection for
OFDM communications, IEEE Transactions on Communications, Vol.54, No.8,
(August 2006), pp.1415-1426
Lin, J.-C. (2006b). Frequency offset estimation technique based on error characterization for
OFDM communications on time-varying multipath fading channels, Proceedings of
IEEE Communications Conference, 2006 (ICC’06), Istanbul, Turkey, pp.2911-2916.
Lin, J.-C. (2007). A frequency offset estimation technique based on frequency error
characterization for OFDM communications on multipath fading channels, IEEE
Transactions on Vehicular Technology, Vol,56, No.3, (May 2007), pp.1209-1222
Luise, M. & Reggiannini, R. (1996). Carrier frequency acquisition and tracking for OFDM
systems, IEEE Transactions on Communications, Vol.44, No.11, (November 1996),
pp.1590-1598
Lv, T., Li, H. & Chen, J. (2005) Joint estimation of symbol timing and carrier frequency offset
of OFDM signals over fast time-varying multipath channels, IEEE Transaction on
Signal Processing, Vol.53, No.12, (December 2005), pp.4526-4535
Manolakis, K., Gutierrez Estevez, D. M., Jungnickel, J., Xu, W. & Drewes, C. (2009) A closed
concept for synchronization and cell Search in 3GPP LTE systems, Proceedings of
IEEE Wireless Communications and Networking Conference, 2009 (WCNC 2009),
Budapest, Hungary, pp. 1-6.
Moose, P. H. (1994). A technique for orthogonal frequency division multiplexing frequency
offset correction, IEEE Transactions on Communications, Vol.42, No.10, (October
1994), pp.2908-2914
Nee, V. R. & Prasad, R., (2000). OFDM for Wireless Multimedia Communications, Artench House
Okada, M., Hara, S., Komaki, S. & Morinaga, N. (1996). Optimum synchronization of
orthogonal multi-carrier modulated signals, Proceedings of IEEE Personal, Indoor and
Mobile Radio Communications Conference, 1996 (PIMRC’96), Taipei, Taiwan, pp. 863-867
Park, B., Ko, E., Cheon, H., Kang, C. & Hong, D. (2001). A Blind OFDM synchronization
algorithm based on cyclic correlation, IEEE Signal Processing Letters, Vol.11, No.2,
(February 2004), pp.83-85.
Popovic, B. M. (1992). Generalized chirp-like polyphase sequences with optimum
correlation properties, IEEE Transactions on Information Theory, Vol.38, No.4, (July
1992), pp.1406-1409
Van de Beek, J.-J., Sandell, M. & Borjesson, P. O. (1997). ML estimation of time and
frequency offset in OFDM systems, IEEE Transaction on Signal Processing, Vol.45,
No.7, (July 1997), pp. 1800-1805
Tsai, Y., Zhang, G., Grieco, D. & Ozluturk, F. (2007). Cell searrch in 3GPP Long Term Evolution
systems, IEEE Vehicular Technology Magazine, Vol.2, No.2, (June 2007), pp.23-29
Warner, W. D. & Leung, C. (1993). OFDM/FM frame synchronization for mobile radio data
communications, IEEE Transactions on Vehicular Technology, Vol,42, No.3, (August
1993), pp.302-313
Yuan, G., Zhang, X., Wang, W. & Yang, Y. (2010). Carrier Aggregation for LTE-advanced
mobile communication systems, IEEE Transaction on Communication Magazine,
Vol.48, No.2, (February 2010), pp.88-93
3
1. Introduction
The principles of multicarrier modulation have been in existence for several decades.
However, in recent years these techniques have quickly moved out of textbooks and into
practice in modern communications systems in the form of orthogonal frequency division
multiplexing (OFDM). OFDM is a special form of multicarrier modulation technique which
is used to generate waveforms that are mutually orthogonal and then distributes the data
over a large number of carriers that are spaced apart at precise frequencies. This spacing
provides the "orthogonality" in this technique which prevents the demodulators from seeing
frequencies other than their own. In an OFDM scheme, a large number of orthogonal,
overlapping, narrow band subcarriers are transmitted in parallel. These carriers divide the
available transmission bandwidth. The separation of the subcarriers is such that there is a
very compact spectral utilization. With OFDM, it is possible to have overlapping sub
channels in the frequency domain (Figure 1), thus increasing the transmission rate.
AWGN present at the input of a Phase Locked Loop (PLL) in a coherent receiver. Phase
noise can cause several types of signal degradation that are usually very difficult to quantify
analytically. When the modulation experiences phase noise, it encounters two problems: 1) a
common phase rotation over all the carrier frequencies which rotate the entire signal space
for a given OFDM symbol and 2) inter-carrier interference due to the loss of orthogonality
between subcarriers. Especially, the ICI seriously degrades system predominance because it
may break down the orthogonality between subcarriers.
There have been many previous works on the phase noise, frequency offset and reduction of
ICI. Among them the following methods are discussed and compared in this chapter. In the
next section the OFDM system is introduced and its benefits along with its drawbacks are
analyzed. ICI reduction methods such as pulse shaping and self-cancellation are given in
section 3 and the last section concludes the chapter.
2. OFDM system
Figure 2 shows the block diagram of a typical OFDM system. The transmitter section
converts digital data to be transmitted, into a mapping of subcarrier amplitude and phase. It
then transforms this spectral representation of the data into the time domain using an
Inverse Discrete Fourier Transform (IDFT). The Inverse Fast Fourier Transform (IFFT)
performs the 20 same operations as an IDFT, except that it is much more computationally
efficient, and so is used in all practical systems. In order to transmit the OFDM signal the
calculated time domain signal is then mixed up to the required frequency. The receiver
performs the reverse operation of the transmitter, mixing the RF signal to base band for
processing, then using a Fast Fourier Transform (FFT) to analyze the signal in the frequency
domain. The amplitude and phase of the subcarriers is then picked out and converted back
to digital data. The IFFT and the FFT are complementary function and the most appropriate
term depends on whether the signal is being received or generated. In cases where the
signal is independent of this distinction then the term FFT and IFFT is used interchangeably.
The high data rate serial input bit stream is fed into serial to parallel converter to get low
data rate output parallel bit stream. Input bit stream is taken as binary data. The low data
rate parallel bit stream is modulated in Signal Mapper. Modulation can be BPSK, QPSK,
QAM, etc. The modulated data are served as input to inverse fast Fourier transform so that
each subcarrier is assigned with a specific frequency. The frequencies selected are
orthogonal frequencies. In this block, orthogonality in subcarriers is introduced. In IFFT, the
frequency domain OFDM symbols are converted into time domain OFDM symbols. Guard
interval is introduced in each OFDM symbol to eliminate inter symbol interference (ISI). All
the OFDM symbols are taken as input to parallel to serial data. These OFDM symbols
constitute a frame. A number of frames can be regarded as one OFDM signal. This OFDM
signal is allowed to pass through digital to analog converter (DAC). In DAC the OFDM
signal is fed to RF power amplifier for transmission. Then the signal is allowed to pass
through additive white Gaussian noise channel (AWGN channel). At the receiver part, the
received OFDM signal is fed to analog to digital converter (ADC) and is taken as input to
serial to parallel converter. In these parallel OFDM symbols, Guard interval is removed and
it is allowed to pass through Fast Fourier transform. Here the time domain OFDM symbols
are converted into frequency domain. After this, it is fed into Signal Demapper for
demodulation purpose. And finally the low data rate parallel bit stream is converted into
high data rate serial bit stream which is in form of binary.
ICI Reduction Methods in OFDM Systems 43
, , , ,
, , , ,
, , , , (1)
, , , ,
, , , ,
At the receiver the first Lc+1 symbols are discarded and the N remained symbols are
demodulated using an N-point FFT. So the data on the k-th subcarrier is as follows:
44 Recent Advances in Wireless Communications and Networks
, , , , (2)
where is the channel impulse response in the frequency domain. It can also be considered
as the channel gain on the k-th subcarrier. , ∑ , is the input symbols of the
IFFT block at the transmitter as:
, _ , (3)
It can be seen that the main symbol stream , could be detected with the estimation of
the channel coefficient at the receiver, while there is no Inter-Symbol Interference (ISI) or
Inter-Carrier Interference (ICI).
Thus, a multipath channel is converted into scalar parallel sub-channels in frequency
domain, thereby simplifying the receiver design considerably. The task of channel
estimation is simplified, as we just need to estimate the scalar coefficients for each sub-
channel and once the values of are estimated, for the duration in which the channel
does not vary significantly, merely multiplying the received demodulated symbols by the
inverse of yields the estimates of , .
The benefits of OFDM are high spectral efficiency, resiliency to RF interference, and lower
multi-path distortion. This is useful because in a typical terrestrial broadcasting scenario
there are multipath-channels (i.e. the transmitted signal arrives at the receiver using various
paths of different length). Since multiple versions of the signal interfere with each other
(inter symbol interference (ISI)) it becomes very hard to extract the original information.
With the rapid growth of digital communication in recent years, the need for high speed
data transmission is increased. Moreover, future wireless systems are expected to support a
wide range of services which includes video, data and voice. OFDM is a promising
candidate for achieving high data rates in mobile environment because of its multicarrier
modulation technique and ability to convert a frequency selective fading channel into
several nearly flat fading channels.
However, there are some non-idealities which can affect the performance of an OFDM
system. These non-idealities are as follows:
Noise: Like other communication systems, the performance of an OFDM system is affected
by different kind of noise such as uniform noise (AWGN), non-uniform noise (colored
noise), and impulse noise.
LO phase offset: This condition occurs when there is a difference between the phase of the
output LO and the phase of the received signal.
FFT window location offset: In practice, a correlation is often used with a known preamble
sequence located at the beginning of the transmission. This correlation operation aids the
receiver in synchronizing itself with the received OFDM symbol boundaries. However,
inaccuracies still remain, and they manifest themselves as an offset in the FFT window
location. The result is that the N symbols sent to the FFT will not line up exactly with the
corresponding OFDM symbol.
Sampling frequency offset: A sampling frequency offset occurs when the A/D converter
output is sampled either too fast or too slow.
Non-linearity in the transmitter and receiver circuits: All transmitters and receivers in
communication systems contain devices such as amplifiers which are often designed to be
non-linear in order to minimize power consumption. On the other hand, an OFDM signal is
ICI Reduction Methods in OFDM Systems 45
made up of multiple simultaneous signals that, for a given average power, have a higher
peak signal level. Thus, OFDM signals result in an increase in the peak-to-average ratio
(PAR) of the signal. Because of the non-linear transfer functions of amplifiers, these higher
peak amplitude levels will create more severe distortion than a single carrier case even if the
average power levels of each are the same.
Phase noise: OFDM systems are very sensitive to phase noise caused by oscillator
instabilities in both the transmitter and the receiver. Without loss of generality, in this study
the local oscillator in the receiver will be considered as the phase noise source. As
mentioned before, the modulated subcarriers overlap spectrally, but since they are
orthogonal over symbol duration, they can be easily recovered as long as the channel and
other non-idealities do not destroy the orthogonality. An unwindowed OFDM system has
rectangular symbol shapes. Therefore, in the frequency domain the individual sub-channels
will have the form of sinc functions where the first sidelobe is only some 13 dB below the
main lobe of the subcarrier (Figure 3). A practical oscillator has spectral components around
the centre frequency. These components cause the loss of orthogonality of the OFDM
carriers. In the frequency domain it can be viewed as interference caused by the high
sidelobes of the adjoining carriers on a particular subcarrier.
1
, , 0,1, … , 1 (4)
46 Recent Advances in Wireless Communications and Networks
The phase noise is modeled as a phasor e , where the phase noise process is zero-
mean and wide-sense stationary with a finite variance . An approximation for the PSD of
a free-running oscillator can be found in [Robertson & Kaiser, 1995] is as follows:
10 | |
10 | |
(5)
10 | |
/ (6)
, , 0,1, … , 1
1 / /
, , (7)
where is the contribution due to AWGN on the k-th subcarrier. We can further
simplify (7) as:
1 1 /
, , , (8)
The first term on the right-hand side of (8) rotates the useful component , of each
subcarrier by an equal amount and is independent of the particular subchannel concerned, k.
ICI Reduction Methods in OFDM Systems 47
This is commonly known as the Common Phase Error (CPE). The second term is the Inter-
Carrier Interference (ICI) caused by contributions from all subcarriers on k due to the
loss of orthogonality. Unlike the CPE, ICI is not easy to estimate.
Local oscillator frequency offset: It drives from the difference between LO frequency at the
transmitter and the receiver. In addition to phase noise, the frequency offset which is caused
by the high Doppler spread and the mismatch in the oscillator frequency, produces inter-
carrier interference (ICI).
For a block of data, the modulated signal at the n-th instant of time can be written as:
1 /
, 0,1, … , 1 (9)
The signal at the receiver, after passing through a frequency selective fading channel is
expressed as:
1 / (10)
At the receiver, the signal is mixed with a local oscillator signal which is ∆ above the
correct carrier frequency. The signal received at the k-th subcarrier after performing the
FFT is expressed as:
1 1
(11)
0 , 0,1, … , 1
Where ∆ is the frequency offset normalized to the OFDM symbol rate 1/ . The
denotes the OFDM symbol duration excluding the guard interval. The sequence is
defined as the ICI coefficient between l-th and k-th subcarriers, which can be expressed as:
1
1 (12)
The first term in the right-hand side of (11) represents the desired signal. Without frequency
error 0 , 0 takes its maximum value. The second term is the ICI components, which as
ε becomes larger, the desired part | 0 | decreases and the undesired part | | increases.
The undesired ICI degrades the performance of the system. It is not possible to make
reliable data decisions unless the ICI powers of OFDM system are minimized. Thus, an
accurate and efficient Inter-Carrier Interference (ICI) reduction procedure is essential to
demodulate the received data. Several methods have been presented to reduce ICI,
including windowing at the receiver [Muschallik, 1996; Müller-Weinfurtner, 2001; Song &
Leung, 2005], the use of pulse shaping [Tan & Beaulieu, 2004; Mourad, 2006; Maham &
Hjørungnes, 2007], self-cancellation schemes [Zhao & Haggman, 2001], and frequency
domain equalization. The next part of this chapter introduces these techniques.
48 Recent Advances in Wireless Communications and Networks
, , 0,1, … , 1 (13)
where represents the frequency f shifted to the carrier frequency of the OFDM system
and normalized to the sampling frequency 1/ . The normalized frequency is given by:
(14)
Accordingly, is defined as the normalized center frequency of the k-th
subcarrier with representing the center frequency of the k-th subcarrier. The spectrum of
the transmitted OFDM symbol is the superposition of the spectra of all individual
subcarriers:
(15)
The sidelobe power of this sum signal and also the sidelobe power of each subcarrier
spectrum only decays with 1/z resulting in a high interference caused by the high sidelobes
of the adjoining carriers on a particular subcarrier.
Here, some techniques introduced to reduce the power of the interfering components.
(16)
ICI Reduction Methods in OFDM Systems 49
where p(t) is the pulse shaping function. The transmitted symbol is assumed to have zero
mean and normalized average symbol energy. Also we assume that all data symbols are
uncorrelated, i.e.:
1, , , 0,1, … , 1
(17)
0, , , 0,1, … , 1
where is the complex conjugate of . To ensure the subcarrier orthogonality, which is
very important for OFDM systems the equation below has to be satisfied:
, , 0,1, … , 1 (18)
(19)
where denotes convolution and h(t) is the channel impulse response. In (19), w(t) is the
additive white Gaussian noise process with zero mean and variance N /2 per dimension.
For this work we assume that the channel is ideal, i.e., h(t) = δ(t) in order to investigate the
effect of the frequency offset only on the ICI performance. At the receiver, the received
signal r ′ t becomes:
∆ ∆ (20)
′
Where θ is the phase error and ∆ is the carrier frequency offset between transmitter and
receiver oscillators. For the transmitted symbol , the decision variable is given as
∞
′
(21)
∞
∆ ∑ ∆ , 0, . . . , 1 (22)
where P(f) is the Fourier transform of p(t) and is the independent white Gaussian noise
component. In (22), the first term contains the desired signal component and the second
term represents the ICI component. With respect to (18), P(f) should have spectral nulls at
the frequencies 1/ , 2/ , . .. to ensure subcarrier orthogonality. Then, there exists no
ICI term if ∆ and θ are zero.
The power of the desired signal can be calculated as [Tan & Beaulieu, 2004; Mourad, 2006;
Kumbasar & Kucur, 2007]:
∆ ∆ | ∆ | | ∆ | (23)
The power of the ICI can be stated as:
∆ ∆ (24)
50 Recent Advances in Wireless Communications and Networks
The average ICI power across different sequences can be calculated as:
∆ (25)
As seen in (25) the average ICI power depends on the number of the subcarriers and P(f) at
frequencies: ∆ , , 0,1, … , 1
The system ICI power level can be evaluated by using the CIR (Carrier-to-Interference
power Ratio). While deriving the theoretical CIR expression, the additive noise is omitted.
By using (23) and (25), the CIR can be derived as [Tan & Beaulieu, 2004; Mourad, 2006;
Kumbasar & Kucur, 2007]:
| ∆ |
(26)
∑ ∆
Therefore, the CIR of the OFDM systems only depends approximately on the normalized
frequency offset. A commonly used pulse shaping function is the raised cosine function that
is defined by:
1 1
, 0
2 2
1, (27)
1 1
, 1
2 2
where α denotes the rolloff factor and the symbol interval is shorter than the total symbol
duration (1 + ) because adjacent symbols are allowed to partially overlap in the rolloff
region. Simulation shows that the benefit of the raised cosine function with respect to the ICI
reduction is fairly low.
A number of pulse shaping functions such as Rectangular pulse (REC), Raised Cosine pulse
(RC), Better Than Raised Cosine pulse (BTRC), Sinc Power pulse (SP) and Improved Sinc
Power pulse (ISP) have been introduced for ICI power reduction. Their Fourier transforms
are given, respectively as [Kumbasar & Kucur, 2007]:
, (28)
, (29)
, (30)
, (31)
, (32)
where (0 1) is the rolloff factor, / 2, a is a design parameter to adjust the
amplitude and n is the degree of the sinc function.
ICI Reduction Methods in OFDM Systems 51
REC, RC, BTRC, SP, and ISP pulse shapes are depicted in Figure 5 for a=1, n=2, and 0.5.
SP pulse shape has the highest amplitude in the main lobe, but at the sidelobes it has lower
amplitude than BTRC. This property provides better CIR performance than that of BTRC as
shown in [Mourad, 2006]. As seen in this figure the amplitude of ISP pulse shape is the
lowest at all frequencies. This property of ISP pulse shape will provide better CIR performance
than those of the other pulse shapes as shown in Figure 6 [Kumbasar & Kucur, 2007].
Figure 5 shows that the sidelobe is maximum for rectangular pulse and minimum for ISP
pulse shapes. This property of ISP pulse shape will provide better performance in terms of
ICI reduction than those of the other pulse shapes. Figure 7 compares the amount of ICI for
different pulse shapes.
symbol is not modulated into one subcarrier, rather at least into two consecutive subcarriers.
This is the ICI cancellation idea in this method.
As shown in figure 7 for the majority of l-k values, the difference between ) and
1 is very small. Therefore, if a data pair (a,-a) is modulated onto two adjacent
subcarriers , 1 , then the ICI signals generated by the subcarrier will be cancelled out
significantly by the ICI generated by subcarrier l+1 [Zhao & Haggman, 1996, 2001].
Assume that the transmitted symbols are constrained so that
, … , then the received signal on subcarrier k considering
that the channel coefficients are the same in two adjacent subcarriers becomes:
1 (33)
1 (34)
For most of the values, it is found that | ΄ | | |.
"
1 2 1 (35)
" 1 2 1 (36)
Figure 8 shows the amplitude comparison of | |,|΄ | and | " | for N=64
and 0.3. For the majority of l-k values, | ΄ | is much smaller than | |, and the
|" | is even smaller than | ΄ |. Thus, the ICI signals become smaller when
applying ICI cancelling modulation. On the other hand, the ICI cancelling demodulation can
further reduce the residual ICI in the received signals. This combined ICI cancelling
modulation and demodulation method is called the ICI self-cancellation scheme.
Due to the repetition coding, the bandwidth efficiency of the ICI self-cancellation scheme is
reduced by half. To fulfill the demanded bandwidth efficiency, it is natural to use a larger
signal alphabet size. For example, using 4PSK modulation together with the ICI self-
cancellation scheme can provide the same bandwidth efficiency as standard OFDM systems
(1 bit/Hz/s).
. . . , 0 (37)
where, N is the total number of sub-carriers, Dk is data symbol for the k-th parallel branch
and is the i–th sub-carrier data symbol after data-conjugate mapping. d(n) is corrupted by
the phase noise in the transmitter (TX) local oscillator. Furthermore, the received signal is
influenced by the phase noise of receiver (RX) local oscillator. So, it is expressed as:
. . (38)
where s(t) is the transmitted signal, w(t) is the white Gaussian noise and h(t) is the channel
impulse response. and are the time varying phase noise processes generated in
the transceiver oscillators. Here, it is assumed that, and
for simple analysis. In the original OFDM system without ICI self-
cancellation method, the k-th sub-carrier signal after FFT can be written as:
1
. (39)
. Therefore, the 2k-th sub-carrier data after FFT in the receiver is arranged as:
(40)
1
(41)
w2k is a sampled FFT version of the complex AWGN multiplied by the phase noise of RX
local oscillator, and random phase noise process is equal to .
Similarly, the 2k+1-th sub-carrier signal is expressed as:
(42)
In the (40) and (42), corresponds to the original signal with CPE, and corresponds
to the ICI component. In the receiver, the decision variable of the k-th symbol is found
from the difference of adjacent sub-carrier signals affected by phase noise. That is,
′
1 1
2 2 2
(43)
∑
where 1⁄2 is the AWGN of the k–th parallel branch data in the
receiver. When channel is flat, frequency response of channel equals 1. Z'k is as follows.
56 Recent Advances in Wireless Communications and Networks
1
(44)
2
. (45)
| | | | (46)
ICI power is:
| | (47)
Transmitted signal is supposed to have zero mean and statistically independence. So, the
CIR of the original OFDM transmission method is as follows:
| | | |
∑ | | ∑ | | (48)
B. Data-conversion method
In the data-conversion ICI self-cancellation method, the data are remapped in the form of
′
, ′ .
So, the desired signal is recovered in the receiver as follows:
1
2 1
2 2
1 (49)
2
CPE is as follows:
2
(50)
2 4
. (51)
So
| 2 | | 2 |
(52)
∑ | 2 | ∑ | 2 |
C. Data-conjugate method
In the data conjugate method, the decision variable can be written as follows:
1
(53)
2
Through the same calculation, CPE, ICI and CIR of the data conjugate method are found.
0 (54)
The fact CPE is zero is completely different from the data conversion method whose CPE is
not zero like (14).
Then, ICI of data conjugate method is:
1 4
. . . (55)
The above term is the summation of the signal of the other sub-carriers multiplied by some
complex number resulted from an average of phase noise with spectral shift. This
component is added into the k-th branch data Z ′ . It may break down the orthogonalities
between sub-carriers. So, CIR is:
4
(56)
∑
4. Conclusion
OFDM has been widely used in communication systems to meet the demand for increasing
data rates. It is robust over multipath fading channels and results in significant reduction of
the transceiver complexity. However, one of its disadvantages is sensitivity to carrier
frequency offset which causes attenuation, rotation of subcarriers, and inter-carrier
interference (ICI). The ICI is due to frequency offset or may be caused by phase noise.
The undesired ICI degrades the signal heavily and hence degrades the performance of the
system. So, ICI mitigation techniques are essential to improve the performance of an OFDM
system in an environment which induces frequency offset error in the transmitted signal. In
this chapter, the performance of OFDM system in the presence of frequency offset is
58 Recent Advances in Wireless Communications and Networks
analyzed. This chapter investigates different ICI reduction schemes for combating the
impact of ICI on OFDM systems. A number of pulse shaping functions are considered for
ICI power reduction and the performance of these functions is evaluated and compared
using the parameters such as ICI power and CIR. Simulation results show that ISP pulse
shapes provides better performance in terms of CIR and ICI reduction as compared to the
conventional pulse shapes.
Another ICI reduction method which is described in this chapter is the ICI self cancellation
method which does not require very complex hardware or software for implementation.
However, it is not bandwidth efficient as there is a redundancy of 2 for each carrier. Among
different ICI self cancellation methods, the data-conjugate method shows the best
performances compared with the original OFDM, and the data-conversion method since it
makes CPE to be zero along with its role in significant reduction of ICI.
5. References
Robertson, P. & Kaiser, S. (1995). Analysis of the effects of phase-noise in orthogonal
frequency division multiplex (OFDM) systems, Proceedings of the IEEE International
Conference on Communications, vol. 3, (Seattle, USA), pp. 1652–1657, June 1995.
Zhao, Y. & Haggman, S.G. (2001). Intercarrier interference self-cancellation scheme for OFDM
mobile communication systems, IEEE Transaction on Communication. pp. 1185–1191.
Muschallik, C. (1996). Improving an OFDM reception using an adaptive Nyquist
windowing, IEEE Transaction Consum. Electron. 42 (3) (1996) 259–269.
Müller-Weinfurtner, S.H. (2001). Optimum Nyquist windowing in OFDM receivers, IEEE
Trans. Commun. 49 (3) (2001) 417–420.
Song, R. & Leung, S.-H. (2005). A novel OFDM receiver with second order polynomial
Nyquist window function, IEEE Communication Letter. 9 (5) (2005) 391–393.
Tan, P. & Beaulieu, N.C. (2004). Reduced ICI in OFDM systems using the better than raised-
cosine pulse, IEEE Communication Letter 8 (3) (2004) 135–137.
Mourad, H.M. (2006). Reducing ICI in OFDM systems using a proposed pulse shape,
Wireless Person. Commun. 40 (2006) 41–48.
Kumbasar, V. & Kucur, O. (2007). ICI reduction in OFDM systems by using improved sinc
power pulse, ELSEVIER Digital Signal Processing 17 (2007) 997-1006
Zhao, Y. & Häggman, S.-G. (1996). Sensitivity to Doppler shift and carrier frequency errors
in OFDM systems—The consequences and solutions, Proceeding of IEEE 46th
Vehicular Technology Conference, Atlanta, GA, Apr. 28–May 1, 1996, pp. 1564–1568.
Ryu, H. G.; Li, Y. & Park, J. S. (2005). An Improved ICI Reduction Method in OFDM
Communication System, IEEE Transaction on Broadcasting, Vol. 51, No. 3, September
2005.
Mohapatra, S. & Das, S. (2009). Performance Enhancement of OFDM System with ICI
Reduction Technique, Proceeding of the World Congress on Engineering 2009, Vol. 1,
WCE 2009, London, U.K.
Moghaddam, N. & Falahati, A. (2007). An Improved ICI Reduction Method in OFDM
Communication System in Presence of Phase Noise, the 18th Annual IEEE
International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC'07)
Kumar, R. & Malarvizhi, S. (2006). Reduction of Intercarrier Interference in OFDM Systems.
Maham, B. & Hjørungnes, A. (2007). ICI Reduction in OFDM by Using Maximally Flat
Windowing, IEEE International Conference on Signal Processing and Communications
(ICSPC 2007), Dubai, United Arab Emirates (UAE).
4
1. Introduction
Recent developed information theory results have demonstrated the enormous potential to
increase system capacity by exploiting multiple antennas. Combining multiple antennas
with orthogonal frequency division multiplexing (OFDM) is regarded as a very attractive
solution for the next-generation wireless communications to effectively enhance service
quality over multipath fading channels at affordable transceiver complexity. In this regard,
multiple antennas, or called multiple-input multiple-output (MIMO) systems, have emerged
as an essential technique for the next-generation wireless communications. In general, an
MIMO system has capability to offer three types of antenna gains: diversity gains,
multiplexing gains and beamforming gains. A wide variety of multiple antennas schemes
have been investigated to achieve these gains, while some combo schemes can make trade-
offs among these three types of gains. In this chapter, an overview of multiple antenna
techniques developed in the past decade, as well as their transceiver architecture designs, is
introduced. The first part of this chapter covers three kinds of diversity schemes: maximum
ratio combining (MRC), space-time coding (STC), and maximum ratio transmission (MRT),
which are commonly used to combat channel fading and to improve signal quality with or
without channel knowledge at the transmitter or receiver. The second part concentrates on
spatial multiplexing to increase data rate by simultaneously transmitting multiple data
streams without additional bandwidth or power expenditure. Several basic receiver
architectures for handling inter-antenna interference, including zero-forcing (ZF), minimum
mean square error (MMSE), interference cancellation, etc., are then introduced. The third
part of this chapter introduces antenna beamforming techniques to increase signal-to-
interference plus noise ratio (SINR) by coherently combining signals with different phase
and amplitude at the transmitter or receiver, also known as transmit beamforming or
receive beamforming. Another benefit of adopting beamforming is to facilitate multiuser
accesses in spatial domain and effectively control multiuser interference. The optimal
designs of these beamforming schemes are also presented in this chapter.
2. Diversity techniques
Diversity techniques have been widely adopted in modern communications to overcome
multipath fading, which allows for enhancing the reliability of signal reception without
sacrificing additional transmission power and bandwidth (Rappaport, 2002; Simon &
Alouini, 1999). The basic idea of diversity is that multiple replicas of transmitted signals
which carry the same information, but experience independent or small correlated fading,
60 Recent Advances in Wireless Communications and Networks
are available at the receiver. In fading channels, some samples are severely faded, while
others are less attenuated; hence, in statistics, the probability of the signal strength of all
samples being simultaneously below a given level becomes small, as compared with the
case without applying diversity techniques. Consequently, we can overwhelm the channel
fading by imposing an appropriate selection or combination of various samples, so as to
dramatically improve the signal quality. Based on signal processing domains to obtain
diversity gains, diversity techniques can be classified into time, frequency and space
diversity. Here, we focus on space diversity techniques where multiple antennas are
deployed at the transmitter or receiver sides. One category of space diversity schemes is to
combine multiple signal replicas at the receiver, which is termed as receive diversity. The
other category is to use multiple antennas at the transmitter, and this kind of diversity
schemes is called transmit diversity (Giannakis et al., 2006).
In this section, we first present various receive diversity schemes, including selection
combining, switch combining, equal-gain combining (EGC), and MRC. The well-known
Alamouti’s transmit diversity scheme using two transmit antennas and one receive antenna
is then introduced. The generalized case using two transmit antennas and multiple receive
antennas is shown as well. Subsequently, space-time block codes (STBCs) with the number
of transmit antennas larger than two (Tarokh et al., 1999) are presented. Finally, a maximum
ratio transmission (MRT) scheme is discussed to simultaneously achieve both transmit and
receive diversity gains and maximize the output signal-to-noise ratio (SNR) (Lo, 1999).
scheme, the switch diversity scheme exhibits lower performance gain since it does not pick
up the branch with the highest instantaneous SNR or received signal power. In spite of this
performance loss, it is still very attractive for practical implementation as it does not require
to periodically and simultaneously monitor all the antenna branches. Another advantage is
that since both the selection and switch diversity schemes do not require any knowledge of
channel state information, they are not limited to coherent modulation schemes, but can also
be applied for noncoherent modulation schemes.
⎡ r1 ⎤ ⎡ h1 ⎤ ⎡ n1 ⎤
⎢ ⎥ ⎢ ⎥ ⎢ ⎥
r = ⎢ ⎥ = ⎢ ⎥s + ⎢ ⎥ = sh + n (11)
⎢r ⎥ ⎢ h ⎥ ⎢n ⎥
⎣ nR ⎦ ⎣ nR ⎦ ⎣ nR ⎦
where ri , hi , and ni are the received signal, channel fading gain, and spatially white noise
at the ith receive antenna branch, respectively. After linearly combining the received
signals, the output signal is given by
y = w † r = w † ( sh + n ) = sw † h + w † n (2)
where w represents the weighting factors for all antenna branches, and ( i ) is the
†
Hermitian operation. Subsequently, from (2), for a given h , the output SNR is calculated by
2
Es w † h
SNRo = 2
(3)
σ n2 w
where Es and σ n2 are the signal power and the noise power, respectively. According to the
Cauchy-Schwarz inequality, we have
2 2 2
w†h ≤ w h (4)
2
Es w † h Es h
2
2
SNRo = 2
≤ = h SNRi (5)
σ n2 w σ n2
where SNRi = Es σ n2 is defined as the input SNR. We can further observe that the equality
in (5) holds if and only if w = h , and therefore, the maximum output SNR can be written as
2
SNRo = h SNRi (6)
may be not practical or cost-effective for some applications. Alamouti‘s STC was historically
the first STBC to provide two- branch transmit diversity gains for a communication system
equipped with two transmit antennas. It has been recognized as a remarkable, but simple,
diversity technique, and adopted in a number of next-generation wireless standards, e.g.,
3GPP long-term evolution and IEEE 802.16e standards.
In this section, we overview Alamouti’s transmit diversity technique. We focus on both
encoding and decoding algorithms, along with its performance results. Then, we introduce
the generalized STBCs with an arbitrary number of transmit antennas to achieve full
diversity gains, which are proposed by Vahid Tarokh (Tarokh et al., 1999) based on
orthogonal design theory.
⎡x − x2* ⎤
X=⎢ 1 ⎥ (7)
⎢⎣ x2 x1* ⎥⎦
x 1 = ⎡⎣ x1 − x2* ⎤⎦
(8)
x 2 = ⎡⎣ x2 x1* ⎤⎦
Multiple Antenna Techniques 65
We can observe that these two signal sequences possess the orthogonal property with each
other. That is, we have
( )
†
x1 x2 = x1x2* − x2* x1 = 0 (9)
In other words, the code matrix, X , satisfies the orthogonal matrix property as follows:
⎡x 2 + x 2
0 ⎤
1 2
XX † = ⎢ ⎥
⎢ 0 x1
2
+ x2 ⎥⎦
2
(10)
⎣
(
= x1 + x 2
2 2
)I 2
h1 (t ) = h1 (t + T ) = h1 (11)
and
h2 ( t ) = h2 ( t + T ) = h2 (12)
where hi , for i = 1 and 2 , is a complex constant value corresponding to the channel gain
from the transmit antenna i to the receive antenna, and T denotes the symbol period. At
66 Recent Advances in Wireless Communications and Networks
the receive antenna, the received signals across two consecutive symbol periods, which are
denoted by r1 and r2 for time t and t + T , are respectively given by
r1 = h1x1 + h2 x2 + n1 (13)
and
r2 = − h1x *2 + h2 x *1 + n2 (14)
where n1 and n2 are independent additive white Gaussian noise with zero mean and
variance σ 2 . It is noticed here that although we present Alamouti’s space-time codes under
flat fading channels without concerning the multipath effect, it is straightforward to extend
the Alamouti’s scheme to the case of multipath channels by using an OFDM technique to
transform a frequency selective fading channel into a number of parallel flat fading channels
(Ku & Huang, 2006).
(x 1, )
x 2 = arg max 2 Pr ( x1 , x2 r1,r2 )
( x1 , x2 )∈C
(15)
where C 2 is the set of all possible candidate symbol pairs ( x1, x2 ) , and Pr ( i ) is a
probability notation. According to the Bayes’ theorem, we can further expand (15) as
Pr ( r1 , r2 x1, x2 ) P ( x1 , x2 )
(x 1 )
, x 2 = arg max
( x1 , x2 )∈C 2
P ( r1 , r2 )
(16)
By assuming that all the constellation points in C 2 occur with equal prior probabilities and
the two symbols of each pair are generated independently, all symbol pairs ( x1 , x2 ) are
equiprobable. As the decision of the symbol pairs ( x1, x2 ) is irrelevant to the probability of
received signals r1 and r2 , we can rewrite (16) as
(x 1, )
x 2 = arg max 2 Pr( r1 , r2 x1, x2 )
( x1 , x2 )∈C
(17)
Furthermore, since the noise n1 and n2 at time t and time t + T , respectively, are assumed
to be mutually independent, we can alternatively express (17) as
(x 1, )
x 2 = arg max 2 Pr( r1 x1, x2 )Pr( r2 x1, x2 )
( x1 , x2 )∈C
(18)
Multiple Antenna Techniques 67
Recall from (13) and (14) that r1 and r2 are two independent Gaussian random variables
( )
with distributions r1 ∼ N h1x1 + h2 x2 , σ 2 and r2 ∼ N − h1x2* + h2 x1* , σ 2 . Substituting this ( )
into (18), we then obtain a ML decoding criterion:
( x x ) = arg ( 2 2
1, 2 min r1 − h1x1 − h2 x2 + r2 + h1x2* − h2 x1*
x1 , x2 )∈C 2
(19)
= arg min 2 d 2 ( r1 , h1x1 + h2 x2 ) + d 2 r2 , −h1x2* + h2 x1*
( x1 , x2 )∈C
( )
where d ( s1 , s2 ) denotes the Euclidean distance between s1 and s2 . The ML decoder is,
2
( x x ) = arg (
1, 2 min
x1 , x2 )∈C2
(h 1
2
+ h2 − 1
2
)( x 1
2
+ x2
2
) + d (x ,x ) + d (x ,x )
2
1 1
2
2 2
(20)
where x 1 and x 2 are two decision statistics obtained by combining the received signals r1
and r2 with channel state information h1 and h2 , given by
x 1 = h1*r1 + h2 r2*
(21)
x 2 = h2* r1 + h1r2*
By taking r1 and r2 from equation (13) and (14), respectively, into (21), the decision
statistics is given by
(
x 1 = h1 + h2
2 2
)x + h n + h n
1
*
1 1
*
2 2
(22)
=(h )x − h n + h n
2 2 * *
x2 1 + h2 2 1 2 2 1
It is observed that for a given channel realization h1 and h2 , the decision statistics x i in
(22) is only a function of xi , for i = 1, 2 . Consequently, the ML decoding criterion in (20)
can be divided into two independent decoding criteria for x1 and x2 ; that is, we have
( 2
x 1 = arg min h1 + h2 − 1 x1 + d 2 x 1 , x1
x1 ∈C
2
) 2
( ) (23)
and
( 2
x 2 = arg min h1 + h2 − 1 x2 + d 2 x 2 , x2
x2 ∈C
2
) 2
( ) (24)
x 1 = arg min d 2 x 1 , x1 ;
x1 ∈C
( ) x 2 = arg min d 2 x 2 , x2
x2 ∈C
( ) (25)
68 Recent Advances in Wireless Communications and Networks
From (25), for the case of constant envelope modulation, the decoding algorithm is just a
linear decoder with extremely low complexity to achieve diversity gains. On the other hand,
when non-constant envelope modulation, e.g., quadrature-amplitude-modulation (QAM) is
adoped, the term (h1
2 2
) 2
+ h2 − 1 xi , for i = 1, 2 , may become different for various
constellation points and cannot be excluded from the decoding metric. Therefore, we should
follow the decoding rules as shown in (23) and (24) to achieve the ML decoding.
where h j , i , for i = 1, 2 and j = 1, , nR , is the channel fading gain from the transmit
antenna i to the receive antenna j , and n1j and n2j are assumed to be spatially and
temporally white Gaussian noises for the receive antenna j at time t and t + T ,
respectively. Similar to the derivation in the case of single receive antenna, the ML decoding
criterion with multiple receive antennas now can be formulated as below:
nR
( x x ) = arg (
2 2
1, 2 min ∑ r1j − h j ,1x1 − h j ,2 x2
x1 , x2 )∈C j = 1
2
+ r2j + h j ,1x2* − h j ,2 x1*
(27)
nR
= arg min
( x1 , x2 )∈C2
∑d
j =1
2
( r1j , h j ,1x1 + h j ,2 x2 + d) 2
( r2j , − h j ,1x2* + h j ,2 x1* )
We then define two decision statistics by combining the received signals at each receive
antenna with the corresponding channel link gains, as follows:
( )
j *
x 1 = h *j ,1r1j + h j ,2 r2j
(28)
j
x 22 = h *j ,2 r1j − h j ,1 (r )
2
j *
Note that by replacing r1j and r2j , given in (26), into (28), the decision statistics can be
explicitly written as
( )
*
x 1 = ⎛⎜ h j ,1 + h j ,2 ⎞⎟ x1 + h *j ,1n1j + h j ,2 n2j
j 2 2
⎝ ⎠ (29)
( )
*
j ⎛ 2 2⎞
x 2 = ⎜ h j ,1 + h j ,2 ⎟ x2 − h j ,1 n2j + h *j ,2 n1j
⎝ ⎠
2 2
where Geff = h j ,1 + h j ,2 is the effective channel fading gain, and it is shown that the
Alamouti’s STC scheme can therefore extract a diversity order of two at each receiving
branch, even in the absence of channel state information at the transmitter side. Following
Multiple Antenna Techniques 69
the derivation in (19) and (20), the ML decoding rules, under the case of nR receive
antennas, for the two data symbols x1 and x2 can be represented by
nR
x 1 = arg min ∑ ⎛⎜ h j ,1 + h j ,2 − 1 ⎞⎟ x1 + d 2 ( x 1 , x1 )
2 2 2 j
(30)
j =1 ⎝ ⎠
x1 ∈C
and
nR
x 2 = arg min ∑ ⎛⎜ h j ,1 + h j ,2 − 1 ⎞⎟ x2 + d 2 ( x 2 , x2 )
2 2 2 j
(31)
x2 ∈C
j =1 ⎝ ⎠
In particular, for constant envelope modulation schemes whose constellation points possess
equal energy, the ML decoding can be reduced to finding a data symbol x i , for i = 1, 2 , to
j
minimize the summation of Euclidean distance d 2 ( x 1 , x1 ) over all receive antennas, in the
following:
( )
nR
j
x 1 = arg min ∑ d 2 x 1 , x1 (32)
x1 ∈C
j =1
and
( )
nR
j
x 2 = arg min ∑ d 2 x 2 , x2 (33)
x2 ∈C
j =1
0
10
SISO
Alamouti (NR=1)
-1 MRC (NR=2)
10
Alamouti (NR=2)
MRC (NR=4)
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30 35 40 45
Eb/N0 [dB]
Fig. 6. Comparison of BER performance between Alamouti’s and MRC schemes with binary
phase-shift keying (BPSK) modulation
0
10
Alamouti QPSK (NR=1)
Alamouti QPSK (NR=2)
-1
10
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
Eb/N0 [dB]
k (34)
Rc
p
Therefore, the spectral efficiency for the STBC is calculated by
rb ( rsm ) Rc km
η = = ( bits sec Hz ) (35)
B rs p
where rb and rs are the bit and symbol rate of a space-time coded symbol, respectively, and
B represents the total bandwidth. For simplicity of notations, we usually denote a STBC
with nT transmit antennas as X nT . Based on the orthogonal designs in (Tarokh et al., 1999),
to obtain full diversity gains, i.e., diversity order is equal to nT , the space-time encoding
matrix should preserve the orthogonal structure; that is, we have
72 Recent Advances in Wireless Communications and Networks
(
X nT ⋅ X n† = c x1 + x2 +
T
2 2
+ xk
2
)I nT (36)
matrix, the entries in X nT take the values of modulated symbols xi , their conjugate xi∗ , or
their combination. The orthogonal structure allows the receiver to decouple the signals
transmitted from different antennas by using a simple linear decoder derived based on the
ML decoding metric. Tarokh et al. (Tarokh et al., 1999) discovered that the code rate of a
STBC with full diversity must be less than or equal to one, i.e., Rc ≤ 1 . In other words, the
STBCs cannot be used to increase bandwidth efficiency, but provide diversity gains. It is
noted that the full code rate, Rc = 1 , requires no additional bandwidth expansion, while the
code rate Rc ≤ 1 requires a bandwidth expansion by a factor of 1 Rc .
Based on modulation types, STBCs can be classified into two categories: real signaling or
complex signaling. For a special case of p = nT , it is evident from (Tarokh et al., 1999) that
for an arbitrary real constellation signaling, e.g., M -amplitude shift keying ( M -ASK),
STBCs with an nT × nT square encoding matrices X nT exist if and only if the number of
transmit antennas nT is equal to two, four, or eight. Moreover, these code matrices can not
only achieve the full code rate Rc = 1 but also provide the full diversity gains with a
diversity order of nT . However, it is desirable to have code matrices with the full diversity
gains and the full code rate for any number of transmit antennas. It has been proved that for
nT transmit antennas, the minimum required value for the transmission periods p to achieve
the full diversity nT and the full code rate Rc = 1 must satisfy the following condition:
min 2 4c + d (37)
{(c , d ) 0≤c , 0 ≤ d ≤ 4, and 8c + 2 d
≥ nT }
nT p X nT
⎡x − x2 ⎤
2 2 X2 = ⎢ 1
⎣ x2 x1 ⎥⎦
⎡ x1 − x2 − x3 −x4 ⎤
⎢x x1 x4 − x3 ⎥⎥
X4 = ⎢
2
4 4
⎢ x3 −x4 x1 x2 ⎥
⎢ ⎥
⎣ x4 x3 x2 x1 ⎦
⎡ x1 − x2 − x3 −x4 − x5 − x6 − x7 − x8 ⎤
⎢x x1 −x4 x3 − x6 x5 x8 − x7 ⎥⎥
⎢ 2
⎢ x3 x4 x1 − x2 − x7 − x8 x5 x6 ⎥
⎢ ⎥
x4 − x3 x2 x1 − x8 x7 − x6 x5 ⎥
8 8 X 8 = ⎢⎢
x x6 x7 x8 x1 − x2 − x3 −x4 ⎥
⎢ 5 ⎥
⎢ x6 − x5 x8 − x7 x2 x1 x4 − x3 ⎥
⎢x − x8 − x5 x6 x3 −x4 x1 x2 ⎥
⎢ 7 ⎥
⎢⎣ x8 x7 − x6 − x5 x4 x3 − x2 x1 ⎥⎦
Table 1. Square code matrices with full diversity gains and full code rate for nT = 2, 4, 8
Multiple Antenna Techniques 73
Accordingly, the minimum values of p for a specific value of nT ≤ 8 , and the associated
STBC matrices X nT for real signaling are provided as follows, where the square transmission
matrices X 2 , X 4 , and X 8 are listed in Table 1, and the non-square transmission matrices
X 3 , X 5 , X 6 and X 7 are listed in Table 2.
nT p X nT
⎡ x1 − x2 − x3 −x4 ⎤
3 4 X 3 = ⎢⎢ x2 x1 x4 − x3 ⎥⎥
⎢⎣ x3 −x4 x1 x2 ⎥⎦
⎡ x1 − x2 − x3 −x4 − x5 − x6 −x7 − x8 ⎤
⎢x x1 −x4 x3 − x6 x5 x8 −x7 ⎥⎥
⎢ 2
5 8 X 5 = ⎢ x3 x4 x1 − x2 −x7 − x8 x5 x6 ⎥
⎢ ⎥
⎢ x4 − x3 x2 x1 − x8 x7 − x6 x5 ⎥
⎢x x6 x7 x8 x1 − x2 − x3 −x4 ⎥⎦
⎣ 5
⎡ x1 − x2 − x3 −x4 − x5 − x6 − x7 − x8 ⎤
⎢x x1 −x4 x3 − x6 x5 x8 − x7 ⎥⎥
⎢ 2
⎢x x4 x1 − x2 − x7 − x8 x5 x6 ⎥
6 8 X6 = ⎢ 3 ⎥
⎢ x4 − x3 x2 x1 − x8 x7 − x6 x5 ⎥
⎢x x6 x7 x8 x1 − x2 − x3 −x4 ⎥
⎢ 5 ⎥
⎢⎣ x6 − x5 x8 − x7 x2 x1 x4 − x3 ⎥⎦
⎡ x1 − x2 − x3 −x4 − x5 − x6 −x7 − x8 ⎤
⎢x x1 −x4 −x3 − x6 x5 x8 −x7 ⎥⎥
⎢ 2
⎢ x3 x4 x1 − x2 −x7 − x8 x5 x6 ⎥
⎢ ⎥
7 8 X 7 = ⎢ x4 − x3 x2 x1 − x8 x7 − x6 x5 ⎥
⎢x x6 x7 x8 x1 − x2 − x3 −x4 ⎥
⎢ 5 ⎥
⎢ x6 − x5 x8 −x7 x2 x1 x4 − x3 ⎥
⎢x − x8 − x5 x6 x3 −x4 x1 x2 ⎥⎦
⎣ 7
Table 2. Non-square code matrices with full diversity gains and full code rate for nT = 3, 5, 6, 7
The other type of STBCs belongs to complex constellation signaling, and just as the case for
the real constellation signaling, these complex STBCs also abide by the orthogonal design
constraint in (36). In particular, Alamouti’s scheme can be regarded as a complex STBC for
two transmit antennas; that is, the code matrix can be expressed as
⎡x −x2* ⎤
X C2 = ⎢ 1 ⎥ (38)
⎢⎣ x2 x1* ⎥⎦
where we use XCnT to denote a complex STBC for nT transmit antennas in order to
discriminate between real and complex matrices. It is noted that the Alamouti’s scheme can
provide a diversity order of two and the full code rate. As compared with those real STBCs,
it is much more desirable to invent complex STBCs since complex constellation schemes
74 Recent Advances in Wireless Communications and Networks
usually exhibit higher bandwidth efficiency. In addition, one might wonder if there exist
other complex STBC matrices for nT > 2 . Unfortunately, it has been shown that Alamouti’s
scheme is the only complex STBC with an nT × nT square code matrix to simultaneously
achieve the full diversity gains and the full code rate. For the case of nT > 2 , we might
intend to construct complex orthogonal matrices XCnT that can achieve full diversity gains,
but with high code rate Rc and minimum decoding latency p . We summarize below that
for any number of transmit antennas, there exist complex STBCs with code rate of Rc = 1 2 .
For example, for the cases of three or four transmit antennas, the code matrices are given by
Still, for the case of nT > 2 , we can acquire other higher code-rate complex code matrices at
the expense of complicated linear encoding and decoding processing. For example, the
following two matrices XC3 and XC4 are STBCs with a code rate of Rc = 3 4 :
⎡ x3* x3* ⎤
⎢ x1 − x2* ⎥
⎢ 2 2 ⎥
⎢ ⎥
x3* - x3*
XC3 ,3 4 = ⎢ x2 x1* ⎥ , Rc = 3 4 (41)
⎢ 2 2 ⎥
⎢ ⎥
⎢ x3 x3 ( −x 1 − x1* + x2 − x2* ) ( * *
)
x 2 + x 2 + x1 − x1 ⎥
⎢ ⎥
⎣ 2 2 2 2 ⎦
⎡ x3* x3* ⎤
⎢ x1 −x2 ⎥
⎢ 2 2 ⎥
⎢ x3* − x3* ⎥
⎢ x2 x1 ⎥
⎢ 2 2 ⎥
XC4 ,3 4 =⎢ * ⎥ , Rc = 3 4
(42)
⎢ x3 x3 ( −x1 − x1* + x2 − x2* ) ( *
x 2 + x 2 + x1 − x1 ⎥ )
⎢ 2 2 ⎥
⎢ 2 2 ⎥
⎢
⎢ x3 − x3 ( −x2 − x2* + x1 − x1* ) ( − x1 + x1* + x2 − x2* ⎥
⎥
)
⎢⎣ 2 2 2 2 ⎥⎦
⎡ h11 h1nT ⎤ ⎡ h1 ⎤
⎢ ⎥ ⎢ ⎥
H=⎢ ⎥=⎢ ⎥ (43)
⎢h hnR nT ⎥⎦ ⎢⎣ hnR ⎥⎦
⎣ nR 1
where the entry hnR nT denotes the flat fading channel gain from the nT th transmit antenna
to the nRth receive antenna. In general, it is essential to acquire the channel state
information for successful implementation of a multiple-input multiple-output
communication system. The channel estimation issue is beyond the scope of this chapter,
and it is assumed that channel state information of (43) is perfectly known at the both
transmitter and receiver sides.
r = Hx + n (45)
T
where n = ⎡n1 ,… , nn ⎤ is the additive white Gaussian noise vector. Subsequently, a
⎣ R ⎦
T
weighting vector w = ⎡ w1 ,… , wn ⎤ is applied for combining the received signals at the
⎣ R ⎦
receive antennas, followed by symbol decision. In the MRT system, we construct the
weighting factor v from the channel matrix H through a linear transformation as follows:
1
v= ( gH )† (46)
a
1
x= ( gH )† s (47)
a
where a is a normalization factor such that the transmit power is equal to one, which can be
represented as
1
⎛ nR nR nT ⎞ 2
a = gH = ⎜ ∑ ∑ g p gq* ∑ hpk h gk
*
⎟ (48)
⎜ p=1 q =1 ⎟
⎝ k =1 ⎠
Therefore, from (47), the received signal vector is given by
1
r = H ( gH ) s + n
†
(49)
a
In order to make symbol decision, the weighting vector w is applied to combine the
received signal vector x for signal reception. If wT is equal to g , the output is given by
1
s = wT r = g H ( gH ) s + gn = as + gn
†
(50)
a
The post-output SNR after combining is thus calculated as
a2 a 2γ 0
γ= γ0= (51)
gg † 2
∑ p =1
nR
gp
Multiple Antenna Techniques 77
where γ 0 = Es σ n2 denotes the average SNR for a single transmit antenna. It is observed
from (51) that the post-output SNR only depends on the value of g . Thus, to maximize the
post-output SNR is equivalent to choosing an appropriate value of g . By assuming all
channel links between the transmitter and receiver are statistically identical, each of the
transmitter antenna has to be allocated with the same weighting power; that is, we have
g1 = g2 = = gnR . Without loss of generality, we can set gi = 1 , for i = 1, , nR , for
simplicity. Accordingly, the post-output SNR in (51) is simplified as
a2
γ= γ0 (52)
N
By applying the Cauchy-Schwarz inequality, we can further get that a 2 is maximized, i.e.,
maximizing the post-output SNR, if and only if we set
nT
∑ hpk hgk*
(g g ) =
* *
p q
k =1
nT
(53)
∑ hpk hgk*
k =1
It is noted that the denominator term in (53) is due to the fact of gi = 1 and g p gq* = 1 . In
accordance with (52) and (53), the maximum post-output SNR is given by
nR nR nT
γ0
γ max =
N
∑ ∑ ∑ hpk hgk*
p =1 q =1 k =1
(54)
nR nR
γ0
=
N
∑∑ h p hq†
p =1 q =1
On the one hand, if h p and hq are mutually orthogonal, i.e., h p hqH = 0 , γ max takes the
minimum value, given by
nR nT
γ0 2
γ max =
N
∑ ∑ hpk (55)
p =1 k =1
2
On the other hand, if h p and hq are fully correlated, i.e., h p hqH = hq , γ max takes the
maximum value, given by
nR nR nT
γ0 2
γ max =
N
∑ ∑ ∑ hpk (56)
p =1 q =1 k =1
Form (55) and (56), the average post-output SNR is therefore bounded by
where γ 0 = γ 0E ⎡⎢ hpk ⎤⎥ is defined as the average SNR at each branch. Also, for an MRT system
2
⎣ ⎦
with nT × nR antennas, it is expected from (55) that the diversity order is equal to nT × nR .
78 Recent Advances in Wireless Communications and Networks
0
10
NR=1
NR=2
-1
10
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
Eb/N0 [dB]
0
10
NR=1
NR=2
-1
10
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
Eb/N0 [dB]
from its corresponding transmit antenna. Without loss of generality, it is assumed that the
same constellation is applied for all substreams, and the transmission duration is a burst
consisting of L symbols. We assume that the multiple-input multiple-output channel is flat
fading and quasi-static over the duration of L symbols, and the channel matrix is denoted
by HnR ×nT , whose ( i , j ) th entry hij represents the complex channel gain from the jth
transmit antenna to the ith receive antenna. We denote the data vector to be transmitted as
T
s = ⎡⎣s1 ,… , snT ⎤⎦ (58)
where si is the modulated symbol at the ith transmit antenna. The received signals at the
nR receive antennas can thus be represented as a vector, as follows:
r = Hs + n (59)
where n is an independent and identical distributied (i.i.d.) white Gaussian noise vector
with zero mean and a covariance matrix σ n2 I .
w †i ( H ) j =δ ij , for i , j = 1, 2, nT (60)
Multiple Antenna Techniques 81
where ( H ) j denotes the jth column of H , the notation ( i ) takes the Hermitian, and δ is
†
the Kronecker delta function. Then, the ith substream after equalization is given by
y i = w †i r (61)
The ZF-based detection procedures to extract substreams for any arbitrary detection order
are elaborated in the following. Let us set j = 1 , r1 = r and the ordering set for data
{ }
detection as ς = k1 , k2 , , knT , where k j ∈ {1,… , nT } .
Step 1. Use the nulling vector w k j to obtain the decision statistic for the k jth substream
y k j = wTk j rj (62)
( )
sˆk j = Q y k j (63)
rj + 1 = rj − s k j ( H ) k (64)
j
Update j to j+1 for the next iteration, and repeat the Step1~Step3, where the k j th ZF nulling
vector is given by
⎧0, for i ≥ j
w †k ( H ) k = ⎨ (65)
⎩1, for i = j
j i
Thus, if the inter-antenna interference is perfectly reconstructed and cancelled, the weighting
vector w †k is orthogonal to the subspace spanned by the interference-reduced vector rj + 1 .
j +
Accordingly, the solution to w †k in (65) is the k jth row of H j − 1 , where the notation
j
H j − 1 denotes the matrix acquired by deleting columns k1 , k2 , , k j −1 of H and ( i )
+
denotes the Moore-Penrose pseudoinverse (Abadir & Magnus, 2006). The post-detection
SNR for the k j th substream of s is therefore given by
Es
SNRk j = 2
(66)
σ n2 wkj
⎡ 2⎤
where Es = E ⎢ sk j ⎥ .
⎣ ⎦
( )
-1
WMMSE = HH† + σ n2 InR H (68)
where σ n2 denotes the noise power and InR represents an nR × nR identity matrix. Thus, the
decision statistic for the ith substream is given by
where (WMMSE )i denotes the ith column of the matrix WMMSE . Subsequently, the hard
decision for the ith substream is given by
sˆi = Q ( yi ) (70)
To further improve the performance, one can incorporate the interference cancellation
methodology, similar to the idea in subsection 3.2.1, into the MMSE equalizer. Concerning
an arbitrary detection order, the interference suppression and cancellation procedure is the
same as the Step1~Step3 in subsection 3.2.1, but the MMSE equalizer is used instead of the
j
nulling vector as follows. Define the MMSE equalizer at the jth iteration as WMMSE :
-1
⎛
( ) ⎞
†
j
WMMSE = ⎜ Hdj − 1 Hdj − 1 + σ n2 I nR ⎟ Hdj − 1 (71)
⎝ ⎠
where Hdj − 1 represents the truncated channel matrix by deleting the columns
k1 , k 2 , , k j − 1 of H . At the jth iteration, the weighting vector for detecting the k jth
j
substream, WMMSE ( ) kj
j
, is thus obtained from the k j th column of WMMSE .
Initialization Step:
Set j = 1
( )
-1
Calculate G1 = H+ (if ZF) or G1 = HH† + σ n2 InR H (if MMSE)
2
Choose k1 = arg min ( G1 )i
i
Recursion Step:
While j ≤ nT
{
Interference supression & cancellation Part:
( )k ( )k
†
Calculate the weighting vector: w †k j = G j (if ZF) or w †k j = G j (if MMSE)
j j
Equalization: y k j = w †k j rj
( )
Slice: sˆk j =Q y k j
Interference cancellation: rj + 1 = rj − s k j ( H ) k
j
Ordering Part:
+
Calculate the equalizer matrix of the updated channel matrix: G j + 1 = H j (if ZF) or
-1
⎛
( ) ⎞
†
G j + 1 = ⎜ H dj H dj + σ n2 I nR ⎟ H dj (if MMSE)
⎝ ⎠
2
Decide the symbol entry for detection: k j + 1 = arg
{
min
i∉ k1 , k2 , ,k }
j
( G j + 1 )i
Update: j = j + 1
}
In the above iterative procedure, for the ZF case, the vector (G j )i denotes the ith row of the
matrix G j , computed from the pseudoinverse of H j − 1 , where the columns k1 , , k j − 1 are
set to zero. However, for the MMSE case, the vector (G j )i denotes the the ith column of
the matrix G j , computed from the MMSE equalizer of Hdj − 1 , where the columns
k1 , , k j − 1 are set to zero. This is because these columns only related to the entries of
sk1 , , sk j which have already been estimated and cancelled. Thus, the system can be
regarded as a degenerated V-BLAST system of Figure 12 where the transmitters k1 , , k j are
removed.
transmit antenna. As compared with the ZF-based and MMSE-based V-BLAST algorithms,
the ML detector has better BER performance. However, the computation complexity of the
ML detector exponentially increases as the modulation order or the number of transmit
antennas increase. Instead, the ZF-based and MMSE-based V-BLAST algorithms, which are
the linear detection methods combined with the interference cancellation methods, require
much lower complexity than the ML detector, but their BER performance is significantly
inferior to that of the ML detector.
0
10
ZF-based V-BLAST
MMSE-based V-BLAST
-1 ML
10
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
Eb/N0 [dB]
4. Beamforming
Beamforming is a promising signal processing technique used to control the directions for
transmitting or receiving signals in spatial-angular domain (Godara, 1997). By adjusting
beamforming weights, it can effectively concentrate its transmission or reception of desired
signals at a particular spatial angle or suppress unwanted interference signals from other
spatial angles. In this section, we will introduce the general concepts of beamforming
techniques as well as some famous beamforming methods.
Multiple Antenna Techniques 85
0
10
ZF without ordering
ZF with ordering
-1 ML
10
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
E b/N0 [dB]
Fig. 14. BER performance of 4 × 4 V-BLAST systems using ZF-based V-BLAST algorithm
with or without ordering
0
10
MMSE without ordering
MMSE with ordering
-1 ML
10
-2
10
BER
-3
10
-4
10
-5
10
0 5 10 15 20 25 30
Eb/N0 [dB]
Fig. 15. BER performance of 4 × 4 V-BLAST systems using MMSE-based V-BLAST algorithm
with or without ordering
86 Recent Advances in Wireless Communications and Networks
{
bi ( t ) = ℜ e mi ( t + τ l (θ i ) ) e
j 2π f 0 ( t +τ l (θ i ) )
} (73)
≅ ℜ e {m ( t ) e }
j 2π f 0 ( t +τ l (θ i ) )
i
Thus, the corresponding baseband equivalent signal on the lth antenna is given by
j 2π f 0τ l (θ i )
mi ( t ) e (74)
Let xl ( t ) denote the baseband representation of the received signal on the lth antenna,
including both M sources and noise on the lth antenna, and from (74), it is given by
M
xl ( t ) = ∑ mi ( t ) e j 2π f 0τ l (θi ) + nl ( t ). (75)
i =1
Multiple Antenna Techniques 87
where nl ( t ) is the spatially additive white Gaussian noise term on the lth antenna with
zero mean and variance σ n2 .
T
T j 2π f 0τ 1 (θ i ) j 2π f 0τ L (θ i ) ⎤
where n ( t ) = ⎣⎡n1 ( t ) , n2 ( t ) ,… , nL ( t ) ⎦⎤ , and a i (θ i ) = ⎡⎢ e ,… , e is known as
⎣ ⎦⎥
the steering vector for the ith source. Then, we can rewrite (77) into a matrix notation,
leading to a compact representation:
y ( t ) = w †x ( t ) (78)
From (77) and (78), for a given beamforming vector, the mean output power is calculated as
P ( w ) = E ⎡⎣ y ( t ) y ∗ ( t ) ⎤⎦ = w †Rw (79)
where E [ i] denotes the expectation operator and R is the correlation matrix of the signal
x ( t ) , which is defined and given by
M
R = E ⎡⎣ x ( t ) x † ( t ) ⎤⎦ = ∑ pi a i a †i + σ n2 I (80)
i =1
where pi is the power of the ith source, I is an identity matrix of size L × L . In the
following, we introduce three famous beamforming schemes to determine the complex
beamforming weights.
88 Recent Advances in Wireless Communications and Networks
1
w= a (θ 0 ) (81)
L
Now we consider a communication environment consisting of only one signal source, and
with this delay-and-sum beamforming scheme, the output signal after beamforming is given
by
y ( t ) = w † x ( t ) = w †a (θ 0 ) m0 ( t ) + w † n ( t ) (82)
By assuming that the power of the source signal is equal to p0 , the post-output SNR after
beamforming is then calculated as
2
w †a (θ 0 ) m0 ( t ) Lp0
SNR = = (83)
E ⎡⎢ w † n ( t ) ⎤⎥
2
σ n2
⎣ ⎦
In fact, the conventional beamforming can be regarded as an MRC-like scheme, as
introduced in (Godara, 1997). It can be easily proved that for the case of a single source, the
conventional beamforming scheme can provide the maximum output SNR. We can also
observe that the output SNR in (83) is proportional to the number of antenna arrays, and as
the number of antennas increases, it can facilitate to reduce the noise effect. However, when
there are a number of signal sources which can interfere with each other, this conventional
beamforming scheme does not have ability to suppressing interference effectively.
w †a 0 = 1
(84)
w †a i = 0, for i = 1, ,M
Multiple Antenna Techniques 89
w †A = eT1 (85)
w † = eT1 A −1 (86)
Otherwise, the solution is obtained via taking the pseudo inverse of A . The solution for the
beamforming weights becomes
( )
−1
w † = eT1 A † AA † (87)
It is noted that although this beamforming scheme has nulls in the directions of interfering
sources, it is not designed to maximum the output SNR. Hence, it is not an optimal one from
the viewpoint of maximizing the output SNR.
min w †Rw
w (88)
subject to w †a 0 = 1
the covariance matrix of the spatial noise. Here, we consider a more general case where the
noise is not necessary spatial white. This optimal beamforming scheme is also known as
minimum variance distortionless response (MVDR) beamforming. The Lagrange multiplier
can be applied to solve this optimization problem, and the Lagrange function associated
with (88) is given by
( )
L ( w , v ) = w †Rw + v w †a 0 − 1 = w † ( Rw + va 0 ) − v (89)
∇ wL ( w , v ) = 2Rw + va 0 = 0 (90)
w †a 0 = 1 (91)
v∗ −1
( )
†
w† = − R a0 (92)
2
Since R is a Hermitian matrix, i.e., R = R † , by taking (91) into (92), we have
v* 1 (93)
− =
2 a †0R −1a 0
From (92) and (93), the optimal beamforming weights (Vural, 1975; Applebaum, 1976) are
therefore given by
R −1a 0 (94)
w=
a †0R −1a 0
R n-1a 0 1 (97)
w= = a0
a 0†R n-1a 0 L
Multiple Antenna Techniques 91
10
Optimal beam former, 20 antennas
Conventional beam former, 20 antennas
0
Amplitude of angle response (dB)
-10
-20
-30
-40
-50
-60
-70
-100 -80 -60 -40 -20 0 20 40 60 80 100
Angle
Fig. 18. Angle responses of optimal and conventional beamforming schemes
92 Recent Advances in Wireless Communications and Networks
-50
Amplitude of angle response (dB)
-100
-150
-200
-250
-350
-100 -80 -60 -40 -20 0 20 40 60 80 100
Angle
Fig. 19. Angle responses of optimal and null-steering schemes
5. References
Abadir, K. M. & Magnus, J. R. (2006). Matrix Algebra, Cambridge University Press, ISBN 978-
0-521-53746-9, New York, USA.
Applebaum, S. P. (1976). Adaptive Arrays, IEEE Transactions on Antennas and Propagation,
Vol.24, No.5, (Sep 1976), pp.585–598, ISSN: 0018-926X.
D’Assumpcao, H. A. & Mountford, G. E. (1984). An Overview of Signal Processing for
Arrays of Receivers, Journal of the Institution of Engineers (Australia), Vol.4, pp.6–19,
ISSN 0020-3319.
Foschini, G. J. (1996). Layered Space-Time Architecture for Wireless Communication in a
Fading Environment When Using Multi-Element Antennas. Bell Labs Technical
Journal, Vol.1, No.2, (Summer 1999), pp.41-59, ISSN 1538-7305.
Foschini, G. J. & Gans, M. J. (1998). On Limits of Wireless Communications in a Fading
Environment when Using Multiple Antennas. Wireless Personal Communications,
Vol.6, No.3, (March 1998), pp.311-335, ISSN 0929-6212.
Foschini, G. J., Golden, G. D., Valenzuela, R. A. & Wolniansky, P. W. (1999). Simplified
Processing for High Spectral Efficiency Wireless Communication Employing Multi-
Multiple Antenna Techniques 93
1. Introduction
Over the last decade, a large degree of consensus has been reached within the research
community regarding the physical layer design that should underpin state-of-the-art and
future wireless systems (e.g., IEEE 802.11a/g/n, IEEE 802.16e/m, 3GPP-LTE, LTE-Advanced).
In particular, it has been found that the combination of multicarrier transmission and
multiple-input multiple-output (MIMO) antenna technology leads to systems with high
spectral efficiency while remaining very robust against the hostile wireless channel
environment.
The vast majority of contemporary wireless systems combat the severe frequency selectivity
of the radio channel using orthogonal frequency diversity multiplexing (OFDM) or some of its
variants. The theoretical principles of OFDM can be traced back to (Weinstein & Ebert, 1971),
however, implementation difficulties delayed the widespread use of this technique well until
the late 80s (Cimini Jr., 1985). It is well-known that the combination of OFDM transmission
with channel coding and interleaving results in significant improvements from an error rate
point of view thanks to the exploitation of the channel frequency diversity (Haykin, 2001, Ch.
6). Further combination with spatial processing using one of the available MIMO techniques
gives rise to a powerful architecture, MIMO-OFDM, able to exploit the various diversity
degrees of freedom the wireless channel has to offer (Stuber et al., 2004).
subcarriers. The subcarriers assigned to a group of symbols are typically chosen as separate
as possible within the available bandwidth in order to maximise the frequency diversity gain.
Note that a GO-CDM setup can be seen as many independent MC-CDM systems of lower
dimension operating in parallel. This reduced dimension allows the use of optimum receivers
for each group based on maximum likelihood (ML) detection at a reasonable computational
cost. In (Riera-Palou et al., 2008), results are given for group dimensioning and spreading code
selection. In particular, it is shown that the choice of the group size should take into account
the operating channel environment because an exceedingly large group size surely leads to a
waste of computational resources, and even to a performance degradation if the channel is not
frequency-selective enough. Given the large variation of possible scenarios and equipment
configurations in a modern wireless setup, a conservative approach of designing the system
to perform satisfactorily in the most demanding type of scenario may lead to a significant
waste of computational power, an specially scarce resource in battery operated devices. In
fact, large constellation sizes (e.g., 16-QAM, 64-QAM) may difficult the application of GO
techniques as the complexity of ML detection can become very high even when using efficient
implementations such as the sphere decoder (Fincke & Pohst, 1985). In order to minimise the
effects of a mismatch between the operating channel and the GO-CDM architecture, group
size adaptation in the context of GO-CDM has been proposed in (Riera-Palou & Femenias,
2009), where it is shown that important complexity reductions can be achieved by dynamically
adapting the group size in connection with the sensed frequency diversity of the environment.
subcarrier grouping dimensions can be a daunting task further complicated when Tx and/or
Rx antennas are correlated. To this end, it is desirable to have at hand closed-form analytical
expressions predicting the performance of the different MIMO-GO-CDM configurations in
order to avoid the need of (costly) numerical simulations.
This chapter has two main goals. The first goal is to present a unified BER analysis of the
MIMO-GO-CDM architecture. In order to get an insight of the best possible performance
this system can offer, attention is restricted to the case when ML detection is employed
at the receiver. The analysis is general enough to incorporate the effects of channel
frequency selectivity, Tx/Rx antenna correlations and the three most common different forms
of spatial processing (SDM, STBC and CDD) in combination with GO-CDM frequential
diversity. The analytical results are then used to explore the benefits of GO-CDM under
different spatial configurations identifying the most attractive group dimensioning from
a performance/complexity perspective. Based on the previous analysis, the second goal
of this chapter is to devise effective reconfiguration strategies that can automatically and
dynamically fix some of the parameters of the system, more in particular the group size of
the GO-CDM component, in response to the instantaneous channel environment with the
objective of optimising some pre-defined performance criteria (e.g., error rate, complexity,
delay).
The rest of this chapter is organized as follows. Section 2 introduces the system model of a
generic MIMO-GO-CDM system, paying special attention to the steps required to implement
the frequency spreading and the MIMO processing. In Section 3 a unified BER analysis
is presented for the case of ML detection. In light of this analysis, Section 4 explores
reconfiguration strategies aiming at the optimisation of several critical parameters of the
MIMO-GO-CDM architecture. Numerical results are presented in Section 6 to validate the
introduced analytical and reconfiguration procedures. Finally, the main conclusions of this
work are recapped in Section 7.
Notational remark: Vectors and matrices are denoted by bold lower and upper case letters,
respectively. The superscripts ∗ , T and H are used to denote conjugate, transpose and complex
transpose (Hermitian), respectively, of the corresponding variable. The operation vec(A)
lines up the columns forming matrix A into a column vector. The symbols ⊗ and denote
the Kronecker and element-by-element products of two matrices, respectively. Symbols Ik
and 1k×l denote the k-dimensional identity matrix and an all-ones k × l matrix, respectively.
The symbol D(x) is used to represent a (block) diagonal matrix having x at its main (block)
diagonal. The determinant of a square matrix A is represented by |A| whereas x2 = xx H .
Expression a is used to denote the nearest upper integer of a. Finally, the Alamouti
transform of a K × 2 matrix X = [x1 x2 ] is defined as A (X ) −x2∗ x1∗ .
2.1 Transmitter
As depicted in Fig. 1, incoming bits are split into Ns spatial streams, which are then processed
separately. Bits on the zth stream are mapped onto a sequence sz of symbols drawn from an
98
4 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
GO-CDM
Antenna mapping
Input bits
STBC
GO-CDM
M-ary complex constellation (e.g. BPSK, M-QAM) with average normalized unit energy. The
resulting Ns streams of modulated symbols {sz }zN=s 1 are then fed to the GO-CDM stage, which
comprises three steps:
1. Segmentation of the incoming symbol stream in blocks of length Nc (i.e., eventual OFDM
symbols), and serial to parallel conversion (S/P) resulting, over the kth OFDM symbol
period, in sz (k).
Ng
2. Arrangement of the symbols in the block into groups szg (k) , where szg (k) =
g =1
T
szg,1 (k) . . . szg,Q (k ) represents an individual group.
3. Group spreading through a linear combination
1
s̃zg (k) = √ Cszg (k), (1)
NT
STBC (Ns = 1, NT = 2) : Two consecutive blocks of spread symbols, s̃1g (k) and s̃1g (k + 1), are
Alamouti-encoded on a per-subcarrier basis over two OFDM symbol periods,
∗
ŝ1g (k) = s̃1g (k), ŝ1g (k + 1) = − s̃1g (k + 1) ,
∗ (3)
ŝ2g (k) = s̃1g (k + 1), ŝ2g (k + 1) = s̃1g (k) .
Diversity Management
Diversity Management in MIMO-OFDMin MIMO-OFDM Systems
Systems 995
In the antenna mapping stage, STBC-encoded streams are connected to two transmit
branches, one for each symbol of the STBC code, that is,
CDD (Ns = 1) : In a pure CDD scheme, the same data stream is sent through NT antennas
with each replica being subject to a different cyclic delay Δi , typically chosen as Δi =
Δi−1 + Nc /NT with Δ1 = 0 (Bauch & Malik, 2006), resulting in transmitted symbols
s̆ig,q (k) = s̃1g,q (k) exp − j2πdq Δi /Nc , (5)
where P denotes the number of independent paths of the channel and φl and τl denote the
power and delay of the l-th path. It is assumed that the power delay profile is the same for
all pairs of Tx and Rx antennas and that it has been normalized to unity (i.e., ∑lP=−01 φl = 1). A
single realization of the channel impulse response between Tx antenna i and receive antenna
j at time instant t will then have the form
P −1
ij
hij (t; τ ) = ∑ hl (t)δ(τ − τl ), (7)
l =0
ij
where it will hold that E | hl (t) |2 = φl . The corresponding frequency response can be
expressed as
P −1
ij
h̄ij (t; f ) = ∑ hl (t) exp(− j2π f τl ), (8)
l =0
which when evaluated at the Nc OFDM subcarriers yields
T
h̄ij (t) = h̄ij (t; f 0 ) . . . h̄ij (t; f Nc −1 ) . (9)
In order to simplify the notation, assuming that the channel is static over the duration of a
block (i.e., an OFDM symbol), the frequency response between Tx-antenna i and Rx-antenna
j over the Nc subcarriers during the kth OFDM symbol can be expressed as
T
ij ij
h̄ij (k) = h̄0 (k ) . . . h̄ Nc −1 (k) . (10)
100
6 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
STBC pre-processing
Subcarrier grouping
Estimated bits
ML group Segment Symbol
CP FFT detection P/S De-map
Since the subsequent analysis is mostly conducted on per-group basis, the channel frequency
response for the gth group is denoted by
T
ij ij ij
h̄g (k ) = h̄ g,1 (k) . . . h̄ g,Q (k) , (11)
which is assumed to be constant over time, common for all pairs of Tx and Rx antennas
and, provided that group subcarriers are chosen equispaced across the available bandwidth,
common to all groups.
Now, considering the spatial correlation introduced by the transmit and receive antenna
arrays, the spatially correlated channel frequency response for an arbitrary subcarrier q in
group g can be expressed as (van Zelst & Hammerschmidt, 2002)
T
H g,q (k) = R1/2 1/2
RX H g,q ( k ) R TX , (13)
2.3 Receiver
As shown in Fig. 2, the reception process begins by removing the cyclic prefix and performing
an FFT to recover the symbols in the frequency domain. After S/P conversion, and assuming
ideal synchronization at the receiver side, the received samples for group g at the output of
the FFT processing stage can be expressed in accordance with the MIMO transmission scheme
in use as follows:
Diversity Management
Diversity Management in MIMO-OFDMin MIMO-OFDM Systems
Systems 1017
represents the spatially and frequency correlated channel matrix affecting all symbols
transmitted in group g, the Ns Q-long vector of transmitted (spread) symbols is formed
as T
s̆g (k) = vec s̆1g (k) . . . s̆gNT (k) , (17)
and finally, υg (k) is an NR Q × 1 vector representing the receiver noise, with each
component being drawn from a circularly symmetric zero-mean white Gaussian
distribution with variance συ2 .
STBC: As stated in (3), STBC encoding period η = k/2, with k = 0, 2, 4, . . ., spawns
two consecutive OFDM symbol periods, namely, the kth and (k + 1)th symbol periods.
Assuming that the channel coherence time is large enough to safely consider that H g (k +
1) = H g (k), then,
where
HA
g (k) D A H g,1 (k) . . . A H g,Q (k) (20)
and T
s̃g (η ) vec s̃1g (k) s̃1g (k + 1) . (21)
In order to facilitate the unified performance analysis of the different MIMO strategies, it is
more convenient to express the reception equation in terms of the original symbols rather than
the spread ones. Thus, defining
T
Ns
sg (k ) = N vec sg (k) . . . sg (k)
√ 1 1 SDM
T
T
sg (η ) = √1 vec s1g (k) s1g (k + 1) STBC (22)
2
sg (k) = √1N s1g (k) CDD
T
it is straightforward to check that the symbols to be supplied to the IFFT processing step are
given by,
s̆g (k) = (C ⊗ I Ns ) sg (k) SDM
s̆g (k) = s̃g (η ) = (C ⊗ I2 ) sg (η ) STBC
s̆g (k) = EgΔ (C ⊗ 1 NT ×1 ) sg (k) CDD
102
8 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
ΔQ Δq
with EgΔ D EgΔ1 . . . Eg , where Eg = D e− j2πdq Δ1 /Nc . . . e− j2πdq Δ NT /Nc (Bauch &
Malik, 2006). Furthermore, since processing takes place either on an OFDM symbol basis for
SDM and CDD systems or on an STBC encoding period basis for STBC schemes, the indexes
k and/or η can be dropped from this point onwards, allowing the reception equation to be
expressed in general form as
rg = Ag sg + νg
where ⎧
⎪
⎪ H g (C ⊗ I Ns ) SDM
⎨
Ag = H̃ g (C ⊗ I2 ) STBC
⎪
⎪
⎩
H g EgΔ (C ⊗ 1 NT ×1 ) CDD
and
υg for SDM/CDD
νg = . (23)
υ̃g for STBC
It should be noted that, regardless of the MIMO scheme and group dimension in use, the
system matrix Ag has been normalised such that the SNR can be defined as Es /N0 = 1/(2συ2 ).
Upon reception, all symbols in a group (for all streams in SDM and for both encoded OFDM
symbols in STBC) are jointly estimated using an ML detection process. That is, the vector of
estimated symbols in a group can be expressed as
This procedure amounts to evaluate all the possible transmitted vectors and choosing the
closest one (in a least-squares sense) to the received vector. Nevertheless, sphere detection
(Fincke & Pohst, 1985) can be used for efficiently performing the exhaustive search required
to implement the ML estimation.
Ng M NQ M NQ
1
Pb ≤
Ng NQ M NQ
∑ ∑ ∑
log2 M g=1 u=1 w=1
P sg,u → sg,w Nb (sg,u , sg,w ), (25)
w
=u
where,
⎧
⎪
⎪ Q Ns for SDM
⎨
NQ = 2Q for STBC . (26)
⎪
⎪
⎩
Q for CDD
The expression P sg,u → sg,w , usually called the pairwise error probability (PEP), represents
the probability of erroneously detecting the vector sg,w when sg,u was transmitted and
Diversity Management
Diversity Management in MIMO-OFDMin MIMO-OFDM Systems
Systems 1039
Nb (sg,u , sg,w ) is equal to the number of differing bits between vectors sg,u and sg,w . To
proceed further, the PEP conditioned on Ag can be shown to be (Craig, 1991)
⎛ ⎞
1 Ag (sg,u − sg,w )2
P sg,u → sg,w |Ag = erfc ⎝ ⎠
2 4συ2
(27)
1 π/2 Ag (sg,u − sg,w )2
= exp − dφ.
π 0 4συ2 sin2 φ
Now, defining the random variable d2g,uw Ag (sg,u − sg,w )2 , the unconditional PEP can be
expressed as
1 π/2 +∞ − x/4σv2 sin2 φ
P sg,u → sg,w = e pd2g,uw ( x ) dx dφ
π 0 −∞
π/2 (28)
1 1
= Md2g,uw − 2 2 dφ,
π 0 4συ sin φ
where p x (·) and M x (·) denote the probability density function (pdf) and moment generating
function (MGF) of a random variable x, respectively.
Let us now define the error vector eg,uw = sg,u − sg,w . Using this definition, it can be shown
that
d2g,uw Ag eg,uw 2 = H gH Tg,uw
H
Tg,uw H g , (29)
where
H g vec vec H g,1 . . . vec H g,Q , (30)
and Tg,uw can be expressed as
1Q×1 ⊗ Sg,uw IQ,NT ⊗ I NR SDM/CDD
Tg,uw = (31)
11×Q ⊗ Sg,uw
T IQ,2
T
⊗ I2NR STBC
with
eTg,uw C T ⊗ I NT SDM/STBC
Sg,uw =
(32)
eTg,uw C T ⊗ 11× NT EΔT CDD
and In,m In ⊗ 11×m . The expression of d2g,uw reveals that it is a quadratic form in complex
variables H g , with MGF given by
! ! −1
Md2g,uw (s) = !I N − sGg,uw ! , (33)
where N is equal to QNR for the SDM and CDD schemes, and equal to 4QNR for the STBC
strategy. Furthermore,
Gg,uw = Tg,uw Rg Tg,uw
H
, (34)
with
Rg = Rhg ⊗ R TX ⊗ R RX . (35)
104
10 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Now, let λg,uw = {λ g,uw,1 , . . . , λ g,uw,Dg,uw } denote the set of Dg,uw distinct positive eigenvalues
of Gg,uw with corresponding multiplicities αg,uw = α g,uw,1 , . . . , α g,uw,Dg,uw . Using the
results in (Femenias, 2004), the MGF of d2g,uw can also be expressed as
Dg,uw Dg,uw α g,uw,d
1 κ g,uw,d,p
Md2g,uw (s) = ∏ (1 − sλ g,uw,d ) α g,uw,d = ∑ ∑ (1 − sλ g,uw,d ) p
(36)
d =1 d =1 p =1
where, using (Amari & Misra, 1997, Theorem 1), it can be shown that
⎡ ⎤!
!
p−α
λ g,uw,d
g,uw,d
α g,uw,d − p Dg,uw !
∂ ⎢ 1 ⎥!
⎢ ⎥!
(α g,uw,d − p)! ∂sαg,uw,d − p ⎣ d∏
κ g,uw,d,p = α g,uw,d ⎦!
=1 (1 − sλ g,uw,d ) !
d
=d !
s= λ 1
g,uw,d (37)
nd α g,uw,d +nd −1
λ g,uw,d ( )
Dg,uw
p−α nd
= λ g,uw,d ∑ ∏
g,uw,d
λ
α g,uw,d + n d
Φ d =1 1− g,uw,d
λ g,uw,d
d
=d
with Φ being the set of nonnegative integers n1 , . . . , nd−1 , nd+1 , . . . , n Dg,uw such that
∑d
=d nd = α g,uw,d − p, which allows (28) to be written as
⎛ ⎞p
D α π/2 2
1 g,uw g,uw,d sin φ
P sg,u → sg,w =
π d∑ ∑ κ g,uw,d,p 0 ⎝ 2 λg,uw,d ⎠ dφ
=1 p =1 sin φ + 4σ2
v
⎛ ⎞p ⎛ ⎞g (38)
λ g,uw,d 1 + Ω λg,uw,d
Dg,uw α g,uw,d 1 − Ω 4σ 2
p − 1
p − 1 + g 4σ 2
= ∑ ∑ κ g,uw,d,p ⎝ v ⎠ ∑ ⎝ v ⎠ ,
d =1 p =1
2 g =0
g 2
(
with Ω(c) = c/(1 + c). By substituting (38) into (25), a closed-form BER upper bound for an
arbitrary power delay profile is obtained. It is later shown that this bound is tight, accurately
matching the simulation results.
where W ( Dg,c , λg,c , αg,c , N ) corresponds to the number of elements in the class
C( Dg,c , λg,c , αg,c ) inducing N erroneous bits.
D
where D̃g,c = ∑d=g,c1 α g,c,d is the rank of the matrix-defining class Gg,c . From (41) it is clear that
the probability of error will be mainly determined by the groups and classes whose matrices
H
Gg,c = Gmin min min
g,c T g,c R g
min
Tg,c (42)
In light of (44), the asymptotic BER minimisation is achieved by maximising the minimum
group/class rank D̃min and the eigenvalue product of all the groups/classes with rank D̃min .
In the following, only the maximization of D̃min (i.e., maximisation of the diversity order)
is pursued since the maximization of the product of eigenvalues is far more difficult as it
involves the simultaneous optimization of all the eigenvalue products in the groups/classes
with rank D̃min .
On the rank of Tg,c
min : As stated in (Cai et al., 2004; Riera-Palou et al., 2008), choosing the
subcarriers for a group equispaced across the whole bandwidth minimizes subcarrier
correlation allowing the optimization of the system performance if an adequate family of
spreading codes is properly selected. To this end, rotated spreading transforms have been
proposed for multicarrier systems in (Bury et al., 2003) where it is shown that the often
used Walsh-Hadamard codes lead to poor diversity gains when employed to perform the
frequency spreading. This can be explained by the fact that for certain symbol blocks the
energy is concentrated on one single subcarrier and, thus,
N SDM
min R
rank Tg,c = (45)
NT NR STBC/CDD.
106
12 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
A deep fade on this subcarrier dramatically raises the probability of error in the detection
process, regardless of the state of all other subcarriers, limiting in this way the achievable
diversity order (asymptotic BER slope). A similar effect can be observed when using
other spreading sequences such as those based on the discrete Fourier transform (DFT).
As pointed out in (Bury et al., 2003), a spreading that has the potential to maximize the
diversity order can be found by applying a rotation to the columns of the conventional
spreading matrix Cconv as C = Cconv D(θ ), where θ = [θ1 . . . θQ ] with each θq denoting
the chip-specific rotation, which in the proposed scheme is given by
j2π (q − 1)
θq = exp ,
QΘ
with Θ being constellation dependent and selected so as to make 2π/Θ the minimum
angle producing a rotation of the transmit symbol alphabet onto itself (e.g., Θ = 2 for
BPSK, Θ = 4 for MQAM). This indicates that while using conventional Walsh-Hadamard
spreading no frequency diversity gain will be achieved, the rotated spreading has the
potential (depending on the channel correlation matrix Rg ) to attain a frequency diversity
gain proportional to the number of subcarriers per group, common to all groups and
classes. That is, when using optimally rotated spreading codes,
QN SDM
min R
rank Tg,c = (46)
Q NT NR STBC/CDD.
Rmin
g = Rmin
h g ⊗ R TX ⊗ R RX , (47)
Except for pathological setups exhibiting full spatial correlation between pairs of transmit
or receive antennas (scenario not considered in this analysis), R TX and R RX are full rank
matrices with rank (R TX ) = NT and rank (R RX ) = NR , and therefore,
rank Rmin
g = NT NR rank Rmin hg . (49)
Therefore, the maximum attainable frequency diversity order can be directly related to
Rmin
h g and is given by the number of independent paths in the channel delay profile. If
error performance isto be
optimized, enough subcarriers per group need to be allocated
to ensure that rank Rminhg = P. In fact, defining the sampled channel order L as the
channel delay spread in terms of chip (sampling) periods, it is shown in Cai et al. (2004)
that the maximum rank of Rminh g is attained by setting the number of subcarriers per group
to Q = L + 1. While this is a valuable design rule in channels with short delay spread, in
most practical scenarios where L can be in the order of tens or even hundreds of samples,
the theoretical number of subcarriers required to achieve full diversity would make the use
of ML detection difficult even when using efficient search strategies (i.e., sphere decoding).
Diversity Management
Diversity Management in MIMO-OFDMin MIMO-OFDM Systems
Systems 107
13
Moreover, very often maximum diversity would only be attained at unreasonably large
Es /N0 levels.
In order to determine the number of subcarriers worth using in a given environment (i.e.,
a particular channel power delay profile), it is useful to use as reference the characteristics
of the ideal case where all subcarriers in the group are fully uncorrelated (frequency
domain iid channel). It is straightforward to see
that, in this case, the frequency correlation
matrix is given by Rmin hg = IQ , with rank Rmin hg = Q, and furthermore, it has only
one non-zero eigenvalue λhg ,1 = 1 with multiplicity αhg ,1 = Q. Therefore, for any given
MIMO configuration and a fixed number of subcarriers, the frequency domain iid channel
results in the maximum frequency diversity order (Q) and will also lead to the minimum
probability of error.
Since, for most realistic scenarios, setting the group size to guarantee full diversity (Q =
L + 1) is unfeasible, we need to be able to measure what each additional subcarrier is
contributing in terms of frequency diversity gain. Ideally, each additional subcarrier
should bring along an extra diversity order, that is, an increase in rank Rmin hg by one
as it is indeed the case for uncorrelated channels. For correlated channels, however, this
is often not the case and therefore to choose the group size it is useful to have some form
of measure. A widely used tool in principal component analysis (Johnson & Wichern,
2002) to assess the practical dimensionality of a correlation matrix is the cumulative sum
Q
of eigenvalues (CSE) that, for the correlation matrix Rmin
h g with eigenvalues λ h g ,q , is
q =1
defined as
∑nq=1 λhg ,q
Ψ(n) = Q
. (50)
∑q=1 λhg ,q
For the frequency domain iid channel, Ψ(n) is always a discrete linearly increasing function
of n, and it can serve as a reference against which to measure the contribution of each
subcarrier in arbitrary realistic channels.
As an example, suppose we are trying to determine the appropriate group size for models
B and E from the propagation studies conducted in the definition of IEEE 802.11n (Erceg,
2003). Both models have been measured across a total bandwidth of 20 MHz with a channel
sampling chip period of 10 ns. On one hand Model B is made of 11 paths and it has an
rms-delay spread of 15 ns and very low frequency selectivity. On the other hand Model
E corresponds to a channel with 38 paths (split in 4 clusters) with an rms-delay spread of
100 ns, resulting in large frequency selectivity. While Model B is representative of typical
office indoor environments, Model E corresponds to large outdoor spaces such as airports
or sport halls.
Figure 3 depicts the CSE for channel profiles B, E and the iid model, for different number
of subcarriers (Q = 2, 4, 8 or 16) chosen equispaced across a bandwidth of 20 MHz. It
can be inferred from the top left plot that when only two subcarriers are used per group
(Q = 2), Models B and E behave qualitatively in a similar manner to the iid model and
each of the subcarriers contributes in a significant way towards the achievement of the
maximum diversity. When increasing the number of subcarriers (e.g., Q = 4, 8, 16), this no
longer holds, notice how the CSE values for Model B quickly saturate and get farther apart
from those of the iid channel, indicating that the additional subcarriers do not contribute
substantially in increasing the frequency diversity order. For the case of Model E, a similar
108 Recent Advances in Wireless Communications and Networks
Fig. 3. Cumulative eigenvalue spread for Models B and E from (Erceg, 2003) and iid channel
for different group sizes.
effect can be appreciated but to a much lesser extent, with the departure from the iid model
being more evident for Q = 16 subcarriers. These results seem to indicate that, for Model B,
Q = 2 would provide a good compromise between performance and detection complexity.
In contrast, for channel E, Q = 8 would seem a more appropriate choice to fully exploit
the channel characteristics. Notice that, according to the number of paths of each profile,
Models B and E should attain diversity orders of 11 and 38, respectively. From the results
in Fig. 3 it is obvious that far more moderate group sizes should be chosen in each case to
operate in an optimal fashion from a diversity point of view at a reasonable (ML) detection
complexity.
In conclusion, provided that scenarios with full spatial correlation are avoided, setting the
number of subcarriers per group Q using the proposed CSE-based approach yields
rank Rmin
g = Q NT NR . (51)
Wireless channel
Fig. 4. Communication architecture for a MIMO-GO-CDM with group-size adaptation.
4. Reconfiguration strategies
It is clear from (44) and (53) that the (instantaneous) rank of the group frequency channel
correlation matrix Rminh g determines the asymptotic diversity of a MIMO-GO-CDM system,
and therefore, it can form the basis for a group size adaptation mechanism. Strictly speaking,
the maximum possible rank of Rmin h g is given by the number of independent paths in the
channel profile. However, as shown in Subsection 3.3, very often the practical rank is far
below this number as maximum diversity is only achieved at unrealistically low error rates.
The adaptive group dimensioning scheme proposed next exploits this rank dependence to
dynamically set the group size as a function of the channel response between all pairs
of transmit and receive antennas. Figure 4 illustrates the architecture of the adaptive
MIMO-GO-CDM system, where it can be appreciated that, in light of the acquired channel
state information (CSI) and system constraints (complexity, QoS), the receiver determines the
most appropriate group size to use and communicates this decision to the transmitter using
a feedback channel. Note, as shown in Fig. 4, that CSI nd SNR information can also be used
to determine the most appropriate modulation and coding scheme in conjunction with the
GO-CDM dimensioning and MIMO mode selection. However this topic is beyond the scope
of this chapter and in this work only fixed modulation and uncoded transmission modes are
considered.
In order to perform the adaptive dimensioning of the GO-CDM component, the receiver
min
requires an estimate R̃hg of the group frequency channel correlation matrix. An accurate
estimate of the full correlation matrix Rmin
h g could be computed by means of time averaging
over the frequency domain, however, in indoor/WLANs scenarios where channels tend to
vary very slowly, this approach would require of many OFDM symbols to get an adequate
estimate. Fortunately, only the group channel correlation matrix is required, thus simplifying
the correlation estimation. Exploiting the grouping structure of GO-CDM-MIMO-OFDM
and assuming the channel frequency response is a wide-sense stationary (WSS) process, it
min
is possible to derive an accurate estimate R̃hg from the instantaneous CSI, provided the
subcarriers in a given group have been chosen equispaced across the available bandwidth.
110
16 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
for all pairs of transmit and receive antennas (i, j) and (i , j ) and any q, v ∈ {1, . . . , Qmax }, as
the correlation among any two subcarriers should only depend on their separation, not their
absolute position or the transmit/receive antenna pair. A group channel correlation matrix
estimate from a single frequency response can now be formed averaging across transmit and
receive antennas, and groups,
min
NT NR Ng
min 1 ij ij
R̃hg = ∑∑ ∑
NT NR Ngmin i=1 j=1 g=1
h̄g (k)(h̄g (k)) H . (55)
min
Using basic properties regarding the rank of a matrix, it is easy to prove that rank R̃hg ≤
min Ngmin , Qmax , therefore, Ngmin = Qmax maximises the range of possible group sizes using
min
a single CSI shot. Let us denote the non-increasingly ordered positive eigenvalues of R̃hg
Q̃
min
by Λ̃hg = λ̃hg ,q where, owing to the deterministic character of R̃hg , they can all be
q =1
assumed to be different and with order one, and consequently, Q̃ represents the true rank of
min
R̃hg . For the purpose of adaptation, and based on the CSE criterion, a more flexible definition
of rank is given as ⎧ ⎫
⎨ ∑nq=1 λ̃hg ,q ⎬
Q̃ = min n : Ψ(n) = ≥ 1− , (56)
⎩ Q̃
∑q=1 λ̃hg ,q ⎭
where n ∈ {1, . . . , Q̃} and is a small non-negative value used to set a threshold on the
normalised CSE. Notice that Q̃ → Q̃ as → 0.
Since the group size Q represents the dimensions of an orthonormal spreading matrix C,
restrictions apply on the range of values it can take. For instance, in the case of (rotated)
Walsh-Hadamard matrices, Q is constrained to be a power of two. The mapping of Q̃ to an
allowed group dimension, jointly with the setting of , permits the implementation of different
reconfiguration strategies, e.g.,
6
10
5
10
3
10
2
10 N =1, group
s
N =1, total
s
N =2, group
s
1
10 N =2, total
s
N =4, group
s
N =4, total
s
0
10
1 2 3 4 5 6 7 8
Group size (Q)
Fig. 5. Complexity as a function of group size (Q) for different number of transmitted
streams.
this procedure is that the receiver regularly estimates the group channel rank and whenever a
variation occurs, it determines and feeds back the new group dimension to the transmitter. In
any case, the feedback information can be deemed insignificant as every update just requires
of log2 Q feedback bits with Q denoting the cardinality of set Q. Differential encoding of Q
would bring this figure further down.
Obviously, to detect all groups in the system, the expected number of required operations is
given by Ω T = NQc Ω g . Figure 5 depicts the expected per-group and total complexity for a
system using Nc = 64 subcarriers, a set of possible group sizes given by {1, 2, 4, 8} and
different number of transmitted streams. Note that, in the context of this chapter, Ns > 1
necessarily implies the use of SDM. Importantly, increasing the group size from Q = 1 to
Q = 8 implies an increase in the number of expected operations of more than two orders of
magnitude, thus reinforcing the importance of rightly selecting the group size to avoid a huge
waste in computational/power resources. Finally, it should be mentioned that for the STBC
setup, efficient detection strategies exist that decouple the Alamouti decoding and GO-CDM
112
18 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
BER
BER
−4 −4 −4
10 10 10
−6 −6 −6
10 10 10
0 5 10 15 20 0 5 10 15 20 0 5 10 15 20
Eb/N0 (dB) Eb/N0 (dB) Eb/N0 (dB)
Fig. 6. Analytical (lines) and simulated (markers) BER for GO-CDM configured to operate in
SDM (left), CDD (centre) and STBC (right) for different group sizes in Channel Profile E.
detection resulting in a simplified receiver architecture that is still optimum (Riera-Palou &
Femenias, 2008).
6. Numerical results
In this section, numerical results are presented with the objective of validating the analytical
derivations introduced in previous sections and also to highlight the benefits of the adaptive
MIMO-GO-CDM architecture. The system considered employs Nc = 64 subcarriers within
a B = 20 MHz bandwidth. These parameters are representative of modern WLAN systems
such as IEEE 802.11n (IEEE, 2009). The GO-CDM technique has been applied by spreading
the symbols forming a group with a rotated Walsh-Hadamard matrix of appropriate size. The
set of considered group sizes is given by Q = {1, 2, 4, 8}. This set covers the whole range
of practical diversity orders for WLAN scenarios while remaining computationally feasible at
reception. Note that a system with Q = 1 effectively disables the GO-CDM component. For
most of the results shown next, Channel Profile E from (Erceg, 2003) has been used. Perfect
channel knowledge is assumed at the receiver. Regarding the MIMO aspects, the system is
configured with two transmit and two receive antennas (NT = NR = 2). As in (van Zelst &
Hammerschmidt, 2002), the correlation coefficient between Tx (Rx) antennas is defined by a
single coefficient ρ Tx (ρ Rx ). Note that in order to make a fair comparison among the different
spatial configurations, different modulation alphabets are used. For SDM, two streams are
transmitted using BPSK whereas for STBC and CDD, a single stream is sent using QPSK
modulation, ensuring that the three configurations achieve the same spectral efficiency.
Figure 6 presents results for SDM, CDD and STBC when transmit and receive correlation
are set to ρ Tx = 0.25 and ρ Rx = 0.75, respectively. The first point to highlight from the
three subfigures is the excellent agreement between simulated and analytical results for the
usually relevant range of BERs (10−3 − 10−7 ). It can also be observed the various degrees of
influence exerted by the GO-CDM component depending on the particular spatial processing
mechanism in use. For example, at a Pb = 10−4 , it can be observed that in SDM and CDD,
the maximum group size considered (Q = 8) brings along SNR reductions greater than 10
dB when compared to the setup without GO-CDM (Q = 1). In contrast, in combination
with STBC, the maximum gain offered by GO-CDM is just above 5 dB. The overall superior
performance of STBC can be explained by the fact that it exploits transmit and receive
Diversity Management
Diversity Management in MIMO-OFDMin MIMO-OFDM Systems
Systems 113
19
0
Spatial division multiplexing 0
Cyclic delay diversity 0
Space−time block coding
10 10 10
Analytical, ρrx=0
Analytical, ρtx=0
−1 −1 −1
10 10 10
Simulation, ρrx=0
Simulation, ρtx=0
BER
BER
BER
−2 −2 −2
10 10 10
−3 −3 −3
10 10 10
−4 −4 −4
10 10 10
0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1
ρ or ρ ρ or ρ ρ or ρ
rx tx rx tx rx tx
Fig. 7. Analytical (lines) and simulated (markers) BER for GO-CDM configured to operate in
SDM (left), CDD (centre) and STBC (right) for different transmit/antenna correlation values.
diversity whereas in SDM there is no transmit diversity and in CDD, this is only exploited
when combined with GO-CDM and/or channel coding.
Next, the effects of antenna correlation at either side of the communication link have been
assessed for each of the MIMO processing schemes. To this end, the MIMO-GO-CDM system
has been configured with Q = 2 and the SNR fixed to Es /N0 = 10 dB. The antenna correlation
at one side was set to 0 when varying the antenna correlation at the other end between 0 and
0.99. As seen in Fig. 7, a good agreement between analytical and numerical results can be
appreciated. The small discrepancy between theory and simulation is mainly due to the use
of the union bound, which always overestimates the true error rate. In any case, the theoretical
expressions are able to predict the performance degradation due to an increased antenna
correlation. Note that, in CDD and SDM, for low to moderate values (0.0 − 0.7), correlation at
either end results in a similar BER degradation, however, for large values (> 0.7), correlation
at the transmitter is significantly more deleterious than at the receiver. For the STBC scenario,
analysis and simulation demonstrate that it does not matter which communication end suffers
from antenna correlation as it leads to exactly the same results. This is because all symbols are
transmitted and received through all antennas (Tx and Rx) and therefore equally affected by
the correlation at both ends.
Finally, the performance of the proposed group adaptive mechanism has been assessed by
simulation. The SNR has been fixed to Es /N0 = 12 dB and a time varying channel profile
has been generated. This profile is composed of epochs of 10,000 OFDM symbols each. Within
an epoch, an independent channel realisation for each OFDM symbol is drawn (quasi-static
block fading) from the same channel profile. For visualisation clarity, the generating channel
profile is kept constant for three consecutive epochs and then it changes to a different one. All
channel profiles (A-F) from IEEE 802.11n (Erceg, 2003) have been considered. Results shown
correspond to an SDM configuration.
The left plot in Fig. 8 shows the BER evolution for fixed and adaptive group size systems as the
environment switches among the different channel profiles. The upper-case letter on the top
of each plot identifies the particular channel profile for a given epoch. Each marker represents
the averaged BER of 10,000 OFDM symbols. Focusing on the fixed group configurations it is
easy to observe that a large group size does not always bring along a reduction in BER. For
example, for Profile A (frequency-flat channel) there is no benefit in pursuing extra frequency
114
20 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
5
10 10
A B F D E C A B F D E C A B F D E C
9 Q=8
−2
10 8
7 4 Q=4
ML detection complexity
10
6
−3
Rank/Q
10 VarQ
BER
5 Q=2
4
3
10
−4 Q=1 3 Q=1
10
Q=2
Q=4 2
Q=8
varQ Q(k)
1
rank
−5 2
10 0 10
0 3 6 9 12 15 18 0 3 6 9 12 15 18 0 3 6 9 12 15 18
4 4
x104 (OFDM symbols) x10 (OFDM symbols) x10 (OFDM symbols)
Fig. 8. Behaviour of fixed and adaptive MIMO GO-CDM-OFDM over varying channel profile
using QPSK modulation at Es /N0 =12 dB. NT = NR = Ns = 2 (SDM mode). Left:
epoch-averaged BER performance. Middle: epoch-averaged rank/group size. Right:
epoch-averaged detection complexity.
diversity at all. Similarly, for Profiles B and C there is no advantage in setting the group
size to values larger than 4. This is in fact the motivation of the proposed MIMO adaptive
group size algorithm denoted in the figure by varQ. It is clear from the middle plot in Fig. 8
that the proposed algorithm is able to adjust the group size taking into account the operating
environment so that when the channel is not very frequency selective low Q values are used
and, in contrast, when large frequency selectivity is sensed the group size dimension grows.
Complementing the BER behaviour, it is important to consider the computational cost of the
configurations under study. To this end the right plot in Fig. 8 shows the expected number
of complex operations (see Section 5). In this plot it can be noticed the huge computational
waste incurred, since there is no BER reduction, in the fixed group size systems with large Q
when operating in channels with a modest amount of frequency-selectivity (A, B and C).
7. Conclusions
This chapter has introduced the combination of GO-CDM and multiple transmit antenna
technology as a means to simultaneously exploit frequency, time and space diversity. In
particular, the three most common MIMO mechanisms, namely, SDM, STBC and CDD, have
been considered. An analytical framework to derive the BER performance of MIMO-GO-CDM
has been presented that is general enough to incorporate transmit and receive antenna
correlations as well as arbitrary channel power delay profiles. Asymptotic results have
highlighted which are the important parameters that influence the practical diversity order
the system can achieve when exploiting the three diversity dimensions. In particular, the
channel correlation matrix and its effective rank, defined as the number of significant positive
eigenvalues, have been shown to be the key elements on which to rely when dimensioning
MIMO-GO-CDM systems. Based on this effective rank, a dynamic group size strategy has
been introduced able to adjust the frequency diversity component (GO-CDM) in light of the
sensed environment. This adaptive MIMO-GO-CDM has been shown to lead to important
power/complexity reductions without compromising performance and it has the potential
to incorporate other QoS requirements (delay, BER objective) that may result in further
energy savings. Simulation results using IEEE 802.11n parameters have served to verify three
Diversity Management
Diversity Management in MIMO-OFDMin MIMO-OFDM Systems
Systems 115
21
8. Acknowledgments
This work has been supported in part by MEC and FEDER under projects MARIMBA
(TEC2005-00997/TCM) and COSMOS (TEC2008-02422), and a Ramón y Cajal fellowship
(co-financed by the European Social Fund), and by Govern de les Illes Balears through project
XISPES (PROGECIB-23A).
9. References
Alamouti, A. (1998). A simple transmit diversity technique for wireless communications, IEEE
JSAC 16: 1451–1458.
Amari, S. & Misra, R. (1997). Closed-form expressions for distribution of sum of exponential
random variables, IEEE Trans. Reliability 46(4): 519–522.
Bauch, G. & Malik, J. (2006). Cyclic delay diversity with bit-interleaved coded modulation
in orthogonal frequency division multiple access, IEEE Trans. Wireless Commun.
8: 2092–2100.
Bury, A., Egle, J. & Lindner, J. (2003). Diversity comparison of spreading transforms for
multicarrier spread spectrum transmission, IEEE Trans. Commun. 51(5): 774–781.
Cai, X., Zhou, S. & Giannakis, G. (2004). Group-orthogonal multicarrier CDMA, IEEE Trans.
Commun. 52(1): 90–99.
Cimini Jr., L. (1985). Analysis and simulation of a digital mobile channel using orthogonal
frequency division multiplexing, IEEE Transactions on Communications 33(7): 665–675.
Craig, J. W. (1991). A new, simple and exact result for calculating the probability of error
for two-dimensional signal constellations, IEEE MILCOM’91 Conf. Rec., Boston, MA,
pp. 25.5.1–25.5.5.
Erceg, V. (2003). Indoor MIMO WLAN Channel Models. doc.: IEEE 802.11-03/871r0, Draft
proposal.
Femenias, G. (2004). BER performance of linear STBC from orthogonal designs over MIMO
correlated Nakagami-m fading channels, IEEE Trans. Veh. Technol. 53(2): 307–317.
Fincke, U. & Pohst, M. (1985). Improved methods for calculating vectors of short length in a
lattice, including a complexity analysis, Math. Comput. 44: 463–471.
Foschini, G. (1996). Layered space-time architecture for wireless communication in a
fading environment when using multi-element antennas, Bell Labs Technical Journal
1(2): 41–59.
Haykin, S. (2001). Communication Systems, 4th edn, Wiley.
IEEE (2009). Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications Amendment 5: Enhancements for Higher Throughput, IEEE
Std 802.11n-2009 .
Johnson, R. & Wichern, D. (2002). Applied Multivariate Statistical Analysis, fifth edn, Prentice
Hall.
Kaiser, S. (2002). OFDM code-division multiplexing in fading channels, IEEE Trans. Commun.
50: 1266–1273.
116
22 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Meyer, C. (2000). Matrix analysis and applied linear algebra, Society for Industrial and Applied
Mathematics (SIAM).
Petersen, K. B. & Pedersen, M. S. (2008). The matrix cookbook. Version 20081110.
URL: http://www2.imm.dtu.dk/pubdb/p.php?3274
Riera-Palou, F. & Femenias, G. (2008). Improving STBC performance in IEEE 802.11n
using group-orthogonal frequency diversity, Proc. IEEE Wireless Communications and
Networking Conference, Las Vegas (US), pp. 1–6.
Riera-Palou, F. & Femenias, G. (2009). OFDM with adaptive frequency diversity, IEEE Signal
Processing Letters 16(10): 837 – 840.
Riera-Palou, F., Femenias, G. & Ramis, J. (2008). On the design of uplink and
downlink group-orthogonal multicarrier wireless systems, IEEE Trans. Commun.
56(10): 1656–1665.
Simon, M. & Alouini, M. (2005). Digital communication over fading channels, Wiley-IEEE Press.
Simon, M., Hinedi, S. & Lindsey, W. (1995). Digital communication techniques: signal design and
detection, Prentice Hall PTR.
Stuber, G., Barry, J., Mclaughlin, S., Li, Y., Ingram, M. & Pratt, T. (2004). Broadband
MIMO-OFDM wireless communications, Proceedings of the IEEE 92(2): 271–294.
Tarokh, V., Jafarkhani, H. & Calderbank, A. (1999). Space-time block codes from orthogonal
designs, IEEE Transactions on Information Theory 45(5): 1456–1467.
Telatar, E. (1999). Capacity of Multi-antenna Gaussian Channels, European Transactions on
Telecommunications 10(6): 585–595.
van Zelst, A. & Hammerschmidt, J. (2002). A single coefficient spatial correlation model
for multiple-input multiple-output (mimo) radio channels, Proc. Proc. URSI XXVIIth
General Assembly, Maastricht (the Netherlands), pp. 1–4.
Vikalo, H. & Hassibi, B. (2005). On the sphere-decoding algorithm ii. generalizations,
second-order statistics, and applications to communications, Signal Processing, IEEE
Transactions on 53(8): 2819 – 2834.
Weinstein, S. & Ebert, P. (1971). Data transmission by frequency-division multiplexing using
the discrete Fourier transform, IEEE Trans. Commun. Tech. 19: 628–634.
Wittneben, S. (1993). A new bandwidth efficient transmit antenna modulation diversity
scheme for linear digital modulation, Proc. IEEE Int. Conf. on Commun., Geneva
(Switzerland), pp. 1630–1634.
Yee, N., Linnartz, J.-P. & Fettweis, G. (1993). Multi-carrier CDMA in indoor wireless radio
networks, Proc. IEEE Int. Symp. on Pers., Indoor and Mob. Rad. Comm., Yokohama
(Japan), pp. 109–113.
0
6
1. Introduction
OFDM (Orthogonal Frequency Division Multiplexing) is a well-known multicarrier
modulation technique that allows high-rate data transmissions over multipath broadband
wireless channels. By using OFDM, a high-rate data stream is split into a number of lower-rate
streams that are simultaneously transmitted on different orthogonal subcarriers. Thus, the
broadband channel is decomposed into a set of parallel frequency-flat subchannels; each one
corresponding to an OFDM subcarrier. In a single user scenario, if the channel state is known
at the transmitter, the system performance can be enhanced by adapting the power and data
rates over each subcarrier. For example, the transmitter can allocate more transmit power and
higher data rates to the subcarriers with better channels. By doing this, the total throughput
can be significantly increased.
In a multiuser scenario, different subcarriers can be allocated to different users,
which constitutes an orthogonal multiple access method known as OFDMA
(Orthogonal Frequency Division Multiple Access). OFDMA is one of the principal
multiple access schemes for broadband wireless multiuser systems. It has being
proposed for use in several broadband multiuser wireless standards like IEEE
802.20 (MBWA: http://grouper.ieee.org/groups/802/20/), IEEE 802.16 (WiMAX:
http://www.ieee802.org/16/, 2011) and 3GPP-LTE (http://www.3gpp.org/). This chapter
focuses on the OFDMA broadcast channel (also known as downlink channel), since this is
typically where high data rates and reliability is needed in broadband wireless multiuser
systems. In OFDMA downlink transmission, each subchannel is assigned to one user at
most, allowing simultaneous orthogonal transmission to several users. Once a subchannel
is assigned to a user, the transmitter allocates a fraction of the total available power as well
as a modulation and coding (data rate). If the channel state is known at the transmitter,
the system performance can be significantly enhanced by allocating the available resources
(subchannels, transmit power and data rates) intelligently according to the users’ channels.
The allocation of these resources determines the quality of service (QoS) provided by the
system to each user. Since different users experience different channels, this scheme does not
only exploit the frequency diversity of the channel, but also the inherent multiuser diversity
of the system.
In multiuser transmission schemes, like OFDMA, the information-theoretic system
performance is usually characterized by the capacity region. It is defined as the set of rates
118
2 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
that can be simultaneously achieved for all users (Cover & Thomas, 1991). OFDMA is a
suboptimal scheme in terms of capacity, but near capacity performance can be achieved when
the system resources are optimally allocated. This fact, in addition to its orthogonality and
feasibility, makes OFDMA one of the preferred schemes for practical systems. It is well known
that coding across the subcarriers does not improve the capacity (Tse & Viswanath, 2005),
so maximum performance is achieved by using separate codes for each subchannel. Then,
the data rate received by each user is the sum of the data rates received from the assigned
subchannels. The set of data rates received by all users for a given resource allocation gives
rise to a point in the rate region. The points of the segment connecting two points associated
with two different resource allocation strategies can always be achieved by time sharing
between them. Therefore, the OFDMA rate region is the convex hull of the points achieved
under all possible resource allocation strategies.
To numerically characterize the boundary of the rate region, a weight coefficient is assigned
to each user. Then, since the rate region is convex, the boundary points are obtained by
maximizing the weighted sum-rate for different weight values. In general, this leads to
non-linear mixed constrained optimization problems quite difficult to solve. The constraint is
given by the total available power, so it is always a continuous constraint. The optimization
or decision variables are the user and the rate assigned to each subcarrier. The first is a
discrete variable in the sense that it takes values from a finite set. At this point is important to
distinguish between continuous or discrete rate adaptation. In the first case the optimization
variable is assumed continuous whereas in the second case it is discrete and takes values from
a finite set. The later is the case of practical systems where there is always a finite codebook,
so only discrete rates can be transmitted through each subchannel. Unfortunately, regardless
the nature of the decision variables, the resulting optimization problems are quite difficult to
solve for realistic numbers of users and subcarriers.
This chapter analyzes the maximum performance attainable in broadcast OFDMA channels
from the information-theoretic point of view. To do that, we use a novel approach to
the resource allocation problems in OFDMA systems by viewing them as optimal control
problems. In this framework the control variables are the resources to be assigned to each
OFDM subchannel (power, rate and user). Once they are posed as optimal control problems,
dynamic programming (DP) (Bertsekas, 2005) is used to obtain the optimal resource allocation.
The application of DP leads to iterative algorithms for the computation of the optimal resource
allocation. Both continuous and discrete rate allocation problems are addressed and several
numerical examples are presented showing the maximum achievable performance of OFDMA
in broadcast channels as function of different channel and system parameters.
each subchannel. Then, taking the limit as N goes to infinite (continuous frequency variable),
the problem can be solved using multilevel water-filling. Similarly, in (Hoo et al., 2004) the
authors characterize the asymptotic (when N goes to infinite) FDMA multiuser capacity
region and propose optimal and suboptimal resource allocation algorithms to achieve the
points in such region. Here, unlike (Goldsmith & Effros, 2001), each subchannel is assigned to
one user at most and a separate AWGN capacity-achieving code is used in each subchannel.
In OFDMA systems the number of subchannels is finite. Each subchannel is assigned to one
user at most, and a power value is allocated to each subcarrier. OFDMA is a suboptimal
scheme in terms of capacity but, due to its orthogonality and feasibility, it is an adequate
multiple access scheme for practical systems. Moreover, OFDMA can achieve near capacity
performance when the system resources are optimally allocated.
In (Seong et al., 2006) and (Wong & Evans, 2008) efficient resource allocation algorithms are
derived to characterize the capacity region of OFDMA downlink channels. The proposed
algorithms are based on the dual decomposition method (Yu & Lui, 2006). In (Wong & Evans,
2008) the resource allocation problem is considered for both continuous and discrete rates,
as well as for the case of partial channel knowledge at the transmitter. By using the dual
decomposition method, the algorithms are asymptotically optimal when the number of
subcarriers goes to infinite and is close to optimal for practical numbers of OFDM subcarriers.
Some specific points in the rate region are particularly interesting. For example the
maximum sum-rate point where the sum of the users’ rates is maximum, or the maximum
symmetric-rates point where all users have maximum identical rate. Many times, in practical
systems one is interested in the maximum achievable performance subject to various QoS
(Quality of Service) users’ requirements. For example, what is the maximum sum rate
maintaining given proportional rates among users, or what is the maximum sum-rate
guarantying minimum rate values to a subset of users. All these are specific points in the
capacity region that can be achieved with specific resource allocation among the users. A
crucial problem here is to determine the optimal resource allocation to achieve such points.
Mathematically, these problems are also formulated as optimization problems constrained
by the available system resources. In (Jang & Lee, 2003) the authors show the resource
allocation strategy to maximize the sum rate of multiuser transmission in broadcast OFDM
channels. They show that the maximum sum-rate is achieved when each subcarrier is
assigned to the user with the best channel gain for that subcarrier. Then, the transmit power
is distributed over the subcarriers by the water-filling policy. In asymmetric channels, the
maximum sum-rate point is usually unfair because the resource allocation strategy favors
users with good channel, producing quite different users’ rates. Looking for fairness among
users, (Ree & Cioffi, 2000) derive a resource allocation scheme to maximize the minimum
of the users’ rates. In (Shen et al., 2005) the objective is to maximize the rates maintaining
proportional rates among users. In (Song & Li, 2005) an optimization framework based on
utility-function is proposed to trade off fairness and efficiency. In (Tao et al., 2008), the authors
maximize the sum rate guarantying fixed rates for a subset of users.
feedback channel. The resource allocator can be physically embedded with the transmitter
or the receiver. From the CSI, the resource allocation algorithm computes the data rate and
transmit power to be transmitted through each subcarrier. Let vectors r = [r1 r2 · · · r N ] T
and p = [ p1 p2 · · · p N ] T denote the data rates and transmit powers allocated to the OFDM
subchannels, respectively. This information is sent to the transmit encoder/modulator
block, which encodes the input data according to r and p, and produces the streams of
encoded symbols to be transmitted through the different subchannels. It is well known
that coding across the subcarriers does not improve the capacity (Tse & Viswanath, 2005)
so, from a information-theoretic point of view, the maximum performance is achieved by
using independent coding strategies for each OFDM subchannel. To generate an OFDM
symbol, the transmitter picks one symbol from each subcarrier stream to form the symbols
vector X = [ X [1], X [2], . . . , X [ N ]] T . Then, it performs an inverse fast Fourier transform (IFFT)
operation on X yielding the vector x. Finally the OFDM symbol x’ is obtained by appending
a cyclic prefix (CP) of length L cp to x. The receiver sees a vector of symbols y’ that comprises
the OFDM symbol convolved with the base-band equivalent discrete channel response h of
length L, plus noise samples
y’ = h ∗ x’ + n. (1)
It is assumed that the noise samples at the receiver (n) are realizations of a ZMCSCG
(zero-mean circularly-symmetric complex Gaussian) random variables with variance σ2 : n ∼
CN (0, σ2 I). The receiver strips off the CP and performs a fast Fourier transform (FFT) on the
sequence y to yield Y. If L cp ≥ L, it can be shown that
Yk = Hk Xk + Nk , k = 1, . . . , N, (2)
where H = [ H1 , H2 , . . . HN is the FFT of h, i.e. the channel frequency response for each
]T
OFDM subcarrier, and the Nk ’s are samples of independent ZMCSCG variables with variance
σ2 . Therefore, OFDM decomposes the broadband channel into N parallel subchannels with
channel responses given by H = [ H1 , H2 , . . . HN ] T . In general the Hk ’s at different subcarriers
are different.
Note that the energy of the symbol Xk is determined by the k-th entry of the power allocation
vector pk . It is assumed that the transmitter has a total available transmit power PT to be
distributed among the subcarriers, so ∑ kN=1 pk ≤ PT . The coding/modulation employed for
the k-th subchannel is determined by the corresponding entry (rk ) of the rate allocation vector
r.
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 1215
Fig. 2 shows a block diagram of a downlink OFDMA system. It comprises the transmitter,
the resource allocator unit and M users’ receivers (Fig. 2 only shows the m-th receiver).
The resource allocator is physically embedded with the transmitter. It is assumed that the
transmitter sends independent information to each user. The base-band equivalent discrete
channel response of the m-th user is denoted by hm = [ hm,1 hm,2 · · · hm,Lm ] T , where now L m is
the number of channel taps and nm ∼ CN (0, σm 2 I) are the noise samples at the m-th receiver.
informs the transmitter and receivers through control channels. Then, the transmitter encode
the input data according to the resource allocation vectors and stores the stream of encoded
symbols to be transmitted through the OFDM subchannels. The OFDM symbols are created
and transmitted as in the single-user case. Each user receives and decodes its data from the
assigned subchannels (given by u).
Let γ be a M × N matrix whose entries are the channel power gains for the different users and
subcarriers normalized to the corresponding noise variance
| Hm,k |2
γm,k = . (3)
σm
2
Assuming a continuous codebook available at the transmitter, rk can take any value subject
to the available power and the channel condition. The maximum attainable rate through the
k-th subchannel is given by
where pk is the power assigned to the k-th subchannel. The minimum needed power to
support a given data rate rk through the k-subcarrier will be
2r k − 1
pk = . (5)
γuk ,k
We assume that the system always uses the minimum needed power to support a given rate
so, for a fixed subcarriers-to-users allocation u, the rk ’s and the pk ’s are interchangeable in the
sense that a given rate determines the needed transmit power and viceversa.
In practical systems there is always a finite codebook, so the data rate at each subchannel is
constrained to take values from a discrete set rk ∈ Sr = {r (1) , r (2) , . . . , r ( Nr ) } where each value
corresponds to a specific modulation and code from the available codebook. The transmit
rates and powers are related by
where the so-called SNR-gap approximation is adopted Cioffi et al. (1995), being 0 < β(r ) ≤ 1
the SNR gap for the corresponding code (with rate r). For a given code β(r ) depends on
a pre-fixed targeted maximum bit-error rate. Then, the SNR-gap can be interpreted as the
penalty in terms of SNR due to the use of a realistic modulation/coding scheme. There will
be a SNR gap β(r ( i) ), i = 1, . . . Nr associated with each code of the codebook for a given
targeted bit-error rate. The minimum needed power to support rk will be
2r k − 1
pk = . (7)
β(rk )γuk ,k
Since there is a finite number of available data rates, there will be a finite number of possible
rate allocation vectors r. Note that there are ( Nr ) N possible values of r, but, in general, for a
given u only some of them will fulfil the power constraint.
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 1237
λ
u k γ u k ,k
log2 if μ ≤ λuk γuk ,k
rk∗ = μ (13)
0 if μ ≥ λuk γuk ,k
where μ is a Lagrangian parameter which can be implicitly obtained from
N +
λuk 1
∑ μ
−
γuk ,k
= PT , (14)
k =1
where ( a)+ = max{ a, 0}.
Fig. 4 shows the rate regions R(u) for all possible subcarriers-to-users allocation vectors (u) in
a toy example with M = 2 users, N = 2 subcarriers and PT = 1. (Although it is not a realistic
channel, it is used here to illustrate the resource allocation problem in OFDMA channels).
Here and in the following results, the rates are given in bits/OFDM symbol.
When the system allocates all subcarriers to a single user (u k = u, ∀k), the broadcast channel
turns into a single-user channel and the solution of (12) does not depend on λ. Therefore, in
these cases the rate region degenerates in a single point on the corresponding axis. The rate at
this point is the capacity of the corresponding single-user OFDM channel. Once the optimal
rate vector r∗ is obtained, the power to be allocated to each subcarrier is given by (5).
The achievable points for all possible values of u and r will be
R0 = R 0 ( u) . (15)
u∈Su
In general, R0 is not convex. This fact can be observed in the example of Fig. 4. The rate
region of the OFDMA broadcast channel is the convex hull of R0 : R = H (R0 ). The rate
region for the example of Fig. 4 is depicted in Fig. 5 as the convex hull of the region achieved
by all vectors u. In general, there are subcarriers-to-users allocation vectors u that are never
optimal. This is the case of u = [1, 2] T in the example.
As it was mentioned, there are M N possible subcarriers-to-users allocation vectors u.
Therefore, an exhaustive search among all the possible vectors requires the computation of
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 1259
Fig. 5. OFDMA rate region. It is the convex hull of the rate regions achieved for all vectors u
(see Fig. 4).
M N waterfilling solutions for each vector λ, which is not feasible for practical values of N and
M. An alternative is to jointly optimize over u and p simultaneously, so the problem becomes
Ck ( xk ) = [ u k , rk ] T | u k ∈ Su , rk ∈ Sr , rk ≤ log2 (1 + ( PT − xk )γuk ,k ) ,
Fig. 6. Rate regions for the two-users channel of Fig. 7 considering different values of average
transmit power per subchannel (P).
The entries of the control vector ck are the user and the rate allocated to the k-th subchannel,
that take values from the sets Su and Sr , respectively. The state variable xk is the accumulated
power transmitted in the previous subchannels. Therefore 0 ≤ xk ≤ PT , and the initial state
is x1 = 0. The control component rk is constrained by the available power at the k-th stage:
PT − xk . Note that the solutions of (16) for different λ’s are the points of R0 located in the
boundary of the rate region, and the convex hull of these points are the boundary of the rate
region.
By using the DP algorithm, rate regions for a more realistic two user channel have been
computed. They are depicted in Fig. 6. In this example the number of subcarriers is N = 128
and the users’ subchannel responses are shown in Fig. 7. They are normalized so the average
gain (averaging over the subchannels and users) equals 1. These channel realizations have
been obtained from a broadband Rayleigh channel model with L = 16 taps and an exponential
power delay profile with decay factor ρ = 0.4. This channel model will be described in section
5. The noise variances are assumed to be σm 2 = 1, identical for all users. Fig. 6 shows
the rate region for two different values of average power per subchannel: P = PT /N = 1
and P = PT /N = 10. Note that if the OFDM subchannels were identical (frequency-flat
broadband channel), the average SNR at the OFDM subchannels would be 0dB and 10dB,
respectively.
To obtain the rate regions of Fig.6, (16) has to be solved for each λ by using the DP algorithm.
In each case, the solution is a pair of optimal resource allocation vectors u∗ and r∗ . Then, the
power to be transmitted through the subchannels p∗ is given by (5). The corresponding users’
rate vector are obtained from (8) and shown in Fig. 6 as a marker point in the boundary of the
rate region. Therefore, the marker points are the points of R0 located in the boundary of the
rate region and associated with pairs of resource allocation vectors (u, r) which are solutions
of (16) for different users’ priority vectors. For example, for λ = [0.4, 0.6] T and PT = 10 the
optimal resource allocation vectors are shown in Fig. 8, as well as the transmit power through
the OFDM subchannels (p∗ ). The resulting users’ rates are R(u∗ , p∗ ) = [82.7, 350.7] T .
Note that different vectors λ can lead to identical solution of (16), and hence to identical
points/markers in the boundary of the rate region. The convex hull of the marker points
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 127
11
Fig. 8. Optimal resource allocation vectors u and r for λ = [0.4, 0.6] T and PT = 10N. The
figure also shows the resulting power allocation vector p.
constitutes the boundary of the rate region. Any point in the segments between two markers
is achieved by time sharing between the corresponding optimal resource allocations.
The application of the DP algorithm requires the control and state spaces to be discrete.
Therefore, if they are continuous, they must be discretized by replacing the continuous spaces
by discrete ones. Once the discretization is done, the DP algorithm is executed to yield
the optimal control sequence for the discrete approximating problem. Hence, it becomes
necessary to study the effect of discretization on the optimality of the solution. In the problem
(16), the state variable xk and the second component of the control vetctor (rk ) are continuous.
To obtain the rate regions of Fig. 6, Sr was uniformly discretized considering Nd = 2000
possible rate values between 0 and a maximum rate which is achieved when the total power
PT is assigned to the best subchannel of all users. The state variable xk was discretized in Nd
possible values accordingly. To study the effect of discretization of xk and rk the rate regions
for different values of Nd are shown in Fig. 9. The channels and simulation parameters were
as in Fig. 6. It shows that the required Nd is less than 500.
128
12 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Fig. 11. Achievable points for u = [1, 2], and their convex hull.
In general the vertex points in the boundary of R0 (u) will be the solutions of (12), but now Sr is
a finite set. Therefore, both the state and control variables are discrete so (12) is a fully integer
optimization problem. Unlike the continuous rates case, there is not closed-form solution
when the allowed rates belong to a discrete set. The problem can be formulated as a DP
problem where
• The process stages are the subchannels, so the number of stages is N,
• Control variable: ck = rk ,
• State variable: xk = Σki=−11 (2r i − 1)/γui ,i , 0 ≤ xk ≤ PT , x1 = 0, x N +1 = PT
• Initial state x1 = 0
• Subsets of possible states: 0 ≤ xk ≤ PT
• Subsets of admissible controls: Ck ( xk ) = rk |rk ∈ Sr , rk ≤ log2 (1 + ( PT − xk )γuk ,k ) ,
• System equation: xk+1 = f k ( xk , ck ) = xk + (2r k − 1)/γuk ,k ,
• Cost functions: gk (ck ) = λuk rk .
The control variables ck are the rates allocated to the subchannels, that take values from the set
Sr . The state variable xk is the accumulated power transmitted in the previous subchannels
(up to k − 1-th subchannel). Therefore 0 ≤ xk ≤ PT , and the initial state is x1 = 0. The control
component rk is constrained by the available power at the k-th stage: PT − xk .
Since there are M N possible values of u, an exhaustive search among all possible vectors u
requires to solve the above DP problem M N times for each vector λ, which is not feasible
for practical values of M and N. In this case one has to jointly optimize over u and
r simultaneously, as in (16). Now, unlike the continuous rates case, (16) is an integer
programming problem because the control variable ck is fully discrete taking values from a
finite set Su × Sr .
Fig. 12 shows the rate regions for the two user channel of Fig. 7 considering continuous
and discrete rate allocation. As it is expected, continuous rate adaptation always outperforms
the discrete rate case. In all cases the rate region has been obtained from the DP algorithm.
The figure depicts the rate region for two different values of average power per subcarrier:
P = 1 and P = 10. It is also assumed that the noise at the OFDM subchannels are
130
14 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Fig. 12. Rate regions for the two user channel of Fig. 7 considering continuous and discrete
rate allocation. P denotes the average transmit power per subchannel
i.i.d. with variance σm 2 = 1, identical for all users. Then, if the subchannels were
identical and frequency-flat, the average SNR at the OFDM subchannels would be 0dB
and 10dB, respectively. Now, the following set of available rates have been considered:
Sr = {0, 1/2, 3/4, 1, 3/2, 2, 3, 4, 9/2}. These are the data rates of a set of rate-compatible
punctured convolutional (RCPC) codes, combined with M-QAM modulations, that are
used in the 802.11a (http://grouper.ieee.org/groups/802/11/). The advantage of RCPC
codes is to have a single encoder and decoder whose error correction capabilities can
be modified by not transmitting certain coded bits (puncturing). Therefore, the same
encoder and decoder are used for all codes of the RCPC codebook. This makes the RCPC
codes, combined with adaptive modulation, a feasible rate adaptation scheme in wireless
communications. Apart from the 802.11, punctured codes are used in other standards like
WIMAX (http://www.ieee802.org/16/, 2011).
To obtain the rate regions of Fig. 12, the maximization problem (16) has been solved, using
the DP algorithm, for each λ. In each case, the solution is a pair of optimal resource allocation
vectors u∗ and r∗ . Now, the corresponding users’ rate vector is obtained from (8) and shown
in 12 as a marker point in the boundary of the rate region. For example, for λ = [0.4, 0.6] T
and PT = 10 the optimal resource allocation vectors are shown in Fig. 13, as well as the
transmit power assigned to each OFDM subchannel (p). These vectors produces the users’
rate vector R(u∗ , r∗ ) = [89.5, 340.0] T . Note that this is quite similar to the users’ rate vector
attained for this λ in the continuous rate case. Comparing 8 and 13 one can observe that
the resource allocation vectors are similar in the cases of continuous and discrete rates. In
fact, for this particular case, the subcarriers-to-users allocation vectors u are identical and the
rates-to-subcarriers allocation vectors r are quite similar. Similar behavior is observed for any
other vector λ.
4. Maximum sum-rate
In the case of continuous rate adaptation, the maximum sum rate will be the solution of (16)
for λ = 1 M . But, it was shown in (Jang & Lee, 2003) that the sum-rate is maximized when
each subcarrier is assigned to the user with the best channel
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 131
15
Fig. 13. Optimal resource allocation vectors u and r for λ = [0.4, 0.6] T and PT = 10N. The
figure also shows the power transmitted through the OFDM subchannels p
Fig. 14. Optimal resource allocation vectors u and r to achieve the maximum sum-rate. The
total transmit power is PT = 10N. The figure also shows the power allocation vector p
Fig. 15. Optimal resource allocation vectors u and r to achieve the maximum sum-rate. The
total transmit power is PT = 10N. The figure also shows the power allocation vector p
can also be obtained from the DP algorithm. In the simple case of Fig. 10, the maximum
sum rate is 1.417, which is achieved by u∗ = [2, 2] T , r∗ = [2/3, 3/4] T and p∗ = [0.52, 0.47] T .
Like in continuous rate adaptation, the maximum sum-rate point is always in the boundary
of the rate region. In the two-user channel of Fig. 7, the maximum sum rate is 441.0 assuming
that the average transmit power per subcarrier is P = 10 and the set of available rates is
Sr = {0, 1/2, 3/4, 1, 3/2, 2, 3, 4, 9/2}. It is achieved by the resource allocation vectors depicted
in Fig. 15. Again, the maximum sum-rate and the corresponding resource allocation vectors
are quite similar to the continuous rate case.
1 − ρm
A m = Em Lm
, (19)
ρ m (1 − ρ m )
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 133
17
Fig. 16. Outage rate regions for different values of probability of outage Pout .
being Em the average energy of the m-th user channel. Note that the frequency selectivity of
the channel is determined by ρm , so the higher the ρm the higher is the frequency selectivity
of the m-th user channel. The exponential decay PDP model is a widely used and it will be
assumed in the following results. Any other PDP model could be used. Unless otherwise
indicated, the parameters of the following simulations are
• Number of OFDM subcarriers: N=128
• i.i.d. Rayleigh fading channel model with ρ = 0.4, L = 16 and E = 1, for all users
• Available transmit power: PT = 10N
• Same probability of outage for all users: Pout = 0.1
• In the case of discrete rates, Sr = {0, 1/2, 3/4, 1, 3/2, 2, 3, 4, 9/2}
To obtain the outage rate region, 5000 channel realizations have been considered in each case.
The rate region of each channel realization has been obtained by solving (16) with the DP
algorithm.
Fig. 16 shows the outage rate regions for different values of outage probability (Pout ). One can
observe the performance gap between continuous and discrete rates, which is nearly constant
for different values of Pout . Since the channel is identically distributed for both users, the rate
regions are symmetric.
Fig. 17 shows the outage rate regions when the users’ channels have different average energy
(Em ). The sum of the average energy of the channels equals the number of users (2). In this
case, only continuous rate adaptation is considered. As it is expected, the user with the best
channel gets higher rates.
Fig. 18 shows the two-user outage rate regions for different values of average transmit power
per subcarrier P = PT /N. Note that the performance gap between continuous and discrete
rates increases with P.
Finally, Fig. 19 compares the outage rate regions for different values of channel frequency
selectivity. The figure clearly shows that the higher the frequency selectivity the more useful
is the resource adaptation. The gap between continuous and discrete rates does not depend
on the frequency selectivity of the channel.
134
18 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Fig. 17. Outage rate regions when the users’ channels have different average energy (Em ).
Fig. 18. Outage rate regions for different values of average power per subcarrier P.
6. Conclusions
This chapter analyzes the attainable performance of OFDMA in broadband broadcast
channels from an information-theoretic point of view. Assuming channel knowledge at
the transmitter, the system performance is maximized by optimally allocating the available
system resource among the users. The transmitter has to assign a user, a fraction of the
available power and a data rate (modulation and channel coding) to each subchannel. The
optimal allocation of these resources leads to non-linear constrained optimization problems
which, in general, are quite difficult to solve. These problems are solved by means of a
novel approach to the resource allocation problems in OFDMA systems by viewing them
as optimal control problems, where the control variables are the resources to be allocated
to the OFDM subchannels (power, rate and user). Once the problems are posed as optimal
control problems, dynamic programming is used to obtain the optimal resource allocation that
maximizes the system performance. This constitutes a new methodology for the computation
of optimal resource allocation in OFDMA systems. The achievable performance for given
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 135
19
Fig. 19. Outage rate regions for different values of PDP exponential decay factor (ρ).
channel realization is characterized by the rate region, whereas the overall performance of
OFDMA in random channels is characterized by means of the outage rate region. The cases
of continuous and discrete rate allocation are addressed under a general framework. The first
case leads to mixed optimization problems, whereas in the second case, the optimal resource
allocation is the solution of integer optimization problems.
By using the dynamic programming algorithm, the achievable rate region of OFDMA for
different channels and system parameters has been computed. The simulation results shows
that the performance gap between continuous and discrete rate adaptation is quite narrow
when the average transmit power per subcarrier is low, and it increases for higher values
of transmit power. The frequency selectivity of the broadband channel has a important
influence in the system performance. The higher the frequency selectivity, the more useful is
the adequate resource adaptation. The gap between continuous and discrete rate adaptation
does not depend on the frequency selectivity of the channel. The gap between continuous and
discrete rate adaptation remains nearly constant for different values of outage probability.
xk + 1 = f k (x k , c k ), 1≤k≤N (20)
where k is an index denoting a stage in the system evolution, N is the number of stages, xk
represents the state of the system at stage k and ck denotes the control action to be selected
at stage k (see Fig. 20). In general xk ∈ Sk ⊂ Rn , so the subset of possible states (Sk ) can
be different at different stages. In fact there is a fixed initial state x1 = x(0) , so the set of all
possible states at the first stage has an unique value S1 = {x(0) }. The control vector ck at
each stage are constrained to take values in a subset Ck (xk ), which, in general, depends on the
current state xk and on the stage (k).
136
20 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Fig. 20. Scheme of a DP problem showing the system states (xk ), controls (ck ) and costs (gk ) at
different stages
At each state the system incurs in an additive cost gk (xk , ck ), which, in general, depends on
the state and on the applied control. The objective is to minimize the total cost of the system
along its evolution by selecting the optimal controls at each stage
N
min
N
∑ gk (xk , ck ). (21)
{ck ∈Ck (xk )}k =1 k =1
Jk∗ (xk ) = min gk (xk , ck ) + Jk∗+1 ( f k (xk , ck )) , k = N − 1, . . . , 1 (22)
ck ∈Ck (xk )
∗
JN (x N ) = min gk (x N , c N ),
c N ∈ C k ( xN )
Finally, the optimal control sequence c∗ = [c1∗ , c2∗ , . . . , c∗N ] and the corresponding system
evolution x∗ = [x1∗ , x2∗ , . . . , x∗N +1 ] are easily obtained by iteratively applying the optimal
control policies from the initial state as follows
Optimal Resource
Optimal Resource Allocation
Allocation in OFDMA inChannels
Broadcast OFDMA Broadcast
Using Dynamic Channels Using Dynamic Programming
Programming 137
21
8. Acknowledgements
This work was supported by the Spanish Government, Ministerio de Ciencia e
Innovacit’on (MICINN), under project COSIMA (TEC2010-19545-C04-03) and COMONSENS
(CSD2008-00010, CONSOLIDER-INGENIO 2010 Program).
9. References
Bellman, R. E. (1957). Dynamic Programming, Princeton University Press, Princeton, NJ, USA.
Bertsekas, D. P. (2005). Dynamic programming and optimal control, volume I, Athena Scientific,
Belmont, Massachusetts, USA.
Boyd, S. & Vandenberghe, L. (2004). Convex Optimization, Cambridge University Press,
Cambridge, UK.
Cioffi, J., Dudevoir, G., Eyuboglu, M. & Forney Jr, G. (1995). Mmse decision-feedback
equalizers and coding ii. coding results, IEEE Transactions on Communications
43(10): 2595–2604.
Cover, T. M. & Thomas, J. A. (1991). Elements of information theory, Wiley.
Goldsmith, A. & Effros, M. (2001). The capacity region of broadcast channels with intersymbol
interference and colored gaussian noise, IEEE Transactions on information Theory
47(1): 219–240.
Hoo, L., Halder, B., Tellado, J. & Cioffi, J. (2004). Multiuser transmit optimization for
multicarrier broadcast channels: Asymptotic fdma capacity region and algorithms,
IEEE Transactions on Communications 52(6): 922–930.
Jang, J. & Lee, K. (2003). Transmit power adaptation for multiuser ofdm systems, IEEE Journal
of Selected Areas in Communications 21(2): 171–178.
Lee, L. & Goldsmith, A. (2001). Capacity and optimal resource allocation for fading
broadcast channels - part ii: Outage capacity, IEEE Transactions on information Theory
pp. 1103–1127.
Ree, W. & Cioffi, J. (2000). Increase in capacity of multiuser ofdm system using dynamic
subchannel allocation, Proceedings of IEEE Vehicular Technology Conference (VTC’00),
Tokyo, Japan, pp. 1085–1089.
Seong, K., Mohseni, M. & Cioffi, J. M. (2006). Optimal resource allocation for ofdma
downlink systems, Proceedings of 2006 IEEE International Symposium on Information
Theory (ISIT’06), Seattle, Washington, USA.
Shen, Z., Andrews, J. G. & Evans, B. L. (2005). Adaptive resource allocation in multiuser ofdm
systems with proportional fairness, IEEE Transactions on Wireless Communications
4(6): 2726–2737.
Song, G. & Li, Y. (2005). Cross-layer optimization of ofdm wireless networks - part ii:
Algorithm development, IEEE Transactions on Wireless Communications 4(2): 625–634.
Tao, M., Liang, Y. C. & Zhang, F. (2008). Resource allocation for delay differentiated
traffic in multiuser ofdm systems, IEEE Transactions on Wireless Communications
7(6): 2190–2201.
Tse, D. & Viswanath, P. (2005). Fundamentals of Wireless Communications, Cambridge University
Press, Cambridge, UK.
138
22 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Wong, I. & Evans, B. (2008). Resource Allocation in Multiuser Multicarrier Wireless Systems,
Springer, New York, USA.
Yu, W. & Lui, R. (2006). Dual methods for nonconvex spectrum optimization of multicarrier
systems, IEEE Transactions on Communications 54(7): 1310–1322.
0
7
1. Introduction
It is well known in the wireless telecommunications field that the most valuable resource
available is the electromagnetic radio spectrum. Being a natural resource, it is obviously finite
and has to be utilized in a rational fashion. Nevertheless the demand increase on wireless
devices and services such as voice, short messages, Web, high-speed multimedia, as well as
high quality of service (QoS) applications has led to a saturation of the currently available
spectrum. On the other hand, it has be found that some of the major licensed bands like
the ones used for television broadcasting are severely underutilized Federal Communications
Commission (November) which at the end of the day results in a significant spectrum
wastage. For this means, it is important to come up with a new paradigm that allows us to take
advantage of the unused spectrum. Cognitive radio has risen as a solution to overcome the
spectrum underutilization problem Mitola & Maguire (1999),Haykin (2005). The main idea
under cognitive radio systems is to allow unlicensed users or cognitive users (those who have
not paid for utilizing the electromagnetic spectrum), under certain circumstances, to transmit
within a licensed band. In order to perform this task, cognitive users need to continuously
monitor the spectrum activities and find a suitable spectrum band that allows them to:
• Transmit without or with the minimum amount of interference to the licensed or primary
users.
• Achieve some minimum QoS required for their specific application.
• Share the spectrum with other cognitive users.
Therefore, it is easy to observe that spectrum sensing is the very task upon which the entire
operation of cognitive radio rests Haykin et al. (2009). It is of extreme importance for the
system to be able to detect the so-called spectrum holes (underutilized subbands of the radio
spectrum). This is why in this chapter we focus all our attention to analyze some important
aspects of spectrum sensing in cognitive radio, and particularly the case when it is performed
using multiple antennas.
In order to take advantage of the cognitive radio features it is important to find which parts
of the electromagnetic spectrum are unused at certain moment. These portions are also
140
2 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
called spectrum holes or white spaces. If these bands are further used by a licensed user the
cognitive radio device has the alternative of either moving to another spectrum hoe or staying
in the same band but altering its transmission power lever or modulation scheme in order to
avoid the interference. Hence it is clear that an important requirement of any cognitive radio
network is the ability to sense such spectrum holes. As the most recent literature suggests
right now Akyildiz et al. (2008),Haykin et al. (2009), the most efficient way to detect spectrum
holes is to detect the primary users that are receiving data within the communication range
of a cognitive radio user. This approach is called transmitter detection which is based on the
detection of the weak signal from a primary transmitter through the local observations of
cognitive users. The hypotheses cab be defined as
H0 : n(t)
x (t) = , (1)
H1 : hs(t) + n(t)
where x (t) is the signal received by the cognitive user, s(t) is the transmitted signal of the
primary user, n(t) is the AWGN and h is the amplitude gain of the channel. H0 is a null
hypothesis, which states that there is no licensed user signal in a certain spectrum band. On
the other hand, H1 is an alternative hypothesis, which states that there exist some licensed
user signal. Three very famous models exist in order to implement transmitter detection
according to the hypotheses model Poor & Hadjiliadis (2008). These are the matched filter
detection, the energy detection and the cyclostationary feature detection.
The sufficient statistic in this case is given by (van Trees, 2001), (Kay, 1998)
−1
T = x H Qx = |s|2 x H Rh |s|2 Rh + σn2 I x, (5)
where Rh = E hh H is the correlation matrix of the channel vector h = vec H.
This correlation matrix reflects both spatial correlation between different antennas and the
time-varying nature of the channel. Let Rh = UΛU H be eigendecomposition of the correlation
matrix Rh . In this case, the statistic T could be recast in terms of the elements of the
eigenvalues λi of the matrix Λ and filtered observations y = UH x:
−1 NR L λ2k
T = y H Λ Λ + σn2 I y= ∑ + σn2
| y k |2 , (6)
k =1 λ k
2
which is analogous to equation (5.9) in (van Trees, 2001). Elements yk of the vector y could
be considered as filtered version of the received signal x with a set of orthogonal filters uk
(columns of the matrix U), i.e. could be considered as multitaper analysis (Thomson, 1982).
Linear filtering preserve Gaussian nature of the received signals, therefore, the distribution of
T could be described by generalized χ2 distribution2 (Andronov & Fink, 1971):
NR L
p( x ) = ∑ αk exp(− x/2λk ), (7)
k =1
and
NR L
λl
αk−1 = 2λk ∏ 1− . (8)
l =1,l =k
λk
Theoretically, equation (7) could be used to set up the detection threshold γ. However, it is
difficult to use it for analytical investigation. Therefore, we would consider a few particular
cases of the channel when the structure of the correlation matrix could be greatly simplified
to reveal its effect on the detection performance.
In absence of the signal, samples xkl are drawn from an i.i.d. complex Gaussian random
variable with zero mean and variance σn2 . Therefore, the distribution of Pk is exponential, with
the mean value Lσn2
1 P
p( P) = exp − , (11)
Lσn2 Lσn2
and the distribution of T is just central χ2 distribution with NR degrees of freedom
1 T NR −1 T
pCI (T |H0 ) = exp − . (12)
Γ( NR ) ( Lσn2 ) NR Lσn2
If γ is a detection threshold for the statistic T then the probability PFA of the false alarm is
∞
Γ NR , γ/Lσn2
PFA = pCI (T |H0 )dT = , (13)
γ Γ( NR )
or
γCI = Lσn2 Γ−1 [ NR , PFA Γ( NR )] , (14)
where Γ−1 [ NR , Γ( NR , x )]
= x. If the signal is present, i.e. if the hypothesis H1 is valid, then the
signal yi is a zero mean with the variance σ2 = L2 |s|2 σh2 + Lσn2 . As the result, the distribution
of the test statistic T under the hypothesis H1 is given by the central χ2 distribution with NR
degree of freedom and the probability of the detection is just
∞
1 γ 1 1
PD = p(T |H1 ) = Γ NR , 2 = Γ NR , Γ−1 [ NR , PFA Γ( NR )] ,
γ Γ( NR ) σ Γ( NR ) 1 + Lμ̄
(15)
where
σ2
μ̄ = |s|2 h2 , (16)
σn
is the average SNR per symbol. Performance curves for this case could be found in (van Trees,
2001).
It could be seen from both (9) and (15) that under the stated channel model, the improvement
in performance PD comes either through reduction of noise through accumulation of signal
in each of the antennas (i.e. increase in the effective SNR) or through exploitation of diversity
provided by NR antennas Kang et al. (2010). Thus, increasing number of antennas leads to a
faster detection.
all the eigenvalues are different so one should utilize equation (7). While these calculations
are relatively easy to implement numerically, it gives little insight into the effect of correlation
on the performance of the detector.
Under certain scattering conditions (Haghighi et al., 2010), the eigenvalues of the matrix Rs
are either all close to some constant λ > 1 or close to zero. If there is Neq < NR non-zero
eigenvalues, their values are equal to λk = NR /Neq to preserve trace, and the rest NR − Neq
are equal to zero. In this case, the test statistic TCC could be further simplified to
Neq
TCC ( Neq ) = ∑ | y k |2 , (18)
k =1
where the index k corresponds to non-zero eigenvalues. Thus, the problem is equivalent to
one considered in Section 2.2.1 with Neq independent antennas and the expression for the
threshold γCC and the probability of detection are given by
αγCC = σn2 Γ−1 Neq , PFA Γ( Neq ) , (19)
∞
1 αLγCC
PD = p(T |H1 )dT = Γ Neq , =
γ Γ( Neq ) σ2
1 1
Γ Neq , Γ−1 Neq , PFA Γ( Neq ) . (20)
Γ( Neq ) 1 + LNR μ̄/Neq
where xk is 1 × L time sample received by the k-th antenna. Therefore, each antenna signal is
processes separately and the results are added afterwards.
Taking advantage of eigendecomposition of the correlation matrix R T calculation of decision
statistic Tk can be recast as a multitaper analysis
−1 L
1 λl
Tk = yk Λk Λk + I L yk = ∑ | y |2 . (22)
μ̄ λ
l =1 l
+ 1/μ̄ kl
146
8 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Once again, we can utilize approximation of the correlation matrix by one with constant or
zero eigenvalues as in Section 2.2.2. In this case there will be
(tr R T )2
Leq = (23)
tr R T R TH
eigenvalues of size L/Leq and the rest are zeros. Therefore, there is NR Le q terms in the sum
(21) each contributing
L/Leq μ̄L + Leq
= , (24)
L/Leq + 1/μ̄ μ̄L
into the variance of T ICC . Corresponding equations for choosing the threshold become
γCC = Lσn2 Γ−1 NR Leq , PFA Γ( NR Leq ) , (25)
∞
1 γ
PD = p(T |H1 )dT = Γ Neq , 2 =
γ Γ( Neq ) σ
1 1
Γ Neq , Γ−1 Neq , PFA Γ( Neq ) . (26)
Γ( Neq ) 1 + LNR μ̄/Neq
The sufficient statistics in the case of the channel with separable spatial and temporal
correlation could be easily obtained from the general expression (5) and (6). In fact, using
Kronecker structure of Rh one obtains
Keq
T = ∑ | z k |2 . (29)
k =1
1. Sinc type correlation If scattering environment is formed by a single remote cluster (as it is
shown in (Haghighi et al., 2010)), then the spatial covariance function Rs (d) as a function
of electric distance between antennas d is given by
where φ0 is the central angle of arrival, Δφ is the angular spread. This correlation matrix
has approximately 2Δφ cos φ0 N + 1 eigenvalues approximately equal eigenvalues with
the rest close to zero (Slepian, 1978).
2. Nearest neighbour correlation Neglecting correlation between any two antennas which
are not neighbours one obtains the following form of the correlation matrix Rs
⎧
⎨ ⎪ 1 if i = j
⎪
ρ if i = j + 1
Rs = rij = ∗ if i = j − 1 , (31)
⎪
⎪ ρ
⎩
0 if |i − j| > 1
where ρ is the correlation coefficient. The eigenvalues of (31) are well know (Kotz &
Adams, 1964)
kπ
λk = 1 − 2|ρ| cos , 1 ≤ k ≤ N. (32)
N+1
The equivalent number of independent virtual antennas is given by
N2 N
Neq = = . (33)
N + 2( N − 1)|ρ|2 1 + 2|ρ|2 (1 − 1/N )
3. Exponential correlation
Rs = rij = |ρ|i− j . (34)
Eigenvalues of this matrix are well known (34) (Kotz & Adams, 1964)
1 − | ρ |2
λk = , (35)
1 + 2|ρ| cos ψk + |ρ|2
4. Temporal correlation model for nonisotropic scattering Considering the extended case of
the Clarke’s temporal correlation model for the case of nonisotropic scattering around the
user, we have the temporal correlation function as (Abdi & Kaveh, 2002):
I0 κ 2 − 4π 2 f D
2 τ 2 + j4πκ cos( θ ) f τ
D
Rs (τ ) = , (37)
I0 (κ )
where κ ≥ 0 controls the width of angle of arrival (AoA), f d is the Doppler shift, and
θ ∈ [−π, π ) is the mean direction of AoA seen by the user; I0 (·) stands for the zeroth-order
modified Bessel function.
148
10 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
0.7
PD 0.6
0.5
0.4
0.3
0.2
0.1
0
−25 −20 −15 −10 −5 0 5
SNR, dB
Fig. 3. ROC approximation vs. simulation results (α = 0.8) . Solid lines - theory, x-lines -
simulation.
7
κ=0
κ=1
6 κ=2
κ=3
κ=4
5
κ=5
4
ΛRs
0
1 2 3 4 5 6 7 8 9 10
No. eigenvalue
Figure 4 shows the eigenvalues behaviour for different values of the κ factor. Notice that
for κ = 0 (isotropic scattering) the values of the eigenvalues are spread in an almost equally
and proportional fashion among all of them. As κ tends to infinity (extremely nonisotropic
scattering), we obtain N − 1 zero eigenvalues and one eigenvalue with value N. In other
words, as κ increases, the number of “significant” eigenvalues decreases and hence so the
value of Neq as shown in Figure 6.
0.9
0.8
0.7
P
D 0.6
0.5
0.4
Nr = 1 L = 100
0.3 Nr = 4 L = 25 (ρ = 0)
Nr = 4 L = 25 (ρ = 0.3)
Nr = 4 L = 25 (ρ = 0.6)
0.2
Nr = 4 L = 25 (ρ = 0.95)
0.1
−25 −20 −15 −10 −5
SNR, dB
0.9 κ = 0 (Theoretical)
κ = 0 (Simulation)
0.8
κ = 10 (Theoretical)
κ = 10 (Simulation)
0.7
0.6
PD
0.5
0.4
0.3
0.2
0.1
0
−25 −20 −15 −10 −5 0 5
SNR, dB
Fig. 6. ROC approximation for the estimator correlator considering the temporal correlation
for isotropic and nonisotropic scattering (κ = 0 and κ = 10 respectively).
section 2.3.1. Therefore, the vectorization operations are performed and after evaluating the
respective statistical tests, Monte Carlo method is utilized.
diversity brunches. Depending on amount of noise (SNR) and fading (fading figure (Simon
& Alouini, 2000)) one of these two technique brings more benefit to the net procedure.
For relatively low levels of SNR noise suppression is a dominant task, therefore it is more
advantageous to have a single antenna and as many time samples as possible. On a contrary,
if SNR is somewhat higher, noise is sufficiently suppressed even by short time averaging and
suppressing fading through diversity combining is more beneficial. This can be seen from
Fig. 5. This graph shows performance different configurations of the receiver in such a way
that product NR L remains constant. The same Figure shows effect correlation, and thus, the
scattering environment, plays on quality of reception. For very strong correlations ρ ≈ 1 and
Neq ≈ 1. Therefore all samples collected are used to reduce noise. Such scheme performs
the best at low SNR. However, when ρ = 0 and Neq = NR the gain from the diversity is
highest and the scheme performs best for higher SNR. Intermediate case allows for smooth
transition between these two regions. It also can be seen, that only in the case of ρ = 1
there is an equivalent trade off between number of antennas and time samples: i.e. the
performance depends only on Q = NR L regardless how the product is divided between NR
and L. However, lesser correlation result in unequal trade-off with gain or loss defined by
SNR and amount of correlation.
Neyman−Pearson
Wald Test
2
10
No. of Samples
1
10
0
10
−20 −15 −10 −5 0
SNRdB
H0 : zi = xi + jyi = wi
. (42)
H1 : z i = m + wi
Here m = m I + jmQ = μ exp( jφm ) = 0 is complex non zero mean and wi is i.i.d. complex zero
mean Gaussian process of variance σ2 .
A single sample log-likelihood ratio Λi is given by
p1 ( z i ; H1 ) 2μ ( xi cos φm + yi sin φm ) − μ2
Λi = ln = . (43)
p0 ( z i ; H0 ) σ2
After N steps of the sequential test the cumulative log-likelihood Λ ratio becomes
N
2μ Nμ2
Λ= ∑ Λn = σ2
TN − 2 ,
σ
(44)
n =1
where
N N
T N = cos φm ∑ xn + sin φm ∑ yn . (45)
n =1 n =1
The rest of the test follows procedure of Section 3.1.
152
14 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Figure 7 shows the performance comparison in number of samples needed between Wald Test
and Neyman-Pearson Test. Notice that the latter needs in general almost twice the number of
samples in order to detect the presence of the signal.
It follows from (45) that the sufficient statistic in the case of complex observation is
N
T = ∑ { x exp(− jφm )}. (46)
n =1
In other words, processing of the received signal is implemented in two stages: first, the data
is unitary rotated by the angle φm to align the mean along real axis; then the real part of data
is analyzed using the same procedure as purely real data.
where the random variable m stands for the required number of samples needed to terminate
the test. As stated in Wald (2004) it is possible to neglect the excess on threshold A and B ,
hence the the random variable can have the four possible combinations of terminations and
hypotheses such as ⎧
⎪
⎪ PFA A if H0 is true
⎨
PD A if H1 is true
Λ= . (48)
⎪ (1 − PFA )B if H0 is true
⎪
⎩
PM B if H1 is true
Following same reasoning we can get the conditional expectation for the random variable Λ
as
PFA A + (1 − PFA )B if H0 is true
Λ̄ = . (49)
PD A + PM B if H1 is true
It is possible now to obtain the average number of samples (decision time) for accepting one
of the two hypothesis (H0 , H1 ) as:
PFA A + (1 − PFA B)
n̄(H0 ) = , (50)
Λ̄(H0 )
P A + (1 − PD B)
n̄(H1 ) = D , (51)
Λ̄(H1 )
∑nN=1 Λn
Λ̄(H0 ) = , (52)
N
if no signal is present. The term Λ̄(H1 ) can be calculated analogously assuming there is a
signal present as follows
∑nN=1 Λn
Λ̄(H1 ) = . (53)
N
Primary
Multi-Antenna User
CognitiveDetection in Multi-Antenna Cognitive Radio 153
Primary User Detection in
Radio 15
3
10
Simulation
Theoretical
2
10
1
10
Samples (n)
0
10
−1
10
−2
10
−20 −15 −10 −5 0 5 10 15 20
SNR(dB)
0.025
Simulation
Wald Distribution
0.02
0.015
0.01
0.005
0
0 50 100 150 200 250
Fig. 8 shows the average number of samples needed to achieve a PD = 0.9 for different SNR.
The deviation at high SNR’s is due to the same effect already explained before. In practice for
very high SNR’s only one sample is enough to detect the presence of primary users.
λ − λ ( x − μ )2
f (x) = exp x > 0, (54)
2πx3 2μ2 x
where μ is the mean and λ > 0 is the shape parameter. In figure 9 it is shown Wald’s
distribution in order to approximate the decision time for a PD = 0.9.
154
16 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Though application of sequential analysis with high reliability of the hypothesis testing
(PFA , PM → 0) can provide an effective censoring of the information sent to other SU or FC
together with reduction of the sampling size at SU.
exp [κ cos(Δ − Δ0 )]
pΔ (δ) = . (56)
2πI0 (κ )
Parameter Δ0 represents bias in the determination of the carrier’s phase, while κ represents
quality of measurements. A few particular cases could be obtained from (56) by proper choice
of parameters
1. Perfect phase recovery (coherent detection): κ = ∞, Δ0 = 0, and, thus, pΔ (Δ) = δ(Δ)
2. No phase recovery (non-coherent detection): κ = 0 and, pΔ (Δ) = 1/2π
3. Constant bias: κ = ∞, Δ0 = 0, pΔ (Δ) = δ(Δ − Δ0 )
We will derive the general expression first and then investigate particular cases to isolate
effects of the parameters on performance of SPRT.
and
xi2 + y2i
p0 (zi ) = C exp − , (58)
σ2
respectively Filio, Primak & Kontorovich (2011). For a given Δ, the likelihood ratio Li could
be easily calculated to be
p (z ) 2μ ( xi cos(φm + Δ) + yi sin(φm + Δ)) − μ2
Li = 1 i = exp . (59)
p0 ( z i ) σ2
The conditional (on Δ) likelihood ratio L( N |Δ), considered over N observation is then just a
product of likelihoods of individual observations, therefore
Primary
Multi-Antenna User
CognitiveDetection in Multi-Antenna Cognitive Radio 155
Primary User Detection in
Radio 17
p1 ( z n )
N 2μ ∑nN=1 ( xn cos(φm + Δ) + yn sin(φm + Δ)) − Nμ2
L( N |Δ) = ∏ = exp
p (z )
n =1 0 n σ2
2μT ( N, Δ) Nμ2
= exp exp − , (60)
σ2 σ2
where
N N
T ( N, Δ) = cos(φm + Δ) ∑ xn + sin(φm + Δ) ∑ yn . (61)
n =1 n =1
Let us introduce a new variables, X ( N ), Y ( N ), Z ( N ) and Ψ( N ), defined by
N
X ( N ) = Z ( N ) cos Ψ( N ) = ∑ xn (62)
n =1
N
Y ( N ) = Z ( N ) sin Ψ( N ) = ∑ yn (63)
n =1
The average likelihood (Middleton, 1960) L( N ) could now be obtained by averaging (60) over
the distribution of pΔ (Δ) to produce
π
Nμ2 2μZ ( N ) cos [φm + Δ − Ψ( N )]
L̄( N ) = exp − 2 exp pΔ (Δ)dΔ. (65)
σ −π σ2
In turn, this expression could be further specialized if pΔ (Δ) is given by equation (56)
⎡ ⎤
2 Z2 ( N )
Nμ2 1 4μ 4μZ ( N ) κ
L̄( N ) = exp − 2 I ⎣ + cos [φm − Ψ( N ) − Δ0 ] + κ 2 ⎦ . (66)
σ I0 (κ ) 0 σ4 σ2
It can be seen from (66) that it is reduced to (45) if Δ0 = 0 and κ = ∞. Furthermore the
deterministic phase bias Δ0 could be easily eliminated from consideration by considering z̃i =
zi exp[− j(φm + Δ0 )] instead of zi . Therefore, equation (66) could be simplified to
Nμ2 1 1 2 Y 2 ( N ) + [2μX ( N ) + κσ2 ]2 .
L̄( N ) = exp − 2 I0 4μ (67)
σ I0 (κ ) σ2
In the case of non-coherent detection, i.e. in the case κ = 0, expression (67) assumes a well
known form
Nμ2 2μZ ( N )
L̄( N ) = exp − 2 I0 . (68)
σ σ2
Formation of the likelihood ratio could be considered as a two step process. As the first
step, inphase and quadrature components independently accumulated to lessen the effect
of AWGN. At the second step, values of X ( N ) and Y ( N ) must be combined in a fashion
depending on available information. In the case of coherent reception it is know a priori that
156
18 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
3
10
κ = 0 (Non coherent)
κ = ∞ (Coherent)
κ=2
κ=7
2
10
1
10
0
10
−20 −15 −10 −5
SNR
the quadrature component Y ( N ) contains only noise and it is ignored in the likelihood ratio.
On the contrary, in the case of non-coherent reception one cannot distinguish between the
in-phase and quadrature components and their powers are equally combined to for Z ( N ). In
the intermediate case both components are combined according to (67) with more and more
emphasis put on in-phase component X ( N ) as coherency increases with increase of κ.
In figure 10 we present the impact of non-coherent detection in the number of samples needed
in order to detect a signal with respect to some PD target. Notice that the main repercussion
of non-coherence detection is the increase of samples to nearly twice in comparison to the
coherent detector. In this terms, the non-coherent Wald sequential test procedure can be
thought as having the same efficiency (in terms of number of samples) as the coherent NP-test.
P(H1 , u L |l)
P(H1 |u L , l) = =
P(u L |l)
P1 P1
P(u L |l) ∏ P(ul = +1|H1 ) ∏ P(ul = −1|H1 ) = P(u L |l) ∏(1 − PM,l ) ∏ PM,l , (72)
S+ S− S+ S−
where S+ is the set of all i such that ui = +1 and S− is the set of all i such that ui = −1.
Similarly, in the case of the hypothesis H0 one obtains
P(H0 , u L |l) P0
P(H0 |u L , l) =
P(u L |l)
=
P(u L |l) ∏(1 − PF,l ) ∏ PF,l . (73)
S− S+
Finally, using equations (72) and (73) one obtains the following expression for the conditional
log-likelihood
P(H1 |u L , l) P 1 − PM,l PM,l
ln = ln 1 + ∑ ln + ∑ ln . (74)
P(H0 |u L , l) P0 S PF,l S
1 − PF,l
+ −
158
20 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
0.9
P M=5
MD
PFA M = 5
0.8
PMD M = 7
PFA M = 7
0.7
PMD M = 11
PFA M = 11
0.6
Asymptotic PMD M = 5
Asymptotic PFA M = 5
0.5 Asymptotic PMD M = 7
Asymptotic PFA M = 7
0.4 Asymptotic PMD M = 11
Asymptotic PFA M = 11
0.3
0.2
0.1
0
0 100 200 300 400 500 600 700 800 900 1000
time
Fig. 12. Data fusion scheme considering sequential analysis decision from each sensor
( PM,l = 0.3, PF,l = 0.1).
0.9
PMD M = 5
PFA M = 5
0.8
PMD M = 7
0.7 PFA M = 7
PMD M = 11
0.6 P M = 11
FA
Asymptotic PMD M = 5
0.5 Asymptotic PFA M = 5
Asymptotic PMD M = 7
0.4 Asymptotic PFA M = 7
Asymptotic PMD M = 11
0.3 Asymptotic PFA M = 11
0.2
0.1
0
0 100 200 300 400 500 600 700 800 900 1000
time
Fig. 13. Data fusion scheme considering sequential analysis decision from each sensor
( PM,l = 0.1, PF,l = 0.3).
In order to evaluate the second term in the sum (71) let us first consider an arbitrary node
1 ≤ k ≤ N. Distribution p T,k (τ ) of the decision time at such a node is assumed to be known.
Therefore, probability PD,k (t|Hi ) that the decision is made by the time t = mTs given that the
hypothesis is true is given by
mTS
PD,k (t|Hi ) = pk (τ |Hi )dτ. (75)
0
Primary
Multi-Antenna User
CognitiveDetection in Multi-Antenna Cognitive Radio 159
Primary User Detection in
Radio 21
0
10
Majority Decision
Maximum Likelihood
−1
10
−2
10
−3
10
4 6 8 10 12 14
Sensors
The probability that no decision has been made by the time t is then simply 1 − PD,k (t|Hi ).
As it has been mentioned earlier, parameters of this distribution could be defined as in Filio,
Kontorovich & Primak (2011). Therefore , the second term in the equation (71).
Finally, the fusion rule in the case of nodes making decision according to Wald’s criteria could
be written as
1 if a0 + ∑lL=1 al ul > 0
f (u) = (77)
−1 otherwise
where
Thus, the combining rule is similar to that suggested in Chair & Varshney (1986), however,
with some significant differences in the term of a0 . In figures 12 and 13 it is shown the
performance of the data fusion scheme considering that each one of the sensors takes a
decision based on the sequential detection criteria. In these figures it is plotted the probability
of missdetection ( PMD ) and the probability of false alarm ( PFA ) versus the time in which the
fusion centre gathers the decisions taken from the local observers. Notice that for t → ∞ all
graphs converge to the data fusion rule of Chair & Varshney (1986) for which the theoretical
160
22 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
4. Conclusion
In the first part of this chapter, we have investigated the impact the scattering environment on
the performance of primary user detection in multiantennae confinguration. An approximate
expressions for the probability of missed detection in function of the number of antennas,
parameters of the scattering environment and number of observations. It is shown that at low
SNR it is more beneficial to utilize just a single antenna and large number of time samples.
This allowes for a better noise suppression via time averaging. On the contrary, at high SNR, it
is more beneficial to have more antennas in order to mitigate fading which is a dominant cause
of errors in detection in weak noise. It was also shown that for a very strong correlation, i.e.
ρ ≈ 1, the equivalent number of antennas is almost unity, Neq ≈ 1. Therefore this scheme can
be usefully applied in a low SNR situations assuming enough time samples are obtained. As
ρ ≈ 0, the diversity gain is increased, therefore making it suitable for higher SNR situations.
The second part of the chapter was devoted to application of the sequential analysis technique
to a chive a faster spectrum sensing in cognitive radio networks. It was shown that using the
sequential probability ratio test it is possible to detect the presence of a primary user almost
twice as fast as other fixed sample approaches such as Neyman Pearson detectors. This can be
achieved when dealing in the low SNR region which is a quite often operating characteristic in
real life. The effect of error in estimation phase of the carrier on the duration of the sequential
analysis has also been investigated. It was shown that the impact of non-coherent detection in
sensing the presence of primary users using sequential analysis is the increase of almost twice
the samples needed in comparison to a coherent detection approach. Afterwards we derived
an optimal fusion rule using detectors that use sequential analysis for taking decisions. We
assessed the performance of the system in terms of the time that it takes to gather the decision
from all detectors. It was shown that for faster decision, the fusion centre does not consider
the opinions of all sensors and hence the performance gets reduced. On the other hand, as
Primary
Multi-Antenna User
CognitiveDetection in Multi-Antenna Cognitive Radio 161
Primary User Detection in
Radio 23
the time of decision increases the performance is better but the system experiment a higher
latency.
5. Appendix
Performance derivation of data fusion rule
Let us introduce the following notations
ln 1−PPFAMD if ui > 0
ai = , (81)
ln 1P−MD
PFA
= − ln 1P−MD
PFA if ui < 0
and
ai = ln 1−PPFAMD if ui > 0
ξi = . (82)
bi = − ai = − ln 1P−MD
PFA
if ui < 0
Consider a T (test statistic) given by eq. (77)
K K K
T = a0 + ∑ a k u k = a0 + ∑ ξ k | u k | = a0 + ∑ ξ k . (83)
k =1 k =1 k =1
Pξ ( x ) = P+ δ( x − a) + P− δx − b
(84)
= Pδ( x − a) + (1 − P)δ( x − b),
where
a = ai = ln 1−PPFAMD
PFA . (85)
b = − ai = − ln 1P−MD
and P+ is probability of u = +1 decision, equal to
If k = 0 then
ka + (K − k)b − a0 = Kb + a0
162
24 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
1 − PFA P(H1 )
= −K ln + ln . (90)
PMD 1 − P(H1 )
If P(H1 ) ≈ 1 such that
K
P(H1 ) 1 − PFA
> , (91)
1 − P(H1 ) PMD
then the FC makes only H1 decisions i.e.
and
(kmax + 1) a + (K − kmax − 1)b + a0 > 0. (93)
In this case the scheme suggested in Chair & Varshney (1986) is equivalent to (kmax + 1) out
of K scheme (this is assuming that are statistically equivalent).
Let H1 be true. Then the target is missed if there are no more than kmax positive decisions, or,
equivalently, no less than K − kmax negative decisions. The probability of miss detection at FC
is then given by
kmax
K k
PMDF = ∑ P (1 − PMD )K −k . (94)
k =0
k MD
To more decisions H1 there should be at least kmax + 1 partial 1. If H0 is true, the probability
of false alarm at the fusion center is then:
H1 : PMDF = k K k K −k
=0 ( k )(1 − PMD ) PMD
∑kmax
. (95)
H0 : PFAF = ∑k=kmax ( k )( PFA ) (1 − PFA )K −k
K K k
6. References
Abdi, A. & Kaveh, M. (2002). A space-time correlation model for multielement antenna
systems in mobile fading channels, 20(3): 550–560.
Akyildiz, I., Lee, W., Vuran, M. & Mohanty, S. (2008). A Survey on Spectrum Management in
Cognitive Radio Networks, 46(4): 40–48.
Almalfouh, S. & Stuber, G. (2010). Interference-aware power allocation in cognitive radio
networks with imperfect spectrum sensing, Proc. of ICC 2010, pp. 1 –6.
Andronov, I. & Fink, L. (1971). Peredacha diskretnykh soobshchenii po parallel’nym kanalam, Sov.
Radio, Moscow.
Chair, Z. & Varshney, P. (1986). Optimal data fusion in multiple sensor detection systems,
22(1): 98 –101.
Chenhui, H., Xinbing, W., Zichao, Y., Jianfeng, Z., Youyun, X. & Xinbo, G. (2010). A geometry
study on the capacity of wireless networks via percolation, 58(10): 2916 – 2925.
Editors, S. (2006). UMTS: Spatial channel model for MIMO simulations, Tech. report 25.996.
Federal Communications Commission (November). Spectrum policy task force, Technical
report, FCC.
Filio, O., Kontorovich, V. & Primak, S. (2011). Characteristics of sequencial detection in
cognitive radio networks, Proc. ICACT 2011, Phoenix Park, Korea.
Primary
Multi-Antenna User
CognitiveDetection in Multi-Antenna Cognitive Radio 163
Primary User Detection in
Radio 25
Filio, O., Kontorovich, V., Primak, S. & Ramos-Alarcon, F. (2010). Collaborative spectrum
sensing for cognitive radio: Diversity combining approach, Wireless Sensor Network
3(1): 24–37.
Filio, O., Primak, S. & Kontorovich, V. (2011). On performance of wald test in partially
coherent channels, Proc. ICCIT 2011, Aqaba, Jordan.
Gosan, N., Jemin, L., Hano, W., Sungtae, K., Sooyong, C. & Daesik, H. (2010). Throughput
analysis and optimization of sensing-based cognitive radio systems with markovian
traffic, 59(8): 4163–4169.
Haghighi, S. J., Primak, S., Kontorovich, V. & Sejdic, E. (2010). Mobile and Wireless
Communications Physical layer development and implementatiom, InTech Publishing,
chapter Wireless Communications and Multitaper Analysis: Applications to Channel
Modelling and Estimation.
Haykin, S. (2005). Cognitive radio: brain-empowered wireless communications,
23(2): 201–220.
Haykin, S., Thomson, D. & Reed, J. (2009). Spectrum sensing for cognitive radio, Proceedings
of the IEEE 97(5): 849 –877.
Jørgensen, B. (1982). Statistical Properties of the Generalized Inverse Gaussian Distribution. Lecture
Notes in Statistics. Vol. 9, Springer-Verlag, New York, Berlin.
Kang, H., Song, I., Yoon, S. & Kim, Y. (2010). A class of spectrum-sensing schemes for cognitive
radio under impulsive noise circumstances: Structure and performance in nonfading
and fading environments, 59(9): 4322 – 4339.
Kay, S. (1998). Statistical Signal Processing: Detection Theory, Prentice Hall PTR, Upper Saddle
River, NJ.
Kontorovich, V., Ramos-Alarcón, F., Filio, O. & Primak, S. (2010). Cyclostationary spectrum
sensing for cognitive radio and multiantenna systems, Wireless Communications and
Signal Processing (WCSP), 2010 International Conference on, pp. 1 –6.
Kotz, S. & Adams, J. W. (1964). Distribution of sum of identically distributed exponentially
correlated gamma-variables, The Annals of Mathematical Statistics 35(1): 277–283.
Li, H. & Han, Z. (2010a). Catch me if you can: An abnormality detection approach for
collaborative spectrum sensing in cognitive radio networks, 9(11): 3554 – 3565.
Li, H. & Han, Z. (2010b). Dogfight in spectrum: Combating primary user emulation attacks in
cognitive radio systems, part i: Known channel statistics, 9(11): 3566 – 3577.
Lin, S.-C., Lee, C.-P. & Su, H.-J. (2010). Cognitive Radio with Partial Channel State Information
at the Transmitter, 9(11): 3402–3413.
Middleton (1960). Introduction to Statistical Communications Theory, first edn, McGraw-Hill,
New York.
Mitola, J. & Maguire, G. (1999). Cognitive radio: making software radios more personal,
6(4): 13–18.
Mitran, P., Le, L. B. & Rosenberg, C. (2010). Queue-aware resource allocation for downlink
ofdma cognitive radio networks, 9(10): 3100 – 3111.
Paulraj, A., Nabar, R. & Gore, D. (2003). Introduction to Space-Time Wireless Communications,
Cambridge University Press, Cambridge, UK.
Poor, H. & Hadjiliadis, O. (2008). Quickest detection, Cambridge University Press.
Rui, Z. (2010). On active learning and supervised transmission of spectrum sharing based
cognitive radios by exploiting hidden primary radio feedback, 58(10): 2960 – 2970.
Shengli, X., Yi, L., Yan, Z. & Rong, Y. (2010). A parallel cooperative spectrum sensing in
cognitive radio networks, 59(8): 4079 – 4092.
164
26 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Simon, M. & Alouini, M.-S. (2000). Digital Communication over Fading Channels:A Unified
Approach to Performance Analysis, John Wiley & Sons, New York.
Slepian, D. (1978). Prolate spheroidal wave functions, Fourier analysis, and uncertainty. V-The
discrete case, Bell System Technical Journal 57: 1371–1430.
Song, M.-G., Kim, D. & Im, G.-H. (2010). Recursive channel estimation method for ofdm-based
cooperative systems, 14(11): 1029 – 1031.
Sun, H., Laurenson, D. & Wang, C.-X. (2010). Computationally tractable model of energy
detection performance over slow fading channels, 14(10): 924 –926.
Tang, P. K. & Han, C. (2010). On the modeling and performance of three opportunistic
spectrum access schemes, 59(8): 4070 – 4078.
Thomson, D. (1982). Spectral estimation and harmonic analysis, 70(9): 1055–1096.
van Trees, H. (2001). Detection, Estimation, and Modulation Theory: Part I, first edn, John Wiley
& Sons, New York.
von Mises, R. (1964). Mathematical theory of probability and statistics, Academic Press, New York.
Wald, A. (2004). Sequential Analysis, 6th edn, Dover Phoenix, Mineola, NY.
Wang, R. & Meixia, T. (2010). Blind spectrum sensing by information theoretic criteria for
cognitive radios, 59(8): 3806 – 3817.
Wenyi, Z. (2010a). Spectrum shaping: A new perspective on cognitive radioŮpart ii:
Coexistence with uncoded legacy transmission, 58(10): 2971 – 2983.
Wenyi, Z. M. (2010b). Spectrum shaping: a new perspective on cognitive radio-part i:
coexistence with coded legacy transmission, 58(6): 1857 – 1867.
Yücek, T. & Arslam, H. (2009). A survey of spectrum sensing algorithms for cognitive radio
applications, IEEE Comm. Surveys & Tutorials 11(1): 116–130.
Zhang, R., Lim, T. J., Liang, Y.-C. & Zeng, Y. (2010). Multi-antenna based spectrum sensing for
cognitive radios: A GLRT approach, 58(1): 84–88.
Zou, Q., Zheng, S. & Sayed, A. (2010). Cooperative sensing via sequential detection,
58(12): 6266 –6283.
8
1. Introduction
The wireless communications field is experiencing a rapid and steady growth. It is expected
that the demand for wireless services will continue to increase in the near and medium term,
asking for more capacity and putting more pressure on the usage of radio resources. The
conventional cellular architecture considers co-located multiple input multiple output
(MIMO) technology, which is a very promising technique to mitigate the channel fading and
to increase the cellular system capacity (Foschini & Gans, 1998). On the other hand,
orthogonal frequency division multiplexing (OFDM) is a simple technique to mitigate the
effects of inter-symbol interference in frequency selective channels (Uppala & Li, 2004),
(Bahai et al., 2004). However, the problems inherent to these systems such as shadowing,
significant correlation between channels in some environments and intercell interference
significantly degrade the capacity gains promised by MIMO techniques (Andrews et al.,
2007). Although theoretically attractive, the deployment of MIMO in commercial cellular
systems is limited by interference between neighbouring cells, and the entire network is
essentially interference-limited (Foschini et al., 2006; Mudumbai et al., 2009).
Conventional approaches to mitigate multi-cell interference, such as static frequency reuse
and sectoring, are not efficient for MIMO-OFDM networks as each has important drawbacks
(Andrews et al., 2007). Universal frequency reuse (UFR), meaning that all cells/sectors
operate on the same frequency channel, is mandatory if we would like to achieve spectrally-
efficient communications. However, as it is pointed out in (Foschini et al., 2006), this
requires joint optimization of resources in all cells simultaneously to boost system
performance and to reduce the radiated power. Such systems have the advantage of macro-
diversity that is inherent to the widely spaced antennas and more flexibility to deal with
intercell interference, which fundamentally limits the performance of user terminals (UTs) at
cell edges (Andrews et al., 2007). Different transmit strategies can be considered, depending
on the capacity of the backhaul channel that connects the coordinated base stations.
Recently, an enhanced cellular architecture with a high-speed backhaul channel has been
proposed and implemented, under the European FUTON project (FUTON, 2011), (Diehm et
al., 2010). This project aims at the design of a distributed broadband wireless system (DBWS)
by carrying out the development of a radio over fiber (RoF) infrastructure transparently
connecting the BSs to a central unit (CU) where centralized joint processing can be
performed. Also, multi-cell cooperation is already under study in LTE under the Coordinated
166 Recent Advances in Wireless Communications and Networks
Multipoint (CoMP) concept (3GPP LTE, 2007) that although not included in the current
releases, will probably be specified for the future ones.
In recent years, relevant works on multi-cell precoding techniques have been proposed in
(Jing et al., 2008), (Somekh et al, 2007), (Boccardi & Huang, 2007), (Zhang et al, 2009),
(Marsch & Fettweis, 2009), (Armada et al., 2009), (Kobayashi et al., 2009), (Zhang, 2010),
(Bjornson et al., 2010). The multi-cell downlink channel is closely related to the MIMO
broadcast channel (BC), where the optimal precoding is achieved by the dirty paper coding
(DPC) principle (Costa, 1983). However, the significant amount of processing complexity
required by DPC prohibits its implementation in practical multi-cell processing. Some
suboptimal multi-cell linear precoding schemes have been discussed in (Jing et al., 2008),
where analytical performance expressions for each scheme were derived considering
nonfading scenario with random phases. The comparison of the achievable rates by the
different proposed cooperative schemes showed a tradeoff between performance
improvement and the requirement for BS cooperation, signal processing complexity and
channel state information (CSI) knowledge. In (Somekh et al, 2007) the impact of joint multi-
cellsite processing was discussed through a simple analytically tractable circular multi-cell
model. The potential improvement in downlink throughput of cellular systems using
limited network coordination to mitigate intercell interference has been discussed in
(Boccardi & Huang, 2007), where zero forcing (ZF) and DPC precoding techniques under
distributed and centralized architectures have been studied. In (Zhang et al, 2009) a
clustered BS coordination is enabled through a multi-cellblock diagonalization (BD) scheme
to mitigate the effects of interference in multi-cell MIMO systems. Three different power
allocation algorithms were proposed with different constraints to maximize the sum rate. A
centralized precoder design and power allocation was considered. In (Marsch & Fettweis,
2009), the inner bounds on capacity regions for downlink transmission were derived with or
without BS cooperation and under per-antenna power or sum-power constraint. The
authors showed that under imperfect CSI, significant gains are achievable by BS cooperation
using linear precoding. Furthermore the type of cooperation depends on channel conditions
in order to optimize the rate/backhaul tradeoff. Two multi-cell precoding schemes based on
the waterfilling technique have been proposed in (Armada et al., 2009). It was shown that
these techniques achieve a performance, in terms of weighted sum rate, very close to the
optimal. In (Kobayashi et al., 2009), each BS performs ZF locally to remove the channel
interference and based on the statistical knowledge of the channels, the CU performs a
centralized power allocation that jointly minimizes the outage probability of the UTs. A new
BD cooperative multi-cells scheme has been proposed in (Zhang, 2010), to maximize the
weighted sum-rate achievable for all the UTs. Multiuser multi-cell precoding with
distributed power allocation has been discussed in (Bjornson et al., 2010). It is assumed that
each BS has only the knowledge of local CSI and based on that the beamforming vectors
used to achieve the outer boundary of the achievable rate region was derived considering
both instantaneous and statistical CSI. An overview of the theory for multi-cell cooperation
in networks has been presented in (Gesbert et al., 2010).
In this chapter we design and evaluate linear precoding techniques for multi-cell MIMO-
OFDM cooperative systems. Two approaches are considered: centralized with a high-speed
backhaul channel, where it is assumed that full CSI and data are available at the CU; and
distributed with lower speed backhaul channel, where only some channel information and
data are shared by the BSs. The precoder design aims at two goals: allow spatial users
separation and optimize the power allocation. The two problems can be decoupled leading
Multi-Cell Cooperation for Future Wireless Systems 167
to a two step design: the precoder vectors design and power allocation algorithms. In this
chapter we discuss three centralized power allocation algorithms with different complexities
and per-BS power constraint: one optimal to minimize the average bit error rate (BER), for
which the powers can be obtained numerically by using convex optimization, and two
suboptimal. In this latter approach, the powers are computed in two phases. First the
powers are derived under total power constraint (TPC). Two criterions are considered,
namely minimization of the average BER, which leads to an iterative approach and
minimization of the sum of inverse of signal-to-noise ratio for which closed form solution is
achieved. Then, the final powers are computed to satisfy the individual per-BS power
constraint.
The rest of this chapter is organized as follows: in section 2 the general scenario is described,
section 3 discusses centralized multi-cell MIMO OFDM cooperative precoding schemes,
while in section 4 distributed multi-cell MIMO OFDM cooperative schemes are proposed, in
section 5 the simulation results are presented and discussed. Finally, conclusions are drawn
in section 6.
Throughout this chapter, we will use the following notations. Lowercase letters, boldface
lowercase letters and boldface uppercase letters are used for scalars, vectors and matrices,
respectively. ( .) , ( .) , ( .) represent the conjugate transpose, the transpose and complex
H T *
conjugate operators, respectively. E [.] represents the expectation operator, I N is the identity
matrix of size N × N , CN ( .,.) denotes a circular symmetric complex Gaussian vector, [ A ] i , j
is the (i,j)th element and [ A ] i is the ith column of the matrix A .
2. Scenario description
Multi-cell architectures that assume a global coordination can eliminate the intercell
interference completely. However, in practical cellular scenarios, issues such as the
complexity of joint signal processing of all the BSs, the difficulty in acquiring full CSI from
all UTs at each BS, and synchronization requirements will make global coordination
difficult. Therefore, in this chapter we assume a clustered multi-cell cellular system as
shown in Fig. 1, where the BSs are linked to a central unit (e.g., by optical fiber) as proposed
in (FUTON, 2010). In such architecture the area covered by the set of cooperating BSs is
termed as super-cell. The area defined by all the super-cells that are linked to the same CU is
termed as serving area. The BSs corresponding to a super-cell are processed jointly by a joint
processing unit (JPU). The number of cooperating BSs per super-cell should not be high for
the reasons discussed above. In this chapter, it is assumed that the interference between the
super-cells is negligible. In fact as we are replacing the concept of cell by the one of super-
cell, this means that there will be some interference among the super-cells especially at the
edges. Two approaches can be considered to deal with the inter-super-cell interference. The
precoders are designed to remove both intra-super-cell and inter-super-cell interference, but
as discussed in (Somekh et al., 2007) this strategy reduces the number of degrees of freedom
to efficiently eliminate the intra-super-cell interference. Alternatively, the radio resource
management can be jointly performed for a large set of super-cells (the serving area) at the
CU, and thus the resource allocation can be done in a way that the UTs of each super-cell
edge interfere as little as possible with the users of other super-cells (FUTON, 2010),
justifying our assumption to neglect it. This resource allocation problem is however beyond
the scope of this chapter. In this latter approach all degrees of freedom can be used to
efficiently eliminate the intra-super-cell interference.
168 Recent Advances in Wireless Communications and Networks
Serving Area
Super Cell BS
JPU … JPU
CU
N tb
BSb
N tb UTk
N tb
... UT2 ...
BS2 BSB
N tb
UTK
UT1 ...
BS1
Backhaul Network
JPU
T
symbol vector, comprising all user symbol vectors, is xl =[ x1, l … xKT , l ]T of size N r × 1 .
The data symbol of user k on subcarrier l, is processed by the transmit precoder
N ×N
Wk , l ∈ C t rk in JPU, before being transmitted over BSs antennas. These individual precoders
together form the global transmit precoder matrix on subcarrier l , Wl = ⎡⎣ W1,l W K ,l ⎤⎦ of
size N t × N r . Let the downlink transmit power over the N t distributed transmit antennas
for user k and data symbol i , i = 1,..., N rk on subcarrier l, be pk,i,l , with p k ,l = ⎡ pk ,1, l … pk , N r , l ⎤
⎣ ⎦
and the global power matrix Pl =diag {[p 1, l p K , l ]} is of size N r × N r .
k
Under the assumption of linear precoding, the signal transmitted by the JPU on subcarrier l
is given by zl =Wl Pl1/2 x l and the global received signal vector on subcarrier l can be
expressed by,
The signal transmitted by the BS b on subcarrier l can be written as zb ,l =Wb ,l Pl1/2 x l , where
Wb ,l of size N tb × N r represents the global precoder at BS b on subcarrier l . The average
transmit power of BS b is then given by,
170 Recent Advances in Wireless Communications and Networks
K N rk N c
E ⎡ z b ⎤ = ∑ ∑∑ pk ,i ,l ⎡⎣ WbH, k ,l Wb , k ,l ⎤⎦
2
(2)
⎣ ⎦ k =1 i =1 l =1 i ,i
y k , l =H e , k , l x k , l +n k , l (7)
To estimate x k ,l , user k processes y k ,l by doing maximal ratio combining (MRC), and the
soft decision variable xˆ k ,l is given by
Multi-Cell Cooperation for Future Wireless Systems 171
xˆ k ,l =H H H H
e , k , l y k , l = H e , k , l H e , k , l x k , l +H e , k , l n k , l (8)
HH ⎡
{ ⎤
e , k , l H e , k , l = diag ⎣ pk ,1, l λk ,1, l ,… , pk , N r ,k , l λk , N rk , l ⎦ } (9)
where λk , i ,l is the ith singular value of matrix H k ,l Wk ,l . From equations (8) and (9) is easy to
see that the instantaneous SNR of data symbol i of user k on subcarrier l can be written as
pk ,i ,l λk ,i , l
SNR k ,i ,l = (10)
σ2
From (10), assuming a M-ary QAM constellations, the instantaneous probability of error of
data symbol i of user k on subcarrier l is given by (Proakis, 1995),
Pe , k ,i ,l = ψ Q ( β SNRk , i ,l ) (11)
∞
where Q( x ) = 1 / 2π ( )∫e ( − t 2 /2 )dt , β = 3 / ( M − 1 ) and ψ = ( 4 / log 2 M ) 1 − 1 / M . ( )
x
⎧ K N rk N c
⎛ 1 K N rk N c ⎛ p λ ⎞⎞ ⎪∑ ∑ ∑ p ⎡ W H W ⎤ ≤ Ptb ,b = 1,.., B
min ⎜
{pk ,i ,l } ⎜⎝ KN rk N c
∑ ∑∑ Q ⎜⎜ k ,iσ,l 2k ,i ,l ⎟ ⎟ s.t. ⎨ k = 1 i = 1 l = 1 k ,i ,l ⎣ b , k ,l b , k ,l ⎦ i ,i
⎟⎟
(12)
k =1 i =1 l =1 ⎝ ⎠⎠ ⎪p
⎩ k ,i ,l ≥ 0, k = 1,.., K , i = 1,.., N rk , l = 1,.., N c
Since the objective function is convex in pk ,i ,l , and the constraint functions are linear, this is
a convex optimization problem. Therefore, it may be solved numerically by using for
172 Recent Advances in Wireless Communications and Networks
example the interior-point method (Boyd & Vandenberghe, 2004). This scheme is referred as
centralized per-BS optimal power allocation (Cent. per-BS OPA).
B. Suboptimal power allocation approaches
Since the complexity of the above scheme is too high, and thus it could not be of interest for
real wireless systems, we also resort to less complex suboptimal solutions. The proposed
strategy has two phases: first the power allocation is computed by assuming that all BSs of
each super-cell can jointly pool their power, i.e., a TPC Pt is imposed instead and the above
optimization problem reduces to,
⎧ K N rk N c
⎪ ∑∑ pk ,i ,l ⎡ WkH,l Wk ,l ⎤ ≤ Pt
⎟ ⎟ s.t. ⎨ k∑
⎛ 1 K N rk N c ⎛ p λ ⎞⎞
min ⎜
⎜
{ k ,i ,l } ⎝ KN rk N c
p
∑ ∑∑ Q ⎜⎜ k ,iσ,l 2k ,i ,l ⎟⎟ =1 i =1 l =1
⎣ ⎦ i ,i (13)
k =1 i =1 l =1 ⎝ ⎠⎠ ⎪
⎩ pk ,i , l ≥ 0, k = 1,.., K , i = 1,.., N rk , l = 1,.., N c
K N rk N c K N rk N c
with ∑ ∑∑ pk ,i ,l ⎡ WkH,l Wk ,l ⎤ = ∑ ∑∑ pk , i ,l , note that the N r columns of
⎣ ⎦ i ,i k
w k ,l have
k =1 i =1 l =1 k =1 i =1 l=1
unit norm. Using the Lagrange multipliers method (Haykin, 1996), the following cost
function with μ Lagrange multiplier is minimized,
1 K N rk N c ⎛ p λ ⎞ ⎛ K N rk Nc ⎞
Jc ,1 =
KN rk N c
∑ ∑∑ Q ⎜⎜ k ,iσ,l 2k ,i ,l ⎟ + μ ⎜ ∑ ∑∑ pk ,i ,l − Pt ⎟
⎟ ⎜ k =1 i =1 l =1 ⎟
(14)
k =1 i =1 l =1 ⎝ ⎠ ⎝ ⎠
The powers pk ,i ,l can be determined by setting the partial derivatives of Jc ,1 to zero and as
shown in (Holakouei et al., 2011), the solution is
⎛ λ k2,i ,l ⎞
σ2
pk , i , l = W0 ⎜⎜ ⎟
2 4 ⎟
(15)
λk ,i ,l
⎝
2
(
⎜ 8πμ KN r N c σ ⎟
k
) ⎠
where W0 stands for Lambert’s W function of index 0 (Corless et al., 1996). This function
W0 ( x ) is an increasing function. It is positive for x > 0 , and W0 (0) = 0 . Therefore, μ 2 can be
K N rk Nc
determined iteratively to satisfy ∑ ∑∑ pk ,i ,l = Pt . The optimization problem of (13) is
k =1 i =1 l =1
similar to the single cell power allocation optimization problem, where the users are
allocated the same total multi-cell power, which may serve as a lower bound of the average
BER for the multi-cell with per-BS power constraint. One solution based on Lambert W
function that minimizes the instantaneous BER was also derived in the context of single user
single cell MIMO systems (Rostaing et al., 2002).
The second phase consists in scaling the power allocation matrix Pl by a factor of β in
order to satisfy the individual per-BS power constraints as discussed in (Zhang et al., 2009)
which can be given by
Ptb (16)
β=
⎛ K N rk Nc ⎞
max b =1,...,B ⎜⎜ ∑ ∑∑ pk ,i ,l ⎡⎣ Wb ,k ,l Wb , k ,l ⎤⎦ i ,i ⎟⎟
H
⎝ k =1 i =1 l =1 ⎠
Multi-Cell Cooperation for Future Wireless Systems 173
This scaled power factor assures that the transmit power per-BS is less or equal to Ptb . Note
that this factor is less than one and thus the SNR given by (10) has a penalty of
10log ( β ) dB . This scheme is referred as centralized per-BS suboptimal iterative power
allocation (Cent. per-BS SOIPA).
Although this suboptimal solution significantly reduces the complexity relative to the
optimal one, it still needs an iterative search. To further simplify we propose an alternative
power allocation method based on minimizing the sum of inverse of SNRs, and a closed-
form expression can be obtained. Note that minimizing the sum of inverse of SNRs is similar
to the maximization of the harmonic mean of the SINRs discussed in (Palomar, 2003). In this
case, the optimization problem is written as,
⎧ K N rk Nc
⎛ K N rk Nc σ2 ⎞ ⎪ ∑ ∑∑ p k ,i ,l ⎡ WkH,l Wk ,l ⎤ ≤ Pt
min ⎜ ∑ ∑∑ ⎟ s.t. ⎨ k = 1 i = 1 l = 1 ⎣ ⎦ i ,i (17)
{pk ,i ,l } ⎜⎝ k = 1 i = 1 l = 1 pk ,i ,lλk ,i , l ⎟⎠ ⎪p
⎩ k ,i ,l ≥ 0, k = 1,.., K , i = 1,.., N rk , l = 1,.., N c
Since the objective function is convex in pk ,i ,l , and the constraint functions are linear, (17) is
also a convex optimization problem. To solve it we follow the same suboptimal two phases
approach as for the first problem. First, we impose a total power constraint and the
following cost function, using again the Lagrangian multipliers method, is minimized,
K N rk N c
σ2 ⎛ K rk Nc
N ⎞
Jc ,2 = ∑ ∑∑ + μ ⎜ ∑ ∑∑ pk ,i , l − Pt ⎟ (18)
k = 1 i = 1 l = 1 pk , i , l λk , i , l
⎜ k =1 i =1 l =1 ⎟
⎝ ⎠
Now, setting the partial derivatives of Jc ,2 to zero and after some mathematical
manipulations, the powers pk ,i ,l are given by,
Pt
pk , i , l = (19)
K N rk N c
1
λk ,i ,l ∑ ∑ ∑
j =1 n=1 p =1 λ j ,n , p
The second phase consists in scaling the power allocation matrix Pl by a factor of β , using
(19) instead of (15), in order to satisfy the individual per-BS power constraints. This scheme
is referred as centralized per-BS suboptimal closed-form power allocation (Cent. per-BS
SOCPA).
The above power allocation schemes can also be used, under minor modifications, for the
case where the system is designed to achieve diversity gain instead of multiplexing gain. In
diversity mode the same user data symbol is received on each receiver antenna, increasing
the diversity order. Thus x k ,i ,l = x k , Nr ,l , i = 1...N rk − 1 and then the SNR is given by
k
N rk
pk , l ∑ λk ,i , l
i =1 pk , lα k ,l
SNR k , l = = (20)
2
σ σ2
and the power loading coefficient is computed only per user and subcarrier. In this case to
compute the power allocation coefficients we should replace λk ,i ,l by α k , l and remove the
script i in all equations.
174 Recent Advances in Wireless Communications and Networks
K
x b ,l = ∑ pb , k ,l wb , k ,l s k ,l , (21)
k =1
Nc K
E ⎡ x b ⎤ = ∑∑ pb , k ,l
2
(22)
⎣ ⎦ l =1 k =1
where x b is the signal transmitted over the N c subcarriers. The received signal at the UT k
on sub-carrier l , yk , l ∈ 1×1 , can be expressed by,
B
yk , l = ∑ hbH, k ,l xb , l + nk ,l (23)
b= 1
where hb , k ,l ∈
N ×1
tb
represents the frequency flat fading channel between BS b and UT k
( )
on sub-carrier l and nk ,l ~ CN 0,σ 2 is the noise.
The channel hb , k ,l , as for the centralized approach, can be decomposed as the product of the
fast fading hbc, k ,l and slow fading ρb , k components, i.e., hb , k , l =hbc , k ,l ρ b , k , where ρ b , k
represents the long-term power gain between BS b and user k and hbc, k ,l contains the fast
fading coefficients with CN ( 0,1) entries. The antenna channels from BS b to user k , i.e. the
components of hbc, k ,l , may be correlated but the links seen from different BSs to a given UT
are assumed to be uncorrelated as the BSs of one super-cell are geographically separated.
B B K
yk , l = ∑ pb , k ,l hbH, k , l wb , k ,l sk ,l + ∑ hbH, k , l ∑ pb , j ,l wb , j ,l s j ,l + nk ,l (24)
b =1 b =1 j = 1, j ≠ k Noise
Desired Signal Multiuser Multicell Interference
{h } H
b , j ,l
j≠k
. Such precoding vectors always exist because we assume that the number of
antennas at each BS is higher or equal to the number of single antenna UTs, i.e. N tb ≥ K .
Note that here K is the number of users that share the same set of resources. Considering an
OFDMA based system, the total number of users can be significantly larger than K, since
different set of resources can be shared by different set of users. By using such precoding
vectors, the multi-cell interference is cancelled and each data symbol on each subcarrier is
only transmitted to its intended UT. Also, for any precoding vector wb , k ,l in the null space
of {h } H
b , j ,l
j≠k
, wb , k ,l = wb , k , l e jϕ is also in the null space of {h } H
b , j ,l
j≠k
. Thus, we can choose
the precoding vectors such that the terms hbH, k ,l wb , k ,l all have zeros phases, i.e.,
∠( hbH, k ,l wb , k ,l ) = 0, ∀ ( b , k , l ) . These precoding vectors can be easily computed, so if Wb , k ,l is
k = 1,..., K , l = 1,..., N c , with the phase of the received signal at each UT aligned, is given by,
(h )
H
H
Wb , k ,l
wb , k ,l = Wb , k , l
b , k ,l
(25)
hbH,k ,l Wb , k ,l
but for N tb > K more than one vector lie in the null space of hbH, j ,l {
} . In this latter case, the
j≠k
(h )
H
H
Wb , k , l
hbH, k ,l wb , k , l = hbH, k ,l Wb , k , l = hbH,k ,l Wb , k ,l = hbeq, k ,l (26)
b , k ,l
H
hb ,k ,l Wb , k ,l
From (26) we can observe that the equivalent channel, hbeq, k , l , is a positive real number. By
using the precoding vectors defined in (25) and considering (26), the received signal in (24)
reduces to,
B
yk ,l = ∑ pb , k , l hbeq, k ,l sk ,l + nk , l (27)
b =1
176 Recent Advances in Wireless Communications and Networks
It should be mentioned that at the UT, to allow high order modulations, only the pb , k , l hbeq, k ,l
coefficients are needed to be estimated instead of all the complex coefficients of the channel,
leading to a low complexity UT design.
( ) ( )
2
Since the N tb − K + 1 components of hbH, k ,l Wb , k ,l are i.i.d. Gaussian variables, hbeq, k ,l is a
( )
chi-square random variable with 2 N tb − K + 1 degrees of freedom. Once the hbeq, k , l
variables are independent, each user is expected to achieve a diversity order of
( )
B N tb − K + 1 (assuming that all channels have the same average power, i.e.,
ρb , k = ρ , ∀(b , k ) and pb , k ,l = 1, ∀(b , k , l ) ). Also, because the received signals from different
BSs have the same phase, they are added coherently at the UTs, and thus an additional
antenna gain is achieved.
⎛ ⎛ B eq ⎞ ⎞
⎜ ⎜ ∑ pb , k ,l hb , k ,l ⎟ ⎟ ⎧ Nc K
⎪∑∑ pb , k ,l ≤ Ptb , b = 1,.., B
Nc K
⎜ 1 ⎜ ⎟ ⎟ (29)
min ∑∑ Q
{pb ,k ,l } ⎜ KN c l = 1 k = 1 ⎜
b =1
σ ⎟⎟
s.t. ⎨ l = 1 k = 1
⎜ ⎜ ⎟ ⎟ ⎪p
⎜ ⎜ ⎟⎟ ⎩ b , k , l ≥ 0, b = 1,.., B, k = 1,.., K , l = 1,.., Nc
⎝ ⎝ ⎠⎠
In this distributed approach, the objective function is convex in pb,k,l, and the constraint
functions are linear this is also a convex optimization problem. Therefore, it may be also
solved numerically by using for example the interior-point method. This scheme is referred
as distributed per-BS optimal power allocation (Dist. per-BS DOPA). In this section, the
distributed term is referred to the precoder vectors since the power allocation is also
computed in a centralized manner.
B. Suboptimal power allocation approaches
As for the centralized approach, the complexity of the above scheme is too high, and thus it
is not of interest for real wireless systems, we also resort to less complex suboptimal
solutions. The proposed strategy has two phases: first the power allocation is computed by
assuming that all BSs of each super-cell can jointly pool their power, i.e., a TPC Pt is
imposed instead and the above optimization problem reduces to,
Multi-Cell Cooperation for Future Wireless Systems 177
⎛ ⎛ B eq ⎞ ⎞
⎜ ⎜ ∑ pb , k ,l hb , k ,l ⎟ ⎟ ⎧ B Nc K
⎟ ⎟ s.t. ⎪ ∑∑∑ pb , k ,l ≤ Pt
Nc K
1
min ⎜ ∑∑ Q ⎜⎜ b =1 σ ⎨b = 1 l = 1 k = 1 (30)
{pb ,k ,l } ⎜ KN c l =1 k =1
⎟⎟
⎪p
⎜ ⎜⎜ ⎟⎟ ⎟⎟ ⎩ b , k ,l ≥ 0, b = 1,.., B, k = 1,.., K , l = 1,.., N c
⎜
⎝ ⎝ ⎠⎠
B
with Pt = ∑ Pt and using the Lagrange multipliers method, the following cost function
b
b =1
with μ Lagrange multiplier is minimized,
⎛ B eq ⎞
⎜ ∑ pb , k , l hb , k ,l ⎟
⎟ + μ ⎛⎜ ⎞
Nc K B Nc K
1
J d ,1 = ∑∑ Q ⎜ b =1 ∑∑ ∑ pb , k ,l − Pt ⎟ (31)
KN c l = 1 k = 1 ⎜ σ ⎟ ⎜ ⎟
⎜⎜ ⎟⎟ ⎝ b =1 l =1 k =1 ⎠
⎝ ⎠
The powers pb , k ,l , ∀(b , k , l ) can be determined by setting the partial derivatives of J d ,1 to
zero and as shown in (Silva et al., 2011) the solution is,
⎛⎛ B 2⎞ ⎞
2
( )
σ 2 hbeq, k ,l
2
⎜
( )
⎜ ⎜ ∑ hieq, k ,l ⎟ ⎟
⎟
pb , k ,l = 2
W0 ⎜ ⎝ i = 1 2 2 2 ⎠4 ⎟ (32)
⎛B 2⎞ ⎜ 8πμ N c K σ ⎟
⎜ ∑(h )
eq
i , k ,l ⎟ ⎜ ⎟
⎝
i =1 ⎠ ⎝ ⎠
B Nc K
Therefore, μ 2 can be determined iteratively, using constraint ∑∑ ∑ pb ,k ,l = Pt . The second
b =1 l =1 k =1
phase consists of replacing μ 2 by μb2 , b = 1,..., B in (32), and then computing iteratively
different μb2 to satisfy the individual per-BS power constraints instead, i.e., μb2 are
computed to satisfy,
⎧ Nc K
⎪∑∑ pb , k , l ≤ Ptb , b = 1,..., B (33)
⎨ l =1 k =1
⎪p
⎩ b , k ,l ≥ 0, b = 1,.., B, k = 1,.., K , l = 1,.., N c
This suboptimal scheme is referred as distributed per-BS sub-optimal iterative power
allocation (Dist. per-BS SOIPA). Although this suboptimal solution significantly reduces the
complexity relative to the optimal one, it still needs an iterative search. To further simplify
we also propose for the distributed scenario, an alternative power allocation method based
on minimizing the sum of inverse of SNRs.
In this case, the optimization problem is written as,
⎛ ⎞
⎜ ⎟ ⎧ Nc K
⎜ ⎟ ⎪∑∑ pb , k ,l ≤ Ptb , b = 1,.., B
Nc K
σ2
min ⎜ ∑∑ ⎟ s.t. ⎨ l = 1 k = 1 (34)
{pb ,k ,l } ⎜ l = 1 k = 1 ⎛ B eq ⎞ ⎟
2
⎪p
⎜ ⎜ ∑ pb , k ,l hb , k ,l ⎟ ⎟ ⎩ b , k , l ≥ 0, b = 1,.., B, k = 1,.., K , l = 1,.., N c
⎝ ⎝ b = 1 ⎠ ⎠
178 Recent Advances in Wireless Communications and Networks
The objective function is convex in pb , k ,l , and the constraint functions are linear, (34) is also
a convex optimization problem. To solve it we follow the same suboptimal two phases
approach as for the first problem.
First, we impose a total power constraint and the following cost function, using again the
Lagrangian multipliers method, is minimized,
Nc K
σ2 ⎛ B Nc K ⎞
J d ,2 = ∑ ∑ + μ ⎜ ∑∑ ∑ pb , k ,l − Pt ⎟ (35)
2 ⎜ ⎟
l =1 k =1 ⎛ B ⎞ ⎝ b =1 l =1 k =1 ⎠
⎜∑ pb , k , l hbeq, k , l ⎟
⎝ b =1 ⎠
Now, setting the partial derivatives of J d ,2 to zero and after some mathematical
manipulations, the powers pb , k ,l can be shown to be given by,
(h )
eq 2
b , k ,l
pb , k ,l = (36)
3
⎛ B ⎞
( )
2
β ⎜ ∑ hieq, k ,l ⎟
⎝ i =1 ⎠
where β = μ / σ 2 . As for the first approach, (36) can be re-written by replacing β by
β b , b = 1,..., B , which are computed to satisfy the individual per-BS power constraints and
the closed-form solution achieved is then given by,
( )
2
Ptb hbeq, k ,l
pb , k ,l = (37)
(h )
2
3 eq
⎛ B ⎞ Nc K
( ) ⎟⎠ ∑ ∑
2 b, j,p
⎜ ∑ hi , k ,l
eq
3
⎝ i =1 ⎛ B eq ⎞
( )
p =1 j =1 2
⎜ ∑ hi , j , p ⎟
⎝ i =1 ⎠
This second suboptimal scheme is referred as distributed per-BS closed-form power
allocation (Dist. per-BS SOCPA).
The precoder vectors are designed by assuming that BSs have only knowledge of local CSI.
However, since we consider a centralized power allocation, to compute all powers the
hbeq, k ,l , ∀b,k,l coefficients should be available at the joint processing unit (JPU). In the
distributed multi-cell system each BS should send a real vector of size KN c to the JPU. Note
that in the centralized approach discussed in section 3, each BS should send to the JPU a
complex vector of size N tb KN c , i.e. 2 N tb more information.
Although, in this section single antenna UTs were assumed, the formulation can be
straightforwardly extended for multiple antenna UTs just by considering each antenna as a
single antenna UT. The main difference is that the long term channel power will be the same
for all antennas belonging to the same UT.
modified taps’ delays, used according to the sampling frequency defined on LTE standard
(3GPP LTE, 2007). This time channel model was extended to space-time by assuming that
the distance between antenna elements of each BS is far apart to assume uncorrelated
channels. To evaluate centralized and distributed schemes, the follwoing scenarios are
considered:
• Scenario 1, we assume that each supercell has 2 BSs, B = 2 which are equipped with 2
antennas, N tb = 2 and 2 UTs, K = 2 , equipped with 2 antennas, N rk = 2 .
• Scenario 2, we assume that each supercell has 2 BSs, B = 2 which are equipped with 2
antennas, N tb = 2 and 2 single antenna UTs, K = 2 .
• Scenario 3, we assume that each supercell has 2 BSs, B = 2 which are equipped with 4
antennas, N tb = 4 and 2 single antenna UTs, K = 2 .
The main parameters used in the simulations are, FFT size of 1024; number of resources, i.e.,
available subcarriers ( N c ) shared by the K users set to 16; sampling frequency set to 15.36
MHz; useful symbol duration is 66.6 μs; cyclic prefix duration is 5.21 μs; overall OFDM
symbol duration is 71.86 μs; subcarrier separation is 15 kHz and modulation is 4-QAM. We
assume that each UT is placed on each cell. The long-term channel powers are assumed to
be ρ b , k = 1, b = k for the intracell links, and ρ b , k , b ≠ k are uniformly distributed on the
interval [ 0.2 , 0.6 ] for the intercell links. All the results are presented in terms of the average
BER as a function of per-BS SNR defined as SNR = Ptb / σ 2 .
-2
10
-3
10
4 8 12 16 20 24 28
per-BS SNR (dB)
-1
10
Cent. per-BS NPA
Cent. per-BS SOCPA
Cent. per-BS SOIPA
-2
Cent. per-BS OPA
10 Cent. TPC OPA
-3
BER
10
-4
10
-5
10
2 4 6 8 10 12 14
per-BS SNR (dB)
collected by each receive antenna of each UT. From this figure we basically can point out the
same conclusions as for the results obtained in the previous one. However, one important
thing that can be found out by comparing multiplexing and diversity modes is that the
difference between Cent. per-BS NPA curves and power allocation based curves (e.g. Cent.
per-BS SOIPA) is bigger in multiplexing mode (approximately 4dB) than diversity mode
(1.5dB) considering a BER=10-2. This can be explained by the fact that in the diversity mode
the equivalent channel gain of each data symbol is the addition of N rk individual channel
gains and thus the dynamic range of the SNRs of the different data symbols is reduced, i.e.,
somewhat leads to an equalization of the SNRs.
-3
10
-4
10
-5
10
2 4 6 8 10 12 14 16 18 20
per-BS SNR (dB)
Fig. 5. Performance evaluation of the proposed distributed multi-cell schemes, for scenario 2
182 Recent Advances in Wireless Communications and Networks
of the suboptimal Dist. per-BS SOIPA and optimal Dist. per-BS OPA is very close (penalty
less than 0.1dB), but the gap between these two schemes and the suboptimal Dist. per-BS
SOCPA is considerable. These results show that the Dist. per-BS SOIPA outperforms the
Dist. per-BS SOCPA for large number of subchannels. We can observe a penalty of
approximately 0.6 dB of the Dist. per-BS SOCPA scheme against the Dist. per-BS SOIPA for
a BER=10-3. Also, a gain of approximately 4.2 dB of the suboptimal Dist. per-BS SOIPA
scheme against the Dist. per-BS EPA is obtained, considering BER=10-3.
6. Conclusion
In this chapter we proposed and evaluated centralized and distributed multi-cell multiuser
precoding schemes for MIMO OFDM based systems. The proposed precoder vectors were
computed either jointly and centraly at JPU benefiting from high DoF or on each BS in a
distributed manner allowing a low feedback load over the backhaul network, while the
power allocation was computed in a centralized fashion at the JPU.
The criteria considered was the minimization of the BER and two centralized power
allocation algorithms with per-BS power constraint: one optimal that can be achieved at the
expense of some complexity and one suboptimal with lower complexity aiming at practical
Multi-Cell Cooperation for Future Wireless Systems 183
-1
10
Distributed precoding
-2
10
BER
-3
10
Centralized precoding
-4
10
per-BS EPA
per-BS SOCPA
per-BS SOIPA
per-BS OPA
-5
TPC OPA
10
2 4 6 8 10 12 14 16 18 20
per-BS SNR (dB)
-1
10
Distributed precoding
-2
10
-3
BER
10
Centralized precoding
-4
10
per-BS NPA
per-BS SOCPA
per-BS SOIPA
per-BS OPA
TPC OPA
-5
10
-2 0 2 4 6 8 10
per-BS SNR (dB)
implementations. In both the optimal (per-BS OPA) and the suboptimal (per-BS SOIPA), the
computation of the transmitted powers required an iterative approach. To circumvent the
need for iterations further proposed another suboptimal scheme (per-BS SOCPA), where the
power allocation was computed in order to minimize the sum of inverse of SNRs of each UT
allowing us to achieve a closed-form solution.
The results have shown that the proposed multi-user multi-cell schemes cause significant
improvement in system performance, in comparison with the case where no power
allocation is used. Also for both approaches, the performance of the proposed suboptimal
algorithms, namely the per-BS SOIPA approach, is very close to the optimal with the
advantage of lower complexity. Also, the performance of the distributed approach tends to
the one achieved by the centralized, when the number of DoF available tends to the number
of DoF available in the centralized system. Therefore, distributed schemes can be interesting
in practice when the backhaul capacity is limited.
It is clear from the presented results the suboptimal proposed either distributed or
centralized precoding schemes allow a significant performance improvement with very low
UT complexity and moderate complexity at both BS and JPU, and therefore present
significant interest for application in next generation wireless networks for which
cooperation between BSs is anticipated.
7. Acknowledgments
The authors wish to acknowledge the support of the Portuguese CADWIN project,
PTDC/EEA TEL/099241/2008, and Portuguese Foundation for Science and Technology
(FCT) grant for the second author.
8. References
Andrews, J. G.; Choi, W. & Heath, R. W. (2007). Overcoming interference in spatial
multiplexing MIMO cellular networks, IEEE Wireless Communication Magazine, vol.
47, no. 6, pp. 95-104, 2007.
Armada, A. G.; Fernándes, M. S. & Corvaja, R. (2009). Waterfilling schemes for zero-forcing
coordinated base station transmissions, in Proceeding of IEEE GLOBECOM, 2009.
Bahai, A. R. S.; Saltzberg, B. R. & Ergen, M. (2004). Multi-carrier digital communications theory
and applications of OFDM, Springer, New York.
Bjornson, E.; Zakhour, R.; Gesbert, D. & Ottersten, B. (2010). Cooperative multi-cell
precoding: rate region characterization and distributed strategies with
instantaneous and statistical CSI, IEEE Transaction on Signal Processing, vol. 58, no.
8, pp. 4298-4310, 2010.
Boccardi, F. & Huang, H. (2007). Limited downlink network coordination in cellular
networks, In Proeeding IEEE PIMRC’07, 2007.
Boyd, S. & Vandenberghe, L. (2004). Convex optimization, Cambridge: Cambridge University
Press, 2004.
Corless, R. M.; Gonnet, G. H.; Hare, D. E. G.; Jeffrey, D. J. & Knuth, D. E. (1996). On the
Lambert W function, Advances in Computer & Mathematics, vol. 5, pp. 329–359, 1996.
Costa, M. H. M. (1983). Writing on dirty paper, IEEE Transaction on Information Theory, vol.
29, no. 3, pp. 439–441, 1983.
Multi-Cell Cooperation for Future Wireless Systems 185
Diehm, F.; Marsch, P. & Fettweis, G. (2010). The FUTON prototype: proof of concept for
coordinated multi-point in conjunction with a novel integrated wireless/optical
architecture, In Proceeding of IEEE WCNC’10, 2010.
Foschini, G. J. & Gans, M. J. (1998). On limits of wireless communications in a fading
environment when using multiple antenna, Wireless Personal Communication
Magazine, vol. 6, no. 3, pp. 311-335, 1998.
Foschini, G. J. et al. (2006). Coordinating multiple antenna cellular networks to achieve
enormous spectral efficiency, in IEEE Proceedings on Communications, Vol. 153, No.
4, pp. 548-555, August 2006.
FUTON, European ICT project. (2007). Available from: https://www.ict-futon.eu.
Gesbert, D.; Hanly, S.; Huang, H.; Shamai, S.; Simeone, O. & Yu, Wei (2010). Multi-cell
MIMO cooperation networks: A new look at interference, IEEE Journal on Selected
Areas in Communications, vol. 28, no. 9, pp. 1380-1408, Dec. 2010.
Guidelines for the evaluation of radio transmission technologies for IMT-2000. (1997).
Recommendation ITU-R M.1225, 1997.
Haykin, S. (1996). Adaptive Filter Theory, 3rd Ed., Prentice Hall, 1996.
Holakouei, R; Silva, A & Gameiro, A. (2011). Multiuser precoding techniques for a
distributed broadband wireless system, Accepted to Telecommunication System
Journal, special issue in WMCNT, Springer.
Silva, A; Holakouei, R & Gameiro, A. (2011). Power Allocation Strategies for Distributed
Precoded Multicell Based Systems, EURASIP Journal on Wireless Communications and
Networking, special issue in Recent Advances in Multiuser MIMO System, Vol. 2011,
2011.
Jing, S.; Tse, D. N. C.; Sorianga, J. B.; Hou, J.; Smee, J. E. & Padovani, R. (2008). Multicell
downlink capacity with coordinated processing, EURASIP Journal of Wireless
Communicaion Network, 2008.
Karakayali, M.; Foschini, G. & Valenzuela, G. (2006). Network coordination for spectral
efficient communications in cellular systems, IEEE Wireless Communication
Magazine, vol. 13, no. 4, pp. 56-61, 2006.
Kobayashi, M.; Debbah, M. & Belfiore, J. (2009). Outage efficient strategies in network
MIMO with partial CSIT, in Proceeding of IEEE ISIT, pp. 249-253, 2009.
Lozano, A.; Tulino, A. M. & Verdú, S. (2008). Optimum Power Allocation for Multiuser
OFDM with Arbitrary Signal Constellations, IEEE Transactions on Communications,
vol. 56, no. 5, pp. 828-837, 2008.
Marsch, P. & Fettweis, G. (2009). On Downlink network MIMO under a constrained
backhaul and imperfect channel knowledge, in Proceeding of IEEE GLOBECOM,
2009.
Mudumbai, T. R.; Brown, D. R.; Madhow, U. & Poor, H. V. (2009). Distributed transmit
beamforming: challenges and recent progress, IEEE Communication Magazine, vol.
47, no. 2, pp. 102-110, 2009.
Palomar, D. P.; Cioffi, J. M. & Lagunas, M. A. (2003). Joint Tx-Rx beamforming design for
multicarrier MIMO channels: A unified framework for convex optimization, IEEE
Transactions on Signal Processing, vol. 51, no. 9, pp. 2381-2401, 2003.
Proakis, J. (1995). Digital Communications, 3 rd Ed., McGrraw-Hill, New York, 1995.
Rostaing, P.; Berder, O.; Burel, G. & Collin, L. (2002). Minimum BER diagonal precoder for
MIMO digital transmissions, Elsevier Signal Processing, vol. 82, no. 10, pp. 1477-1480,
2002.
186 Recent Advances in Wireless Communications and Networks
Somekh, O.; Zaidel, B. & Shamai, S. (2007). Sum rate characterization of joint multiple cell-
site processing, IEEE Transaction of Information Theory, vol. 53, no. 12, pp. 4473- 4497,
2007.
Third Generation Partnership Project, (2007). LTE Physical Layer - General Description, no
3. 3GPP TS 36.201 v8.1.0, 2007. Available from: http://www.3gpp.org/LTE.
Uppala, L. S. & Li, J. (2004). Designing a mobile broadband wireless access network, IEEE
Signal Processing Magazine, vol. 21, no. 5, pp. 20-28, 2004.
Zhang, J.; Chen, R.; Andrews, J. G.; Ghosh, A. & Heath Jr., R. W. (2009) Networked MIMO
with Clustered Linear Precoding, IEEE Transaction on Wireless Communication, vol.
8, no. 4, pp. 1910-1921, 2009.
Zhang, R. (2010). Cooperative multi-cell block diagonalization with per-base-station power
constraints, in Proceeding of IEEE WCNC, 2010.
Part 2
Upper Layers
9
1. Introduction
The fourth-generation (4G) (Liu, 2004) system is expected to support fully integrated
services and ubiquitous access anytime and anywhere. Instead of developing a new uniform
standard for all wireless communication systems, some endeavors in 4G research focus on
the seamless integration of various existing wireless communication networks, such as
integrated Wireless LAN (WLAN) and the third-generation (3G) cellular networks.
3G cellular networks provide wide coverage and universal roaming services with limited
data rate up to 2 Mbps (Liu, 2006, 2007). With careful network planning and mature
admission control algorithms, the achievable Quality of Service (QoS) level of 3G cellular
networks is relatively high. On the other hand, WLANs provide low-cost, high data rate
wireless access within limited hotspot-area. Since WLAN is originally designed for best-
effort data services with contention-based access, it is difficult to achieve strict QoS
provisioning for real-time services, such as voice service (Song et al., 2006).
Due to different network capacities, user mobile patterns, vertical handoffs, and QoS levels,
the integrated WLAN and 3G cellular networks require a new call admission control scheme
to provide QoS provisioning and efficient resource utilization. Currently there are three major
architectures for internetworking between 3G cellular cellular networks and WLAN
(Ahmavaara et al., 2003). But they are all lack of joint resource management and admission
control schemes in integrated environment. Previous research work on admission control in
homogeneous cellular networks and heterogeneous integrated networks are investigated with
technical descriptions on their pros and cons. It is shown that more endeavors are needed on
joint congestion control, load balance, and high-level QoS provisioning in integrated
networks.
In this chapter, a novel joint call admission control (CAC) scheme is proposed to support
both voice and data services with QoS provisioning. Due to different network service
characteristics, 3G cellular network is defined to be a voice-priority network where voice
services have higher priority for resource allocation than data services, while WLAN is
defined as data-priority network where data services have higher priority than voice services.
A joint call admission policy is derived to support heterogeneous network architecture,
service types, QoS levels, and user mobility characteristics. Furthermore, to relieve traffic
congestion in cellular networks, an optimal channel searching and replacement algorithm
and related passive handoff techniques are further developed to balance total system traffic
190 Recent Advances in Wireless Communications and Networks
between WLAN and 3G cellular network, as well as to reduce average system QoS cost,
such as system blocking probability. A one-dimensional Markov model for voice service is
also developed to analyze interworking system performance metrics. Both theoretical analysis
and simulation results show that average system QoS costs, such as overall blocking and
dropping probabilities, are reduced, and our scheme outperforms both traditional disjoint
static CAC scheme and joint CAC without optimization.
2. Technical background
This section briefly describes concepts, architecture and vertical handoffs in integrated
WLAN and cellular networks.
Internet
GGSN
Loose Coupling
UMTS Core
Nework
Tight Coupling
SGSN
RNC
Cell SA
integrated WLAN and 3G cellular networks, seamless vertical handoffs and call admission
control must be considered as dependent and joint mechanisms to ensure both high-level
call service quality and efficient resource utilization in interworking environment.
put into a queue while handoff calls are dropped (Lau & Maric, 1998; Ahmed, 2005).
Although queuing schemes can avoid high blocking probability or dropping probability due
to increased call intensity for a short period, it is not realistic in a practical system in which a
handoff call may not hold in a queue for a long time because of fast signal fading, and new
calls will leave the queue system due to users’ impatience.
Guard Channels
Voice handoff
Calls
Voice New Calls Common Channels
Data Calls
Channel Pool
Fig. 3. Guard channel reservation based scheme for voice and data services
QoS estimation based approaches: CAC in cellular networks calculates the future resource
requirements for new calls and handoff calls based on user mobility and call intensity
estimation (Zhao et al., 2003; Koodli & Puuskari, 2001). A weighted overall handoff failure
probability for all cells is calculated as an indicator for long-term statistics of successful call
completion. The suggested schemes take the overall weighted handoff failure probability as
the criterion for new call admission. Although those schemes can improve the efficiency of
admission control and resource utilization, they cause nontrivial calculation complexity, and
too many real-time control messages among cells may incur large signaling traffic and
communication overhead. Furthermore, rough estimation techniques used in these schemes
may cause erroneous decisions for call requests in a real world scenario, which will
deteriorate the QoS level in the system.
Bandwidth degradation CAC: Some methods are proposed to degrade some connections
adaptively when there are no more resources available for incoming new calls or handoff
calls. For example, longest calls in the system are degraded to free resource for handoff calls
(Jia & Mermelstein, 1996). Another proposal includes an algorithm in which each admitted
connection degrades to a lower bandwidth level according to weights (Ahmed, 2005). Other
proposals reduce the bandwidth of latest admitted connections. However, bandwidth
Joint Call Admission Control in Integrated Wireless LAN and 3G Cellular Networks 195
degradation can only reduce the bandwidth of varied-bit-rate (VBR) and non-real-time
(NRT) services for each individual, and is not suitable for constant-bit-rate (CBR)
connections. Furthermore, though these schemes can reduce the blocking probability, the
QoS level in the network cannot avoid deteriorating after degradation, and the overall
utilization ratio may not be improved.
several drawbacks of this policy method, such as high latencies to fetch context information
during the candidate access point classification procedure, and no optimization policy is
defined for resource allocation in integrated networks.
Nework health
t
monitor
Network policy engine
Network capacities
BER Network selector
Enforce PDP
Call blocking probabilities decision
Call dropping probability Network Policy
PDP PEP
Policy repository
minimized by admitting passive vertical handoffs with a probability, and it is proven that
there exists at least one optimal value for the target passive handoff probability. In this way,
the total traffic is balanced in the interworking environment as well as the resource
utilization is optimized. A linear programming solution is proposed for searching the
optimal admission probability for passive vertical handoff, with performance comparsion to
the traditional disjoint guard channel CAC. Numerical and simulation results demonstrate
that the optimal CSR (oCSR), outperforms disjoint guard channel CAC and original CSR
algorithms in both QoS provisioning and system resource utilization.
Phone A NodeB
Phone B
AP
UMTS Cell Phone C Phone E
VH_U
Phone D
VH_W
WLAN
service is represented as an average voice packet generation rate bv and the maximum
tolerable transmission delay Dv. On the other hand, QoS constraint for data service i is
mainly defined as the minimum throughput Ti, since data services are assumed as best
effort services and not sensitive to the transmission delay.
With careful network planning and mature admission control algorithms, the UMTS
network is assumed to support both voice and data services with QoS provisioning.
However, due to limited bandwidth and high cost per bit, voice calls are assigned with
higher priority than data services in cellular networks, and data services are regarded as
best-effort services. So we set the proportion Rc (0< Rc < 1) as the maximum ratio of
resource usage assigned to all data services in the cellular network.
On the other hand, the traditional WLAN is designed to support only best-effort data
services. To match the QoS difference between the cellular network and the traditional
WLAN, we assume that the IEEE 802.11e WLAN standard is adopted and our polling
algorithm named IIT (Liu & Zhou, 2006) is used to guarantee bandwidth and delay
requirements for voice services in WLAN while enhanced distributed coordination function
(EDCF) to support data services. Since normally mobile users connect to WLAN for
high-speed data transmission with low cost, we assume that data services in WLAN have
higher priority than voice services. Compared to cellular network, the proportion Rw (0 <
Rw < 1), is set as the maximum ratio of resource usage assigned to all voice services in the
WLAN.
Based on user mobility characteristics, voice call requests in a UMTS cell can be classified
into the following two categories: vertical handoffs from the overlaid WLAN to the UMTS,
which is denoted as VH_U, and new calls from this UMTS cell. Since a WLAN network is
assumed to be overlaid by a UMTS cell, there are also two categories in admission requests:
new call requests for WLAN access, and vertical handoffs from the surrounding UMTS cell,
denoted as VH_W, as shown in Fig. 5. To reduce complexity, the horizontal handoffs from
nearby cellular cells to the target cell are assumed to be equal to horizontal handoffs out of
the cell to neighbor cells so that we do not consider horizontal handoffs in this work. We
further assume that QoS level in the integrated networks are mainly bottlenecked by the
total bandwidth in the integrated networks. Therefore, the QoS performance considered in
this work includes blocking probability of new call requests and dropping probability of
handoff call requests.
cellular network should be assigned a higher priority than new call requests and data
vertical handoff from WLAN to UMTS, to avoid possible voice dropping in the cellular
service area. Here, we adopt guard channel scheme (Fang & Zhang, 2002) to reserve some
bandwidth for voice VH_U handoff. However, for any data VH_U handoff, no matter how
high data rate it gets in WLAN, it become best-effort service when the user move from
WLAN to cellular network. So data VH_U is assigned same priority as any new call requests
is in cellular network.
New call
handoff call
request
request
checking
service area
VH_W ?
No
In overlay Yes
area ? Yes
CAC
in UMTS CAC in
No CAC WLAN
in WLAN
CAC
in UMTS Yes
Reject ? No
Yes Reject ?
Reject ?
Yes
Reject ? No
Yes
Drop the call
No Keep original
Block the connection with
No
call Admitted in Admitted in Admitted in UMTS
WLAN UMTS WLAN
Admitted in
UMTS
(a) New call admission control flow (b) Handoff call admission control flow
connections staying in WLAN area to the WLAN, as shown in Figure 8. Specifically, if there
exists an ongoing cellular connection and the mobile terminal residing in the WLAN area,
and there is still bandwidth available in the WLAN at the same time, the cellular connection
will be switched to the WLAN by vertical handoff, and then the incoming call request will
take the released bandwidth in cellular network to avoid being blocked or dropped. This
kind of vertical handoff is called “passive“ because it is initiated by the system resource
management instead of by users or signal fading.
To achieve the fairness among different service connections, CSR checks the difference of
QoS provisioning in both networks before switching a cellular connection to WLAN. If there
is no QoS degradation during switching and WLAN can guarantee QoS provisioning for all
existing ongoing calls, then the bandwidth or channel is released.
Considering the CSR algorithm may increase the blocking probability in the WLAN (i.e.,
deteriorate the QoS in the WLAN by forwarding more traffics from the cellular network to
WLAN). We further assume that there is a call admission probability for passive vertical
handoff, which is determined by the system status of cellular network and WLAN, and QoS
levels. The pseudocode of the CSR is shown in Fig. 8.
prabability and handoff dropping probability. To reduce the complexity, we focus on voice
services in the integrated WLAN and 3G UMTS cellular networks, with fixed total channels
in UMTS cell and bandwidth in WLAN.
(ω n + ω v )G ⋅ (ω v ) C −G
Pv = π c (C ) = C!
(1)
G
(ω n + ω v ) i C
(ω n + ω v )G (ω v ) i−G
∑i =0 i!
+ ∑
i =G +1 i!
C
(ω n + ωv )G ⋅ (ω v ) i −G
C ∑ i!
Pn = ∑ π c (i ) = i =G
(2)
G
(ω n + ω v ) i C
(ω n + ωv )G (ω v ) i −G
∑ ∑
i =G
+
i =0 i! i =G +1 i!
where π c ( i ) represents the stationary state of occupied channel i. The detailed derivations
for above equations are shown in our previous work (Liu & Zhou, 2007).
equals to C, an incoming vertical handoff from WLAN can also be admitted in cellular
network if there is a successful channel replacement in the WLAN. To avoid over-utlization
on WLAN, it is assumed that a call request can get admission with probability δ that is
determined by the total number of occupied channels in the cell, the probability for mobile
terminals using ongoing cellular connection while located in the WLAN, and the state of
current occupied channels in the WLAN. Based on the above descriptions, we can get a
Markov chain model for the cellular network, shown in Fig 9(b).
Using CSR, call request blocking or dropping in a cellular network will happen in following
two scenarios:
Scenario 1: There is no idle channel available in cellular network, and no cellular
connections residing in the WLAN;
Scenario 2: There is no idle channel available in cellular network, and no channel within the
WLAN, although there is a cellular connection residing in the WLAN.
So Let Pf be the probability of an ongoing cellular call remaining in a WLAN, which is
assumed to be determined by a user’s preference for vertical handoff and mobility velocity.
Let ψ c (i ) be the probability that there is no cellular connection within the WLAN when the
number of total occupied channels in the cellular network is i.
⎛i⎞
ψ c ( i ) = ⎜ ⎟ ⋅ ( p f )0 ⋅ (1 − p f )i (3)
⎝0⎠
If the probability for finding a cellular connection staying in the WLAN is set as 1, which
means always finding available cellular connection successfully, the traffic intensity in the
WLAN depends on not only original traffic inside, but also on passive handoffs from the
cell. So the traffic intensity ρ (i ) in the WLAN is a function of state i in UMTS cell and can be
expressed as,
ρ (i ) = I 1 (i ) ⋅ ( ρn + ρ v ) + I 2 (i ) ⋅ ( ρn + ρ v + ωn ) + I 3 (i ) ⋅ ( ρn + ρ v + ωn + ωv ) (4)
where ρ n is original traffic intensity of new call requests in WLAN, ρ v is original call
intensity of vertical handoff requests from UMTS to WLAN. Ii() are state indicator functions:
I 1 (i ) equals to 1 when state i smaller than guard channel Gc, otherwise equals to zero.
I 2 (i ) equals to 1 when state i larger than Gc-1 and smaller than total channels C in UMTS
cell, otherwise equals to zero. I 3 (i ) equals to 1 when state i equals to total channels C in
UMTS cell, otherwise equals to zero.
Since in WLAN vertical handoffs and new calls are assigned with same priorities for
resource, the blocking probability of new call is same to dropping probability of vertical
handoffs. Considering voice service, the blocking probability pbw in WLAN is determined
by incoming traffic intensity ρ (i ) , which is affected by traffic intensities in both UMTS cell
and WLAN, the probability of an ongoing cellular call remaining in a WLAN, as well as
admission probability of passive handoffs.
According to above definitions of the two scenarios, the blocking probability for new call
requests and dropping probability for vertical handoffs from WLAN to cellular network can
be approximated as,
C
{ }
Pn = ∑ ψ c (i ) + [ 1 − ψ c (i )] ⋅ pbw (i ) ⋅ π c ( i )
i =G
(5)
204 Recent Advances in Wireless Communications and Networks
{ }
Pv = ψ c (C ) + [ 1 − ψ c (C )] ⋅ pbw (C ) ⋅ π c (C ) (6)
Notations:
ωn + ωv ω n + ωv ω n + ωv ωv ωv
0 1 Gc C
1 Gc C
(a) State -transition model for Disjoint Guard Channel scheme in UMTS
δ ⋅ ωn δ ⋅ ωn
ω n + ωv ω n + ωv ω n + ωv ωv ωv ωv
δ ⋅ (ωn + ωv )
0 1 G G+1 C
1 2 G
G+1 G+2 C
(b) State -transition model for Channel Searching and Exchange scheme in UMTS
minimize average weighted system cost with constraint on probability of passive vertical
handoffs, as shown in follows:
W1 ⋅ Pn ⋅ ωn + W2 ⋅ Pv ⋅ ωv + W3 ⋅ Pbw ⋅ ( ρn + ρ v )
Minimize Pave =
ωn + ωv + ρn + ρ v
s.t. 0 ≤ δ ≤ 1
where W1, W2, and W3 are cost weights for the blocking probability in the cellular network,
the dropping probability in cellular network, and the blocking probability in the WLAN,
respectively.
It is easy to prove that blocking probability in WLAN is a monotonically increasing
continuous function of δ , while blocking probability and dropping probability in UMTS
cell are continuous decreasing functions over δ in the interval between zero and one. So the
weighted cost function is also a continuous function over the same interval. According to
the Extreme Value Theorem, target cost function has a minimum and a maximum value
over the interval 0 ≤ δ ≤ 1 . So it is feasible to find out a optimal admission probability for
passive handoff which minimizes the integrated system cost with linear programming. Here
we should notice that there may be more than one optimal value for the admission
probability.
Bc Bw Gc bv Rc Rw pf W1 W2 W3 Ti
20 30ms 18 30kb 0.2 0.2 0.3 1.0 2.0 1.0 30kb
Table 1. System parameters
Fig. 10 shows the changes in the optimal admission probability for passive vertical handoff
as handoff intensity in the cell varies. We set new call intensity in UMTS cell ω n = 10, new
call intensity in WLAN ρn = 10, vertical handoff intensity ρ v = 5. Since the weight of
handoff dropping is larger than both the weights of blocking calls in cellular network and in
WLAN, the optimal admission probability increases quickly for W3 = 1.3 and W3 = 2.0, and
is 1 when the handoff intensity is larger than 45. In other words, the integrated system
attempts to allocate each idle resource in the WLAN to handoff in cellular network to avoid
larger system cost caused by dropping probability.
In contrast, when new call intensity ρn in the WLAN increases ( ωv is set as 5), the
admission probability for W3 = 2.0 and W3 = 1.3 is reduced to zero, but remains 1 for W3 = 1,
as shown in Figure 11. Again, it is shown that CSR can adjust the traffic intensity among the
two networks to avoid overloaded situation in the WLAN. For W3 = 1.0, since the cost for
blocking a passive handoff is no more than the costs of blocking a new call or dropping a
connection in cellular network, the passive handoff always get an admission into the WLAN.
206 Recent Advances in Wireless Communications and Networks
0.6
0.4
0.2
0
20 40 60 80 100
Handoff intensity in cellular network
Fig. 10. Optimal admission probability for passive handoff vs handoff intensity in cellular
Optimal Admission Probability
W3 = 1.3
0.8 W3 = 2.0
W3 = 1.0
0.6
0.4
0.2
0
20 40 60 80 100
New Call Intensity in WLAN
Fig. 11. Optimal admission probability for passive handoff vs new call intensity in WLAN
To validate the analytical results, simulations were performed based on the OPNET tool, an
efficient discrete event-driven simulator. Fig. 12 shows the average system cost for DGC,
CSR, and optimal CSR (oCSR), when new call intensity in UMTS, ωn , is set as 30. In this
case, the optimal admission probibility for passive handoff δ can be obtained as 0.078. DGC
has the highest system cost due to its disjoint resource allocation, while oCSR can achieve
the optimal resource allocation with minimum average system cost. Since the cost of oCSR is
less than that of CSR, original CSR in UMTS cellular network is a sub-optimal solution for
the overall resource allocation for integrated networks.
Joint Call Admission Control in Integrated Wireless LAN and 3G Cellular Networks 207
0.7
DGC
CSR
0.5
0.4
0.3
0.2
0.1
0
0 2 4 6 8 10 12
Time (seconds) x 10
4
0.81
DGC
oCSR
0.80
0.79
Utilization
0.78
0.77
0.76
0.75
0.74
0.73
20 30 40 50 60
New call intensity in cellular network
1
DGC
oCSR
0.9
Blocking probability
0.8
0.7
0.6
0.5
0.4
0.3
20 30 40 50 60
New call intensity in cellular network
Fig. 14. Blocking probability with optimal CSR and DGC
0.7
DGC
oCSR
0.6
Dropping probability
0.5
0.4
0.3
0.2
0.1
0
10 20 30 40 50
Handoff call intensity
Fig. 15. Dropping probability with optimal CSR and DGC
Similarly, Fig. 15 shows the handoff dropping probability in the cell as the handoff intensity
increases. Due to limited resources in the cellular network, both dropping probabilities
increase. However, the dropping probability of the DGC is always greater than the
dropping probability of the oCSR, since some handoffs are transferred to the WLAN, except
in the case vertical handoff equals to 10. Since the optimal admission probability is equal to
zero when ωv = 10, there is no passive handoff from the cellular network to the WLAN and
both dropping probabilities are the same.
6. Conclusion
In this chapter, we introduce the next-generation call admission control schemes in
integrated WLAN / 3G cellular networks. Technical background and previous works on call
Joint Call Admission Control in Integrated Wireless LAN and 3G Cellular Networks 209
7. References
Ahmavaara, K.; Haverinen, H. & Pichna, R. (2003), Interworking Architecture between
3GPP and WLAN Systems, IEEE Communications Magazine, Vol. 41, No.11, (Nov
2003), pp. 74 – 81, ISSN 0163-6804
Ahmed, M. (2005), Call admission control in wireless networks: a comprehensive survey,
IEEE Communications Surveys & Tutorials, Vol. 7, No. 1, May 2005, pp. 50-69, ISSN
1553-877X.
Fang, Y. & Zhang, Y. (2002), Call admission control schemes and performance analysis in
wireless mobile networks, IEEE Transactions on vehicular Technology, vol. 51, No.2,
(March 2002), pp. 371-382, ISSN 0018-9545
Guerrero, J. & Barba, A. (2008), Policy-based Network Management Reference Architecture
for an Integrated Environment WLAN-3G, IEEE Latin America Transactions, Vol. 6,
No. 2, (June 2008), pp. 229-234, ISSN 1548-0992
Jia, D. & Mermelstein, P. (1996), Adaptive Traffic Admission for Integrated Services in
CDMA Wirelessaccess Networks, IEEE Journal on Selected Areas in Communications,
Vol. 14, No. 9, (Dec. 1996), pp.737–47, ISSN 0733-8716.
Klein, T. & Han, S. (2004), Assignment strategies for mobile data users in hierarchical
overlay networks: Performance of optimal and adaptive strategies, IEEE Journal on
Selected Areas in Communications, vol. 22, No. 5, (June 2004), pp. 849–861, ISSN 0733-
8716
Koodli, R. & Puuskari, M. (2001), Supporting packet-data QoS in next generation cellular
networks, IEEE Communication Magazine, Vol.39, No.2, (Feb. 2001), pp.180-188, ISSN
0163-6804
Lampropoulos, G.; Passas, N. & Merakos, L. (2005), Handover management architectures in
integrated WLAN / Cellular Networks, IEEE Communications Surveys & Tutorials,
Vol. 7, No. 4, (May 2005), pp. 30-44, ISSN 1553-877X.
Lau, K. & Maric, S. (1998), Mobility of Queued Call Requests of a new call-queueing
technique for cellular systems, IEEE Transactions on vehicular Technology, vol. 47,
no.2, (May 1998), pp.480-488, ISSN 0018-9545
Liu, C. & Zhou, C. (2004), Challenges and Solutions for Handoff Issues in 4G Wireless
Systems An Overview, Proceedings of International Latin American and Caribbean for
210 Recent Advances in Wireless Communications and Networks
Engineering and Technology 2004, Paper No. 047, Miami, Florida, USA, June 2-4,
2004.
Liu, C. & Zhou, C. (2005), HCRAS: A novel hybrid internetworking architecture between
WLAN and UMTS cellular networks, Proceedings of IEEE Consumer Communications
& Networking Conference 2005, pp. 374-379, ISBN 0-7803-8784-8, Las Vegas, Nevada,
January 1- 10, 2005.
Liu, C. & Zhou, C. (2005), An improved architecture for UMTS-WLAN Tight Coupling,
Proceedings of IEEE Wireless Communications & Networking Conference 2005, pp. 1690-
1695, ISBN 0-7803-8966-2, New Orleans, LA, March 13-17, 2005.
Liu, C. & Zhou, C. (2006), Providing Quality of Service in IEEE 802.11 WLAN, Proceedings of
IEEE Consumer Communications & Networking Conference 2005, pp. 374-379, ISBN 0-
7803-8784-8, Las Vegas, Nevada, USA, January 1-10, 2006.
Liu, C. (2006). System Design and Resource Management in the Next-Generation Integrated
WLAN / 3G Cellular Networks, Doctoral dissertation, Florida International University,
Miami, Florida, USA, August 2006.
Liu, C.; Zhou, C.; Pissinou, N. & Makki, K. (2007), Resource Management in the Next-
Generation Integrated WLAN / 3G Cellular Networks, Proceedings of IEEE Wireless
Communications & Networking Conference 2007, pp. 3343-3348, ISBN 1-4244-0658-7,
Hong Kong, China, March 11-15, 2007.
Liu, Z. & Zarki, M. (1994), SIR-based Call Admission Control for DS-CDMA Cellular
Systems, IEEE Journal on Selected Areas in Communications, Vol.12, no. 4, (May 1994),
pp. 638–44, ISSN 0733-8716
Rashad, S. (2006), Mobility-based predictive call admission control and resource reservation
for next-generation mobile communications networks, Doctoral dissertation,
University of Louisville, In ACM digital library, Available from
http://portal.acm.org/citation.cfm?id=12929
Shafiee, K. ; Attar, A. & Leung, V. (2011), Optimal Distributed Vertical Handoff Strategies in
Vehicular Heterogeneous Networks, IEEE Journal on Selected Areas in
Communications, Vol. 29 , No.3, (March 2011), pp. 534 – 544, ISSN 0733-8716
Song, W.; Jiang, H. & Zhuang, W. (2007), Performance analysis of the WLAN first scheme in
cellular/WLAN interworking, IEEE Transactions on Wireless Communications, vol. 6,
No. 5, (May 2007), pp. 1932-1943, ISSN 1536-1276
Song, W.; Jiang H.; Zhuang W. & Saleh, A. (2006), Call Admission Control for Integrated
Voice/Data Services in Cellular/WLAN Interworking, Proceedings of IEEE
International Conference on Communications 2006, PP. 5480 - 5485, ISBN 1-4244-0355-
3, Istanbul, TURKEY, June 11-15, 2006
Song W.; Zhuang W. & Cheng Y. (2007). Load balancing for cellular/WLAN integrated
networks, IEEE Network, Vol. 21, No. 1, (Feb 2007), pp. 27-33, ISSN 0890-8044.
Zhao, D.; Shen, X. & Mark, J. (2003), Radio Resource Management for Cellular CDMA
Systems Supporting Heterogeneous Services, IEEE transactions on Mobile Computing,
Vol.2, No.2, (June 2003), pp. 147 – 160, ISSN 1536-1233
Zhuang W.; Gan Y.; Loh K. & Chua K. (2003). Policy-based QoS-management architecture in
an integrated UMTS and WLAN environment, IEEE Communications Magazine, Vol.
41, No. 11, (Nov. 2003), pp. 118-123, ISSN 0163-6804
0
10
1. Introduction
Relaying (1–3) has been considered as a paradigm for improving the quality of service (i.e.,
bit-error-rate, data rate and coverage) in wireless networks. In this work, we study a two-hop
relay channel in which each node can have multiple antennas. It is well-known that utilizing
multiple-input multiple-output (MIMO) links can significantly improve the transmission rate
(see e.g. (4; 5) and references therein). Thus, one can expect a combination of a MIMO gain and
a relaying gain in a MIMO relay link. We focus on one-shot transmission, where the channel is
used once for the transmission of one symbol representing a message. This is often referred to
as uncoded transmission. The main motivation for such a scenario is in considering applications
requiring either low-delays or limited processing complexity.
The capacity of the MIMO relay channel is studied in (6). The work in (9) establishes the
optimal linear relaying scheme when perfect CSI is available at the nodes. The work in (7; 8)
investigates linear relay processing for the MIMO relay channel. In this paper, in contrast
to (6–9), we study an uncoded system, and we propose a nonlinear relaying scheme which is
superior to linear relaying and performs close to the theoretical bound. Our proposed scheme
is based on constellation permutation (10; 11) at the relay over different streams obtained by
channel orthogonalization.
We investigate a two-hop MIMO fading Gaussian relay channel consisting of a source, a
relay and a destination. We assume that all three nodes have access to perfect channel
state information. We propose a nonlinear relaying scheme that can operate close to the
optimal performance. The proposed scheme is constructed using channel orthogonalization
by employing the singular value decomposition, and permutation mapping. We also
demonstrate that linear relaying can amount to a significant loss in the performance.
1.1 Organization
The remainder of the chapter is organized as follows. Section 2 first introduces the two-hop
relay channel model and then explains the transmission protocol and the assumptions on the
channel state information (CSI) at the nodes and finally formulates an optimization problem.
Section 3 simplifies and reformulates the optimization problem introduced in the preceding
section, by channel orthogonalization using SVD. Section 4 introduces a novel relaying
strategy in which the relay first detects the transmitted message and employs permutation
coding over different streams obtained by channel orthogonalization. This section also
212
2 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
z1 z2
x1 y1 x2 y2
w α H1 f (y1 ) H2 β ŵ
provides some performance bounds. Section 5 finally provides some simulation results and
concludes the chapter.
α : W −→ C M
x1 = α ( w )
f : C L −→ C L
x2 = f (y1 )
Since the function f (·) is arbitrary, our model includes linear as well as nonlinear mappings.
We assume an average power constraint at the relay such that trE {x2 x2† } ≤ P2 . The received
Near-Optimal
Near-Optimal NonlinearNonlinear Forwarding
Forwarding Strategy Strategy
for Two-Hop MIMO Relaying for Two-Hop MIMO Relaying 2133
y2 = H2 x2 + z2 (2)
where H2 ∈ C [ N × L] denotes the channel between the relay and the destination, x2 ∈ C [ L×1]
denotes the transmitted signal vector from the relay and z2 ∈ C [ N ×1] denotes the additive
circularly symmetric Gaussian noise. Finally, the destination, upon receiving y2 , detects the
transmitted message using the function (demodulator or detector) β defined as
β : C N −→ W
ŵ = β(y2 )
We desire to find a structured solution to the optimization problem in (3). Imposing structure
on a communication strategy results in loss of performance in general. On the other hand, a
structured strategy however facilitates the design. We first utilize the channel knowledge to
orthogonalize each hop using the SVD and then propose a nonlinear scheme that performs
close to the theoretical bound.
H1 = U1 D1 V1†
H2 = U2 D2 V2†
214
4 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
Relay
z1 z2
ỹ11 x21
x11 ỹ21
√ .. √ ..
λ1r . z̃1r g(·) λ2t . z̃2t
ỹ1r x2t
x1r ỹ2t
ỹ1 = U1† y1
= U1† H1 V1 x1 + U1† z1
= U1† U1 D1 V1† V1 x1 + U1† z1
= D1 x1 + z̃1
where the last equality follows from the identities U1† U1 = I L and V1† V1 = I M and the
definition z̃1 = U1† z1 . The random vector z̃1 ∼ CN (0, N1 I L ) since U1 is a unitary matrix. In
a similar fashion, we can obtain
ỹ2 = D2 x2 + z̃2
where z̃2 U2† z2 ∼ CN (0, N2 I M ). See also Fig. 2. Because D1 and D2 are diagonal matrices,
we have
ỹ1i = λ1i x1i + z̃1i , i ∈ {1, 2, . . . , min( M, L )}
ỹ2j = λ2j x2j + z̃2j , j ∈ {1, 2, . . . , min( L, N )}
Near-Optimal
Near-Optimal NonlinearNonlinear Forwarding
Forwarding Strategy Strategy
for Two-Hop MIMO Relaying for Two-Hop MIMO Relaying 2155
√
where λ1i is the ith entry on the main diagonal of D1 and λ2j is the jth entry on the main
diagonal of D2 . The equivalent channel obtained by the SVD operation is shown in Fig. 3.
The function g(·) in Fig. 3 denotes the forwarding strategy at the relay, defined as
g : Cr −→ C t
x2 = g(ỹ1 )
Proof. Consider a two-hop channel where the first hop is noise-free and the second hop is
identical to the original channel in Fig. 1. Denote the average error probability of this new
channel by P̄e . It is easy to see that Pe ≥ P̄e = Pe2 . In a similar manner we can obtain Pe ≥
P̃e = Pe1 , where P̃e denotes the error probability of a two-hop channel with identical first hop
to that in Fig. 1 and a noise-free second hop. This yields (5).
allocation factor where ∑ti=1 κ2i = 1. Note that the number of parallel channels that can be
utilized is min{r, t}, i.e., the minimum number of parallel streams of the first- and second hop.
In (9), it is shown that the strategy given by (6) is optimal if the relay mapping is constrained
to be linear. However as we show, AF is in general suboptimal for the underlying channel.
The received signal-to-noise ratio (SNR) of the ith stream at the destination is given by
Relay Destination
q
{w j }2j=1,j=i 1 − i q
{w j }2j=1,j=i
( i) i
Pe1
wi
( i)
( i) Pe2
1 − Pe1
wi wi
( i)
1 − Pe2
Fig. 4. Error probability transition in DF relaying.
Case r = 1: In order to maximize γi , one should choose the strongest mode (the stream with
largest singular value) with full power when r = 1. Note that the use of weaker streams at
the relay does not improve the performance of AF since all streams are transmitting the same
signal, thus allocating all power to the strongest mode is the optimal solution. Therefore, the
maximum possible achievable SNR for linear relaying when r = 1, is given by
λ11 λ21 P1 P2
γ ∗AF = (8)
N1 N2 + λ11 P1 N2 + λ21 P2 N1
where λ11 and λ21 are the largest eigenvalues of the first- and second hop, respectively.
( i) ( i)
where Pe1 and Pe1 respectively denote the ith message error probability of the first- and the second hop
and Pe1 and Pe1 respectively are the average message error probabilities of the first- and the second hop.
Proof. Consider the transmission of wi from the source. The relay either detects the
transmitted message correctly or declares another message. This is illustrated in Fig. 4. Using
Fig. 4, the ith message error probability can be bounded as
( i) ( i) ( i) ( i)
Pe = (1 − Pe1 ) Pe2 + Pe1 (1 − i ) (11)
( i) ( i) ( i) ( i)
≤ Pe1 + Pe2 − Pe1 Pe2 (12)
Near-Optimal
Near-Optimal NonlinearNonlinear Forwarding
Forwarding Strategy Strategy
for Two-Hop MIMO Relaying for Two-Hop MIMO Relaying 2177
q
where i denotes the detection probability of wi at the destination when {w j }2j=1,j=i is
transmitted from the relay, under the constraint that the source is transmitted wi . The
inequality in (11) follows from the fact that 0 ≤ i ≤ 1. By taking average over all possible
messages, we have
2q
( i)
Pe = ∑ Pe p(wi ) (13)
i =1
2q
( i) ( i) ( i) ( i)
≤ ∑ Pe1 + Pe2 − Pe1 Pe2 p(wi ) (14)
i =1
2q
( i) ( i)
= Pe1 + Pe2 − ∑ Pe 1
Pe2 p(wi ) (15)
i =1
2q
( i) ( i)
≤ Pe1 + Pe2 − min q Pe1 Pe2
1≤ i ≤2
∑ p(wi ) (16)
i =1
( i) ( i)
= Pe1 + Pe2 − min q Pe1 Pe2 (17)
1≤ i ≤2
Proposition 1. DF relaying achieves the same performance as that of a single hop (i.e., max{ Pe1 , Pe2 })
at high SNR when N = M.
Proof. For given modulator and optimal demodulator, the error probability at the destination
is upper bounded as
a1 1 a2 1
Pe ≤ Pe1 + Pe2 = NL + O
DF
+ LM + O
γ1 γ1NL+1 γ2 γ2LM+1
⎧
⎪
⎪
⎨ γaNL
1
+ O γ NL1 +1 if N < M
= 1
1 (18)
⎪
⎪ a2
⎩ γ LM + O 1
LM + 1 if M < N
γ2
2
P1 P2
where we used Lemma 2 and γ1 N 1
, γ2 N 2
, and a1 and a2 are two constants depending
on the number of antennas and the modulation scheme.
We also have the following lower bound using Lemma 1
⎧
⎪
⎪
⎨ γaNL
1
+O 1
NL + 1 if N < M
Pe ≥ max{ Pe1 , Pe2 } = 1 γ1 (19)
⎪
⎪
⎩ γaLM
2
+O 1
LM + 1 if M < N
γ2
2
Comparing (18) and (19), we see that the upper bound and lower bound meet each other at
high SNR. This therefore establishes the optimality of DF at high SNR.
Proof. From Lemma 1, we conclude that d∗ ≤ min{ NL, ML }. But, from Lemma 2 we know
that PeDF ≤ Pe1 + Pe2 . Thus the diversity order is bounded as d DF ≥ min{ NL, ML }. Therefore,
DF achieves the optimal diversity order.
Proof. The proof follows from the observation that using only the stream with the strongest
mode of the second hop, one can obtain higher diversity gain compared to the first hop for
any source modulator. Since M < N, we have
a1 1 a1 1
Pe ≤ LM + O
DF
, and Pe ≥ LM + O . (20)
γ1 γ1LM+1 γ1 γ1LM+1
This completes the proof.
Proposed DF: A more sophisticated approach at the relay is to use different modulators over
distinct streams. In the following, we propose a structured method for obtaining different
modulators based on a given modulator, say αr . Let π denote a permutation operation on a
given finite sequence. For example, if a = (1, 2, 3, 4) the operation π ( a) produces a different
ordering of the elements in the sequence, such as π1 ( a) = (4, 3, 1, 2). In the following let ᾱr
denote the list of letters produced by the modulator αr , in the default order. Now we construct
the ith modulator using ᾱr as
ᾱri = κi π i (ᾱr ) (21)
where κi is a power allocation factor used at ith stream such that {κi } meets the power
constraint trE [x2 x2† ] ≤ P2 . Thus, the transmitted signal from the relay over the ith stream
is given by
x2i = gi (ỹ1 ) = κi αri (ŵˆ ) = κi αri ( βr (ỹ1 )) (22)
Here βr denotes the detector used at the relay and the modulator αri is constructed using
the ith permutation used over the ith stream, i.e., π i . Now designing a relaying strategy
specializes to finding the optimal permutations and the power allocation factors. That is
({κi∗ }ti=1 , {π i∗ }ti=1 ) = arg min Pr{ŵ = w} (23)
{κ i }ti=1 ,{πi }ti=1
−1
−2
log10 ( Pe )
−3
AF
DF: 1 Stream
−4 DF: 2 Streams
Lower Bound
−5
0 3 6 9 12
P [dB]
Fig. 5. Average message error probability (Pe ) using 16-QAM modulation for different
forwarding strategies (AF, conventional DF (i.e., one stream) and proposed DF (i.e., two
streams with permuted modulations)). Here we set P1 = P2 = P, N1 = N2 = 1, number of
antennas at the source is N = 1 and number of antennas at the relay and the destination are
L = M = 10.
220
10 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
We can see from Fig. 5 that the performance of conventional DF approaches that of the
proposed scheme at high SNR. This is in accordance with Proposition 3. However, we also
see that the new scheme gives considerable gains in the low- and moderate SNR regime, and
it achieves the optimal performance at lower SNR compared to conventional DF.
6. References
[1] E. C. van der Meulen, “Three-terminal communication channels,” Adv. Appl. Probab.,
vol. 3, pp. 120-154, 1971.
[2] T. M. Cover and A. El Gamal, “Capacity theorems for the relay channel,” IEEE Trans.
Inf. Theory, vol. 25, no. 5, pp. 572-584, Sep. 1979.
[3] J. N. Laneman, G. W. Wornell, and D. N. C. Tse, “Cooperative diversity in wireless
networks: efficient protocols and outage behavior,” IEEE Trans. Inf. Theory, vol. 50, no.
12, pp. 3062-3080, Dec. 2004.
[4] E. Telatar, “Capacity of multi-antenna Gaussian channels,” Technical Memorandum, Bell
Laboratories (Published in European Transactions on Telecommunications, Vol. 10, No.6, pp.
585-595, Nov/Dec 1999), 1995.
[5] D. Palomar and S. Barbarossa, “Designing MIMO communication systems:
Constellation choice and linear transceiver design,” IEEE Trans. Signal Processing, vol.
53, no. 10, pp. 3804-3818, Oct. 2005.
[6] B. Wang, J. Zhang, and A. Høst-Madsen, “On the capacity of MIMO relay
channels,” IEEE Trans. Inf. Theory, vol. 51, no. 1, pp. 29-43, Jan. 2005.
[7] A. S. Behbahani, R. Merched, and A. M. Eltawil, “Optimization of a MIMO relay
network” IEEE Trans. on Signal Processing, vol. 56, no. 10, Oct. 2008.
[8] N. Khajehnouri and A. H. Sayed, “Distributed MMSE relay strategies for wirless sensor
networks” IEEE Trans. on Signal Processing, vol. 55, no. 7, July 2007.
[9] X. Tang and Y. Hua , “Optimal design of non-generative MIMO wireless relays” IEEE
Trans. on Wireless Communications, vol. 6, no. 4, April 2007.
[10] M. N. Khormuji and E. G. Larsson, “Improving collaborative transmit diversity using
constellation rearragment,” In proceedings IEEE WCNC, March 2007.
[11] M. N. Khormuji and E. G. Larsson, “Rate-optimized constellation rearrangement for the
relay channel,” IEEE Communication Letters, vol. 12, no. 9, pp. 618-620, Sept. 2008.
11
Connectivity Support in
Heterogeneous Wireless Networks
Anna Maria Vegni1 and Roberto Cusani2
1University
of Roma Tre
Department of Applied Electronics, Rome;
2University of Roma “La Sapienza”
1. Introduction
Recent advances in wireless technology and decreasing costs of portable devices strongly
contributed to increase the popularity of mobile communications.
Wireless communication and device integration have lead to the so-called nomadic computing
(or mobile computing) where portable devices (such as laptop and handheld computers) allow
users to access Internet and data on their home or work computers from anywhere in the
world. Multimedia services requirements nowadays encompass not only large bandwidths,
but also on-the-move facilities. Future 4th generation wireless communications systems will
provide seamless mobility support to access heterogeneous wired and wireless networks
(Makhecha & Wandra, 2009), (Lin et al., 2010).
Emerging and pre-existing wireless technologies exhibit different characteristics, access
technologies, available services and network performances. For example GSM, UMTS,
WLAN and WiMAX have different bandwidth (70 Mbps for WiMAX and 9.6 kbps for GSM),
cell diameter ( 50 km in LoS for WiMAX and 100 m for WLAN), or handover latency (3 s for
WLAN and 50 µs for WiMAX).
The increasing demand for services with high QoS requirements and novel mobility
scenarios, like on-the-move business users, home and office networks, on-the-move
entertainment, info-mobility etc., provide users to be connected to the Internet anytime and
anywhere, as well as user services and connectivity be maintained, and kept alive. Mobility
management in heterogeneous networks is the essential support for roaming nomadic devices
switching from one access technology to another, at the same time maintaining seamless
connectivity at high QoS services (i.e. video-streaming).
New emerging multimode mobile devices are equipped with multiple wireless network
interface cards, providing Vertical Handover capability to autonomously select the best access
network. The design of innovative handover mechanisms —sometimes called as handoff—
between heterogeneous mobile devices (e.g. PDA, laptop, smart phones) and seamless
integration of different integrated network (e.g. GSM, UMTS, HSDPA, GPS, WLAN, Bluetooth
and so on) is an open research issue.
222 Recent Advances in Wireless Communications and Networks
In this way, a mobile user can seamlessly switch between different networks, supporting the
same services. This process must be performed to automatically adapt to change access
networks and environments, without any user participation. In order to do this, cross layer
design for multimedia communications is required. Mobile computing then becomes more
feasible, e.g. a mobile user performing a videoconference using UMTS maintains this service
even though the link breaks down, accessing into a WLAN network.
Vertical Handover (VHO) is a mechanism allowing heterogeneous connectivity by enabling
switches from a serving network to a candidate network, whenever users or network
requirements (i.e. power level, network congestions, or other QoS constraints) impose or
suggest it. Notice that VHO allows switching from one access technology to another, thus
offering additional functionalities with respect to classic horizontal handover where mobile
nodes move from an access point to another without changing the serving access network
(Balasubramaniam & Indulska, 2004), (McNair & Fang, 2004).
In this chapter we show how heterogeneous networks for next generation multimedia
systems can cooperate in order to provide seamless mobility support to mobile users
requiring high multimedia Quality-of-Service (QoS) constraints (Knightson et al., 2005).
We describe the traditional techniques of Vertical Handover in heterogeneous wireless
networks. Basically, in Section 2 we introduce the main characteristics of handover process
and our effort is addressed on a first handover classification, which distinguishes between
horizontal and vertical, hard and soft, upward and downward procedures, and more.
Beyond several handover algorithms, in Subsection 2.1 we give an overview of current IEEE
802.21 standard for seamless connectivity in heterogeneous environments. In Section 3 we
describe different decision metrics for handover mechanisms. Various metrics triggering
handover decisions, including multi-parameters QoS, and mobile terminal location
information, will be described in details in Subsection 3.1, and 3.2, respectively. Moreover, a
hybrid approach which exploits both power measurements and location information will be
presented in Subsection 3.3. Finally conclusions are drawn in Section 4.
going below a prescribed threshold can be detected and handover toward another radio
channel or cell can be initiated.
Some of these events employed are “Link Up”, “Link Down”, “Link Detect”, “Link
Parameter Reports” and “Link Going Down”, (Gupta, et al. 2006).
MICS uses the MIHF primitives to send commands from higher layers to lower ones. It
determines the status of the connected links, performing mobile and connectivity decisions
of the higher layers to the lower ones. Then, MIIS is a mechanism to discover available
neighboring network information in order to facilitate handover process. It assures a set of
information entities, both static and dynamic. In the first case, there are the names and
services providers of the MN’s current network, while the dynamic information include link
layer parameters such as channel information, MAC addresses, security information and
other higher layer service information.
Three main handover schemes have been developed within IEEE 802.21 standardization
process, defined as follows:
1. Serving Network-Initiated and Candidate Network-Canceled Handover: the Service Access
Network (SAN) sends messages about information request to the IS in order to know if
a handover mechanism can be initiated. The Candidate Network (CN) could not be an
available resource, because of link quality level or network traffic status;
2. Serving Network-Initiated and MN-Canceled Handover: after sending information request
messages to the IS, the MN could be not available to perform handover, because of MN
movement or user intervention or low battery that let the MN renouncing handover
mechanism. In this case, the handover could be canceled directly by interaction between
SAN and CN;
3. MN-Initiated and MN-Canceled Handover: in this case, the MN communicates only with
the SAN, which sends messages of Resources-Request to the CN. The MN could be no
more available to perform handover, (e.g. movement or time out or user intervention).
The MN sends HandoverCancel message to SAN which is asked to interrupt the
handover mechanism. Figure 2 shows the flowchart of this approach.
• Location-based VHO algorithms estimate network QoS levels on the basis of the MN’s
location relatively to the serving access point (Kibria et al., 2005); (Inzerilli et al., 2008);
(Inzerilli et al., 2010).
The above-mentioned VHO algorithms are analyzed here in the following.
The RSS-based VHO is the traditional technique for connectivity switching in heterogeneous
networks. It is driven on power level measurements, such as when the measured RSS
coming from the SN drops below a predefined threshold. The RSS of the monitored set of
CNs is evaluated, and a vertical handover will be executed towards the best—most
appropriate—candidate network. This approach represents the primitive and simplest
handover mechanism, which however does not aim to optimize communication performance
but only focuses on maintaining seamless connectivity (Ayyappan & Dananjayan, 2008).
Moreover, since RSS value suffers from severe fluctuations due to the effects of shadowing
and fading channels, filtering techniques (e.g. exponential smoothing average (Inzerilli &
Vegni, 2008)) should be considered to estimate the trend of RSS signal.
On the other hand, the SINR-based approach compares received power with noise and
interference levels in order to obtain a more accurate performance assessment. SINR factor
represents a valid handover decision metric, as it directly affects the maximum data rate
compatible with a given Bit Error Rate (BER). SINR-based VHO approach is more suitable to
meet QoS requirements, since a reduction of SINR factor produces a reduction of data rate
and QoS level (Yang et al., 2007). Both RSS and SINR-based schemes are reactive approaches,
whose aim is to compensate for performance degradation.
The multi-parameter QoS-based VHO scheme in (Vegni et al., 2007) represents a proactive
approach performing regular assessment of the QoS level offered by the current SN, as well
as by other CNs. In general, a multi-parameter QoS-based VHO technique is well suited for
multimedia applications like real-time video streaming.
In location-based VHO solutions, the knowledge of MN’s location information is exploited
to assess the quality of the bidirectional link between SN and MN (Inzerilli et al., 2008).
Moreover, the estimation of MN’s position can drive the initiation of a reactive handover
mechanism. Information about MN’s position can be determined in several ways (Kibria et
al., 2005), including Time of Arrival, Direction of Arrival, RSS, as well as A-GPS (Assisted
Global Positioning System) techniques.
Notice that in general each time a vertical handover is initiated the traffic overhead
increases. The limitation of handover occurrences is an issue specially when unwanted and
unnecessary vertical handovers are executed. This represents the case of a mobile node
moving back and forth between the two neighbouring wireless networks—or in general
around a corner that involves three or more wireless networks—. This aspect in known in
literature as ping-pong effect (Kim et al., 2007).
Repeated vertical handover attempts lead to frequent location and registration updates
(with network resource consumption), frequent connectivity interruptions, as well as serious
affections to MN’s QoS (i.e., decreasing battery life). Frequent handovers lead the user to
experience many unpleasant transients of service interruption.
Techniques to prevent unnecessary and unwanted handovers have been proposed (Kim et
al., 2007); (Inzerilli & Vegni, 2008); (Inzerilli et al., 2008). A hysteresis cycle or a hard
limitation in maximum handover frequency can mitigate this phenomenon.
The above descriptions have shown the main vertical handover approaches, which are
based on single metrics (i.e., RSS, SINR, QoS, and location). Still, many handover techniques
are based on the combination of two or more metrics, which generate most effective VHO
Connectivity Support in Heterogeneous Wireless Networks 227
decisions, and avoid unnecessary and unwanted vertical handover occurrences (Vegni et al.,
2009). These approaches are called as hybrid (or combined) vertical handovers.
The following Subsection 3.1 and 3.2 offer a more detailed description of QoS- and location-
based vertical handover algorithms, respectively.
3. MIH_Link_Detected Indication
Link Type = WLAN
MACNewPoA = MAC of AP(x)
MIH Capability = 1 (Supported)
Network Selection
Switch to WLAN
4. MIH_Net_HO_Candidate_Query Request
CurrentLinkType = 3G
SuggestedNewPoA = MAC of AP(x)
HandoverMode = Make before Break
OldLinkAction = LINK_NO_ACTION
5. MIH_N2N_HO_Query_Resources Request
QueryResourceList = QoS:??
6. MIH_N2N_HO_Query_Resources Response
ResourceStatus = 1 (Available)
AvailableResourceList = QoS:??
7. MIH_MN_HO_Candidate_Query Response
CurrentLinkType = 3G
HandoverAck = 1 (Initiate Handover)
PreferredLinkType = WLAN
PreferredPoA = MAC of AP(x)
ErrorCode = 0
8. MIH_MN_HO_Candidate_Commit Request
CurrentLinkType = 3G
NewLinkType = WLAN
MACNewPoA = MAC of AP(x)
OldLinkAction = HANDOVER_CANCEL
9. MIH_MN_Candidate_Commit Responset
CurrentLinkType = 3G
OldLinkAction = HANDOVER_CANCEL
HandoverStatus = 0 (Abort Handover)
During the last decade several techniques to assess the quality of multimedia services
without performing a subjective test have been investigated, leading to objective quality
metrics that approximate the MOS (Mean Opinion Score). Such metrics are usually classified
as full-reference, reduced reference and no-reference metrics. They differ in the degree of
knowledge about the original multimedia flow used in the quality assessment. Full
reference methods evaluate the difference between the original signal and the received one
and are, thus, rarely employed in real time assessment of video quality. On the other hand,
reduced reference metrics require a channel for sending side information concerning some
characteristics of the original signal, while No-Reference (NR) metrics do not require any
knowledge of the original. On the other hand, the perceived video quality highly depends
on the end-user, according to her a priori knowledge of the topic, level of attention while
looking at the video, and assigned task.
In general a QoS-based VHO technique focuses on the maximization/enhancement of QoS
level experienced by the mobile user. The connectivity is switched from the serving network
to a selected candidate network, which provides high QoS. In (Vegni et al., 2007) an
innovative NR-Video Quality Metric (NR-VQM) has been assumed. This metric incorporates
both spatial and temporal resolution reduction, packet losses, latency, and delay jitter, as
well as indicators for the evaluation of (i) blocking, blurring and ringing introduced by
current video coders, and (ii) jerkiness and other effects produced by packet losses. Jerkiness
is evaluated by a neural network feed with estimated dynamics of objects composing the
scene, trained by means of subjective tests.
The impact of packet losses on perceived quality is based on the analysis of the inter-frame
correlation measured at the receiver side. Presence of error concealment algorithms
employed by the receiver is also taken into account. The packet losses degradation
assessment presents best performances for long sequences with slow motion.
Since the NR algorithm directly processes the rendered video, no information about the
kind of errors, delays and latencies affecting the links is required. In addition, the NR
techniques easily account for continuous increase of computing power of both mobile and
wired terminals, and allow a wide spread of error concealment techniques to increase the
perceived quality.
Subjective test evinced good agreement between NR metric and MOS, regardless of intrinsic
video characteristic and spatial-temporal resolution.
In the scheme presented in (Vegni et al., 2007) the NR-QoS is combined with a packet
classification originally designed for DiffServ (DS) protocol, allowing different QoS grades
to be mapped into different classes of aggregated traffic flows, (Shin et al., 2001). It is an
adaptive packet forwarding mechanism for DS networks. It allows mapping mechanism of
video packets onto different DS levels based on Relative Priority Index (RPI), that is the
relative preference per each packet in terms of loss and delay. The packets are classified,
conditioned, and remarked to certain network DS levels by considering the traffic profile
based on the Service Level Agreement (SLA) and the current network status.
The proposed QoS-based handoff scheme in (Vegni et al., 2007) is well suited for real-time
applications in IEEE 802.21 scenarios. The overall vertical handover process is organized in
five phases, such as (i) measurement phase, (ii) QoS prioritization, (iii) initialization, (iv)
candidate networks scanning, and (v) VQM conversion. Figure 4 depicts the pseudo-code of
the QoS-based vertical handover algorithm. Basically, the multi-parameter QoS-based
handover algorithm considers three inputs, such as (i) the RSS samples, (ii) the mobile node
distance and (iii) the current QoS level (i.e. Lev). As output it returns the number of vertical
230 Recent Advances in Wireless Communications and Networks
handovers executed by the mobile node (i.e. nVHO). In the following we shall describe the
overall mechanism in more details.
Given a video application, the QoS mapping process is accomplished by considering the
relative prioritized packets to maximize end-to-end video quality. In the measurement phase,
each T seconds, the MN gets samples of RSS and position, as well as monitors Lev parameter
for the video stream received from the current serving network. QoS monitoring is
performed on the basis of the NR metrics1. In our scope, NR technique addresses on audio
and video flows evaluations to the receiver side, although it could be also tuned and
optimized by means of a full-reference metric applied to some low rate probe signals.
In the QoS prioritization phase, the probability to perform a handover is evaluated (i.e. PVHO).
By opportunistically weighting the QoS-Lev parameter the handover probability will be
mainly driven by QoS factors. The received video-streaming quality is monitored according
to a subjective evaluation. On the basis of user preferences, two appropriate QoS thresholds
are defined, called as Th1 and Th2, with Th1 > Th2.
else
nVHO ← 0 ( no VHO executed )
end
end
1 NR method presents some basic indicators for temporal and spatial analysis: block distortion is
evaluated by applying first a coarse temporal analysis for each frame, to extract blocks potentially
affected by artefacts produced by lost packets.
Connectivity Support in Heterogeneous Wireless Networks 231
Traffic congestions, transmission errors, lost packets or delay can keep QoS level lower than
a first threshold, i.e. Lev < Th1. If Lev keeps on decreasing, the handoff initiation phase can be
required by the MN whenever Lev < Th2.
The MN alerts to change the serving network and sends this alarm message to a closer QDE.
So, the candidate networks scanning phase occurs on the basis of VQM parameters, such as
throughput, link packet error rate, Packet Loss Probability (PLP), supported number of
Class of Service (CoS), etc. All these parameters are sent inside the information message
“LINK QoS PARAMETER LIST”.
Based on the statistics computed on previous NR-QoS reports produced by the served MNs,
when the QDE communicates with a MN, it can operate a conversion of VQM parameters for
each network in NR parameters. The MN evaluates which candidate network is appropriate
for its video application. As an instance, let us suppose that a MN is in a WLAN area. When
it realizes a QoS reduction, it sends a first alarm to the QDE, which will start a candidate
network scanning process in order to select a target network providing a QoS enhancement
to the MN (i.e. Lev1 > Lev). A set of target networks to hand over is selected, and the best
network is chosen on the basis of MN preferences and handover policies. Finally, the handover
is performed according to the IEEE 802.21 message exchange in the scheme of Figure 2.
Finally, in order to determine the probability to perform a vertical handover (i.e. Pr(VHO)),
we shall provide the following assumptions:
1. A mobile node is locating at position P = (x, y), in the middle of two active networks (i.e.
Ni, i = 1,2);
2. The averaged received signal levels over N1 and N2 radio links are assumed as lognormal
distributions, respectively rN 1 ( P ) and rN 2 ( P ) , with mean signal levels μ N 1 and μ N 2 ,
and the shadowing standard deviations σ N2 1 and σ N2 2 ;
3. The distance dN i from the MN’s position to the reference BS of network Ni can be
assumed as a stationary random process with mean value d and variance c 2σ t2dn , where
c the speed of light and σ t2dn is the standard deviation of the signal delay measurement 2;
4. On the basis of each single parameter (i.e. RSSI, distance, and QoS) different thresholds
are assumed, called as R, D and Q for RSSI, distance and quality criterions, respectively.
Each threshold is typical for a single access network (i.e. RW and RU are the RSS
thresholds for WLAN and UMTS, respectively).
Let us suppose to perform a handover from UMTS to WLAN. The handover decision occurs
when both (i) the RSS measurement on WLAN is higher than RW (i.e. rW ( P ) ≥ RW ), (ii) the
distance from MN to WLAN AP is lower than DW (i.e. dW ≤ DW), and (iii) the QoS-Lev in
WLAN is upper than QW (i.e. qW ≥ QW) 3. Thus, the probability to initiate the handover from
UMTS to WLAN in the position P, is
{⎣ ⎦}
PrU → W ( P ) = P ⎡rW ( P ) ≥ RW ⎤ ⋅ P {[ dW ≤ DW ]} ⋅ P {[ qW ≥ Th2 ]} . (1)
On the other hand, the handover decision from WLAN to UMTS is taken only when it is
really necessary, such as when (i) the RSS measurement on WLAN is lower than RW (i.e.
2 Basically, the delay measurement of the signal between the MN and the BS is characterized by two
terms, (i) the real delay and (ii) the measurement noise tdn. It is assumed to be a stationary zero-mean
random process with normal distribution.
3 Notice that due to chip WLAN monetary cost the handover decision does not take account to the RSS,
rW ( P ) ≤ RW ), (ii) the RSS measurement on UMTS is higher than RU (i.e. rU ( P ) ≥ RU ), (iii) the
distance from MN to UMTS BS is lower than DU (i.e. dU ≤ DU), and (iv) the QoS-Lev in UMTS
is upper than QU (i.e. qU ≥ QU). Thus, the probability to initiate the handover from WLAN to
UMTS in the position P, is
{
⎣ ⎦ } {⎣ ⎦ }
PrW →U ( P ) = P ⎡rW ( P ) ≤ RW ⎤ ⋅ P ⎡rU ( P ) ≥ RU ⎤ ⋅ P {[ dU ≤ DU ]} ⋅ P {[ qU ≥ Th2 ]} . (2)
τk =
⎡
1 ⎢ 1 + ρ k 1 + Cb
⋅
2
( ) ⎤⎥ . (3)
μk ⎢ 2 ( 1 − ρ k ) ⎥
⎣ ⎦
From (3) we consider the average time delay for a single packet sent from a N1 to N2 (i.e.
TN 1 → N 2 [s]) such as
N
TN 1 → N 2 = ∑ τ kγ N( k1)→ N 2 , (4)
k =1
where γ N( k )→ N is the probability that packets are sent from N1 to N2, on the k-th link with
1 2
capacity Ck [bit/s].
The average packet rate represents how many packets are sent from N1 to N2, i.e. rN 1 → N 2
[packets/s]. Considering all the available networks (i.e. N1, N2, …, Nn), the total average
packet rate Λ tot [packets/s] is
N N
Λ tot = ∑∑ rN i → N j , (5)
i =1 j =1
N N
∑∑ TN →N i j
⋅ rN i →N j
i =1 j =1
ΔTMean = N N
. (6)
∑∑ rNi →N j
i =1 j =1
In the case of handover occurrence from Ni to Nj, the mobile user moves from Ni to Nj with a
probability β i → j . So, the probability ν j that an user moves from her own serving network is:
Connectivity Support in Heterogeneous Wireless Networks 233
ν j = ∑ β i → j = 1 − β i →i , (7)
i≠ j
where β i →i represents the probability a user stays in her serving network. In this way, we
can find the average packet rate from Ni to Nj during handover, as
→ N = ∑ rN → N β j →m + β i → j ∑ rN → N .
rN( HO ) ( HO ) ( HO ) (8)
i j j m i h
m h
Let us assume ρj [packets/s] as the average rate of packets sent to Nj. By replacing (7),
HO
the expression of Λ tot becomes
HO
Λ tot = Λ tot + ∑ν j ρ j . (10)
j
Finally, let χ be the ratio between the average time delay in case and in absence of
handover, τ ( HO ) and τ respectively
⎡
1 ⎢1 +θ
( HO )
1 + Cb 2 ( ) ⎤⎥
χ=
τ ( HO )
=
μ k ⎢ 2 1 − θ ( HO )
⎣ ( ) ⎥
⎦ = 1 +θ
( HO )
(1 + Cb 2
⋅
)
(1 − θ ) =
τ ⎡
1 ⎢ 1 + θ 1 + Cb ⎥
2 ⎤
( ) (
1 + θ 1 + Cb 2 ) (
1 − θ ( HO ) ) (12)
μk ⎢ 2 ( 1 − θ ) ⎥
⎣ ⎦
=
(
1 + θ 1 + Cb 2 ( 1 + ν ) ) ⋅
(1 − θ ) .
1 + θ 1 + Cb ( 2
) 1 − θ (1 +ν )
The mobile node’s location information is used to initiate handovers, that is, when the
distance of the MN from the centre of the cell of the candidate network towards which a
handover is attempted possesses an estimated goodput, i.e. GPCN, significantly greater than
the goodput of the current serving network, i.e. GPSN. The handover initiation is then followed
by a more accurate estimate (handover assessment) which actually enables or prevent
handover execution (Inzerilli et al., 2008).
In the handover initiation phase, the algorithm evaluates the goodput experienced by a MN in
a wireless cell. The goodput depends on the bandwidth allocated to the mobile for the
requested services and the channel quality. When un-elastic traffic is conveyed (e.g. real-
time flows over UDP) the goodput is given by:
GP = BW ⋅ ( 1 − Pout ) , (13)
where BW [Bit/s] is the bandwidth allocated to the mobile node and Pout is the service
outage probability. When elastic traffic is conveyed (typically when TCP is used),
throughput tends to decrease with increasing values of Pout. BW is a function of the nominal
capacity, of the MAC algorithm which is used in a specific technology and sometimes of the
experienced Pout. We consider the maximum value of BW, i.e. BWmax which is obtained in the
case of a single MN in the cell and with a null Pout 4.
Pout is a function of various parameters. In UMTS network it can be calculated theoretically,
using the following formula:
⎧ ⎫
EbUMTS
UMTS
Pout = Pr ⎨
⎪ ,Tx
( ) ⎪
⋅ Ad−1 rUMTS ≤ μ UMTS ⎬ , (14)
I
⎩⎪ 0
+ γσ ( 2
N
UMTS
) ⎭⎪
where EbUMTS
,Tx is the bit energy in the received signal, µ and γ are parameters dependent on
the signal and interference statistics, σ N2 is the receiver noise power, Ad (r UMTS) is the signal
attenuation factor dependent on the MN’s distance r UMTS from the centre of the cell, and I0 is
the inter and intra-cell interference power. The service outage probability for a WLAN
WLAN
network Pout can be calculated theoretically in a similar fashion using the following
formula:
⎧ WLAN ⎫
⎪ Eb ,Tx
WLAN
Pout = Pr ⎨ ⋅ A −1 WLAN
r (≤ μ )
WLAN ⎪
⎬. (15)
( 2
⎪⎩ γσ N WLAN) d
⎭⎪
We define as the radius of a wireless cell Rcell the distance from the cell centre beyond which
the signal-to-noise ratio or the signal-to-interference ratio falls below the minimum
acceptable value (i.e. μ). Rcell can be obtained resolving the above equations or empirically,
through measurement on the network. As an alternative, typical value for well-known
WIFI
technologies can be used, e.g. Rcell ≈ 120 m for IEEE 802.11a outdoor, and
UMTS
100 m ≤ Rcell < 1 km for a UMTS micro-cell.
4 In an IEEE 802.11a link, the maximum theoretical BWWLAN is equal to 23 Mbps (out of a nominal
capacity of 54 Mbps), although it decreases rapidly with the number of users because of the contention-
based MAC. In HSDPA network, the maximum BWUMTS is equal to 14.4 Mbps, which decreases rapidly
with Pout.
Connectivity Support in Heterogeneous Wireless Networks 235
Since the path loss Ad (r ) is approximately proportional to rγ, the SNR(r) can be written as
⎡⎛ R ⎞γ ⎤
SNR(r ) = μ ⎢⎜⎜ cell ⎟⎟ + δ Ad ⎥ . (16)
⎢⎝ r ⎠ ⎥
⎣ ⎦
Maximum GP in a WLAN and UMTS cell can be calculated with the following approximated
formulas, respectively
⎧ ⎧⎛ UMTS ⎞γ ⎫
⎪GPUMTS = BW UMTS ⋅ Pr ⎪⎨⎜ Rcell ⎟ + δ A < 1⎪⎬
⎪ max max ⎜ r UMTS ⎟ d
⎪ ⎩⎪⎝ ⎠ ⎭⎪
⎨ (17)
⎧⎛ R WLAN ⎞ γ ⎫
⎪ WLAN WLAN ⎪ cell ⎪
⎪GPmax = BWmax ⋅ Pr ⎨⎜ WLAN
⎜ ⎟ + δ Ad < 1⎬
⎟
⎪ ⎪⎩⎝ r ⎠ ⎪⎭
⎩
which will be regarded as zero out of cells.
Handover initiation will be performed when the estimated goodput of the new network is
greater than the current one. Namely, in the case of vertical handover from WLAN to
UMTS, the following equations applies:
UMTS WLAN
GPmax < GPmax . (18)
It is worth noticing that when handover executions are taken too frequently, the quality as
perceived by the end user can degrade significantly in addition to wasting battery charge.
The LB approach brings about a reduction of CRB between 6.5% for a null waiting time and
20% for waiting time equal to 60 s. It follows that the waiting time constraint is not suitable
for LB approach in order to reduce the number of vertical handovers while keeping a
limited reduction of CRB.
Table 2 shows results of the number of VHO experienced with the LB and PB approach, still
in terms of the mean value, standard deviation and dispersion index for various waiting
time values. It can be noticed that the number of vertical handover with LB is on average
significantly smaller, i.e. ranging in [9.65, 3.70] than that experienced with PB approach, i.e.
ranging in [9.15, 329.85]. This remarks that the PB approach requires a constraint on
handover frequency limitations, while this approach is counterproductive with LB.
25
PB-VHO
LB-VHO
20
Vertical handovers (VHO)
15
10
-10 0 10 20 30 40 50 60 70
In Figure 5, the mean values of vertical handovers for LB and PB vs. the waiting time
constraint are depicted. This shows even more clearly how the LB approach, providing a
more accurate assessment for handover initiation, limits handover initiations, resulting in
about a little performance gain. In contrast, PB approach is unstable even for high values of
waiting time, as it can be noticed from the fact that the PB curve is not monotone.
Finally, in Figure 6 (a) and (b) are reported the dynamics of the CRB over the mobile node
steps during the simulation (a step is performed every 5 seconds) for a null waiting time and
a waiting time of 60 s, respectively. The instability of PB approach when no waiting time
constraint is applied is clearly shown in Figure 6 (a).
9 9
x 10 x 10
10 10
LB-VHO, Twait = 0 LB-VHO, Twait = 60
9 9
PB-VHO, Twait = 0 PB-VHO, Twait = 60
8 8
7 7
6 6
Bits
Bits
5 5
4 4
3 3
2 2
1 1
0 0
0 500 1000 1500 2000 2500 0 500 1000 1500 2000 2500
(a) (b)
Fig. 6. CRB during a simulated scenario with PB and LB-VHO approaches, for (a) Twait = 0 s,
(b) Twait = 60 s
location-based (ELB) VHO. The HVHO technique is suitable for dual-mode mobile
terminals provided with UMTS and WLAN network interface cards, exploiting RSS
measurements, MN’s location information, and goodput estimation as discussed in Section
3. The overall procedure is mobile-driven, soft and includes measures to limit the ping-pong
effect in handover decisions. The flowchart of HVHO is depicted in Figure 7.
Basically, the HVHO approach proceeds in two phases:
1. In the initial learning phase when the visited environment is unknown, the RSS based
approach is used, i.e. hereafter referred to as Power-Based (PB) mode. In the meanwhile,
the MN continuously monitors the strength of the signals received from the SN, as well
as from the other candidate networks. By combining RSS samples with location data
provided by the networks or some auxiliary navigation aids, like GPS, the MN builds a
path losses map for each discovered network in the visited environment;
2. At the end of this phase the MN enters the ELB-VHO mode and it can exploit the path
losses map to take handover decision using its current location.
INIT
N
start PB-VHO
MRIn > MRIth
algorithm
Y
Build cell
radius list
n
1
PN = ∑
K i = N −K + 1
pi , N ≥ K . (19)
Though averaging over the last K samples, it allows reducing the impact of instantaneous
power fluctuations in power detection and reduce the power error estimation. On the other
Connectivity Support in Heterogeneous Wireless Networks 239
hand, as the MN is assumed to be moving, the length of moving windows depends on the
actual MN speed. However, moving average filters are prone to outlayers. A more robust
estimate can therefore be computed by replacing the linear mean filter with the (non-linear)
median filter.
Let us suppose a mobile node is moving in an area approximated with a lattice of M x M
square zones, each with a width Lzone [m]. While moving on the lattice, the MN calculates
the power received for each visited zone Zj. Let Pn Zj denote the average of the power
samples collected inside Zj and associates it with the planar coordinates of the centre of the
zone (xj, yj). Namely, power level calculated at time n for the zone (xj, yj) is given by
Z
(
Pn j = Pn xi , y j = ) 1
Z( j)
∑ pi , (20)
i∈Z ( j )
where Z (j) is the set of the power samples pi collected in the last visited zone j up to time n,
and Z ( j ) is the cardinality of the set Z (j).
Equation (20) provides a criterion to assess received power from both the UMTS and WLAN
networks on which handover decisions of the PB approach are based. In addition, it allows
assessing the power P(xj, yj) for each Zj zone which can be stored in the terminal and
populate a power map for the visited area. Once each zone of the lattice were visited at least
once, the power map would be completed. However, it is possible that the complete visit of
all the zones of the map can take long, and perhaps never occurs, especially if the number of
zones M2 is big. As a consequence, in order to accelerate power map building we can use
polynomial interpolation to assign a power value to zones which has not been visited yet.
Namely, let us assume that zone Zj has not been assigned a power value yet. Moreover, let
Zj1 and Zj2 be the nearest zones and aligned to Zj (as depicted in the examples of Figure 8),
with a power value assigned. We can use linear interpolation to assess the power value
P (xj, yj) of Zj as follows. When the zone j-th is between zone j1 and j2 (Figure 8(a) and (b)),
assessed power value of P(xj, yj) of zone j-th is given by:
D jj2 D jj1
( )
P xi , y j =
D jj1 + D jj2
(
P x j1 , y j1 + ) D jj1 + D jj2
( ) j j
P x j2 , y j2 , with D j 1 < D j 2 , (21)
where
(xj − xj ) + (y j − y j )(xj − xj ) + (y j − yj )
2 2 2 2
D jj1 = 1 1
, D jj2 = (22)
2 2
are the Euclidean distances between the centers of the zones Z j = ( x j , y j ) and Z j = ( x j , y j )
with Z j = ( x j , y j ) , respectively. Conversely, when Z is not between Z j and Z j , as
1 2
j 1 2
depicted in Figure 7 (c) and (d), the assessed power value P (xj, yj) of the zone j-th is given
by:
D jj2 D jj2
(
P xj ,yj = ) D jj2 − D jj1
(
P x j1 , y j1 − ) D jj2 − D jj1
( )
P x j2 , y j2 . (23)
It is worth highlighting that linear interpolation through (22) and (23) brings about errors in
the power map. In addition, the exploitation of (22) and (23) starting from the power values
of all visited zones does not guarantee completion of the power map. In general, a sufficient
240 Recent Advances in Wireless Communications and Networks
y y
j2
j2 (a) (b)
D = 2
j1
D =2 2
j1
j j
j j
j1 D =2 2
j2
j D jj2 = 3 2
j1
y x y x
(c) j (d)
D =2 j1 j1
D = 5
j2 j1 j j
j1 j
D =3 j2
j D jj2 = 2 5
j2
x x
Fig. 8. Power Map built according to the displacement of zones
number of visited zones has to be achieved prior completion of the power map is possible.
Such number is also dependent on the actual path of the MN in the lattice.
Let us introduce a coefficient to denote the degree of reliability of the power map at time n.
Let VZn be the set of visited zones up to time n. We introduce the Map Reliability Index
MRIn at time n as follows:
VZn
MRI n = , (24)
M2
where M2 is the total number of zones in the square lattice. We fix empirically a threshold
value MRITH for the index in (24) beyond which the knowledge of the visited environment is
regarded acceptable. Only when this threshold value is reached MRITH, polynomial
interpolation with (22) and (23) is started. As in (Wang et al., 2001), a lookup table of power
profiles in each visited area is stored in the MN’s database.
Basically, each visited zone size depends on the rate of change of the received power signals.
For example, Lzone = 50 m is typical for a macro-cell with a slow average power variation, and
Lzone = 10 m for a microcell with a fast signal change. Then, each zone size has pre-measured
signal means and standard deviations for the serving cell and the neighbouring cells.
Figure 9 shows how a visited zone is built. The MN is in position P1 =(x1, y1), while
P2 = (xc, yc) is the centre of a WLAN/UMTS cell. We can evaluate the angle α between the
line from P1 and P2 and the horizontal plane, as:
⎛ y − yc ⎞
α = arcsin ⎜⎜ (25)
⎟⎟ ,
⎝ P1 P2 ⎠
Connectivity Support in Heterogeneous Wireless Networks 241
where P1 P2 is the distance from P1 and P2 obtained according to the Euclidean formula. The
angle α is adopted to get the power attenuation, as we assume that the WLAN/UMTS cell
radius rWLAN/UMTS strictly depends on a factor γ (α), that modifies the cell radius value, as:
⎛ α − ϕ kWLAN /UMTS ⎞
γ (α ) = 1 + 0.8 ⋅ sin ⎜ ⎟⎟ , (27)
⎜ 2
⎝ ⎠
where ϕ k represents the k-th WLAN/UMTS cell down-tilt value, such as
360
ϕ kWLAN /UMTS = k ⋅ , (28)
N WLAN /UMTS
which depends on the number of WLAN/UMTS cells NWLAN/UMTS, (i.e. 10 and 3 WLAN
access points and UMTS base stations, respectively). So, the factor γ (α) is in the range [0.2,
1.8], and rWLAN/UMTS (α) will be decreased or increased of 80% of rWLAN/UMTS.
P1 = ( x , y )
P2 = ( xc , yc )
wireless cell
Fig. 9. Trigonometric approach for path loss map building in a (circular) wireless cell
environment
PM ( xM , yM )
Pc ( xc , yc ) α
wireless cell
Fig. 10. Trigonometric approach for path loss map building in (anisotropic) wireless cell
environment
The boundary of a cell in the power map is identified by a set of values of the power
approaching the network sensitivity μ. When such values are not available in the power
map they can be obtained through polynomial interpolation. The centre of the cell is instead
identified with the maximum power value.
Once the boundary and centre of each cell k-th in the power map has been identified as a set
of points, it is possible to assign an angle αk to each point of the boundary with respect of the
centre of the cell and its distance Rcell (αk). The list of radius Rcell (αk) for each cell k-th is
exploited by the ELB scheme.
Connectivity Support in Heterogeneous Wireless Networks 243
It follows that the maximum GP in a WLAN and UMTS cell can be calculated with the
following approximated formulas, which replace (17) as:
⎧ ⎧⎛ UMTS γ ⎫
⎪GPUMTS = BW UMTS ⋅ Pr ⎪⎜ Rcell (α ) ⎟ + δ A < 1⎪
⎞
⎪ max max ⎨ ⎜ UMTS ⎟ d ⎬
⎪ ⎪⎩⎝ r ⎠ ⎭⎪
⎨ (29)
⎧⎛ R WLAN α ⎞ γ ⎫
⎪ ⎪ ( ) ⎪
WLAN
⎪GPmax WLAN
= BWmax ⋅ Pr ⎨⎜ cellWLAN ⎟ + δ Ad < 1⎬
⎪ ⎜ r ⎟
⎪⎩⎝ ⎠ ⎭⎪
⎩
However, the handover decisions are still taken on the basis of (19).
4. Conclusions
In this chapter we described the main aspects of vertical handover procedure. This
mechanism is oriented to ensure and maintain service continuity for mobile users in
heterogeneous wireless network environments. Three different vertical handover strategies
have been investigated, such as (i) the multi-parameter QoS-based approach, (ii) the
location-based algorithm and (iii) the hybrid vertical handover technique.
The multi-parameter QoS-based VHO assumes both subjective and objective video quality
metrics as handover decision criterion, such as a vertical handover is initiated whenever the
QoS level is decreasing under a fixed threshold. In the location-based VHO the mobile node
position is exploited in order to estimate some network performance (i.e. goodput figure). A
handover is then initiated whenever a selected candidate network guarantees higher
performance than the serving network.
Finally, we illustrated the third vertical handover technique (i.e. HVHO), that is an hybrid
approach based on both power measurements and location information. The HVHO
develops an enhanced location-based approach to build and maintain path loss maps, which
provides an updated description of the wireless cells in a visited environment. The use of
combined location and power information to drive handover decisions brings about
goodput enhancements, while assuring a limited VHO frequency with respect to simple
single-parameter techniques.
5. References
Makhecha K. P. & Wandra K. H. (2009). 4G Wireless Networks: Opportunities and Challenges,
Annual IEEE India Conference (INDICON), pp.1-4, December 2009.
Lin M.; Heesook Choi; Dawson T. & La Porta T. (2010). Network Integration in 3G and 4G
Wireless Networks, Proceedings of 19th International Conference on Computer
Communications and Networks (ICCCN), pp.1-8, August 2010.
Balasubramaniam S. & Indulska J. (2004). Vertical handover supporting pervasive computing in
future wireless networks, Computer Communications, Vol. 27, Issue 8, pp. 708–719, 2004.
Knightson K.; Morita N. & Towle T. (2005). NGN architecture: generic principles, functional
architecture, and implementation, IEEE Communication Magazine, Vol. 43, Issue 10,
pp. 49–56, October 2005.
McNair J. & Fang Z. (2004). Vertical handovers in fourth-generation multinetwork
environments, IEEE Wireless Communications, Vol. 11, Issue 3, pp. 8–15, June, 2004.
244 Recent Advances in Wireless Communications and Networks
Pollini G. P. (1996). Trends in handover design, IEEE Communication Magazine, Vol. 34, No.
3, March 1996, pp. 82–90.
Inzerilli T. & Vegni A. M. (2008). A reactive vertical handover approach for WiFi-UMTS
dual-mode terminals, Proceeding of 12th Annual IEEE International Symposium on
Consumer Electronics, April 2008, Vilamoura (Portugal).
Ayyappan, K. & Dananjayan, P. (2008). RSS Measurement for Vertical Handover in
Heterogeneous Network, Journal of Theoretical and Applied Information Technology,
Vol. 4, Issue 10, October 2008.
Vegni A. M.; Carli M.; Neri A. & Ragosa G. (2007). QoS-based Vertical Handover in
heterogeneous networks, Proceeding on 10th International Wireless Personal
Multimedia Communications, December 2007, Jaipur (India).
Yang K.; Gondal I.; Qiu B. & Dooley L. S. (2007). Combined SINR based vertical handover
algorithm for next generation heterogeneous wireless networks, Proceeding on IEEE
GLOBECOM 2007, November 2007, Washinton (USA).
Vegni A. M.; Tamea G.; Inzerilli T. & Cusani R. (2009). A Combined Vertical Handover
Decision Metric for QoS Enhancement in Next Generation Networks, Proceedings of
IEEE International Conference on Wireless and Mobile Computing, Networking and
Communications 2009, pp. 233–238, October 2009, Marrakech (Morocco).
Kibria M. R.; Jamalipour A. & Mirchandani V. (2005). A location aware three-step vertical
handover scheme for 4G/B3G networks, Proceeding on IEEE GLOBECOM 2005, Vol.
5, pp. 2752–2756, November 2005, St. Louis (USA).
Kim W. I.; Lee B. J.; Song J. S.; Shin Y. S. & Kim Y. J. (2007). Ping-Pong Avoidance Algorithm
for Vertical Handover in Wireless Overlay Networks, Proceeding of IEEE 66th
Vehicular Technology Conference, pp. 1509-1512, September 2007.
Inzerilli T.; Vegni A. M.; Neri A. & Cusani R. (2008). A Location-based Vertical Handover
algorithm for limitation of the ping-pong effect, Proceedings on 4th IEEE International
Conference on Wireless and Mobile Computing, Networking and Communications,
October 2008, Avignon (France).
Gupta V.; Williams M. G.; Johnston D. J.; McCann S.; Barber P. & Ohba Y. (2006) IEEE 802.21
Overview of Standard for Media Independent Handover Services, IEEE 802 Plenary,
San Diego, CA, USA, July 2006.
Golmie N.; Olvera-Hernandez U.; Rouil R.; Salminen R. & Woon S. (2006). Implementing
Quality of Service based handovers using the IEEE 802.21 framework, IEEE 802.21
session 15 San Diego, California, July 2006.
Shin J.; Kim J. W. & Kuo C. C. J. (2001). Quality-of-Service Mapping Mechanism for Packet
Video in Differentiated Services Network, IEEE Transactions on Multimedia, Vol. 3,
no. 2, June 2001.
Vegni A. M. (2010). Multimedia Mobile Communications in Heterogeneous Wireless Networks -
Part 2, PhD thesis, University of Roma Tre, March 2010, available online at
http://www.comlab.uniroma3.it/vegni.htm
Wang S. S.; Green M. & Malkawi M. (2001). Adaptive Handoff Method Using Mobile
Location Information, Proceedings on IEEE Emerging Technology Symp.
Broadband Comm. for the Internet Era Symposium, pp. 97-101, September 2001.
Inzerilli T.; Vegni A. M.; Neri A. & Cusani R. (2010). A Cross-Layer Location-Based
Approach for Mobile-Controlled Connectivity, International Journal of Digital
Multimedia Broadcasting, vol. 2010, 13 pages, 2010.
12
1. Introduction
Communications networks, particularly Internet, allow starting new businesses, to improve
the current ones, and to offer an easiest access to new markets. Nowadays, Internet connects
millions of terminals in the world, and it is a goal that this connection could be done with
anyone, at any moment, and anywhere. In order to achieve this target, new lax and varied
access requirements are needed. It is expected that a user would be able to access network
services in a transparent way disregarding the location. The user terminal could seamlessly
use the best available access technology (e.g., WLAN (Wireless Local Area Networks), LTE
(Long Term Evolution), or PLC (Power Line Communications)), and service provisioning
should agree with the user contract. This convergence of communications networks is
giving rise to new challenges. The Internet Protocol (IP) has been selected to provide the
necessary interconnection among all wireless and wired existing technologies. However, the
use of IP does not solve all drawbacks. Multimedia applications show that current transport
protocols like TCP (Transmission Control Protocol) or UDP (User Datagram Protocol) are
not good enough to meet the new quality requirements.
To face these new challenges, the IETF (Internet Engineering Task Force) defined a new
transport protocol called Stream Control Transmission Protocol (SCTP) (Stewart, 2007),
whose main features are multihoming and multistreaming. Multistreaming allows
transmission of several data streams within the same communication, splitting the
application data into multiple streams that have the property of independently sequenced
delivery, so that message losses in any one stream will only initially affect delivery within
that stream, and not delivery in other streams. On the other hand, multihoming allows
binding one transport layer’s association to multiple addresses at each end of the SCTP
association. The binding allows a sender to transmit data packets to a multihomed receiver
through one of those different destination addresses. Therefore, SCTP is not only intended
for signaling, but it can be used for any data application transport. The first studies about
the performance of SCTP showed promising results. For instance, in (Kamal et al., 2005),
authors evaluate the benefits of using SCTP instead of TCP as the underlying transport
protocol for a MPI (Message Passing Interface) middleware. Darche et al. (2006) presented a
network architecture to enhance the cooperation of mobile and broadcast networks using
SCTP as the transport layer protocol. In (Shaojian et al., 2005), authors study the suitability of
SCTP for satellite networks. Kim et al. investigate in (Kim et al., 2006) the applicability of
SCTP in MANET (Mobile Ad hoc NETworks). In (Kozlovszky et al., 2006), authors carry out
246 Recent Advances in Wireless Communications and Networks
2. Related work
The SCTP features are described in this section. In addition, a survey about the applicability
of SCTP in wireless environments has been also included. Among the advantages of using
SCTP in wireless networks, mobility and multimedia transmission are highlighted,
reviewing the most relevant works in these two areas. Other improvements like security or
the introduction of redundancy for data delivery are also mentioned.
function). The IP addresses of the SCTP association could be exchanged even if the
association is already in use, i.e., it is possible to include new IP addresses during the
communication (Stewart et al., 2007). This feature is known as Dynamic Address
Reconfiguration or Mobile SCTP.
Shutdown. SCTP shutdown procedure uses three messages: shutdown, shutdown ack, and
shutdown complete. Each endpoint has an ack of the data packets received by the remote
endpoint before closing the connection. SCTP does not support a half open connection, but it
is assumed that if the shutdown initiates, then both endpoints will stop transmitting data.
Focusing on vertical handover between WLAN and cellular networks, particularly UMTS
(Universal Mobile Telecommunication System), authors in (Ma et al., 2007) proposed a very
interesting error recovery scheme called Sending-buffer Multicast-Aided Retransmission
with Fast Retransmission that increases the throughput achieved during the SCTP
connection in the presence of forced vertical handovers from WLAN to UMTS. A forced
vertical handover occurs when the mobile node leaves the WLAN coverage due to the loss
of signal and switches to the cell network. The advantages of using SCTP for vertical
handovers were clearly identified in (Ma et al., 2004): higher throughput, shorter delay, a
simpler network architecture, and ease to adapt network congestion and flow control
parameters to the new network; but a scenario with forced handovers involves important
packet losses. Ma, Yu & Leung (2007) categorized these packet losses as dropping
consecutive packets because of the loss of signal (WLAN) and random packet losses over the
cellular link. To deal with these different types of errors, the authors propose to use two
solutions. First, packet losses due to the loss of signal enable the Sending-buffer Multicast-
Aided Retransmission algorithm, which multicast all buffered data on both the primary and
the alternate address (observe that in a standard implementation SCTP only retransmits
data to the alternate address if the error was due to a time out). The same applies to new
data that needs to be sent. Second, packet losses likely due to random packet losses over the
link (detected by the reception of duplicated acknowledgments) activate the Fast
Retransmission algorithm, which force the retransmission to be done to the same destination
IP address. With these two algorithms, long waiting delays are avoided, thus increasing the
achieved throughput. Working on the same heterogeneous scenario with WLAN and UMTS
networks, Shieh et al. (2008) detected that SCTP significantly decreases the congestion
window when new primary addresses are used in the SCTP association (i.e., during a
handover). Therefore, they proposed to assign an adequate initial congestion window
according to the bandwidth available in the new path, so the association can skip the slow-
start phase and enter the congestion avoidance phase directly. Packet-pair bandwidth
proving is used to estimate the available bandwidth in the new path. Authors demonstrated
the feasibility and goodness of their proposal through simulation. From an experimental
point of view, authors in (Bokor et al., 2009) designed and implemented a real native IPv6
UMTS-WLAN testbed to evaluate the effect of SCTP parameter configuration in terms of
handover effectiveness, link changeover characteristics, throughput, and transmission delay.
Among the most important parameters that have an effect on handover are: RTO.Min,
RTO.Max, Path.Max.Retransmission, and HB.Interval. Authors verified that with the standard
parameters, the handover delay would rise exponentially due to RTO redoubling, but using
a more appropriate setting the handover delay rises linearly when the RTO is incremented.
They also recommended keeping the HB.Interval (the time that elapses between
consecutive heartbeat monitoring messages) as low as possible. Finally, they found that the
SCTP performance in terms of delay, jitter, and throughput was better in UMTS than in
WLAN.
From another perspective, authors in (Lee et al., 2009) studied a mobile web agent
framework based on SCTP. Typical web agents use TCP as transport protocol. However,
mobile web agents using TCP present the following drawbacks: performance degradation,
head-of-line (HOL) blocking, and unsupported mobility (as identified by IEEE Std 802.11-
1997 and IEEE 802.16e-2005). By transmitting each object in a separate stream, SCTP solves
the HOL problem. Mobility is achieved by the SCTP multihoming capability. To improve
the performance, authors assumed that mean response time between HTTP requests and
250 Recent Advances in Wireless Communications and Networks
replies is the most important performance parameter in a web environment. Therefore, they
proposed to use SCTP to decrease the response time compared to the classical TCP
implementation of web agents. Authors described the complete architecture for the mobile
SCTP web agent framework. By simulation, they found that the mean response time
decreased notably (around 30%) by using SCTP. The mean packet loss was also smaller with
SCTP, and the faster the moving speed the better the SCTP performance in terms of packet
loss compared to TCP.
Regarding the option of introducing crosslayer techniques to combine the SCTP features
with information available at lower levels, the IEEE introduced the IEEE 802.21-2008 Media
Independent Handover (MIH) as a way to provide link layer intelligence and other related
network information to upper layers. MIH does not carry out the network handover, but it
provides information to allow handover within a wide range of networks (e.g., WiFi,
WiMAX, 3G, etc.). In (Fallon et al., 2009) authors proposed to separate path performance
evaluation (i.e., how SCTP detects that a path is no longer available) from path switching
(i.e., update the new addresses of the primary path in the SCTP association). Whereas the
first task will be done with MIH, SCTP will only be in charge of the second task (path
performance is disabled in SCTP). By simulation, authors demonstrated that the
combination of SCTP and MIH reacts to sudden performance degradation resulting from
obscured line of sight in a heterogeneous scenario with WiMAX and HSDPA technologies.
Indeed, the throughput of the SCTP connection improved notably (from 5% to 45%)
compared to the standard SCTP implementations.
Network Mobility (NEMO), commonly used in military or vehicular applications, has been
also studied from a SCTP perspective. In host mobility, a network in which terminals
change their location, mobility is managed through the mobile node itself. In a mobile
network, mobility is managed by a central node (e.g., a bus providing a WLAN service that
moves around a city, hence changing the access point from which obtains Internet access).
Leu & Ko (2008) proposed a method that combines SIP and SCTP with the aim of
minimizing delay and packet losses during the handovers of a mobile network. With the
authors’ proposal, packet losses decreased significantly. Similarly, Huang & Lin (2010)
presented a method to improve the bandwidth use and the achieved throughput in
vehicular networks by using SCTP. Their approach is explained as follows. In a Vehicle to
Infrastructure network (V2I), moving vehicular nodes communicate with Road Side Units
(RSU) deployed in a specific area. RSU are connected to the wired infrastructure, e.g.,
providing Internet access to mobile vehicular nodes. Usually, several RSU share the same
gateway to access the infrastructure. Therefore, authors proposed to use this gateway as a
SCTP-packet monitoring station, buffering all SCTP packets containing data chunks. In the
event of a packet loss, the gateway (not the destination node, which is assumed to be in the
wired part of the network) will be in charge of retransmitting lost packets in the wireless
link. With this scheme, the wired part of the communication is used more efficiently because
no retransmissions are sent (unless the packet loss occurs in the wired part of the network).
Moreover, since the destination node is not informed about packet losses in the wireless part
of the network, its congestion window does not decrease as much, keeping a higher
throughout rate in average. The performance of this proposal was done through simulation.
Authors verified that the achieved throughput, the transmission time, and the congestion
window behaved better with their approach than with the standard SCTP
implementation.
On the Use of SCTP in Wireless Networks 251
Switching from UDP or TCP to SCTP (with Dynamic Address Reconfiguration) provides a
seamless way for the user to roam maintaining the QoS level of the VoIP call. Authors
analyzed their proposal in a real testbed. Nevertheless, results showed that although
mobility was achieved, the delay was higher with their proposal.
Live TV broadcasting over wireless technologies could also benefit from the use of SCTP.
Liu et al. (2010) introduced a method to provide an economic way of live news broadcasting
by using SCTP. Satellite News Gathering (SNG) vehicles, which usually use satellite links
for transmission, are an expensive service for TV companies, mainly due to the required
equipment. In this case, the current deployment of WiMAX networks is a feasible alternative
to satellite communication, but the bandwidth offered by WiMAX is not enough to provide
a live TV service with QoS demands. Therefore, the authors proposed to take advantage of
all available wireless networks, not only WiMAX but also HSDPA or WiFi, thus increasing
the available bandwidth. A SCTP multi-link connection with both multihoming and multi-
streaming was a key point for this implementation. SCTP Concurrent Multipath Transfer,
which will be explained in next section, is also needed. With an experimental testbed,
authors demonstrated the feasibility of their proposal, not only achieving a cost-effective
system to provide live TV broadcasting but also increasing the coverage of previous SNG
systems.
delay wireless network.” Consequently, authors proposed a new modification of the SCTP
called Wireless Concurrent Multipath Transfer SCTP (WCMT SCTP). With this modification,
each SCTP path delivers packets belonging to the same stream (one or more than one). For
instance, if there are three paths available and there are five streams, then the first path only
transmits packets from the first stream, the second path only transmits packets from streams
two and three, and the third path only transmits packets from streams four and five.
Authors also added other changes to the standard CMT implementation: a per-path
congestion control mechanism, a new congestion control mechanism and a new
retransmission mechanism that takes into account the type of error. Results obtained by
simulation showed that WCMT SCTP performs better than CMT SCTP in ad hoc networks.
In a similar way, Yuan et al. (2010) improved the CMT SCTP mechanism by categorizing the
streams depending on their specific QoS requirements, and grouping those streams with
similar QoS needs in subflows that are sent through the more appropriate paths available in
the SCTP association. Finally, the work done in (Xu et al., 2011) showed how to optimize
CMT SCTP for video and multimedia content distribution.
Another interesting works that improve the performance of SCTP in wireless environments
from different perspectives are (Cui et al., 2007; Cano et al., 2008; Lee & Atiquzzaman, 2009;
Cheng et al., 2010; Funasaka et al., 2010). Cui et al. (2007) proposed to use a hierarchical
checksum method that improves the retransmission procedure, thus increasing the achieved
throughput in links with high packet losses. Cano et al. (2008) investigated how to combine
the use of IPSec (Internet Protocol Security) with SCTP to enhance the security of the
wireless communication. The work done in (Lee & Atiquzzaman, 2009) presented an
analytical model to estimate the delay of HTTP over SCTP in wireless scenarios. Last, Cheng
et al. (2010) proposed to use two new methods for bandwidth estimation and per-stream-
based error recovery.
Library Description
netinet/sctp.h It contains definitions for SCTP primitives and data
structures.
netdb.h It contains definitions for network database operation, e.g.
translation.
sys/socket.h It defines macros for the Internet Protocol family such as the
datagram socket or the byte-stream socket among others.
netinet/in.h It contains definitions of different types for the Internet
Protocol family, e.g. sockaddr_in to store the socket
parameters (IP address, etc.).
arpa/inet.h To manage numeric IP addresses, making available some of
the types defined in netinet/in.h
Table 2. Description of the libraries related to SCTP network communication
3. Implementation
For the sake of simplicity, we implement three SCTP client/server applications. The first one
is called single SCTP, the second one is called multistream SCTP, and the last one is called
multihomed SCTP. Single SCTP is very similar to TCP, since it will be able to transmit just
254 Recent Advances in Wireless Communications and Networks
one data stream between source and destination endpoints. Multistream SCTP includes
multistreaming, and finally, multihomed SCTP incorporates multihoming. The three
implementations are written in C code. We use the libraries provided by the Berkeley Socket
Application Programming Interface, which are briefly described in Table 2. Next sections
detail the practical SCTP implementation issues.
Fig. 1. Extract of the original SCTP client code in a single file transmission
In Fig. 2, we define how to implement a SCTP server. In this case, to execute the server, no
parameters are needed in the command line. We define a constant called MYPORT to
include the port number associated to the server IP address (see code line 12 in Fig. 2). The
server IP address is automatically set to any local IP address available (see code line 13 in
Fig. 2). Then, we follow the usual sequence to set up the server. First, we create the socket
with the socket() function. As indicated before, the socket protocol is set to IPPROTO_SCTP
(see code line 15 in Fig. 2). Then, we set the socket parameters with the bind() function (see
code line 18 in Fig. 2). Afterwards, we execute listen() so that the server can receive a specific
number of client requests (see code line 20 in Fig. 2). The accept() function makes the server
to wait for client requests (see code line 25 in Fig. 2). Finally, if a client request is received,
the client is served by a child process due to the fork() function (see code line 27 in Fig. 2). To
make it compatible with IPv6, lines indicated in Table 4 should be replaced.
Fig. 2. Extract of the original SCTP server code in a single file transmission
256 Recent Advances in Wireless Communications and Networks
1 int main()
2 {
3 int connSock, in, ret;
4 struct sockaddr_in servaddr;
5 struct sctp_status status;
6 struct sctp_sndrcvinfo sndrcvinfo;
7 struct sctp_event_subscribe events;
8 struct sctp_initmsg initmsg;
9 int numElem=0, firstTime=1;
10 connSock = socket( AF_INET, SOCK_STREAM, IPPROTO_SCTP ); //IPv4
11 memset( &initmsg, 0, sizeof(initmsg) );
12 initmsg.sinit_num_ostreams = 30; //max streams
13 initmsg.sinit_max_instreams = 30; //max streams
14 initmsg.sinit_max_attempts = 5; //max attempts
15 ret = setsockopt( connSock, IPPROTO_SCTP, SCTP_INITMSG,&initmsg,
sizeof(initmsg) );
16 bzero( (void *)&servaddr, sizeof(servaddr) ); //server to connect to
17 servaddr.sin_family = AF_INET;
18 servaddr.sin_port = htons(MY_PORT_NUM);
19 servaddr.sin_addr.s_addr = inet_addr("192.168.1.10" );
20 ret = connect( connSock, (struct sockaddr *)&servaddr, sizeof(servaddr) ); //connect
to the server
21 memset( (void *)&events, 0, sizeof(events) );
22 events.sctp_data_io_event = 1;
23 ret = setsockopt( connSock, SOL_SCTP, SCTP_EVENTS,(const void *)&events,
sizeof(events) );
24 //File transfer
25 //Loop to receive the different streams
26 in = sctp_recvmsg( connSock, (void *)buffer, sizeof(buffer),(struct sockaddr *)NULL,
0, &sndrcvinfo, &flags );
27 if(in==0)
28 break;
29 //Store each stream in its corresponding file
30 if (sndrcvinfo.sinfo_stream == STREAM1)
31 { if(firstTime)
32 {fp=fopen("reciboweb.txt","wb"); firstTime=0;}
33 numElem=fwrite(buffer, 1, 1024, fp);
34 if(num_elementos<1024) {fclose(fp); break;} }
35 else if (sndrcvinfo.sinfo_stream == STREAM2) 42
36 {//Save this stream in its corresponding file, lines 31-41}
37 else if ...//Save each stream in its corresponding place
38 //End loop to receive different streams
39 fclose(fp);
40 close(connSock);
41 return 0; }
SCTP association. Both client and server agree on this parameter (see code lines 12-15 in
Fig. 3). Afterwards, both the server IP address and the port number to connect to are
indicated (see code lines 16-19 in Fig. 3). Next, the client connects to the server (see code line
20 in Fig. 3). Finally, we enable data delivery with the function setsockopt() (see code lines 21-
23 in Fig. 3). By doing so, the client is able to use the primitive sctp_recvmsg() for data
delivery. At this point, the client is ready to receive data in multiple streams within the same
SCTP association.
On the other hand, the SCTP server multistream implementation also needs some variations
compared to the SCTP server single implementation. First, we declare data structures. After
that, we create the SCTP socket as explained in the previous section (see code line 8 in Fig.
4). Then, the server IP address is automatically set to any local IP address available, the port
is assigned, and the bind() function is called (see code line 9-13 in Fig. 4). The maximum
number of ingoing and outgoing streams is specified now (see code lines 15-18 in Fig. 4).
Observe that it is the same value used previously for the client implementation. Next, the
server remains listening for client requests (see code line 19 in Fig. 4). If there is a client
request, then the server accepts the connection, and it starts sending the corresponding files.
Once a client is connected to the server, the information sent from the server to the client
should be identified, so that the client knows what file (stream) the data belong to. Whereas
the source (the server in this case) is in charge of assigning an identifier to each stream,
which is done with the sctp_sendmsg()function and a stream number (see line 28 and 35 in
Fig. 4), each stream is identified using the sndrcvinfo.sinfo_stream field (see line 30 and 35 in
Fig. 3) in the receiving side (the client in this case).
4. Experimental results
Three different scenarios are evaluated to compare the performance of SCTP vs. TCP. In the
first scenario, our SCTP application transfers a single text file, a single mp3 file, or a single
mpeg file from server to client. We called it the single operation. In the second scenario, our
SCTP application transmits different types of files simultaneously from server to client. We
called it the multistream operation. The former is like a normal TCP transfer file operation.
The latter could emulate a web loading, where usually different types of multimedia files
are involved. In the third scenario, we test the multihoming feature in what we called the
multihomed operation. Next we describe the experimental topology, and discuss the
experimental results.
On the Use of SCTP in Wireless Networks 259
1 int main()
2 {
3 int listenSock, connSock, ret, msglen;
4 struct sockaddr_in servaddr;
5 struct sctp_initmsg initmsg;
6 FILE *fp;
7 int num_bytes=0;
8 listenSock = socket( AF_INET, SOCK_STREAM, IPPROTO_SCTP );
9 bzero( (void *)&servaddr, sizeof(servaddr) );
10 servaddr.sin_family = AF_INET;
11 servaddr.sin_addr.s_addr = htonl( INADDR_ANY );
12 servaddr.sin_port = htons(MY_PORT_NUM);
13 ret = bind( listenSock, (struct sockaddr *)&servaddr, sizeof(servaddr) );
14 memset( &initmsg, 0, sizeof(initmsg) );
15 initmsg.sinit_num_ostreams = 30;
16 initmsg.sinit_max_instreams = 30;
17 initmsg.sinit_max_attempts = 5;
18 ret = setsockopt( listenSock, IPPROTO_SCTP, SCTP_INITMSG, &initmsg,
sizeof(initmsg) );
19 listen( listenSock, 5 );
20 int i=0;
21 while( 1 )
22 {
23 connSock = accept( listenSock, (struct sockaddr *)NULL, (int *)NULL );
24 fp = fopen("textoweb.txt","rb");
25 do
26 {
27 num_bytes=fread( (void *)buffer, 1,1024, fp);
28 ret = sctp_sendmsg( connSock, (void *)buffer, (size_t)strlen(buffer),NULL, 0, 0, 0,
STREAM1, 0, 0 );
29 }while(!feof(fp));
30 fclose(fp);
31 fp = fopen("vaquero.jpg","rb");
32 do
33 {
34 num_bytes=fread( (void *)buffer, 1,1024, fp);
35 ret = sctp_sendmsg( connSock, (void *)buffer, (size_t)strlen(buffer),NULL, 0, 0, 0,
STREAM2, 0, 0 );
36 }while(!feof(fp));
37 fclose(fp);
38 ...//Send each file with its corresponding stream identifier
39 }
40 return 0; }
Fig. 5. Experimental topology. Laptops have Intel Centrino platforms, Intel Pentium M
740/1.73 GHz processors, and 1GB RAM. Operating system is Linux (SuSe 10.0)
4.2 Results
Results from the single operation tests show that TCP is slightly faster than SCTP in a single
file transmission. Table 6 includes the average transmission time for single-file transmissions
with TCP and SCTP and the corresponding confidence intervals. For instance, we observe
that the transmission of a 3 MB file with SCTP lasts 2.73 seconds compared to the 2.6
seconds of TCP. SCTP is slower than TCP for two reasons. Firstly because its socket
initiation time is 1ms larger (it uses four packets, adding the effect of the cookie mechanism).
Secondly, the monitoring of the path that the SCTP carries out periodically (heartbeat
mechanism) also introduces some overhead. As a result, the SCTP transmission lasts
approximately 3% more than the TCP one.
Regarding the multistream operation, the first clear conclusion is that TCP requires more IP
packets to proceed with these transmissions. A TCP connection requires three packets for
negotiation and four packets for shutdown. Therefore, the more files to transmit with TCP
the more packets, because it is necessary to establish a different connection to download
each file (each stream) with TCP. Likewise, a SCTP association needs four packets for
negotiation and three for shutdown, however, SCTP will only require an association for
downloading multiple files. Fig. 6 shows the overhead amount produced with SCTP and
TCP, where the x axis represents the number of files to be transmitted and the y axis the
number of bytes used. We represent in this figure the number of bytes used in TCP for
initiation and shutdown, as well as the number of bytes consumed by SCTP in initiation,
shutdown, and heartbeat packets. For the heartbeat mechanism, we consider sending the
On the Use of SCTP in Wireless Networks 261
heartbeat signal every 100ms, 250ms, 500ms, and 1 s. Observe that the time interval for
sending the heartbeat is an adjustable parameter. Clearly, the more frequent the heartbeat
the more bandwidth consumed. Assuming the minimum possible packet sizes for TCP and
SCTP, and taking into account the SCTP heartbeat mechanism, the overhead introduced by
TCP would be smaller than the one introduced by SCTP only if the heartbeat is very
aggressive. Otherwise, the fact of establishing one TCP connection for each file transmission
produces higher bandwidth consumption.
Fig. 6. Overhead introduced by TCP and SCTP. For TCP, the packet size is 20 bytes (we
assume no data is sent with the first ACK packet). For SCTP, we take the following minimum
packet sizes as indicated in (Stewart, 2007): INIT 20 bytes, INIT ACK 20 bytes, COOKIE ECHO
8 bytes, COOKIE ACK 4 bytes, HEARTBEAT REQUEST 4 bytes, HEARTBEAT ACK 4 bytes
On the other hand, socket initiation is still faster in TCP. However, since more sockets need
to be used in TCP, the total initiation time difference between TCP and STCP is shorter and
shorter as the number of files to be transmitted increases. Fig. 7 and Fig. 8 represent the
duration of initiating sockets in TCP versus initiating sockets in SCTP. Indeed, when two
multimedia files are transmitted (Fig. 7), the average time dedicated to sockets initiation in
TCP is 1.69 ms, while the average time is 1.73 ms for SCTP. However, if we send four
multimedia files, the average time increases to 3.4 ms average in TCP whereas
approximately the same value remains in SCTP (Fig. 8). Thus, when four files are
transmitted, SCTP total initiation time is half of the TCP total initiation time. Consequently,
results show that not only the SCTP multiple file transmission is faster than the TCP one,
262 Recent Advances in Wireless Communications and Networks
but it consumes less bandwidth. Table 7 includes the average times for a multiple-file
transmission and the corresponding confidence intervals.
Table 7. SCTP vs. TCP average transmission times in multistream operation tests
On the Use of SCTP in Wireless Networks 263
Finally, we test the multihoming SCTP feature in the topology shown in Fig. 5, where two
PCs are connected to each other through two interfaces (one is wired, the other is wireless).
We use the multistreaming SCTP client and server implementations shown in Fig. 3 and
Fig. 4 respectively, including the new lines shown in Table 5. At first, client and server are
using the wired network (primary IP addresses). Then, one of the wired network interface
card is disabled. Experimental results show that in less than 1 second SCTP reacts in the
presence of the network failure by replacing primary IP addresses with the alternative one
(wireless one) to continue with the transmission. The time to change the IP addresses in use
includes the ARP resolution, which is almost negligible in this scenario. Table 8 shows the
exchange of IP addresses in use.
5. Conclusion
In this work, we have presented a survey with the most relevant works on the applicability
of SCTP in wireless networks. We have categorized the benefits of SCTP for wireless
technologies in the following categories: mobility and handovers, multimedia transmission,
and other improvements related to multiple path transmission or security. We have also
shown the practical aspects of the design of a SCTP client/server application. In our
example, the SCTP application is used to download files from a server. We have described
the basics of how to enable multihoming and multistreaming capabilities in SCTP. We have
observed that it is quite easy to adapt current applications to the SCTP protocol. When
comparing to TCP, the advantages of SCTP are numerous (e.g., faster average transmission
times and resources saving), above all in applications that require the transmission of
multiple files. Moreover, multihoming allows increasing reliability, a key additional
requirement in multimedia applications over wireless networks.
6. Acknowledgment
This research has been supported by the MICINN/FEDER project grant TEC2010-21405-
C02-02/TCM (CALM).
7. References
Afif, M., Martins, P., Tabbane, S., & Godlewski, P. (2006a). Radio aware SCTP extension for
handover data in EGPRS. Proceedings 17th Annual IEEE International Symposium on
Personal, Indoor and Mobile Radio Communications PIMRC'06, pp. 1-5.
Afif, M., Martins, P., Tabbane, S., & Godlewski, P. (2006b). SCTP Extension for
EGPRS/WLAN Handover Data. Proceedings 31st IEEE Conference on Local Computer
Networks, pp. 746-750.
Aydin, I., & Shen, C.-C. (2009). Performance Evaluation of Concurrent Multipath Transfer
Using SCTP Multihoming in Multihop Wireless Networks. Proceedings 8th IEEE
International Symposium on Network Computing and Applications, pp. 234-241.
Balk, A., Sigler, M., Gerla, M., & Sandidi, M. Y. (2002). Investigation of MPEG-4 video
streaming over SCTP. Proceedings 6th World Multiconference on Systemics. Cybernetics.
and Informatics SCI’02, pp. 1-4.
Begg, C. L., Pawlikowski, K., Sirisena, H., & De Silva, P. (2007). Suitability of SCTP for High
Quality Video Streaming over CDMA2000. Proceedings Australasian
Telecommunication Networks and Applications Conference, pp. 496-502.
Bokor, L., Huszák, A., & Jeney, G. (2009). On SCTP Multihoming Performance in Native
IPv6 UMTS–WLAN Environments. Proceedings 5th International Conference on
Testbeds and Research Infrastructures for the Development of Networks & Communities
and Workshops TridentCom’09, pp. 1-10.
Cano, M.-D., Romero, J.A., & Cerdan, F. (2008). Experimental Tests on SCTP over IPSec.
Proceedings IFIP International Conference on Network and Parallel Computing NPC’08,
pp. 96-102.
Chang, L.-H., Huang, P.-H., Chu, H.-C., & Tsai, H.-H. (2009). Mobility Management of VoIP
services using SCTP Handoff Mechanism. Proceedings Symposia and Workshops on
Ubiquitous, Autonomic and Trusted Computing, pp. 330-335.
On the Use of SCTP in Wireless Networks 265
Cheng, R.-S., D.-J., Chao, H.-C., & Chen, W.-E. (2010). An Adaptive Bandwidth Estimation
Mechanism for SCTP over Wireless Networks. Proceedings 5th International
Conference on Future Information Technology, pp. 1-5.
Chughtai, H. M. O., Malik, S. A., & Yousaf, M. (2009) Performance Evaluation of Transport
Layer Protocols for Video Traffic over WiMax. Proceedings IEEE 13th International
Multioptic Conference, pp. 1-6.
Cui, X., Cui, L., & Koh, S. J. (2007). A Hierarchical Checksum Scheme for SCTP over Wireless
Networks with Worse Channel Condition. Proceedings International Conference on
Wireless Communications, Networking and Mobile Computing WiCom’07, pp.1845-1848.
Darche, D., Kopp, R., Mazieres, B., Lepage, F., & Gnaedinger, E. (2006). Using SCTP to improve
performances of hybrid broadcast/telecommunication network system. Proceedings of
IEEE Consumer Communications & Networking Conference, Vol. I, pp. 371-375.
Fallon, E., Murphy, L., & Murphy, J. (2009). Optimizing Metropolitan Area Wireless Path
Selection Using Media Independent Handover. Proceedings Second International
Workshop on Cross Layer Design IWCLD'09, pp. 1-5.
Honda, M., Sakakibara, H., Nishida, Y., & Tokuda, H. (2007). SmSCTP: A Fast Transport
Layer Handover Method Using Single Wireless Interface. Proceedings 12th IEEE
International Symposium on Computers and Communications ISCC’07, pp.319-324.
Huang, C.-M., & Lin, M.-S. (2010). RG-SCTP: Using the Relay Gateway Approach for
Applying SCTP in Vehicular Networks. Proceedings IEEE International Symposium on
Computers and Communications ISCC’10, pp. 139-144.
IEEE Std 802.11-1997. (1997). IEEE 802.11 wireless LAN medium access control (MAC) and
physical layer (PHY) specifications.
IEEE Std. 802.16e-2005. (2005). IEEE Standard for Local and metropolitan area networks.
Part 16: Air interface for fixed broadband wireless access systems.
IEEE Std. 802.21-2008. (2008). IEEE Standard for Local and metropolitan area networks. Part
21: Media Independent Handover Services.
Iyengar, J. R., Amer, P., & Stewart, R. (2006). Concurrent multipath transfer using SCTP
multihoming over independent end-to-end paths. IEEE/ACM Transactions on
Networking, Vol. 14, No. 5, pp. 951–964.
Kamal, H., Penoff, B., & Wagner, A. (2005). SCTP versus TCP for MPI. Proceedings of
ACM/IEEE SuperComputing Conference SC’05, pp. 30-44.
Kim, D., Song, J., Kim, J., Yoo, H., Park, J., & Cano, J.C. (2006). The Applicability of SCTP to
Mobile Ad Hoc Networks. Proceedings International Conference on Advanced
Communication Technology ICACT’06, Vol. 3, pp. 1979-1984.
Kohler, E., Handley, M., & Floyd, S. (2006). Datagram Congestion Control Protocol. RFC 4340.
Kozlovszky, M., Berceli, T., & Kutor, L. (2006). Analysis of SCTP and TCP based
communications in high speed clusters. Nuclear Instruments and Methods in Physics
Research Section A, Vol. 559, Issue 1, pp.85-896.
Lee, Y.-J. & Atiquzzaman, M. (2009). Mean Waiting Delay for Web Object Transfer in
Wireless SCTP Environment. Proceedings IEEE International Conference on
Communications ICC’09, pp. 1-5.
Lee, Y.-J., Lee, D.-W., & Atiquzzaman, M. (2009). Novel web agent framework to support
seamless mobility for data networks. IET Communications Journal, Vol. 3, No. 12, pp.
1861–1869.
Leu, F.-Y. & Ko, Z.-J. (2008). A Novel Network Mobility Scheme Using SIP and SCTP for
Multimedia Applications. Proceedings of International Conference on Multimedia and
Ubiquitous Engineering, pp. 564-569.
266 Recent Advances in Wireless Communications and Networks
Liu, H.-S., Hsieh, C.-C., Chen, H.-C., Hsieh, C.-H., Liao, W., Chu, P.-C., & Wang, C.-H.
(2010). Exploiting Multi-link SCTP for Live TV Broadcasting Service. Proceedings
IEEE 71st Vehicular Technology Conference, pp. 1-6.
Ma, L., Yu, F., Leung, V. C. M., & Randhawa, T. (2004). A new method to support
UMTS/WLAN vertical handover using SCTP. IEEE Wireless Communications, Vol.
11, No. 4, pp. 44-51.
Ma, L., Yu, F. R., & Leung, V. V. M. (2007). Performance Improvements of Mobile SCTP in
Integrated Heterogeneous Wireless Networks. IEEE Transactions on Wireless
Communications, Vol. 6, No. 10, pp. 3567-3577.
Mascolo, S., Grieco, L. A., Ferorelli, R., Camarda, P., & Piscitelli, G. (2004). Performance
evaluation of Westwood+ TCP congestion control. Performance Evaluation, Vol. 4,
No. 55, pp. 93–111.
Natarajan, P., Iyengar, J. R., Amer, P. D., & Stewart, R. (2006). SCTP: An innovative transport
layer protocol for the web. Proceedings 15th International World Wide Web Conference,
WWW’06, pp. 615-624.
Nosheen, S., Malik, S. A., Zikria, Y. B., & Afzal, M., K. (2007). Performance Evaluation of
DCCP and SCTP for MPEG4 Video over Wireless Networks. Proceedings IEEE 11th
International Multitopic Conference, pp. 1-6.
Perotto, F., Casetti, C., & Galante, G. (2007). SCTP-based Transport Protocols for Concurrent
Multipath Transfer. Proceedings IEEE Wireless Communications and Networking
Conference WCNC’07, pp. 2969-2974.
Shaojian, F., Atiquzzaman, M., & Ivancic, W. (2005). Evaluation of SCTP for space networks.
IEEE Wireless Communications, Vol. 12, No. 5, pp. 54-62.
Shieh, C.-S., Lin, I-C., & Lai, W. K. (2008). Improvement of SCTP Performance in Vertical
Handover. Proceedings of Eighth International Conference on Intelligent Systems Design
and Applications, pp. 494-498.
Stewart, R. (2007). Stream Control Transmission Protocol. RFC 4960.
Stewart, R., Xie, Q., Tuexen, M., Maruyama, S., & Kozuka, M. (2007). Stream Control
Transmission Protocol (SCTP) Dynamic Address Reconfiguration. RFC 5061.
Wang, B., Feng, W., Zhang, S.-D., & Zhang, H.-K. (2010). Concurrent multipath transfer protocol
used in ad hoc networks. IET Communications Journal, Vol. 4, No. 7, pp. 884–893.
Wang, H., Jin, Y., Wang, W., Ma, J., & Zhang, D. (2003). The performance comparison of
PRSCTP, TCP and UDP for MPEG-4 multimedia traffic in mobile network. Proceedings
International Conference on Communication Technology (ICCT), Vol. 1, pp. 403-406.
Wang, L., Kawanishi, K., & Onozato, Y. (2008). MPEG-4 Optimal Transmission over SCTP
Multi-streaming in 802.11 Wireless Access. Proceedings 7th Asian-Pacific Symposium
on Information and Telecommunication Technologies, pp. 172-177.
Wang, L., Kawanishi, K., & Onozato, Y. (2009).Achieving Robust Fairness of SCTP Extension
for MPEG-4 Streaming. Proceedings 20th Personal, Indoor and Mobile Radio
Communications Symposium PIMRC '09, pp. 2970-2974.
Wireshark. <http://www.wireshark.org>. Last visited March 20th, 2011.
Xu, C., Fallon, E., Qiao, Y., Zhong, L., & Muntean, G.-M. (2011). Performance Evaluation of
Multimedia Content Distribution Over Multi-Homed Wireless Networks. IEEE
Transactions on Broadcasting, Vol. PP (99), pp. 1-12.
Yuan, Y., Zhang, Z., Li, J., Shi, J., Zhou, J., Fang, G., & Dutkiewicz, E. (2010). Extension of
SCTP for Concurrent Multi-Path Transfer with Parallel Subflows. Proceedings IEEE
Wireless Communications and Networking Conference WCNC’10, pp. 1-6.
0
13
1. Introduction
The expansion and diversification of wireless communications are proceeding rapidly
with the diffusion of cellular phones, WiFi and WiMAX. However, concern is increasing
that the growth of wireless systems will exhaust finite wireless resources. Cognitive
radio technology(Mitorall & Maguire, 1999; Mitoralll, 1999; Harada, 2005), which has been
proposed as a solution to this problem, aims to optimize the utilization of diverse
wireless resources. Furthermore, AIPN (All-IP Network) (3GPP, 2005) and NGN (Next
Generation Network)(ITU, 2006) investigate the network architecture that accommodates
diverse communication media. Accordingly, we expect that in the near future, wireless access
networks will be composed of diverse wireless medias.
To exploit wireless media diversity in expected access networks, some bandwidth-aggregation
methods in wireless media have recently been proposed. Bandwidth-aggregation combines
diverse communication links in parallel and suitably distributes packets to communication
links. The works(Phatak & Goff, 2002; Snoeren, 1999; Shrama et al., 2007) aggregate wireless
links in IP to improve IP throughput. The work(Chebrou & Rao, 2006) also aggregates
wireless links in IP to decrease IP delay based on wireless media that provide a bandwidth
guarantee. The works(Hsieh et al., 2004; Zhang et al., 2004) aggregate communication links
in a transport layer to improve TCP throughput. Meanwhile, wireless access networks
process traffic of diverse application, and the traffic is classified by the following two types of
application traffic:
• Traffic of throughput-oriented application such as FTP and Web on TCP.
• Traffic of delay-oriented application such as VoIP and Video Conference on UDP.
Therefore, wireless access networks are required to provide high throughput and low
delay by diverse applications. The above works do not consider delay except for
the work(Chebrou & Rao, 2006), and the work(Chebrou & Rao, 2006) does not consider
IEEE802.11 that no bandwidth guarantee is provided. Furthermore, the works(Phatak & Goff,
2002; Snoeren, 1999; Shrama et al., 2007; Chebrou & Rao, 2006) improve IP performance, but
can not provide effective improvement of application performance because they do not
consider out-of-order packets which occur by the packet distribution to multiple links. The
works(Hsieh et al., 2004; Zhang et al., 2004) consider the out-of-order packet, and can improve
the performance of TCP application, but can not improve that of UDP application such as VoIP
and Video Conference.
268
2 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
802.11a/b 802.16
Transmission Rate 54Mbps/11a, 11Mbps/11b 75Mbps
Coverage 50m/11a, 100m/11b 1000m
CSMA/CA TDD/FDD
Access Control
(Decenteralized) (Centeralized)
Bandwidth Guarantee No Yes
Table 1. Performance of wireless systems.
In this chapter, assuming the expected wireless access network to be composed of IEEE802.11,
which is a popular wireless system, and IEEE802.16, which is expected to spread, a IP
packet distribution on the access route, which combines IEEE802.11-link and IEEE802.16-link
in parallel, is proposed to improve the application performance. The proposed packet
distribution increases IP throughput and decreases IP delay. Furthermore, it reduces
out-of-order packets and provides high throughput and low delay to both UDP applications
and TCP applications simultaneously.
Our works(Takizawa et al., 2008; Takizawa, 2008) have proposed the packet distribution
for combining IEEE802.11/16 wireless upload links. We expand the above packet
distribution to reduce out-of-order packets and to apply download traffic, and show
its essential characteristics of packet distribution for composite wireless access route of
IEEE802.11/16-links (call M-route) , then propose a packet distribution method for M-route.
Furthermore, we evaluate the method’s performance by multiple application traffic on both
UDP and TCP in a wireless access network composed of 802.11a, 802.11b and 802.16, which
have the different characteristic from each other (see Table 1).
The configuration of wireless access networks by wireless media diversity is assumed as
follows (see Fig. 1).
Network
16-antenna
16-link
11a-link
11b-link
11b-Coverage
11a/b-antenna 11a/b-antenna
11a-Coverage 11a-Coverage
11b-Coverage
i i i i i i i i f stage 0
b c i
Transmission Attempt Period
Transmission Waiting Period in range (0, 21CWmin-1)
i f stage 1
i s stage i
ptr = 1 − (1 − τ )n−1
( n − 1) τ (1 − τ ) n − 2
psuc =
ptr
pi = 1 − ptr (2)
ps = ptr · psuc
pc = ptr (1 − psuc )
q = (1 − τ ) n −1
where n is the number of terminal in the channel coverage, ptr is the probability that there
is at least one transmission in the slot time of the transmission waiting period, psuc is the
probability that a transmission occurring on the channel is successful, pi is the probability that
the slot time is idle in the transmission waiting period, ps is the probability that the channel
is busy due to a packet transmission success in the transmission waiting period, pc is the
probability that the channel is busy due to a collision in the transmission waiting period, and
q is the probability that a packet transmission success in the transmission attempt period. Let
B be the average time which the transmission waiting period takes until a packet transmission
succeeds, and let A be the average time which the transmission attempt period takes until a
Traffic Control
Traffic Control forWireless
for Composite Composite Wireless
Access Route Access
of IEEE802.11/16 Links Route of IEEE802.11/16 Links 2715
Source
RTS Data
SIFS DIFS
Destination
CTS SIFS SIFS
ACK
Others
NAV(RTS)
Others(Hidden)
NAV(CTS)
packet transmission succeeds, B and A are derived from a binary exponential backoff scheme
as follows(Carvalho & Garcia, 2003). (Note: In this section, "time" is the duration in slot time
units σ of IEEE802.11)
tb (ηCWmin − 1)
B= (3)
2q
tb = pi ti + ps ts + pc tc
q − 2r (1 − q )r +1 (4)
η=
1 − 2(1 − q )
1−q
A= tc + ts (5)
q
ti = 1
ts = RTS + SIFS + δ + CTS + SIFS + δ + H
(6)
+ PL + SIFS + δ + ACK + DIFS + δ
tc = RTS + DIFS + δ
where ti is the time of idle (i.e., one backoff slot), ts is the average time that the channel is
sensed busy due to a packet transmission success, tc is the average time that the channel is
busy due to a collision in the channel, RTS, CTS and ACK are time that RTS, CTS and ACK
frame is transmitted respectively, SIFS and DIFS are the interval time (see Fig. 3), δ is the
propagation delay, H is the time that a packet header is transmitted, and PL is the time the
payload is transmitted. According to Eq. (2), q = 1 − ptr , therefore, tb /q expresses the average
time that the backoff timer is decreased by one, and (ηCWmin − 1)/2 expresses the average
of sum of backoff timer in all stage. In Eq. (5), (1 − q )/q expresses the average number of
collision in the transmission attempt priod.
Then, the average packet service time S is argued using the above analysis. S is shown as
follows.
S = B+A (7)
When the number of terminal is constant, the dependence of S on τ is shown using the first
and second derivative of S at τ as follows.
dS d2 S
>0 >0 (8)
dτ dτ 2
Therefore, S is a convex monotonically increasing function of τ. Figure 4(a) illustrates the
dependence of S on τ by using Eq. (7) in 11b MAC parameter, transmission rate 11Mbps, a
272
6 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
number of terminals 10∼40, maximum backoff stage 5, and the payload size 1500 bytes, and
it also shows the same characteristics.
4
1x10 0.02
8
F in n=10 1x10
8000
7
0.015 8x10
2
F in n=30
(slot/packet)
2nd Moment of
6000 7
6x10
0.005
2000 2x10
7
1/S in n=10
Maximun Backoff Stage 5
1/S in n=20
Payload Size1500bytes 1/S in n=40 1/S in n=30
0 0 0
0 0.02 0.04 0.06 0.08 0.1 0 0.01 0.02 0.03 0.04 0.05 0 0.01 0.02 0.03 0.04 0.05
Tx Attempt Rate (Tx/slot) Tx Attempt Rate (Tx/slot) Tx Attempt Rate (Tx/slot)
In (Bianchi, 2000) and (Carvalho & Garcia, 2003), the transmission queue is assumed to be
always non-empty, thus, the dependence of τ on the packet arrival rate F is not considered.
Let F be the number of arrival packets at a link in a slot time, the dependence is argued. The
average number of arrival packets in period S is FS, and the average number of transmission
attempts on a successfully transmitted packet is (1 − q )/q + 1. Then, the average number of
that a packet transmission attempts in period S is FS/q. Therefore, τ is shown as follows.
FS F
τ= = (9)
qS q
Figure 4(b), which illustrates the dependence of F on τ using Eq. (9) in the same parameter as
Fig. 4(a). In Fig. 10, when F < 1/S (1/S is the packet service rate), that is, when the load does
not exceed the link capacity, and when the number of terminal is constant, F for τ is concavely
and monotonically increasing. Therefore, within link capacity, the dependence of F on τ is
shown using the first and second derivative of F at τ as follows.
dF d2 F
>0 <0 (10)
dτ dτ 2
˙ (10) as follows.
Furthermore, the first and second derivative of S on F is shown using Eqs.(8),
dS dS dτ dS 1
= = >0 (11)
dF dτ dF dτ dF
dτ
2 2 2
d S d S dτ dS 1
= − >0 (12)
dF 2 dτ 2 dF dτ d2 F
dτ 2
Therefore, within link capacity, S is a convex monotonically increasing function of F.
packet service time for NQ packets and R, which is the sum of the residual service time in each
packet arrival. Consequently, W is shown as follows.
W = NQ · S + R = F · W · S + R (13)
Each residual service time in a packet arrival is S2 /2S(Bertsetkas
& Gallager, 1992), where S2
is the second moment of S. The average number of packet arrivals in S is FS; accordingly, R is
FS2 /2. Applying the above relations to Eq. (13), W is given as
FS2
W= (14)
2(1 − FS )
Let V [ S ] be the variance of S, and it is shown as follows(Carvalho & Garcia, 2003)
2
tb (CWmin γ − 1) 1−q
V [S] = + tc
2 q2 (15)
[2q − 4q + 1 − r (−1 + 2q )q ][2(1 − q )]r + 2q2
2
γ=
(−1 + 2q )2
Using Eq. (15), S2 is shown as follows.
S2 = S + V (S ) (16)
Furthermore, using Eq. (16), the first and second derivatives of S2 at τ are shown, respectively,
as follows.
dS2 d2 S 2
>0 >0 (17)
dτ dτ 2
Figure 4(c) illustrates the dependence of S2 on τ using Eq. (16) in the same parameter as
Fig. 4(a), and it also shows the same characteristics. Furthermore, applying Eq. (10) to Eq. (17),
the first and second derivatives of S2 at F are shown, respectively, as follows.
dS2 d2 S 2
>0 >0 (18)
dF dF 2
Using Eqs. (14) (18), the first and second derivatives of W at F are shown, respectively, on the
condition of FS < 1, as follows.
dW d2 W
>0 >0 (19)
dF dF 2
FS < 1, that is, F < 1/S expresses the condition that a link load is with a link capacity.
Therefore, within a link capacity, W is also a convex monotonic increasing function of F.
dd d2 d
>0 >0 (20)
dF dF 2
Consequently, a 11-link cost d is also a convex monotonic increasing function of F within a
link capacity and in a fixed number of terminals.
mi = ∑ d( i,x ) (21)
x ∈Ui
Ui is the set of an uplink which is provided by a 11-wireless interface equipped with terminal i.
Here, in steady packet arrival rate, the packet distribution from an 11-uplink k to an 11-uplink
j in M-route of terminal i, is argued. In this case, the packet distribution to the other 11-uplinks
is constant, thus the dependence of F( i,j) on F( i,k) is shown as follows.
terminal i
mi
Composite Access Route of multiple links
mi = d(i,k ) + d(i, j )
interface a
F(i,a ) T(i,a ) link a
d(i,a ) Base Station
Cost
Queue
interface k d(i, j )
Fi F(i,k ) T(i,k ) link k d(i,k )
d(i,k ) Base Station
Queue
interface z
F(i,z) T(i,z) link z
d(i,z ) Base Station
Queue
F
(i,k)
(a) M-route cost for upload traffic. (b) Dependence of M-route cost
on packet distribution.
dmi (n )
≈ T( i,k) (n + 1) − T( i,j) (n + 1) > 0 (26)
dF( i,k)
Where, mi (n ) is M-route cost of terminal i in packet distribution of n time and T( x,y) (n + 1) is
average delay of 11-link y in terminal x in packet distribution of n + 1 time.
Consequently, when the packet distribution meets Eq.(26) which means the average delay
of source 11-uplink on packet distribution becomes larger than that of destination 11-uplink
on packet distribution, the M-route cost for upload traffic decreases and approaches the
optimal solution. Such packet distribution is repeated with the decrease in the amount of the
distributing packets (ΔF( i,k) → 0), and finally the average delay of source 11-uplink becomes
equal to that of destination 11-uplink, the M-route cost for upload traffic reaches its optimal
solution.
Furthermore, the search for the optimal solution of M-route cost has the additional
effectiveness which decreases the arrival of out-of-order packets because of the equalization
of the delay of source 11-link and destination 11-link.
and T( bs,k[i]) which is average delay of link k[i ] in base station, is common among the others.
Therefore, d( bs,k[i]) which is cost of 11-link k[i ] in base station, is shown as follows (see Fig. ??).
Base Station
interface K
F(bs,k[a ]) link k[a]
d(bs,k[a ]) Terminal a
Queue
F(bs,k[i]) T(bs,k )
d(bs,k[i]) link k[i]
Terminal i
Queue
mbs[i]
where T ( bs,k[i]) is the average delay of 11-interface k providing downlink k[i ] in base station.
That is, T ( bs,k[i]) is the average delay based on all the packets which are distributed to
11-interface k.
To argue the dependence of d( bs,k[i]) on F( bs,k[i]), the first derivative of d( bs,k[i]) at F( bs,k[i]) is
shown. Using Eq.(27), it is shown as follows.
dT ( bs,k[i])
>0 (29)
dF( bs,k[i])
dd ( bs,k [ i])
According to the condition Eq.(29), its is dF( bs,k [ i]) > 0, then d( bs,k[i]) is a monotonically
increasing function of F( bs,k[i]).
In the condition, the packet distribution from a 11-downlink k[i ] to a 11-downlink j[i ], is
argued. These 11-downlinks are contained in the M-route which aggregates 11-downlinks
to terminal i, and are respectively provided by different 11-interface (11-interface k and j).
The same as the packet distribution of M-route for upload traffic, the packet distribution to
the other 11-downlinks to terminal i, which is respectively provided by different 11-interface
except for 11-interface k and j, is constant, thus the dependence of F( bs,j[i]) on F( bs,k[i]) is shown
as follows.
dF( bs,j[i])
= −1
dF( bs,k[i])
d2 F( bs,j[i])
=0 (30)
d( F( bs,k[i]))2
Therefore, the first derivative of d( bs,j[i]) at F( bs,k[i]) in the condition Eq.(29) is shown as follows.
dmbs [i] (n )
≈ T ( bs,k[i])(n + 1) − T ( bs,j[i])(n + 1) > 0 (33)
dF( bs,k[i])
Where, mbs [i](n ) is the cost of M-route to terminal i from base station in packet distribution of
n time and T ( bs,y[ x ])(n + 1) is average delay of interface y in packet distribution of n + 1 time,
and the interface y provides 11-downlink to terminal x.
278
12 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
Furthermore, based on Eqs. (29) and (30), the dependence of T( bs,j[i]) on F( bs,k[i]) is shown as
follows.
dT ( bs,j[i])
<0 (34)
dF( bs,k[i])
That is, T ( bs,j[i]) is a monotonically decreasing function of F( bs,k[i]). Therefore, a cost of each
link in M-route should be considered a monotonically increasing function of the packet arrival
rate, and the cost of M-route is the sum of each link cost, is a multioptimization function of
F( bs,k[i]) (see Fig.6(b)). That is, mbs [i] has some local minimums for F( bs,k[i]) and the packet
distribution meeting Eq.(33) may not bring mbs [i] to the optimal solution.
On the other hand, T ( bs,k[i]) and T ( bs,j[i]) is respectively a monotonically increasing/decreasing
function for F( bs,k[i]), and then, in 0 ≤ F( bs,k[i]) ≤ Fbs [i], the number of solutions which
makes T ( bs,k[i]) equal to T ( bs,j[i]) is 1 in the maximum (see Fig. 6(c)). Consequently, the packet
distribution which meets Eqs.(29) and (33) is repeated, and finally it reaches T ( bs,k[i])(n + 1) −
T ( bs,j[i])(n + 1) = 0, then the M-route cost mbs [i] reaches its optimal solution. Furthermore, the
search for the optimal solution of M-route cost mbs [i] has the additional effectiveness which
decreases the arrival of out-of-order packets because of the equalization the delay of source
11-link and destination 11-link.
$# #
'
'
! $
&
&
#
' '
!
accordance with its four QoS classes. Furthermore, based on the analyzed dependence, the
characteristics of 16-link for packet distribution is shown.
Figure. 7 shows 16-frame in TDD. The frame consists of DL-subframe and UL-subframe.
Each subframe consists of time slots. Base station (BS) sends DL-MAP and UL-MAP in
DL-subframe, and all terminals listen to the DL-subframe, and know that they should listen
to slots in DL-subframe, and know that they should use slots in UL-frame to transmit data.
In such communications between BS and terminals, IEEE802.16(IEEE std. 802.16-2004, 2004;
IEEE std. 802.16e-2005, 2005) supports four class for QoS, which are UGS, rtPS, nrtPS, BE.
In UGS class, BS assigns fixed-size periodic data grants to both of uplink and downlink in
terminals. In rtPS class and nrtPS class, BS assigns data grants to downlink, and polls to
terminals in accordance with the reserved capacity for uplink in each terminal, and in nrtPS
class, terminals are additionally allowed to use contention requests for uplink bandwidth
(BW). In BE class, terminals are allowed to use contention requests only for both of uplink
and downlink, and BS does not poll to terminals.
On the analysis, the assumptions are as follows.
• 16-frame length is constant.
• The multiplexing is TDD.
• The DL-subframe and DL-subframe length in frame is the ratio of 1:1.
• The modulation for each link is unchanged after the communication is arranged
• A time is normalized by slot.
Cdl.USG C
Rdl.USG = Rds.UGS + (1 − dl.USG ) Rother
LF LF
2 (35)
Cdl.UGS V 2 dl.UGS
= + ( L F − Cdl.UGS)
2L F 2V dl.UGS L F
280
14 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
Argue Qdl.UGS. Based on Little’s theorem(Gross & Harris, 1985), the number of queued
packets in UGS of downlink, which is Ndl.UGS, is derived as follows.
dTdl.UGS d2 Tdl.UGS
>0 2
>0 (41)
dFdl.UGS dFdl.UGS
Consequently, Tdl.UGS is a convex monotonically increasing function of Fdl.UGS.
Argue Wul.UGS, which is the average time that a packet waits in queue of uplink. Similar to
Wdl.UGS, Wul.UGS consists of Rul.UGS, which is the average residual time for frame on a packet
arrival at USG of uplink, Qul.UGS, which is the queued packet processing time for UGS of
uplink, and Aul.UGS which is the average advance time for UGS of uplink. Rul.UGS is common
to Rdl.UGS, and Qul.UGS is Ful.UGSWul.UGSmL F based on Little’s theorem. Aul.UGS is the sum
of L dl and the residual time for UL-subframe because UL-subframe is arranged to following
DL-subframe. Let Tul.UGS and Cul.UGS be respectively the average delay in USG of uplink and
the number of reserved slots for UGS of uplink, Wul.UGS and Tdl.UGS are respectively dervied
as follows
Rul.UGS + Aul.UGS
Wul.UGS =
1 − mFul.UGS L F (42)
Tul.UGS = Wul.UGS + Cul.UGS
Traffic Control
Traffic Control forWireless
for Composite Composite Wireless
Access Route Access
of IEEE802.11/16 Links Route of IEEE802.11/16 Links 281
15
Similar to downlink, Rul.UGS and Aul.UGS are independent on Ful.UGS. Accordingly, Tul.UGS is
a convex monotonically increasing function of Ful.UGS.
X2 dl.rtPS V 2 dl.rtPS
Rdl.rtPS = + ( L F − X dl.rtPS)
2L F 2V dl.rtPS L F
X2 dl.rtPS V 2 ds.rtPS
Adl.rtPS = + ( L dl − X dl.rtPS)
2L dl 2V ds.rtPS L dl
Rdl.rtPS + Adl.rtPS (43)
Wdl.rtPS =
1 − mFdl.rtPS L F
Tdl.rtPS = Wdl.rtPS + X dl.rtPS
X dl.rtPS + V dl.rtPS = L F
X dl.rtPS + V ds.rtPS = L dl
X dl.rtPS and X2 dl.rtPS are respectively the first and second moment of the number of granted
slots, which is a process time of a packet, for rtPS of downlink, V dl.rtPS and V 2 dl.rtPS be
respectively the first and second moment of process time of a packet in frame except for rtPS of
downlink, V ds.rtPS and V 2 ds.rtPS be respectively the first and second moment of process time
of a packet in DL-subframe except for rtPS, Fdl.rtPS is a rtPS packet arrival rate at 16-downlink,
and Wdl.rtPS is the average time that a packet waits in queue in rtPS of downlink,
Argue the dependence of X rtPS and X2 dl.rtPS on Fdl.rtPS. Assuming the modulation for each
link to be unchanged, X rtPS increases in the linear for the increase in Fdl.rtPS. Therefore, the
dependence of X rtPS and X2 dl.rtPS on Fdl.rtPS are respectively expressed as follows.
dX dl.rtPS d2 X dl.rtPS
>0 2
=0
dFdl.rtPS dFdl.rtPS
(44)
dX2 dl.rtPS d2 X2 dl.rtPS
>0 2
=0
dFdl.rtPS dFdl.rtPS
Based on Eq. (43) and (44), the dependence of Tdl.rtPS on Fdl.rtPS is derived as follows.
dTdl.rtPS d2 Tdl.rtPS
>0 2
>0 (45)
dFdl.rtPS dFdl.rtPS
The difference of nrtPS form rtPS is the length of data grant periods, and the data grants
period in nrtPS is longer than that in rtPS. Then the depenadence of delay Tdl.nrPS on Fdl.nrtPS,
which is nrtPS packet arrival rate at uplink, is the same as that in rtPS. Consequently, Tdl.rtPS
and Tdl.nrtPS are a convex monotonically increasing function of the each packet arrival rate.
two frames is necessary to transmit a packet. Let Rul.rtPS, Aul.rtPS, m, and Ful.rtPS, X ul.rtPS be
respectively the average residual time for rtPS packet of uplink, the average advance time for
rtPS packet of uplink, the polling period in rtPS, the packet arrival rate at rtPS of uplink, and
the average process time for packet in rtPS of uplink, Wul.rtPS, which is the queued packet
processing time for UGS of uplink, and Tul.rtPS, which is the average delay in rtPS of uplink,
are respectively expressed as follows.
Rul.rtPS + Aul.rtPS
Wul.rtPS =
1 − 2mFul.rtPS L F (46)
Tul.rtPS = Wdl.rtPS + X ul.rtPS
Rul.rtPS is common to Rdl.rtPS, and Aul.rtPS is the sum of Adl.rtPS and L F because the rtPS of
uplink is necessary to additional a frame to poll to terminal and to request BW to BS with
contention free. Therefore, Rdl.rtPS and Adl.rtPS are independence on Ful.rtPS, and then Tul.rtPS
is a convex monotonically increasing function of Ful.rtPS the same as rtPS of downlink.
• In each terminal, Let τbw be the BW request attempt rate (req/slot) in the contention period
of UL-subframe, and then the probability q bw that BW request is transmitted successfully
is (1 − τbw )n−1 , where n is the number of terminals transmitting BW request .
• In each terminal, the packet arrival process (i.e., upload traffic) and packet request process
(i.e., download traffic) is poisson process(Bertsetkas & Gallager, 1992). Let Fbw be an packet
arrival/request rate (packets/slot), which need the contention BW request.
• The contention period ratio, which is the ratio of the number of slots in the contention
period in a frame, is constant. Let Uc be the contention period ratio.
• The process of the BW request that BS receives is assumed to FCFS, and the allocating data
grants rate (slot/packet) in DL-subframe or UL-subframe for BW request in BS is Sdg , and
is constant.
The contention BW request process is the same as the model described in 2.1.1 except for tb
in Eq.(4), ts and tc in Eq.(6). tb is 1 because the contention BW request process decrements
the backoff counter without carrier sensing. tc is the number of slots to be spent by timeout
of data grant receipt from BS, and is a constant. ts is the number of slots to be spent from
the success transmitting of BW request to the complete transmission of packet, and then it
depends on Fbw . ts is divided into tss , which is the air time of BW request from terminal to BS,
and tbs , which is the time from the receipt of BW request in BS to the complete transmission
of packet in terminal, and tss is a constant.
Here, argue the dependence of tbs on Fbw . In Sbw which is the average time from first
transmission attempt of contention BW request to successful transmission of that, the average
number of arrival/request packets for contention BW request is Fbw Sbw , and, in Sbw , the
average number of BW request transmission attempts is (1 − q bw )/q bw + 1. Therefore, τbw
is expressed as follows.
Fbw Sbw F
τbw = = bw (47)
Uc Sbw q bw Uc q bw
And, based on Eqs.(3), (4) and (5), Sbw is shown as follows.
dFbw_bs dSbw_bs
>0 >0 (51)
dFbw dFbw
-3 -3
2x10 5x10
Fbw in n=10 Fbw_bs in n=10
(req/slot)
3x10
Fbw in n=40 Fbw_bs in n=40
-3
1x10 1/Sbw in n=40 1/Sbw in n=40
-3
2x10
-4
5x10
-3
1x10
0 0
0 0.05 0.1 0.15 0.2 0 0.05 0.1 0.15 0.2
BW Request Attempt Rate (req/slot) BW Request Attemp Rate (req/slot)
Fbw_bs S2dg
Wbw_bs = (52)
2(1 − Fbw_bs Sdg )
Sdg is constant for Fbw_bs , and then, on condition of Fbw_bs < 1/Sdg , the dependence of Wbw_bs
on Fbw_bs is shown as follows.
dWbw_bs
>0 (53)
dFbw_bs
tbs is the sum of Wbw_bs and Sdg , and then, based on Eqs.(51) and (56), the dependence of tbs
on Fbw on condition of Fbw < 1/Sbw and Fbw_bs < 1/Sdg , that is, within the link capacity, is
shown as follows.
dtbs
>0 (54)
dFbw
Argue Wbw which is the packet waiting time in queue of terminal. According to the
exponential binary backoff model described in 2.1.1, and applying tb = 1 and the constance
of tc for τbw to Eq.(15), Wbw is derived as follows.
Fbw S2bw
Wbw = (55)
2(1 − Fbw Sbw )
According to Eqs.(16), (50), on condition of Fbw < 1/Sbw , that is, within link capacity, the
dependence of Wbw on Fbw is derived as follows.
dWbw
>0 (56)
dFbw
Traffic Control
Traffic Control forWireless
for Composite Composite Wireless
Access Route Access
of IEEE802.11/16 Links Route of IEEE802.11/16 Links 285
19
Finally, Tbw , which is the average delay for contention BW request, is the sum of Wbw , Sbw , tss
and tbs , the dependence of Tbw on Fbw is derived, based on Eqs.(51), (54) and (56), as follows.
dTbw d
= (Wbw + Sbw + tss + tbs ) > 0 (57)
dFbw dFbw
Therefore, Tbw is monotonically increasing function of Fbw.
dT ( bs,k[i]) ΔT ( bs,k[i])
≈ >0 (58)
dF( bs,k[i]) ΔF( bs,k[i])
Because 11-link k[i ] is a source link on packet distribution, ΔF( bs,k[i]) < 0. Therefore, to meet
Eq.(58), ΔT ( bs,k[i]) < 0. In other words, it is that the average delay of source 11-interface on
packet distribution decreases. The increase in average delay of source 11-interface k does not
meet the condition and it occurs in the following unsteady state.
• The packet arrival rate at other links provided by 11-interface k increases.
• The number of links provided by 11-interface k increases.
The first item in the above list means the increase in contention with other terminals, thus
it also causes the increase in average delay of source link when source link is 11-uplink or
16-uplink in nrtPS or 16-link in BE. The second item means the increase in a number of
286
20 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
terminals, thus it causes the increase in average delay of source link because of the same reason
as the first item. Then it also occurs when source link on packet distribution is 11-uplink or
16-uplink in nrtPS or 16-link in BE. In above cases, M-route cost also loses the monotonically
increasing characteristics for packet arrival rate. Therefore, in consideration of the unsteady
state that traffic fluctuates, the restriction condition which is the decrease in the average delay
of source link on packet distribution is a necessary condition to bring the M-route cost to the
optimal solution.
4.2 Search for optimal solution of M-route cost with packet distribution
Argue the search for optimal solution of M-route cost with Packet Distribution in unsteady
state by the following packet distribution.
• M( x,y) is a M-route from x to y. On x and y, one is a base station and the other is a terminal.
• Packets transmitted to y at x are distributed.
• K denotes a source interface on the packet distribution. J denotes a destination interface
on the packet distribution.
• K is either an 11-interface or 16-interface and J is also either an 11-interface or 16-interface.
• ( x, Z [ y]) denotes a certain link to y in x, which link is provided by a certain interface Z.
• F( x,Z [y]) denotes a packet arrival rate at ( x, Z [ y])
• T ∗ ( p( x,Z [y])) denotes interface average delay T ( p( x,Z [y])) if Z is 11-interface, and denotes
link average delay T ( p( x,Z [y])) if Z is 16-interface.
Based on subsection 4.1, the search for optimal solution of M-route cost in unsteady state is
the search for the packet distribution meeting the following conditions.
Step4: At end of n-th period (n ≥ 1), T(∗x,Z [y])(n ) of each link in M( x,y) is derived. The delay
of each packet is a period when the packet arrives at IP layer, and is enqueued in queue of an
interface, and is dequeued by an interface, and is sent and interface receives its ACK based
on the media access control. Therefore, it can be measured within packet distributing side x.
Based on the relation of T(∗x,K [y])(n ) and T(∗x,J [y])(n ), ΔF( x,K [y])(n + 1) is derived as follows.
• In T(∗x,K [y])(n ) > T(∗x,J [y])(n ) and in ΔT(∗x,K [y])(n ) < 0, Eq. (59) is met. Therefore,
ΔF( x,K [y])(n + 1) is allocated the same as ΔF( x,K [y])(n ), and it is shown as follows.
• In T(∗x,K [y])(n ) < T(∗x,J [y])(n ) and in ΔT(∗x,K [y])(n ) < 0, M( x,y) cost goes beyond the optimal
solution and ascents the gradient. Because it is caused by the excessive packet distribution
from source link to destination link, ΔF( x,K [y])(n + 1) is allocated smaller than ΔF( x,K [y])(n )
as follows. where α is the decrement rate (0 < α < 1).
• In ΔT(∗x,K [y])(n ) > 0, the traffic among the source link increases as shown in subsection
4.1. Because ΔF( x,K [y])(n ) is underestimated, and because the monotonically increasing
characteristics of the source link cost for the packet distribution is regained, ΔF( x,K [y])(n +
1) is allocated larger than ΔF( x,K [y])(n ) as follows. where β is the increment rate (β > 1).
5. Performance evaluation
In this section, the simulation evaluation of the packet distribution method for M-route
compositing 11/16-links is shown.
11b-Coverage 11a-Coverage
11a-Coverage
Antenna-B
11b-Coverage
Antenna-A
Server
560m
Base station
11b-Coverage
11b-Coverage
Antenna-B
Antenna-B
11a-Coverage
11a-Coverage
560m
• An antenna-A which equips with 16- and 11a/b-antena, three antenna-B which equip with
11a/b-antena, and 100 terminals without mobility are randomly deployed in 560m × 560m
space with a 1/10 scale of 16-coverage with 1000m radius.
• A FTP server and a Video Conference (VC) server, which are outside the wireless access
network, are connected to the base station by a wired network.
In the above access network, M-route between each terminal and a base station combines
available links as follows.
• The M-route between a base station and a terminal in 11a-coverage (area-A) combines
11a/b-link and 16-link.
• The M-route between a base station and a terminal in 11b-coverage and outside
11a-coverage (area-B)combines 11b-link and 16-link.
• The M-route between a base station and a terminal outside 11b-coverage (area-C) uses only
16-link.
The performance of 11a/b-wireless system and 16-wireless system shown in Table 1 is applied,
and each the capacity reservation of 16-link is shown in Table 2. Assuming the evaluation
environment to be a suburban area in line of sight, the 11a/b-radio propagation model is
a two-ray model and Ricean fading with Ricean factor 6dB(Takada, 2004), and the 16 radio
propagation model is a Erceg (TerrainA).
According to (3GPP2, 2006), the VC traffic on UDP is generated at each terminal as follows:
• The average video rate in the incoming and the outgoing is 32 Kbps.
• The distribution in video rate is a truncated pareto distribution with maximum 8Kbits
• The frame rate in the incoming and outgoing is 10fps. A frame corresponds to a data
packet in VC.
• As the sequence control of frame, VC waits for the frame with expected sequence number
for a period of 100 msec that is equal to frame interval. The frame that arrived on excess of
the period is destroyed.
Traffic Control
Traffic Control forWireless
for Composite Composite Wireless
Access Route Access
of IEEE802.11/16 Links Route of IEEE802.11/16 Links 289
23
IP Throughput (bps)
5
0.0055 1.5x10
6
6.5x10
Proposal
0.005 RR 1x10
5
SL
6 TR Proposal
6x10
Proposal RR
RR TR
0.0045 SL 5x10
4
TR 5.5x10
6
6
0.004 5x10 0
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec) Simulation Time (sec)
Proposal Proposal 6
RR 2.5x10
6
RR 4x10
11b Load (bps)
11a Load (bps)
16 Load (bps)
6 SL SL
1x10 TR TR
6 6
2x10 3x10
5
Proposal
5x10 RR
6 6 SL
1.5x10 2x10
TR
FTP file size 1 Kbytes session interval 10 sec
VC video rate 32 Kbps frame rate 10 fps
FTP file size 1 Kbytes session interval 10 sec FTP file size 50 Kbytes session interval 10 sec
VC video rate 32 Kbps frame rate 10 fps 6
VC video rate 32 Kbps frame rate 10 fps
6
0 1x10 1x10
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec) Simultion Time (sec)
Fig. 11. Distributed traffic load to each wireless system on FTP file size 1K bytes.
TCP Retransmissions (number/5sec)
8
FTP file size 1 Kbytes session interval 10 sec 0.22 4
FTP file size 1 Kbytes session interval 10 sec 1.55x10
VC video rate 32 Kbps frame rate 10 fps
FTP Response Time (sec/file)
7 0.2
0.18 1.5x10
4
6
Proposal
0.16 RR
SL
5 TR
4
Proposal 0.14 1.45x10
RR Proposal
SL RR FTP file size 1 Kbytes session interval 10 sec
4
TR SL VC video rate 32 Kbps frame rate 10 fps
0.12
TR
4
3 0.1 1.4x10
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec) Simulation Time (sec)
(a) TCP retransmissions. (b) FTP response time. (c) FTP throughput.
Fig. 12. Transition of TCP and FTP on FTP file size 1K bytes.
5
0.008 9x10
FTP file size 1 Kbytes session interval 10 sec
VC Throughput (bytes/sec)
VC video rate 32 Kbps frame rate 10 fps VC video rate 32 Kbps frame rate 10 fps
5
0.007 Proposal 8x10
RR
SL
TR
Proposal
5
0.006 7x10 RR
SL
TR
5
0.005 6x10
5
0.004 5x10
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec)
others. Figures 11(a), 11(b) and 11(c) show, respectively, the transition of distributed load to
11a-wireless system (11a-load), that to 11b-wireless system (11b-load) and that to 16-wireless
system (16-load), when file size in FTP is 1K bytes. The decrease in IP average delay of the
proposal corresponds to the increase in 11a-load of the proposal (see Fig. 10(a) and Fig. 11(a)).
In area-A, 11a accommodates a few terminals because of its narrow coverage, and the proposal
distributes almost packets to 11a-link the same as SL, and saves the capacity of 11b and 16 for
many terminals outside area-A. RR and TR in the area distributes packets to other link as
well, thus RR and TR can not use 11a capacity effectively to save the capacity of 11b and 16.
Consequently, RR and TR bring the large load to 16 (see Fig. 11(c)), which of links have low
transmission rate (see Tab. 2), and it causes the inferior IP average delay of RR and TR to that
of the proposal. In area-B, SL distributes all packets to 11b-link (see Fig. 11(b)), and then the
packet collision in 11b occurs frequently. Thus, it causes the inferior IP average delay of SL to
that of the proposal. In comparison with SL, the packet distribution of the proposal and TR
improve IP performance, but that of RR lowers IP performance.
The IP out-of-order packets of the proposal decreases the same as the decrease in its IP average
delay, consequently, its out-of-order packets becomes much lower than that of RR and TR (see
Fig. 10(c)). Therefore, its packet distribution effects the decrease in IP average delay and the
decrease in out-of-order packets. Figures 12(a) shows the number of TCP retransmissions for
a period of 5 sec. The TCP retransmissions of the proposal is nearly equal to that of SL and
RR, and that of TR is larger than that of the others. The cause of TCP retransmission in SL
is packet loss. In area-B, SL distributes all packets to 11b, thus the packet collision occurs
frequently in 11b and then it causes the TCP retransmission. The cause of TCP retransmission
in the proposal, RR and TR is out-of-oder packets. The number of TCP transmissions in RR is
lower than that of TR. RR loads larger mount of packets with 16 than the others (see Fig. 11(c)).
Because the 16-link has the low transmission rate, the IP average delay of RR is inferior to that
of the others (Fig. 10(a)). Then TCP congestion window size of RR is smaller than that of TR
and the proposal, and the amount of distributed packets to multiple links for a period is fewer
than that of TR and the proposal, thus the probability of occurrence of out-of-order packets
is lower. Consequently, the TCP retransmissions of RR is lower than that of TR. That of the
proposal is also lower than that of TR, then the delay equalization between multiple links
in the proposal effects the decrease in the occurrence of out-of-order packets, and effects the
decrease in TCP retransmissions.
Figures 12(b) and 12(c) show, respectively, the transition of FTP response time and FTP
throughput. The FTP response time of SL and the proposal are superior to that of RR and
TR. The IP average delay of TR is superior to that of SL, however, the FTP response time of TR
is inferior to that of SL. The inversion is caused by the large number of TCP retransmissions in
292
26 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
TR, and the packet distribution of TR lowers the FTP performance. The cause of the inferior
FTP response time of RR to that of SL is not the TCP retransmissions, but is the small amount of
TCP flow based on TCP congestion window size, then the packet distribution in RR distributes
the large number of packets to 16-link, which is narrow bandwidth, and originally lowers IP
performance. The number of TCP retransmissions and the FTP response time of the proposal
is the same as those of SL. As the above mentioned, the cause of TCP retransmission in SL is
the packet loss in 11b-link, but the cause of that in the proposal is the out-of-order packet, that
is, the proposal offsets the improvement of IP performance against the out-of-order packets,
and does not improve the FTP performance, but does not lower it.
Figures 13(a) and 13(b) show, respectively, the transition of VC average delay and VC
throughput. The VC average delay of SL is equal to the IP average delay because a VC
frame corresponds to a IP packet and because out-of-order packet does not occur. In the
proposal, RR, and TR, the VC average delay is larger than that of IP because the sequence
control in VC waits for frame with the expected sequence on the occurrence of out-of-order
packet. Therefore, VC average delay of TR is higher than that of SL though IP average delay of
TR is lower than that of SL, i.e., the packet distribution of TR lowers the VC performance. On
the other hand, that of the proposal is lower than that of SL, therefore, the effect of the packet
distribution in the proposal overcomes the ill of it, and can improve the VC performance. That
of RR is higher than that of the others because RR originally lowers IP performance.
1 3.5x10
7
6
7x10
0.5
0.3 7
6
6x10 Proposal
3x10 RR
TR
6
0.2 5x10
7
Proposal 2.5x10 Proposal
0.1 RR RR 6
4x10
SL SL
TR TR
6
0 2x10
7 3x10
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec) Simualtion Time (sec)
7
3x10
8x10
6 FTP file size 350 Kbytes session interval 10 sec FTP file size 350 Kbytes session interval 10 sec FTP file size 350 Kbytes session interval 10 sec
6
VC video rate 32 Kbps frame rate 10 fps 8x10 VC video rate 32 Kbps frame rate 10 fps VC video rate 32 Kbps frame rate 10 fps
6
7x10
7
2.5x10
11b Load (bps)
Proposal
11a Load (bps)
6
6 7x10
16 Load (bps)
6x10 RR
SL
6 TR
5x10 6 7
6x10 2x10 Proposal
6 RR
4x10 SL
TR
6
3x10
6 5x10 7
1.5x10
Proposal
2x10
6 RR
4x10
6 SL
TR
6 7
1x10 1x10
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec) Simulation Time (sec)
Fig. 15. Distributed traffic load to each wireless system on FTP file size 350K bytes.
Traffic Control
Traffic Control forWireless
for Composite Composite Wireless
Access Route Access
of IEEE802.11/16 Links Route of IEEE802.11/16 Links 293
27
TCP Retransmissions (number/5sec)
1400
120 6
FTP file size 350 Kbytes session interval 10 sec 4x10
FTP file size 350 Kbytes session interval 10 sec
60
600
400 40 2x10
6
Proposal Proposal
200 RR 20 RR
SL SL
TR TR
0 6
300 400 500 600 700 800 900 1000 0 1x10
300 400 500 600 700 800 900 1000 300 400 500 600 700 800 900 1000
Simulation Time (sec) Simulation Time (sec) Simulation Time (sec)
(a) TCP retransmissions. (b) FTP response time. (c) FTP throughput.
Fig. 16. Transition of TCP and FTP on FTP file size 350K bytes.
4
FTP file size 350 Kbytes session interval 10 sec 8x10
5
VC Average Delay (sec/frame)
VC Throughput (bytes/sec)
2
Proposal
1
RR
5
SL 7x10
0.03 TR
0.02 Proposal
5
RR
6x10 SL
TR
0.01
Figures 14(a) and 14(b) show, respectively, the transition of IP average delay and IP
throughput, when file size in FTP is 350K bytes, furthermore, Fig. 15(a), 15(b) and 15(c) show,
respectively, the transition of 11a load, 11b load and 16 load, when file size in FTP is 350K
bytes. The IP average delay of the proposal is low, and is stable. On the other hand, that of
the others increase as linear, and become much higher than that of the proposal. Furthermore,
their IP throughput are lower than that of the proposal. In area-A, the packet distribute to
11a-link brings low delay to IP because of wide bandwidth and few accommodated terminals
in 11a, as mentioned in 5.2. In area-B, the packet collision and loss in 11b further increase
because of the increase in traffic, and the large number of retransmissions in MAC brings the
increase in delay to IP. Furthermore, the packet loss in 11b brings the decrease in throughput
to IP. Each 16-link has the narrow bandwidth, but does not cause the collision because of
TDD. i.e., The delay of 16-link is lower than that of 11b-link because of no retransmission
process in MAC, which of delay in 11b exponentially increases based on a binary back-off
mechanism. Therefore, the large number of packet distribute to 11b brings the increase in
delay and the decrease in throughput to IP. Consequently, IP average delay of the proposal,
which distributes the smaller number of packets to 11b than the others (see Fig. 15(b)), is
lowest, and its IP throughput is highest.
Figures 14(c) and 16(a) show, respectively, the transition of IP out-of-order packets and TCP
retransmissions, when file size in FTP is 350K bytes. The IP out-of-order packets of the
proposal decreases rapidly as the packet distribute proceeds the same as the case that FTP
file size is 1K bytes, i.e., the delay equalization between the multiple links in the proposal
effects the decrease in IP out-of-order packets. That of RR also decreases, but the decrease in
294
28 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
the amount of TCP flow based on TCP congestion window size, which becomes small rapidly
by the increase in IP delay of RR, brings it. TCP retransmission is caused by the IP packet
loss and IP out-of-order packets. The TCP retransmissions in SL is caused only by IP packet
loss, and IP packet loss is caused by the large number of distributed packets to 11b. That of
RR, TR and the proposal is caused by IP packet loss and IP out-of-order packets. That of RR
is caused largely by IP packet loss, because RR distributes the large number of packets to 11b
and IP out-of-order packets decreases by the decrease in TCP flow. Therefore, the trend of
TCP retransmissions of RR is similar to that of SL. TR also distributes the large number of
packets to 11b, but distributes the larger number of packets than RR to 11a and 16, which of
packet loss probability is much lower than 11b, i.e., the TCP retransmissions in TR is caused
mainly by out-of-order packets and it reduces the upward trend of TCP retransmissions in
comparison with SL and TR. On the other hand, the TCP retransmissions of the proposal is
low stable in comparison with the others. The proposal distributes the much smaller number
of IP packets than the others to 11b and reduces IP packet loss, furthermore, it equalizes the
delay of each link in M-route, thus reduces also IP out-of-order packets. That brings the low
and stable retransmissions to TCP.
Figures 16(b) and 16(c) show, respectively, the transition of FTP response time and FTP
throughput, when file size in FTP is 350K bytes. The FTP response time of RR and TR increase
as linear. In RR and TR, FTP session can not complete in a period of 10 sec, which is FTP
session start interval, because the amount of TCP flow is restrained low by the large number
of retransmissions. The active FTP session accumulates. Therefore, the access network causes
the congestion. In the proposal, FTP session can complete within 10 sec, and the delay not
increase and is stable. Furthermore, the throughput reaches the input load 4M bytes/sec.
Therefore, the proposal controls avoids the congestion.
Proposal
FTP Response Time (sec/file)
20 0.014 Proposal
RR
SL RR
0.04 TR SL
TR
0.012
15
0.03
0.01
10
0.02
0.008
5
0.01 Proposal 0.006
RR
SL
TR
0 0 0.004
7 7 7 7 6 6 6 6 6 6 6 6 6
1x10 2x10 3x10 4x10 0 1x10 2x10 3x10 4x10 1x10 2x10 3x10 4x10 5x10
IP Throughput (bps) FTP Throougput (bytes/sec) Sum Throughput of VC and FTP (bytes/sec)
increases, the 11b-link load of M-route in 11b-coverage and outside 11a-coverage becomes
high, then M-route including 11b-link needs to distribute packets to 11a-link or 16-link. SL can
not distribute packets of 11b-link to other links, then SL is saturated first by the exhaustion
of 11b-link capacity. By the same cause, RR and TR are saturated in FTP file size 300K bytes
and 400K bytes respectively. The proposal distributes packets from 11b-link to 16-link and
11a-link, and avoids the saturation until FTP file size exceeds 400K bytes.
Summarizing, in any FTP traffic, the proposal can distribute packets effectively in comparison
with other methods, and it produces low delay and hight throughput on both TCP application
and UDP application, and simultaneously.
6. Conclusion
In this chapter, the packet distribution characteristics in IEEE802.11-link and that in
IEEE802.16-link was respectively shown, and, based on these characteristics, the packet
distribution method for access route compositing IEEE802.11/16-links was proposed.
Furthermore, its performance through evaluation with IEEE802.11a/b and IEEE802.16 was
shown. Consequently, the proposed method was found to have the following effectiveness.
• It can greatly effectively distribute packets to IEEE802.11/16 links according to link load.
• And, it can also reduce out-of-packets caused by distributing packets to multiple links.
• Then, It can decrease delay and can increase throughput on both TCP application and UDP
application, and simultaneously.
7. References
Arkin, D. (2004). My Life, Arkin Publishing, Arkinson.
Mitoralll, J. & Maguire, G. (1999). Cognitive Radio: Making Software Radios More Personal,
IEEE Pers. Comm., Vol. 6, No. 4, pp. 13–14 1999.
Mitoralll, J. (1999). Cognitive Radio for Flixible Multimedia Communications, Proc. MoMuC99,
pp. 3–10, 1999.
Harada, H. (2005). A Study on a new wireless communications system based on cognitive
radio technology, IEICE Tech. Rep., Vol. 105, No. 36, pp. 117–124, 2005.
3GPP TS 22.258. (2005). Service Requirements for the All-IP Network (AIPN); Stage 1, v2.0.0,
2005.
ITU-T. (2006). Y.2021: NGN Release 1, 2006.
Phatak, D. S. & Goff, T. (2002). A novel mechanism for data streaming across multiple IP
links for improving throughput and reliability in mobile environments, Proc. IEEE
INFOCOM, pp. 773–781, 2002.
Snoeren, A. C. (2002). Adaptive Inverse Multiplexing for Wide-Area-Wireless Networks, Proc.
IEEE GlobCom’99, Vol.3, pp.1665–1672, 1999.
Shrama, P.; Lee, S.; J. Brassil, J. & Shin, K. (2007). Aggregating Bandwidth for Multimode
Mobile Collaborative Communities, IEEE Tans. on MC, Vol. 6, No. 3, pp. 280–296,
2007.
Chebrolu, K. & Rao, R. (2006). Bandwidth Aggregation for Real-Time Applications in
Heterogeneous Wireless Networks, IEEE Tans. on MC, Vol. 5, No. 4, pp. 388–403, 2006.
Hsieh, H.; Kim, K. & Sivakumar, R. (2004). An end-to-end approach for transparent mobility
across heterogeneous wireless networks, Mob. Netw. Appl., Vol. 9, No. 4, pp. 363–378,
2004.
296
30 Recent Advances in Wireless Communications andCommnucations
Wireless Networks
Zhang, M.; Lai, J.; Krishnamurthy, A.; Peterson, L. & Wang, R. (2004). A Transport Layer
Approach for Improving End-to-End Performance and Robustness Using Redundant
Paths, USENIX 2004, 2004.
D. Gross, D. & C. Harris, C. (1985). Fundamentals of Queueing Theory 2nd ed, John Wiley &
Sons, 1985.
Little, J. (1961). A Proof of the Queueing Formula L = λW", Opre Res J., 18:172–174, 1961.
Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function,
IEEE JSAC, Vol. 18, No. 3, pp. 535–547, 2000.
Carvalho, M. M. & Garcia-Luna-Aceves, J. J. (2003). Delay analysis of IEEE 802.11 in single-hop
networks, Proc. of ICNP, pp. 146 –155, 2003.
Takizawa, Y.; Taniguchi, N.; Yamanaka, S.; Yamaguchi, A. & Obana, S. (2008). Characteristics
of Packet Distribution in Wireless Access Networks Accommodating IEEE802.11 and
IEEE802.16, IPSJ Journal, Vol. 49, No. 9, pp. 3245–3256, 2008.
Takizawa, Y.; Taniguchi, N.; Yamanaka, S.; Yamaguchi, A. & Obana, S. (2008). Packet
Distribution Control for Wireless Access Networks Accommodating IEEE802.11 and
IEEE802.16, IPSJ Journal, Vol. 49, No. 10, pp. 3576–3587, 2008.
Bertsekas, D. & Gallager, R. (1992). Data Networks, Prentice Hall, 1992.
IEEE Std 802.16-2004. (2004). Local and Metropolitan Area Networks, Part 16: Air Interface
for Fixed Broadband Wireless Access Systems, 2004.
IIEEE Std. 802.16e-2005. (2005). Local and Metropolitan Area Networks, Part 16: Air Interface
for Fixed and Mobile Broadband Wireless Access System, 2005.
Takada, J. (2004). Radiowave Propagation for Mobile Satellite Communications, Tech. Rep. of
IEICE, Vol. 104, No. 671, pp. 13–16, 2004.
3GPP2. (2006). C30-20060823-004A Evaluation methodology V4.0, 2006.
Konishi, S.; Wang, X.; Kitahara, T.; Nakamura, H. & Suzuki, T. (2008). A Study on Ultra
Low-Latency Mobile Networks, Wireless Personal Comm.:An Int. Journal, Vol. 44, No.1,
pp.57–73, 2008.
Nakayo, D. J. and Hossain, E. (2006). A Queuing-Theoretic and Optimization-Based Model
for Radio Resource Management in IEEE 802.16 Broadband Wireless Networks, IEEE
Trans Comp., Vol. 55, No.11, pp. 1473–1488, 2006.
Cho, D.; Song, J.; Kim, M. and Han, K. (2006). Performance Analysis of the IEEE 802.16
Wireless Metropolitan Area Network, Proc. IEEE DFMA 2005., 2005.
Lin, L.; Jia, W. and Lu, W. (2007). Performance Analysis of IEEE 802.16 Multicast and Broadcast
Polling based Bandwidth Request, Proc. IEEE WCNC 2007., 2007.
Iyengar, R.; Iyer, P. and Biplab Sikdar, B. (2005). Delay Analysis of 802.16 based Last Mile
Wireless Networkst, Proc. IEEE GlobeCom 2005., 2005.
He, J.; Guild, K.; Yang, K. and Chen, H. (2007). Modeling Contention Based Bandwidth
Request Scheme for IEEE 802.16 Networks, IEEE Comm. Letter, Vol. 11, No.8, pp.
698–700, 2007.
Ni, Q.; Xiao, Y.; Turlikov, A. and Jiang, T. (2007). Investigation of Bandwidth Request
Mechanisms under Point-to-Multipoint Mode of WiMAX Networks, IEEE Comm.
Magazine, Vol. 4, No.4, pp. 477–486, 2007.
Part 3
1. Introduction
Wireless Sensor Network is a technology which has capability to change many of the
Information Communication aspects in the upcoming era. From the last decade Wireless
Sensor Networks (WSNs) is gaining magnetic attention by the researchers, academician,
industry, military and other ones due to large scope of research, technical growth and nature
of applications etc. Wireless Sensor Networks (WSNs) employ a large number of miniature
disposable autonomous devices known as sensor nodes to form the network without the aid
of any established infrastructure. In a Wireless Sensor Network, the individual nodes are
capable of sensing the environments, processing the information locally, or sending it to one
or more collection points through a wireless link. Day to day applications of WSNs is
increasing from domestic use to military use and from ground to space.
The objective of this book chapter is to explore all aspects of WSNs under different modules
including these as well in a systematic flow: Sensor nodes, Existing hardware, Sensor node’s
operating systems, node deployment options, topologies used for WSN, architectures, WSN
lifecycle, Resource constraint nature, Applications, Existing experimental tools, Usability &
reliability of experimental tools, Routing challenges and Protocol design issues, Major existing
protocols, Protocol classifications, Protocols evaluation factors, Theoretical aspects of major
Energy Efficient protocols, Security issues, etc.
This chapter contains from very basic to high level technical issues obtained from highly
cited research contribution in a concluding manner but presenting whole aspects related to
this field.
Communication
Subsystem
Mobility
Subsystem
Power Processing
Subsystem Unit
Sensor
Subsystem(s)
1. Mica Atmel ATMega128L 4KB 128KB TR1000 433, 916 MHz 200
2. Mica2 Atmel ATMega128L 4KB 128KB CC1000 315, 433, 916 MHz 500
3. Mica2Dot Atmel ATMega128L 4KB 128KB CC1000 315, 433, 916 MHz 500
8. BTnode3 Atmel ATMega128L 64KB 128KB Zeevo-BT/CC1000 2.4 GHz/868 MHz 328/500
10. Intel mote ARM7TDMI (Core) 64KB 512KB Zeevo-BT 2.4 GHz 328
11. Intel mote2 PXA27x (Core) 256KB 32MB CC2420 2.4 GHz 410
12. MANTIS nymph Atmel ATMega128L 4KB 128KB CC1000 315, 433, 868, 915 MHz 500
13. XYZ mote ARM7TDMI (Core) 32KB 256KB CC2420 2.4 GHz 410
16. Smart-Its mote Atmel ATMega103L 4KB 128KB Ericsson-BT/TR1001 2.4 GHz/ 868 MHz 328/984
17. Tmote Sky TIMSP430 10KB 48KB CC2420 2.4 GHz 410
Table 1. A summarized list of some popular wireless sensor node (Manjunath, 2007)
18. TinyNode 584 TIMSP430 10KB 48KB Xemics XE1205 868 MHz 200
19. ZebraNet H/W TIMSP430 2KB 60KB 9XStream 902-928 MHz 328
301
302
Event
Data path Throughput Energy
SN System Arch Style driven Circuit Techniques Accelerators Memory (KB) Process Voltage (V)
width (MIPS) (pJ/ins)
(Y/N)
Atmel GP Off-the-
1. 8 N N N 132KB 350nm 3.0 7.3 MHz 3200
ATmega128L shelf
GP RISC
Timer, message 1.8 54 152
4. BitSNAP Bit-serial 16 Y Asynchronous 8KB 180nm
interface 0.6 6 17
datapath
Synchronous - 2
5. Smart Dust GP RISC 8 N None 3.125KB 250nm 1.0 0.5 (500KHz) 12
clock
Table 2. Technical specification for some hardware systems for Wireless Sensor Network
Recent Advances in Wireless Communications and Networks
Wireless Sensor Network: At a Glance 303
• Random Deployment – Sensor nodes are scattered over finite area. When the
deployment of nodes is not predefined optimal positioning of cluster head becomes a
critical issue to enable energy efficient network operation. Random deployment is
generally used in rescue operations.
Area of Use: Environmental and Habitual monitoring, etc.
• Sensor Nodes with Mobility - Can move to compensate for deployment shortcomings;
can be passively moved around by some external force (wind, water, vehicle); can
actively seek out “interesting” areas.
Area of Use: Battle field surveillances, Emergency situations (Fire, Volcano, Tsunami),
etc.
Star
Gateway
Mesh Sensor node
Cluster Tree
Fig. 2. Topologies used for Wireless Sensor Networks
Three phases related to topology maintenance and changes has been presented in a research
contribution (Akyildiz et al., 2002a):
• Pre-deployment and Deployment phase
• Post-deployment phase
• Redeployment of additional nodes phase
In another research paper (Dulman & Havinga, 2005) the characteristics of wireless sensor
networks from an architectural point of view is presented. Since WSNs are designed for
specific applications so there is no precise architecture to fit them all but rather a common
set of characteristics that can be taken as a starting point. In same paper a data-centric
architecture is also presented.
A research paper (NeTS-NOSS, 2007) presents six aspects of architecture for WSN: Design
Principles, Functional Architecture, Programming Architecture, Protocol Architecture,
System Support Architecture and Physical Architecture. This paper also states that “The
situation today in sensor networks is that none of these six levels of network system
architecture are ‘solved’ or even clearly established. The vast majority of the studies fall in
the category of protocol architecture”.
In a research paper (Vazquez et al., 2009), an architecture for integrating Wireless Sensor
Networks into the Internet of Things called “Flexeo” is presented. In another research paper
(Schott et al., 2007) a flexible protocol architecture “e-SENSE” for WSNs has been
introduced, which is well-suited for capturing the context surrounding service users in
order to enable a variety of advanced context-aware applications in beyond 3G mobile
communication systems.
Area Applications
Military • Military situation awareness.
• Sensing intruders on basis.
• Detection of enemy unit movements on land and sea.
• Battle field surveillances
Emergency • Disaster management.
situations • Fire/water detectors.
• Hazardous chemical level and fires.
Physical world • Environmental monitoring of water and soil.
• Habitual monitoring.
• Observation of biological and artificial systems.
• Marginal Farming.
Medical and health • Sensors for blood flow, respiratory rate, ECG (electrocardiogram),
pulse oxymeter, blood pressure and oxygen measurement.
• Monitoring people’s location and health condition.
Industry • Factory process control and industrial automation.
• Monitoring and control of industrial equipment.
• Machine health monitoring.
Home networks • Home appliances, location awareness (blue tooth).
• Person locator.
Automotive • Tire pressure monitoring.
• Active mobility.
• Coordinated vehicle tracking.
Area monitoring • Detecting enemy intrusion
• Geo-fencing of gas or oil pipelines.
• Detecting the presence of vehicles.
Environmental • Air pollution monitoring.
monitoring • Forest fires detection.
• Greenhouse monitoring.
• Landslide detection.
• Volcano monitoring.
• Flood detection.
Water/Wastewater • Landfill ground well level monitoring and pump counter.
monitoring • Groundwater arsenic contamination assessment.
• Measuring water quality.
Cognitive sensing • Bio-inspired sensing.
• Swarm intelligence.
• Quorum sensing.
Underwater • Oceanographic data collection.
acoustic sensor • Pollution monitoring.
systems • Disaster prevention.
• Assisted navigation.
• Tactical surveillance.
Traffic Management • Traffic congestion control.
& Monitoring • Road Surface Condition Monitoring (BusNet in Sri Lanka).
Table 5. Some applications of WSNs in different areas
308 Recent Advances in Wireless Communications and Networks
Deploying nodes in an unattended environment will provide more possibilities for the
exploration of new applications. WSNs will be ubiquitous in the near future, due to new
opportunities for the interaction between humans and their physical world also WSNs are
expected to contribute significantly to pervasive computing.
IEEE 802.15.4 Standard for low-rate, wireless personal area networks, defines
the "physical layer" and the "medium access layer".
Zigbee ZigBee builds upon the 802.15.4 standard to define application
profiles that can be shared among different manufacturers.
IEEE 802.11 Standards efforts for low-power Wi-Fi.
IEEE 1451 The objective of this standard is to make it easier for different
manufacturers to develop smart sensors and to interface those
devices to networks.
ISA100 Addresses wireless manufacturing and control systems in the
areas of the: Environment, Technology and life cycle, and
Application of Wireless technology.
6LoWPAN IPv6 over low-power wireless networks, defines an adaptation
layer for sending IPv6 packets over IEEE 802.15.4.
uIPv6 uIPv6 is the world's smallest certified open source IPv6 stack
provides TCP/IP connectivity to tiny embedded 8-bit micro
controllers for low-cost networked device such as sensors and
actuators with maintained interoperability and RFC standards
compliance.
Table 7. Predominant standards in field of WSNs
Wireless Sensor Network: At a Glance 309
1. Classification • Flat-based or Data Centric routing: In flat-based routing algorithm, all nodes play the same role and
based on mainly apply flood based data transferring.
Network • Hierarchical-based or Cluster based routing: Hierarchical protocols aim at clustering the nodes so that
Structure cluster heads can do some aggregation and reduction of data in order to save energy. Hierarchical
(Al-Karaki & routing is mainly two-layer routing where one layer is used to select cluster heads and other for
Kamal, 2004) routing.
• Location-based routing: Location-based protocols utilize the position information to relay the data to the
desired regions rather than the whole network.
2. Classification • Multipath-based routing: This type of routing protocols uses multiple paths instead of a single path in
based on order to enhance network performance.
Protocol • Query-based routing: In this type of routing protocol destination nodes propagate a query for data
Operation (sensing task) from a node through the network, and a node with this data sends the data that matches
(Al-Karaki & the query back to the node that initiated the query.
Kamal, 2004) • Negotiation-based routing: These protocols use high-level data descriptors in order to eliminate
redundant data transmissions through negotiation. Communication decisions are also made based on
the resources available to them.
• QoS-based routing: In QoS-based routing protocols, the network has to balance between energy
consumption and data quality. In particular, the network has to satisfy certain QoS metrics (delay,
energy, bandwidth, etc.) when delivering data to the base station.
• Non-coherent & Coherent data-processing based routing: In non-coherent data processing routing, nodes
will locally process the raw data before it is sent to other nodes for further processing.
3. Classification • Gossiping and agent-based unicast forwarding: These schemas are an attempt of working without routing
based on tables in order to minimize the overflow needed to build the tables, as much as result of the initial
Packet stages in which the tables were not built yet.
Destination • Energy-efficient unicast: These techniques analyze the network nodes distribution to set the cost of
(Karl & Willig, transmitting over the link between two nodes and select an algorithm to calculate the minimum cost.
5. Classification • Stateful Ad Hoc routing: Stateful ad hoc routing protocols require node to maintain some routing
based on State information that is collected using the routing protocol (e.g., through route request propagation or by
(Eriksson, 2009) reversing paths taken by the query).
• Stateless Geometric Ad Hoc routing: These kinds of protocols only track the position of their neighbors
and select among them a neighbor that is likely to be closer to the destination.
6. Classification • Pull based epidemic algorithm: A node asks a selected neighbor for new information. The node will receive
based on new information only if the neighbor has new information.
Epidemic • Push based epidemic algorithm: A node with new information sends the information to a selected
behavior (Akdere neighbor.
et al., 2006) • Pull-push based epidemic algorithm: This algorithm is a combination of two models described above.
7. Classification • Protocols operating on flat topology (WSN consisting Homogeneous nodes)
based on Sensor • Protocols operating on hierarchical topology(WSN consisting Heterogeneous nodes).
Wireless Sensor Network: At a Glance
Node Architecture
(Al-Karaki &
Kamal, 2004)
8. Classification • Source-initiated (Src-initiated): A source-initiated protocol sets up the routing paths upon the demand of
based on the source node, and starting from the source node. Here source advertises the data when available and
Protocol’s initiates the data delivery.
initialization • Destination-initiated (Dst-initiated): A destination initiated protocol, on the other hand, initiates path
point (Biradar et setup from a destination node.
al., 2009)
9. Classification • Proactive: A proactive protocol sets up routing paths and states before there is a demand for routing
based on how the traffic. Paths are maintained even there is no traffic flow at that time. This approach is best suited for
source finds the applications having fixed nodes
destination • Reactive: In reactive routing protocol, routing actions are triggered when there is data to be sent and
(Biradar et al., disseminated to other nodes. Here paths are setup on demand when queries are initiated. This
2009) approach is best suited for applications mobile nodes
• Hybrid: This approach combines both techniques.
10. Classification • Protocols that control the transmission power level at each node by increasing network capacity while
based on the basis keeping the network connected.
of how to reduce • Protocols that make routing decisions based on power optimization goals.
and wireless mesh networks. Major Constraints while designing protocols for WSNs are:
Energy, Processing power, Memory. In various literatures or research contributions, related
316 Recent Advances in Wireless Communications and Networks
to WSNs these design challenges are identified (Dwivedi et al., 2009a; Eriksson, 2009;
Al-Karaki & Kamal, 2004; Karl & Willig, 2006; Akyildiz et al., 2002b; Akkaya & Younis, 2005;
Wachs et al., 2007).
• Due to the relatively large number of sensor nodes, it is not possible to build a global
addressing scheme for the deployment of a large number of sensor nodes as the
overhead of ID maintenance is high. Thus, traditional IP based protocols may not be
applied to WSNs.
• In contrast to typical communication networks, almost all applications of sensor networks
require the flow of sensed data from multiple sources to a particular Base Station.
• Sensor nodes are tightly constrained in terms of energy, processing, and storage
capacities. Thus, they require careful resource management.
• In most application scenarios, nodes in WSNs are generally stationary after deployment
except for, may be, a few mobile nodes.
• Sensor networks are application specific, i.e., design requirements of a sensor network
change with application.
• Position awareness of sensor nodes is important since data collection is normally based
on the location.
• Finally, data collected by various sensors in WSNs is typically based on common
phenomena; hence there is a high probability that this data has some redundancy.
Visibility (Wachs et al., 2007) is a new metric for WSNs protocol design. The objective of this
visibility metric is that “Minimize the energy cost of diagnosing the cause of a failure or
behavior”.
Except these there are exist some common performance metrics, including latency,
throughput, success rates, energy consumption and energy load, that must be calculated for
the evaluation of routing algorithms.
- The main drawback of this scheme is that, if the thresholds are not reached, the nodes will never
communicate; the user will not get any data from the network at all and will not come to know even if
all the nodes die. Thus, this scheme is not well suited for applications where the user needs to get data
on a regular basis.
- Another possible problem with this scheme is that a practical implementation would have to ensure that
there are no collisions in the cluster.
2. APTEEN - A Protocol for Hybrid network (inherit best characteristics of both proactive and reactive network).
(Adaptive - To provide periodic data collection as well as near real-time warnings about critical events.
Periodic - By sending periodic data, it gives the user a complete picture of the network. It also responds
Threshold- immediately to drastic changes, thus making it responsive to time critical situations. Thus, it combines
sensitive Energy both proactive and reactive policies.
Efficient Sensor - It offers a flexibility of allowing the user to set the time interval (TC) and the threshold values for the
Network attributes.
Protocol) - Energy consumption can be controlled by the count time and the threshold values.
(Manjeshwar & - The hybrid network can emulate a proactive network or a reactive network, by suitably setting the count
Agarwal, 2002) time and the threshold values.
- The main drawback of this scheme is the additional complexity required to implement the threshold
functions and the count time. However, this is a reasonable trade-off and provides additional flexibility
and versatility.
3. HEED (Hybrid - An energy-efficient clustering protocol, using residual energy as primary parameter and network
Energy-Efficient topology features (e.g. node degree, distances to neighbors) as secondary parameters.
Distributed - Here all nodes are assumed to be homogenous nodes (with same initial energy).
clustering) - It extends the basic scheme of LEACH.
Table 17. Major theoretical aspects of some major energy efficient protocols for WSNs
(Younis & - The clustering process is divided into a number of iterations, as well as in each iteration nodes which are
Fahmy, 2004) not covered by any cluster head doubles their probability of becoming a cluster head.
- Since it enable every node to independently and probabilistically decide on its role in the clustered
network, thus cannot guaranteed optimal elected set of cluster heads.
319
S.N. Energy Efficient Major Theoretical Aspects
320
Protocol
4. H-HEED - A protocol for heterogeneous WSN.
(Heterogeneous - Cluster head selection is primarily based on the residual energy of each node. Since the energy
- HEED) (Kour & consumed per bit for sensing, processing, and communication is typically known, and hence residual
Sharma, 2010) energy can be estimated.
- Intra cluster communication cost is considered as the secondary parameter to break the ties, tie means
that a node might fall within the range of more than one cluster head.
- Different level of heterogeneity is introduced: 2-level, 3-level and multi-level in terms of the node
energy.
- In 2-level H-HEED, two types of sensor nodes, i.e., the advanced nodes and normal nodes are used.
- In 3-level H-HEED, three types of sensor nodes, i.e. the super nodes, advanced nodes and normal nodes
are used.
- In this heterogeneous approach all the sensor nodes are having different energy as a result nodes will
die randomly.
- Multi-level H-HEED prolongs lifetime and shows better performance than other level of H-HEED and
HEED protocol.
5. Reactive Energy - To solve the problem of limited energy, the loading of nodes have to be distributed as possible as it can.
Decision Routing - If the energy consumption can be shared averagely by most nodes, then the lifetime of sensor networks
Protocol will be enlarged.
(REDRP) (Ying- - This protocol will create the routes in reactive routing method to transmit the data node gathered.
Hong et al., 2006) - It uses the residual energy of nodes as the routing decision for energy-aware.
6. PEGASIS - A near optimal chain-based protocol and an enhanced descendant of LEACH.
(Power-Efficient - It has two main objectives: increases the lifetime of each node by using collaborative techniques and
Gathering in allow only local coordination between nodes that are close together so that the bandwidth consumed in
Sensor communication is reduced.
Information - Nodes route data destined ultimately for the base station through intermediate nodes.
Systems) - In determining the routes only consider the energy of the transmitter and neglect the energy dissipation
(Lindsey & of the receivers.
Raghavendra, - It assumes that each sensor node can be able to communicate with the base-station directly and all nodes
2002) maintain a complete database about the location of all other nodes in the network.
- The method of which the node locations are obtained is not outlined.
- It also assumes that all sensor nodes have the same level of energy and they are likely to die at the same
time.
7. Hierarchical- - Its objective is to decrease the delay incurred for packets during transmission to the base-station.
PEGASIS - In its concept only spatially separated nodes are allowed to transmit at the same time.
(Savvides - This chain-based protocol with CDMA capable nodes, constructs a chain of nodes, that forms a tree like
et al., 2001) hierarchy, and each selected node in a particular level transmits data to the node in the upper level of
the hierarchy, that ensures data transmitting in parallel and reduces the delay significantly.
- Results shows that this hierarchical extension of PEGASIS performs better than the regular PEGASIS
scheme by a factor of about 60.
8. SHPER - Enhanced integration of a hierarchical reactive routing protocol.
(Scaling - It supposes the coexistence of a base station and a set of homogeneous sensor nodes which are randomly
Hierarchical distributed within a delimited area of interest.
Power Efficient - Consists of two phases: the initialization phase and the steady state phase.
Routing) - Hard and soft thresholds are utilized in the SHPER protocol as with TEEN.
(Kandris et al., - Best suited in real life applications where imbalance in energy distribution is the common case.
Table 17. (continues) Major theoretical aspects of some major energy efficient protocols for WSNs
2009) - Network scalability is retained because it adopts both multi-hop routing and hierarchical architecture.
Recent Advances in Wireless Communications and Networks
S.N. Energy Efficient Major Theoretical Aspects
Protocol
9. TREnD - A novel cross-layer WSN protocol for control applications.
(Timely, - The routing algorithm of TREnD is hierarchically subdivided into two parts: a static route at inter
Reliable, clusters level and a dynamical routing algorithm at node level. This is supported at the MAC layer by
Energy-efficient hybrid TDMA/CSMA solution.
and Dynamic) - The protocol parameters are adapted by an optimization problem, whose objective function is the
(Marco network energy consumption, and the constraints are the reliability and latency of the packets.
et al., 2010) - It uses a simple algorithm that allows the network to meet the reliability and latency while minimizing
for energy consumption.
- It is best fit for industrial environments.
10. LEACH (Low - A most popular cluster-based protocol, which includes distributed cluster formation.
Energy Adaptive - The idea is to form clusters of the sensor nodes based on the received signal strength and use local
Clustering cluster heads as routers to the sink.
Hierarchy) - It randomly selects a few sensor nodes as cluster-heads and rotates this role to evenly distribute the
Wireless Sensor Network: At a Glance
Table 17. (continues) Major theoretical aspects of some major energy efficient protocols for WSNs
along a balanced path.
321
322 Recent Advances in Wireless Communications and Networks
Fig. 4. Security threats and their usual defenses in Wireless Sensor Networks (Dwivedi et al.,
2009b)
19. Reference
Dwivedi, A. K. & Vyas, O.P. (2010). Network Layer Protocols for Wireless Sensor Networks:
Existing Classifications and Design Challenges, International Journal of Computer
Applications (IJCA), Vol.8, No.12, Article 6, pp. 30-34.
Tatiana, M. (2010). Mini Hardware Survey. Available from
http://www.cse.unsw.edu.au/~sensar/hardware/hardware_survey.html
Wireless Sensor Network: At a Glance 323
Imperial college London, U.K. (2007). Body Sensor Networks. Available from
http://ubimon.doc.ic.ac.uk/bsn/index.php?m=206
Embedded WiSeNts Platform Survey (2006). Available from
http://www.embedded-wisents.org/studies/survey_wp2.html
Senses (2005). Available from http://senses.cs.ucdavis.edu/resources.html
The Sensor Network Museum (2010). Available from
http://www.snm.ethz.ch/Main/Homepage
Hempstead, M.; Lyons, M.J.; Brooks D. & Wei, G.-Y. (2008). Survey of Hardware
Systems for Wireless Sensor Networks, Journal of Low Power Electronics, Vol.4,
pp. 1-10.
Fröhlich, A.A. & Wanner L.F. (2008). Operating System Support for Wireless Sensor
Networks, Journal of Computer Science, Vol.4, No.4, pp. 272-281.
Reddy, A.M.; Kumar, V.A.V.U.P.; Janakiram, D, & Kumar, G.A. (2007). Operating Systems
for Wireless Sensor Networks: A Survey, Technical Report, IIT Madras, Chennai,
India.
Dwivedi, A. K.; Tiwari, M.K. & Vyas, O.P. (2009). Operating Systems for Tiny Networked
Sensors: A Survey, International Journal of Recent Trends in Engineering, Vol.1, No.2,
pp. 152-157.
Manjunath, D. (2007). A Review of Current Operating systems for Wireless Sensor
Networks, Technical Report, Department of ECE, Indian Institute of Science,
Bangalore, INDIA.
Akyildiz, I.; Su, W.; Sankarasubramaniam, Y. & Cayirci, E. (2002). A survey on Sensor
Networks, IEEE Communications Magazine, Vol.40, Issue:8, pp. 102-114.
Karl, H. & Willig, A. (2003). A Short Survey of Wireless Sensor Networks, TKN Technical
Report TKN-03-018, Technical University Berlin, Germany.
Dulman, S. & Havinga, P. (2005). Architectures for Wireless Sensor Networks, Proceedings of
the IEEE ISSNIP 2005, pp. 31-38.
NeTS-NOSS: Creating an Architecture for Wireless Sensor Networks, (2007). Available from
http://snap.cs.berkeley.edu/documents/architecture.pdf
Vazquez, J.; Almeida, A.; Doamo, I.; Laiseca, X. & Orduña, P. (2009). Flexeo: An Architecture
for Integrating Wireless Sensor Networks into the Internet of Things, Proceedings of
3rd Symposium of Ubiquitous Computing and Ambient Intelligence 2008, Springer
Berlin/Heidelberg, Vol.51, pp. 219-228, 2009.
Schott, W.; Gluhak, A.; Presser, M.; Hunkeler U. & Tafazolli, R. (2007). e-SENSE Protocol
Stack Architecture for Wireless Sensor Networks. Proceedings of 16th IST Mobile and
Wireless Communication Summit, pp. 1-5.
Biradar, R.V.; Patil, V.C.; Sawant, S.R. & Mudholkar, R.R. (2009). Classification and
Comparison of Routing Protocols in Wireless Sensor Networks, Special Issue on
Ubiquitous Computing Security Systems, UbiCC Journal, Vol.4, pp. 704-711.
Katiyar, V.; Chand, N. & Chauhan, N. (2010). Recent advances and future trends in Wireless
Sensor Networks, International Journal of Applied Engineering Research, Vol.1, No.3,
pp. 330-342, ISSN 0976-4259.
Distributed Computing Group’s Sinalgo-Simulator for Network Algorithms. (2009).
Available from http://disco.ethz.ch/projects/sinalgo/tutorial/tuti.html
324 Recent Advances in Wireless Communications and Networks
Karlof, C. & Wagner, D. (2003). Secure routing in wireless sensor networks: Attacks and
countermeasures. Proceedings of 1st IEEE International Workshop on Sensor Network
Protocols and Applications.
Dwivedi, A.K. & Vyas, O.P. (2011). An Exploratory Study of Experimental Tools for Wireless
Sensor Networks. Wireless Sensor Network,Vol. 3, ISSN 1945-3078 (Print), 1945-3086
(Online). Available from http://www.scirp.org/journal/wsn
0
15
1. Introduction
Cognitive Radio (CR) Mitola (2000) is a promising technology to improve spectrum utilization
of wireless communication systems. Current investigations in CR have been focused on the
physical layer functionality. The cognitive radio, built on a software-defined radio, assumes
that there is an underlying system hardware and software infrastructure that is capable of
supporting the flexibility needed by the cognitive algorithms. As already foreseen by Mitola
Mitola & Maguire (1999), a Cognitive Radio is the final point of Software Defined Radio (SDR)
platform evolution: a fully reconfigurable radio that changes its communication functions depending
on network and/or user demands. Mitola’s definition on reconfigurability is very broad and we
only focus here on the reconfigurability of the hardware platform for Cognitive Radio. SDR
basically refers to a set of techniques that permit the reconfiguration of a communication
system without the need to change any hardware system element. As explained in the
schematic of figure 1, this relies on a cognitive circle. Figure 1 (a) is from Mitola (2000) and
figure 1 (b) is a simplified view of the cycle summarized in three main steps:
• Observe: gathers all the sensing means of a CR,
• Decide: represents all that implies some intelligence including learning, planning decision
taking,
• Adapt: reconfigures the radio, designed with SDR principles, in order to be as flexible as
possible.
The figure 2 draw the general approach that can help the radio to better adapt its functionality
for a given service in a given environment without restriction on the sensors nature.
Sensors are classified in function of the OSI layers they correspond to, with a rough division
in three layers. Corresponding to the lower layers of the OSI model, we find specifically
all the sensing information related to the physical layer: propagation, power consumption,
coding scheme, etc. At the intermediate level are all the information that participate to
vertical handover, or can help to make a standard choice, as a standard detection sensor
for instance. The network load of the standards supported by the equipment may also be
of interest. It also includes the policies concerning the vicinity, the town or the country.
The highest layer is related to the applications and all that concerns the human interaction
328
2 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
with the communicating device. It is related to everything that concerns the user, his habits,
preferences, policies, profile. If a user has the habit to connect to a video on demand service
every evening while coming back home from office by metro, a CR terminal should be
aware of it to plan all the requirements in terms of battery life, sufficient quantity of credit
on his contract, vertical handover succession depending on each area during the trip, etc.
The equipment can be aware of its environment with the help of sensors like microphone,
video-camera, bio-sensors, etc. As we are at the early beginning of such technology, it is
difficult to foresee all the possibilities. We can think, for instance, that user’s biometric
information and/or facial recognition will ensure equipment security. Video-camera could
also be used to indicate if the terminal is outside or inside a building. This may impact
propagation features, but also the capability or not to receive GPS signals. Another example
could be given in the context of video conferencing, a separation between the face of the
speaker and the background could help decreasing the data rate while refreshing slowly the
background of the image Nafkha et al. (2007).
Note that this classification is also related to three well-known concepts of the literature:
• Context aware for higher layers Chen & Kotz (2000),
• Interoperability for intermediate layers Aarts et al. (2001),
• Link adaptation for lower layers Qiu & Chuang (1999).
All this may be combined to achieve cross-layer optimizations. This is one of the
responsibilities of the cognitive engine in our mind. However, due to the high financial
pressure on spectrum issues, CR is often restricted in the research community to spectrum
management aspects as in Fan et al. (2008); Ghozzi et al. (2006). Opportunistic spectrum
Software Defined
Software Defined Radio
Radio Platform Platform
for Cognitive for and
Radio: Design Cognitive Radio: Design and Hierarchical Management
Hierarchical Management 3293
access approaches are explored to increase the global use of the spectrum resources. FCC has
been already opening the door for several years, in the TV broadcasting bands, and permits
secondary users (e.g. not licensed) to occupy primary users spectrum when available.
More futuristic CR scenarios may also be considered concerning the spectrum management.
We may even imagine in the very long term a fully deregulated spectrum access where all
radio connections features would be defined on-the-fly: carrier frequency, modulation, data
rate, coding scheme, etc. But this means also to overcome regulatory issues in addition to
technological challenges.
this also guarantees the non dependence of processing modules in terms of operating rhythm.
One can just not make them run faster than their fastest speed, but anything lower is
compatible.
This is very straightforward in a processor environment as the processing modules varies with
the processor frequency (or it architecture after compilation). But this is generalized to the
reconfigurable HW world while using Globally Asynchronous Locally Synchronous (GALS)
principles. It turns HW processing as SW in the sense that the exchanges between processing
modules are asynchronous from the data rate they have to process. The consequence is
that these processing modules can be ported to several designs at different speeds, with no
dependence with the speed of other blocks. Another major effect is that it becomes transparent
to replace a SW processing module, e.g. running in a processor, by a HW processing module,
e.g. running in a FPGA, and vice versa. Moreover, a HW processing module can be easily
moved to a processor instantiated inside a FPGA (such as a NIOS for Altera or a MicroBlaze
for Xilinx) without reconsidering the global behavior of the processing modules it is connected
to.
This design approach is completely compatible with an Intellectual property (IP) oriented
design strategy. Re-usability has several major advantages: gains of time at all development
stage, debug and validation stages, and integration stage. It permits also to benefit from third
party expertise to speed-up or complete the proprietary designs. To sum-up the proposed
solution consists in declaring rules for the design of IPs or processing modules so that they
can be easily assembled in the design framework that is detailed below.
3. System structure
The presented real-time platform provides a simple wireless video stream broadcasting
system to verify and test our approach. It consists of one transmitter as the base station and
one receiver as the terminal. The system architecture is depicted in figure 3. Basically, the
transmitter and receiver hosts can communicate and exchange their data through an existing
TCP/IP networks or Intermediate Frequency (IF) link. The transmitter host utilizes USB port
to communicate with the video camera. At the receiver side, any standard display monitor
allows us to display the incoming video stream.
of blistering fast QDRII memory, ensuring ample capacity to develop todays demanding
applications. The SMT348 includes SHB and SLB (Sundance LVDS Bus) interfaces. It provides
quick and easy connection to rapid ADC and DAC modules for data acquisition or software
radio systems. The SMT350 module, is composed of:
• Two DACs DAC5686 from Texas Instrument with 16 bits of resolution and a maximum
sampling rate of 500MSPS with interpolation filters
• Two ADCs ADS5500 from Texas Instrument with 14bits of resolution and a maximum
sampling frequency of 125MHz
• A CDCM7005 from Texas Instrument which provides individual sample frequency to each
converters
The stream server program encapsulates the video data into Internet Protocol (IP) stream and
saves the IP stream in the buffer allocated in the main memory of the host PC. The DSP module
fetches the data in the buffer through the PCI interface provided by the above mentioned
carrier board and then executes the partial part of the digital baseband and Intermediate
Frequency (IF) signal processing algorithms of the transmitter. The driver of the carrier board
offers the DSP module the methods to access the main memory of the host PC through PCI
interface by providing C/C++ Application Program Interface (API) functions. The Xilinx
FPGA on the DSP module takes care of the Sundance High speed Bus (SHB) interfacing
between the DSP module SMT395 and the FPGA module SMT348. The SHB interface is able
to transfer 32-bit data at a 100 MHz clock. Via SHB the digital IF signal is forwarded to the
SMT350 to generate the analog signal using its integrated Digital to Analog Converter (DAC).
The analog IF signal goes through the low-pass filter.
The hardware setup of the receiver is similar to the transmitter, as shown in figure 5. In this
case, the SMT350 is configured as an Analog to Digital Converter (ADC) module and the
signal experiences the reciprocal of the transmitter. The IF signal coming from the transmitter
is sampled synchronously by the ADC on the SMT350 module. The FPGA module SMT348
receives the digital samples from the SHB interface and accomplishes a high parallel part of
Software Defined
Software Defined Radio
Radio Platform Platform
for Cognitive for and
Radio: Design Cognitive Radio: Design and Hierarchical Management
Hierarchical Management 3337
digital signal process algorithms of the receiver. The simplest part of the baseband process is
sent to the SMT395 module via the SHB.
The final received IP packets are saved to the buffer in the main memory of the host PC
through the PCI interface. The network layer program fetches the IP packets from the buffer
and emits them to the certain IP port by IP socket programming. The video stream player
always listens to the IP port and plays the video back.
In both side, transmitter/receiver, the testbed platform contains a Graphics Processor Unit
(GPU). The main reason behind is that the GPU is specialized in compute intensive, highly
parallel computation and therefore is designed in such a way that more transistors are devoted
to data processing rather than data caching and flow control.
SynDEx tools Grandpierre et al. (1999) provides a formal framework based on graphs and
system-level software. On the one hand, these specify the functions of the applications,
the distributed resources in terms of processors and/or specific integrated circuit and
communication media, and the non-functional requirements such as real-time performances.
On the other hand, they assist the designer in implementing the functions onto the resources
while satisfying timing requirements and, as far as possible, minimizing the resources. This
is achieved through a graphical environment (see figure 5 ), which allows the designer
to explore manually and/or automatically the design space solutions using optimization
heuristics. Exploration is mainly carried out through timing analysis and simulations. The
results of these prediction’s is a real-time behavior of the application functions executed on
various resources, like processors, integrated circuits or communication media. This approach
conforms to the typical hardware/software co-design process. Finally, for the software part of
the application, code is automatically generated as a dedicated real-time executive.
4. Hardware development
Even though the prototyping effort is focused on an FPGA-based design, we are also
exploring the architectural benefits of custom integrated circuitry, primarily related to power
consumption and the silicon area, which are important performance parameters for hardware
designs used in mobile/portable platforms. The approach we have chosen to take involves
identifying the hardware architecture appropriate for low-power configurable design based
on heterogeneous blocks (i.e. blocks that are highly optimized for a particular function,
yet flexible enough to support a variety of configuration parameters) as a compromise for
the trade-off between programmability and power consumption/area. In addition to fast
prototyping, the additional benefits of using modern FPGAs (e.g. Xilinx Virtex 4) are the
availability of highly optimized features implemented as non-standard configurable logic
blocks (CLB) like phase-locked loops, low-voltage differential signal, clock data recovery, lots
of internal routing resources, hardware multipliers for DSP functions, memory, programmable
336
10 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
I/O, and microprocessor cores. These advantages simplify mapping from hierarchical blocks
to FPGA resources.
The Virtex-II and the Virtex-II Pro are the first Xilinx architectures that support Internal
configuration access port (ICAP) Blodget et al. (2003) which is a subset of the Xilinx SelectMAP
interface having fewer signals because it only deals with partial configurations and does not
have to support different configuration modes. For Virtex-II and Virtex-II Pro series, the ICAP
furnishes an 8 bit input data bus and an 8 bit output data bus while with the Virtex-4 Series,
the ICAP interface has been updated with 32 bit input and output data buses to increase its
bandwidth. The ICAP allows the internal logic of the FPGA to reconfigure and to read-back
the configuration memory. With combination of either a hard or a soft microprocessor as a
controller, dynamic reconfiguration is carried out through the ICAP interface Blodget et al.
(2003)
We consider two possible scenarios for dynamically reconfiguring the partial reconfiguration
modules: exo-configuration and endo-configuration as shown in figure 8. The exo-configuration
constitutes the traditional way to configuring an FPGA. A configuration bit-stream is
controlled by an external processor like DSP. In this way, new modules, or upgraded versions
of them, can be created and used at any moment. This approach exhibits upgrade-ability,
but the platform is totally dependent on the processor for modifying its function. The
endo-reconfiguration, also known as self-reconfiguration, considers a different scenario.
An FPGA reconfigures itself using its own local resources. The platform is thus totally
independent as it does not require an external source to provide a bit-stream and to decide
whether to self-reconfigure. The main draw-back is that partial bit-streams need to be
previously generated by a host computer. This approach benefits, thus, of an autonomous
reconfiguration with very limited upgrade-ability.
Our Platform supports both of the previous cited configuration techniques. In fact, at
boot time, the initial full configuration bit-stream file is sent to the FPGA. This file
includes an internal configuration controller, the internal reconfiguration interface, the initial
instantiations of processing bloc units. Depending on the granularity level. One stays internal
to the FPGA in case of limited-scale reconfiguration (for co-accelerators configuration) or
design parameterization. This implies to interconnect the Micro-blaze to the ICAP internal
configuration interface. In this case, small partial bit-streams can be stored inside the FPGA,
and the use of endo-configuration lets free the other HW resources of the platform. At a
338
12 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
larger scale, configuration for the HW accelerator is external. This implies to interconnect
the DSP to the external SelectMap or internal ICAP reconfiguration interfaces. The bit-stream
corresponding to the design of HW accelerators are stored in an external SRAM memory.
5. Software development
The great diversity of processing types in a multi-standard application implies a large number
of processing configurations to be managed. The configuration management is complex
and we believe that a hierarchical approach of configuration control and management could
simplify it Delahaye et al. (2005). We combine two configuration features, as presented in
section 5.1 and 5.2, in order to create the complete configuration framework for CR testbed.
The proposal of a hierarchical view enables to manage multi-granularity of configurations,
which is of particular interest for heterogeneous architectures. The proposed model is
composed of three levels of hierarchy detailed in figure 9. A system architecture compliant
with this functional model includes one Configuration Manager Unit at level 1 (L1_CMU),
several Configuration Manager Units at level 2 (L2_CMU), each of them being responsible for
one or several Configuration Manager Units of level 3 (L3_CMU), which directly manage the
processing components.
the face of the speaker and the background of the image are transmitted using a traditional
compression mode. This requires a relatively high data-rate over the time, a model of the
person’s face is generated at the transmitter’s side, and sent to the receiver. Once this model
is understood by the receiver, the transmitted parameters of the face’s model (orientation,
opening of the mouth, of the eyes, direction of the glance) are enough to reproduce the face
behavior at the receiver. This permits to save the data amount required to transmit the face of
the speaker, by reducing very significantly the data to be transmitted through the air. The data
rate variations by step as well as the dynamic reconfigurations of the radio link are illustrated
in figure 9.
At the start, the person switches-on his terminal and starts a video-conference service. Video
coder starts learning the face model, as well as models for eyes and mouth reconstruction.
Then the radio link goes through the following steps.
Step 1: The image is transmitted using a traditional compression mode. The terminal learns
the 3D model of the person face and performs a 802.11g modulation with standard error
coding.
Step 2: The face model is learned: only high level parameters of the face are transmitted
(location, size, orientation) so the receiver can reconstruct the 3D model of the face with its
texture on the already sent background. In order to improve the reconstruction at the receiver,
errors between the model and the real image are also transmitted by the means of an UMTS
modulation with standard error coding.
Step 3: The mouth variations are modeled: The mouth characteristics, as well as high level
parameters of the face model are transmitted through UMTS with a very robust error coding
on the data for the mouth model.
Step 4: In this last step all face features’ models were already learn only high level parameters
of all three face, mouth, and eyes models are transmitted, as well as the errors with respect
to the real image to help the reconstruction process. GSM modulation with standard error
coding can then be used.
The last step is the longer period of the video-call, which permits to reduce very efficiently the
global mean throughput necessary for the communication. This justifies the efforts accepted
at the beginning of the call in terms of adaptation complexity. Changing from one data rate
to another is possible, while permanently reconfiguring the air link characteristics to up a
significant degree.
SHB, SDB, PCI, Ethernet) and the edges are connections between them. So the architecture
structure exhibits the actual parallelism between operators. Computation vertices have no
internal computation parallelism available. An example is shown in figure 10. In order to
perform the graph matching process, computation vertices have to be characterized with
algorithm operation execution times. Execution times are determined during the profiling
process of the operation. The media are also characterized with the time needed to transmit
a given data type.
The output files generated by SynDEx are exploited by our platform to manage correctly
the hardware reconfiguration platform. These text files are managed by the L1_CMU of the
transmitter (the platform in charge to send video stream) and by L1_CMU of the receiver to be
standard compatible with the current or future transmission. In the next section , we present
the hardware platform used and its specifications.
This hardware architecture is represented by an architecture graph under SynDEx and in
the same manner a DFG is done for the application task (telecommunication chain to be
used). Then, the heuristic of SynDEx realizes the adequation between the graph and the
hardware and generates constraint files for the DSP and the FPGA that give information for
the reconfiguration of the platform. Then the host of the platform sends a new source-code
to the DSP and a new order of partial reconfiguration to the FPGA using the architecture
described above.
7. Conclusion
In this chapter, we introduce a heterogeneous reconfigurable Sundance platform to support
Cognitive Radio in the context of emergency networks. The heterogeneous reconfigurable
architecture includes heterogeneous processing elements such as general purpose processors
(GPU), DSPs and FPGAs. A key element in this heterogeneous reconfigurable architecture
is the run-time partial reconfiguration of the hardware part, which can achieve the
Software Defined
Software Defined Radio
Radio Platform Platform
for Cognitive for and
Radio: Design Cognitive Radio: Design and Hierarchical Management
Hierarchical Management 343
17
8. References
J. Mitola, ”Cognitive Radio: An Integrated Agent Architecture for Software Defined Radio,” Ph.D.
dissertation, Royal Inst. of Tech., Sweden, May 2000.
J. Mitola, G. Maguire, ”Cognitive radio: making software radios more personal, Personal
Communications,” IEEE Wireless Communications, Vol. 6, No. 4. (1999), pp. 13-18
A. Nafkha, R. Seguier, J. Palicot, C. Moy, J.P. Delahaye, "A Reconfigurable BaseBand
Transmitter for Adaptive Image Coding", IST Mobile and Wireless Communications
Summit, 1-5 July 2007,
G. Chen, D. Kotz, "A Survey of Context-Aware Mobile Computing Research", Technical Report
TR2000-381, Dept. of Computer Science, Dartmouth College, Nov. 2000
E. Aarts, H. Harwig, and M. Schuurmans, "Ambient Intelligence: The Invisible Future", J.
Denning, ed., McGraw Hill, New York, 2001.
X. Qiu, J. Chuang, "Link adaptation in wireless data networks for throughput maximization
under retransmissions", in Proceedings of International Conference on Communications
(ICC), Vancouver, 1999.
W. Fan, M. Krunz, C. Shuguang; "Price-Based Spectrum Management in Cognitive Radio
Networks", IEEE Journal of Selected Topics in Signal Processing, vol.2, 2008.
M. Ghozzi, M. Dohler, F. Marx, J. Palicot, "Cognitive radio: methods for the detection of
free bands, Towards reconfigurable and cognitive communications", Comptes rendus
Physique, Paris, vol. 7, no7, 2006.
F. Jondral, "Software Defined Radio Enabling Technologies" edited by W.Tuttlebee, Wiley, 2002.
L.Alaus, J. Palicot, C. Roland, Y. Louet, D.Noguet, "Promising technique of parametrization
for reconfigurable radio, the Common Operators Technique : fundamentals and
examples", Signal Processing For Software Defined Radio Handsets, Springer, 2008.
A-R. Rhiemeier, "Benefits and Limits of Parameterized Channel Coding for Software Radio",
2nd Karlsruhe Workshop on Software Radios, Germany, 2002.
J. Palicot, C. Roland, "FFT: a Basic Function for a Reconfigurable Receiver", International
Conference on Telecommunications, Papeete, Tahiti, 2003.
V. Rodriguez, C. Moy, J. Palicot, "Install or invoke?: The optimal trade-off between
performance and cost in the design of multi-standard reconfigurable radios," Wiley
Inter-science, Wireless Communications and Mobile Computing Journal, Volume 7 Issue
9, Pages 1143 - 1156, 2007.
J.P. Delahaye, J. Palicot, P. Leray, "A Hierarchical Modeling Approach in Software Defined
Radio System Design", IEEE Workshop on Signal Processing Systems, Athens (Greece),
Nov. 2005.
344
18 Recent Advances in Wireless CommunicationsWill-be-set-by-IN-TECH
and Networks
B. Blodget and S. McMillan and P. Lysaght, "A lightweight approach for embedded
reconfiguration of FPGAs," in Design, Automation and Test in Europe Conference and
Exhibition, 2003.
T. Grandpierre, C. Lavarenne, and Y. Sorel, "Optimized Rapid Prototyping for Real-Time
Embedded Heterogeneous Multiprocessors",in CODES, Rome, Italy, May 1999.
J.P. Delahaye, C. Moy, P. Leray, J. Palicot, "Managing Dynamic Partial Reconfiguration on
Heterogeneous SDR Platforms", Sdr Forum, November, Los Angeles, USA, 2005.
L. GODARD, C. MOY, J. PALICOT, ”An Executable Meta-Model of a Hierarchical
and Distributed Architecture Management for the Design of Cognitive Radio
Equipments,” Annals of Telecommunications, Special issue on Cognitive Radio,
Volume 64, Numbers 7-8, 2009.
T.F.Cootes, G.J.Edwards and C.J.Taylor, ”Active Appearence Models”, Europeen Conference
on Computer Vision,1998.
16
1. Introduction
Long Term Evolution (LTE) is an evolving wireless standard developed by the 3rd
Generation Partnership Project (3GPP) which, along with 3GPP HSPA+, 3GPP EDGE
Evolution and Mobile WiMAX (IEEE 802.16e), opens the road to 4G technologies. The
standard is focused on delivering high data rates for bandwidth-demanding applications
and on improving flexibility and spectral efficiency, thus constituting an attractive solution
for both end users and mobile operators. An important feature of LTE that differentiates it
from conventional mobile standards is the all-IP packet based network architecture, which
further ensures the seamless integration of internet applications and facilitates the
convergence between fixed and mobile systems.
The radio interface of LTE is based on Orthogonal Frequency Division Multiplexing
(OFDM) and supports Multiple-Input-Multiple-Output (MIMO) technology. The standard
defines asymmetrical data rates and modulations for uplink and downlink, using different
access schemes for each link. In particular, Orthogonal Frequency Division Multiple Access
(OFDMA) is employed in the downlink, while the technically similar but less power-
demanding Single Carrier – Frequency Division Multiple Access (SC-FDMA) is used in the
uplink. In terms of the wireless spectrum allocation, LTE supports variable channel
bandwidths that vary from 1.4 to 20 MHz and can be deployed in different frequency bands.
The LTE architecture, referred to as Evolved Packet System (EPS) comprises the Evolved
Radio Access Network (E-UTRAN) and the Evolved Packet Core (EPC), illustrated in Fig. 1
(3GPP, 2010). The E-UTRAN consists of a network of enhanced base stations called evolved
Nodes B (eNBs) whose main role is to manage the radio resource and mobility in the cell in
order to optimize the communication among all User Equipments (UEs). The eNBs can
communicate with each other through the X2 interface and can access the EPC by means
of the S1 interface. On the other hand, the EPC consists of a control plane node called
the Mobility Management Entity (MME) and two user plane nodes, the Serving Gateway
and the Packet Data Network Gateway (PDN Gateway or P-GW). These control planes
handle the data packet routing within the LTE and towards non-3GPP data networks,
respectively.
346 Recent Advances in Wireless Communications and Networks
Fig. 1. LTE Architecture and functional split between E-UTRAN and EPC
LTE provides service differentiation by adopting a class-based Quality of Service (QoS)
concept. In particular, each data flow between the user equipment and the P-GW (called EPS
bearer) is assigned a QoS profile. A total of nine profiles are defined in the specification
(3GPP, 2011) that can be mapped to different types of applications such as real time video
and voice services, online gaming, etc. Each profile involves the bearer type, the flow
priority, an upper bound for the packet delay and the packet error rate. The bearer type
indicates whether a Guaranteed Bit Rate (GBR) will be provided to the bearer by
permanently allocating network resources during the data session.
The essential difference between GBR and non-GBR bearers is that, in the first case, a
connection may be blocked if the network does not have the resources to guarantee the
desired QoS of these connections. This concept is known as Call Admission Control (CAC)
and it is an important component of radio resource management. CAC algorithms are
usually implemented in eNBs and their role is to determine whether a new connection
request should be accepted or rejected, depending on the available network resources.
This chapter is focused on CAC policies for handling the admission of Voice over IP (VoIP)
calls in an LTE system. Particular interest is laid on the “busy hour” phenomenon, which is
defined as the “uninterrupted period of 60 minutes during the day when the traffic offered
is the maximum” (Weber, 1968). It is during these intervals of increased traffic that CAC
mechanisms play a significant role in the system performance and stability. However, most
works in the literature either implement fixed bandwidth reservation schemes or give
priority to real time services once they have been admitted to the system. In this chapter, the
authors present two different approaches that take into consideration the “busy hour”
phenomenon, namely, a dynamic bandwidth reservation scheme and a dynamic CAC
mechanism that adapts to the incoming traffic load.
Dealing with VoIP Calls During “Busy Hour” in LTE 347
The chapter is organized as follows. Section 2 outlines the related work on admission
control schemes for 4G networks found in the literature. The two proposed CAC algorithms
are described in Section 3 and their performance is discussed in Section 4. Finally, Section 5
is devoted to conclusions.
2. Related work
Although the admission control concept has been extensively studied in the literature, only
a limited number of contributions are developed within the context of 4G networks. The
objective of this section is to highlight the recent work on this field in order to provide the
reader with an up to date State of the Art.
One of the first attempts towards introducing admission control in the fourth-generation
cellular mobile networks has been made by Jeong et al. (Jeong et al., 2005). In their work, the
authors present a CAC scheme that supports the QoS requirements of the accepted
connections in IEEE 802.16e wireless systems. The objective of the proposed CAC is to
maximize the utilization of the resources, considering as basic parameter the capacity
estimation of the cell. Furthermore, during the admission and scheduling process, the base
station distinguishes the delay-sensitive real-time (RT) from the delay-tolerant non-real-time
(NRT) connections. The proposed scheme achieves to fulfil the QoS demands of the
connections, but in temporary overloaded situations, only NRT class connections can be
admitted, thus excluding entirely the RT traffic.
Qian et al. (Qian et al., 2009) propose a novel radio admission control scheme for multiclass
services in LTE systems. The authors introduce an objective function to maximize the
number of admitted users and propose a CAC algorithm that implements a service
degradation scheme whenever a limitation of resources occurs. In their paper, there is a
service differentiation approach, with different portions of bandwidth devoted to each
traffic class. However, in the presented numerical results there is no plot that distinguishes
the blocking probabilities for the different types of traffic, thus not providing any
information about the actual handling of the multiclass services.
Anas et al. propose an admission control algorithm for LTE utilizing the fractional power
control (FPC) formula agreed in 3GPP (Anas et al., 2008). In their work, GBR is the only
considered QoS of the bearer, while each user is assumed to have a single-bearer. The main
idea of their proposed algorithm is that the current resource allocation can be modified in
order for the new user to be admitted without violating the power restriction for the
physical uplink shared channel (PUSCH).
Lei et al. (Lei et al., 2008) introduce a resource allocation algorithm along with a connection
access control scheme for LTE systems with heterogeneous services. Their proposed CAC
assigns different portions of bandwidth for real-time and non-real-time connections, thus
balancing the ongoing connections of different traffic classes and facilitating the support to
potential handoff users. However, the results show that the cell throughput remains the
same whether the proposed admission control scheme is applied or not.
In (Kwan et al., 2010) a novel predictive admission control scheme is presented. The authors
propose a new cell load measurement method and mechanisms for predicting the load
increase due to the acceptance of new connections. In the same content, a resource-estimated
CAC algorithm is proposed in (Bae et al., 2009). Specifically, whenever a service request
occurs, the resource-estimated CAC algorithm calculates the required amount of resources
in order for the request to be served. This amount is determined based on the service type,
348 Recent Advances in Wireless Communications and Networks
the modulation and the coding scheme level of the particular user. However, the results
show that the proposed CAC is beneficial only in terms of packet delay, since the average
data rate and the cell utilization are decreased.
Regarding the bandwidth reservation, a downlink CAC algorithm with look-ahead calls for
3GPP LTE mobile networks is presented in (Sallabi and Shuaib, 2009). The proposed
algorithm handles the advance resource reservations, providing a high probability that the
advance calls will be immediately served once their session is ready to start. Nevertheless, it
is hard to derive useful conclusions since there is no reference or comparison to other
admission control methods.
Finally, there are various works on the scheduling phase of LTE that grant priority to the
VoIP traffic service (Choi et al., 2007; Puttonen et al., 2008; Saha and Quazi, 2009). The main
idea behind these contributions is that the prioritization of the voice packets takes place
once the connection has been admitted in the system. This results in higher satisfaction of
the VoIP users since the QoS of the voice traffic remains in high levels.
probability of a call being blocked (BP) or delayed more than a specified interval. From a
practical aspect it could be also defined as the probability of a user receiving a network busy
signal in a telephone service and can be measured using the following equation:
In the above expression, the traffic intensity ρ1 is a measure of the average occupancy of the
base station during a specified period of time. It is denoted as ρ = λ1 / μ1, where λ1 is the
mean arrival time for VoIP connections and μ1 represents their mean service rate (duration).
Furthermore, BW1 is the bandwidth needed for each VoIP call, while β ∈ [ 0,1] denotes the
bandwidth reservation factor.
Formula (2) implies that traffic intensity has an impact on the blocking probabilities of both
voice and non-voice connections. It makes sense that applying this bandwidth reservation
scheme, the blocking probability for the VoIP connections is decreased, since a portion of
bandwidth is exclusively dedicated to this service type. On the contrary, the available
bandwidth for the connections of the other service types is decreased and consequently the
blocking probability for the specific types increases.
In bandwidth reservation schemes, one of the main difficulties is to avoid the inefficient
utilization of system resources. However, in our case, the daily traffic variation establishes
the ability to predict an increase in VoIP calls, thus enabling us to tackle this problem.
Therefore, our scheme outperforms classic bandwidth reservation mechanisms.
this point we must clarify that this simplification takes place only in the admission control
process since, after being accepted, the connections are treated according to their different
priorities. Furthermore, non-GBR connections are not included in the model as they are
always accepted without any QoS guarantees.
λ1 λ1 λ1
0,n 1,n 2,n … ...
μ1 2 ⋅ μ1 3 ⋅ μ1
λ2 n ⋅ μ2 λ2 n ⋅ μ2 λ2 n ⋅ μ2
… ...
… ...
… ...
λ2 3 ⋅ μ2 λ2 3 ⋅ μ2 λ2 3 ⋅ μ2
λ1 λ1 λ1
0,2 1,2 2,2 … ...
μ1 2 ⋅ μ1 3 ⋅ μ1
λ2 2 ⋅ μ2 λ2 2 ⋅ μ2 λ2 2 ⋅ μ2 2 ⋅ μ2
λ1 λ1 λ1 λ1 λ1
0,1 1,1 2,1 … ... k,1 … ...
μ1 2 ⋅ μ1 3 ⋅ μ1 k ⋅ μ1 (k + 1) ⋅ μ1
λ2 μ2 λ2 μ2 λ2 μ2 μ2
λ1 λ1 λ1 λ1 λ1 λ1
… ... k,0 … ... m,0
0,0 1,0 2,0
μ1 2 ⋅ μ1 3 ⋅ μ1 k ⋅ μ1 (k + 1) ⋅ μ1 m ⋅ μ1
r,s+1
λ2 (s + 1)⋅ μ2
λ1 λ1
λ2 s ⋅ μ2
r,s-1
pr , s ⋅ ( λ1 ⋅ ϕr + 1, s + λ2 ⋅ ϕr , s + 1 ⋅ θ r , s + 1 + r ⋅ μ1 ⋅ ϕr − 1, s + s ⋅ μ 2 ⋅ ϕr , s − 1 ) =
(4)
= λ1 ⋅ pr − 1, s ⋅ ϕr − 1, s + λ2 ⋅ pr , s − 1 ⋅ ϕr , s − 1 ⋅ θ r , s + ( r + 1 ) ⋅ μ1 ⋅ pr + 1, s ⋅ ϕr + 1, s + ( s + 1 ) ⋅ μ2 ⋅ pr , s + 1 ⋅ ϕr , s + 1
where pr , s denotes the steady state probability of the system lying in the state ( r , s ) and
φr , s , θ r , s denote characteristic functions:
⎧1, (r , s ) ∈ S
ϕr , s = ⎨ (5)
⎩0, otherwise
The above functions are used in order to prevent a transition into an invalid state, according
to the previously defined restrictions. Furthermore, considering the normalization condition
∑ pr ,s = 1 , the steady state probability for each possible state can be obtained.
( r , s )∈S
The blocking probabilities for VoIP and non-VoIP connections are given by:
BPVoIP = ∑ pr , s (7)
( r + 1) ⋅ BW1 + s ⋅ BW2 > BWT
BPnon −VoIP = ∑
r ⋅ BW1 + ( s + 1) ⋅ BW2 > BWT − BWR
pr , s (8)
r,s+1
(s + 1)⋅ μ2
λ1 λ1
r ⋅ μ1 (r + 1)⋅ μ1
λ2 s ⋅ μ2
(s + 1)⋅ μ2
λ1 λ1
{( r , s ) , ( r + 1, s ) , ( r , s + 1) , ( r − 1, s ) , ( r , s − 1)} ∈ S (9)
Under these assumptions and using the definitions of φr , s and θ r , s , we derive the steady
state equation for the specific case:
pr , s ⋅ ( λ1 + r ⋅ μ1 + s ⋅ μ 2 ) = λ1 ⋅ pr − 1, s + λ2 ⋅ pr , s − 1 + ( r + 1 ) ⋅ μ1 ⋅ pr + 1, s + ( s + 1 ) ⋅ μ 2 ⋅ pr , s + 1 (12)
Second case: In this case we assume that the system lies in the state (r,s), subject to the
following constraints:
{( r , s ) , ( r + 1, s ) , ( r , s + 1) , ( r − 1, s )} ∈ S (13)
( r , s − 1) ∉ S (14)
Considering again the definitions of φr , s and θ r , s , we derive the respective steady state
equation for this case, that is:
pr , s ⋅ ( λ1 + r ⋅ μ1 ) = λ1 ⋅ pr − 1, s + ( r + 1 ) ⋅ μ1 ⋅ pr + 1, s + ( s + 1 ) ⋅ μ2 ⋅ pr , s + 1 (17)
Dealing with VoIP Calls During “Busy Hour” in LTE 353
Cneed = ∑ ρ × BW
i =1,2
i i
(18)
All the parameters in the above expression have been already defined. However, it should
be stressed that the index i corresponds to different service types and can take values 1 and
2 for VoIP and non-VoIP traffic, respectively.
In case that the system bandwidth suffices to serve the flows of all service types, the outage
probability is equal to zero. Due to this fact, the proposed admission control has the same
output as classic admission control schemes under light traffic conditions in the network.
On the contrary, in overloaded environments where the bandwidth is not sufficient for all
connections, an admission control algorithm is required in order to provide different levels
of priority to the various connections.
Let us consider the arrival rate of the VoIP requests, defined as λ1. If this rate is higher than a
specific threshold there will be an outage probability for the requests of the other GBR
service types. This threshold is defined by the administrator/operator of the network, by
considering the network parameters, e.g. the arrival rate of VoIP calls during “busy hour”.
The value of the outage probability fluctuates between Poutmin and Poutmax, depending on
the available system bandwidth. In the extreme case that we have no available bandwidth,
the overall outage probability becomes Poutmax. Adversely, when the total bandwidth of the
system is available and no connections are being served, i.e., BWavailable/BWT = 1, the outage
probability becomes Poutmin, since there is enough bandwidth in order for the connections of
all types to be served. These borderline values are selected by the system’s operator
according to each traffic class’ desired level of priority. On the other hand, whenever the
arrival rate of VoIP connections is smaller than this arrival rate threshold, we assume that
we are out of “busy hour” and, therefore, the outage probability equals zero.
The flowchart in Fig. 5 depicts the connection acceptance/rejection procedure in the
proposed Dynamic Connection Admission Control (DCAC) algorithm. The basic process of
the connection request flow has been described above. In the last part of the algorithm, there
is an estimation of the available bandwidth ratio in order to derive the exact value of the
outage probability (the higher the ratio, the lower the probability). In particular, the Poutmin
is a system parameter, designated by the operator, which determines the desirable level of
priority to be assigned to the voice calls. By adding this value to the normalized bandwidth
ratio, the outage probability for the specific connection is derived.
354 Recent Advances in Wireless Communications and Networks
Admission Request
Yes
Estimate Ratio of
Poutage =
Available Bandwidth Accept/Reject
Pout min +
(Available BW / Connection
Total BW) Normalized Ratio
4. Performance evaluation
In order to evaluate the performance of the proposed CAC schemes and verify the validity
of the analytical formulation, corresponding event-driven C++ simulators that execute the
rules of the algorithms have been developed. In this section, the simulation set up is
described, followed by a discussion of the obtained results.
where Creserved represents the capacity reserved by the already admitted connections in the
system, TRiservice denotes the traffic rate that should be guaranteed to the new connection i
of service type service and Ctotal is the total available capacity.
We refer to these methods as capacity-based (CB) algorithms in order to distinguish from
our proposed algorithms which are either based on the bandwidth reservation (BR) concept
Dealing with VoIP Calls During “Busy Hour” in LTE 355
Parameter Value
Bandwidth 4 Mb/s
λ2 Poisson (1 connection/s)
1/ μ1 Exponential (mean 50 s)
1/ μ2 Exponential (mean 50 s)
BW1 64 kb/s (G.711)
BW2 128 kb/s
Threshold 0.2 calls/s
β (BR) 1/3
Poutmin (DCAC) 0.6
Poutmax (DCAC) 0.85
Table 1. System parameters
Under these assumptions and considering λ1 = 1 connection/s, the system can serve about
98% of the VoIP calls if all the requests of the other classes are rejected, which means that the
network is overloaded. Furthermore, in the specific case we use a single admission control
based on bandwidth availability (CB) where all the requests are accepted if there is enough
bandwidth to serve them, regardless of the class that they belong to, the system serves about
57% of the VoIP flows and 34% of the other flows.
Finally, before proceeding to the simulation results, let us recall that the aim of the proposed
schemes is to serve more voice traffic by reducing the GoS, and consequently the blocking
probability, of VoIP calls.
Fig. 6. GoS vs. VoIP Calls Arrival Rate (proposed Bandwidth Reservation (BR) CAC vs.
Capacity-based (CB) CAC including analytical results)
Fig. 7. GoS vs. VoIP Calls Arrival Rate (proposed DCAC vs. Capacity-based (CB) CAC)
Dealing with VoIP Calls During “Busy Hour” in LTE 357
The simulation results of the proposed Dynamic Call Admission Control (DCAC) algorithm
comparing to the Capacity-based (CB) algorithm are presented in Fig. 7. This algorithm not
only improves the voice traffic service, but also enhances the overall system performance.
However, in this case the level of prioritization of the VoIP calls over the other type of traffic
is lower compared to the bandwidth reservation scenario, thus resulting in a fairer
distribution of the system resources.
Furthermore, it is interesting to observe that even for the lower arrival rates of VoIP calls
(i.e. 0.25 and 0.5 calls/s) the DCAC handles efficiently the system’s bandwidth, due to its
flexibility, while the BR scheme fails to overcome the Capacity-based algorithm. The
comparison between the two proposed schemes is given in Fig. 8. In this figure, even if there
is no further information provided, it can be clearly seen how the two proposed schemes
deal with the different types of traffic, as well as their overall performance. An interesting
observation is that, in this particular scenario, the curves for the total GoS for the two
schemes cross when the arrival rate is approximately 1.3 connections/s. Below this
threshold (i.e. for relatively low traffic conditions) the DCAC outperforms the proposed BR
scheme, while above this threshold (i.e. for relatively high traffic conditions) the BR scheme
handles the total connections in a more efficient way.
The system’s bandwidth is a main parameter of the DCAC. In Fig. 9 the provided Grade of
Service for various values of bandwidth is plotted. As far as networks with restricted
bandwidth capabilities are considered, we observe that our proposed dynamic admission
control algorithm outperforms single methods, as it improves the GoS of both VoIP calls (11-
27%) and of the total number of connections (8-10%) as well.
Fig. 8. GoS vs. VoIP Calls Arrival Rate (proposed Bandwidth Reservation (BR) CAC vs.
proposed DCAC)
358 Recent Advances in Wireless Communications and Networks
Fig. 9. GoS vs. Total System’s Bandwidth (proposed DCAC vs. Capacity-based (CB) CAC)
5. Conclusion
In this chapter, two new admission control schemes for the LTE architecture have been
presented. The first mechanism (BR CAC) is based on bandwidth reservation concept, while
the second (DCAC) reacts dynamically, depending on the available system’s bandwidth.
Compared to simple, Capacity-based (CB) admission control methods for 4G networks, the
proposed solutions improve the Grade of Service of the voice traffic, without deteriorating
the total system performance. The main idea of the proposed schemes is that the base station
serves more VoIP calls by considering the “busy hour” phenomenon. Finally, although both
the proposed algorithms have been designed with LTE infrastructure in mind, the flexibility
of the schemes enables their adaptation to other similar technologies such as IEEE 802.16
(WiMAX).
6. Acknowledgment
This work has been funded by the Research Projects GREENET (PITN-GA-2010-264759),
CO2GREEN (TEC2010-20823) and CENTENO (TEC2008-06817-C02-02).
7. References
3GPP (2010). Evolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal
Terrestrial Radio Access Network (E-UTRAN) (Release 10); Overall description;
Dealing with VoIP Calls During “Busy Hour” in LTE 359
Stage 2, 3rd Generation Partnership Project (3GPP), TS 36.300, v. 10.2.0, Dec. 2010.
Available at http://www.3gpp.org/ftp/Specs/html-info/36300.htm
3GPP (2011). Policy and Charging Control Architecture (Release 11) ; Evolved Universal
Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio
Access (E-UTRAN); 3rd Generation Partnership Project (3GPP), TS 23.203, v.
11.0.1, Jan. 2011. Available at
http://www.3gpp.org/ftp/Specs/html-info/23203.htm
Anas, M.; Rosa, C.; Calabrese, F.D.; Michaelsen, P.H.; Pedersen, K.I. & Mogensen, P.E.
(2008). QoS-Aware Single Cell Admission Control for UTRAN LTE Uplink,
Proceedings of IEEE Vehicular Technology Conference (VTC Spring 2008), pp.2487-2491,
Marina Bay, Singapore, May 11-14, 2008.
Bae, S. J.; Lee, J. J.; Choi, B. G.; Kwon, S & Chung, M. Y. (2009). A Resource-Estimated Call
Admission Control Algorithm in 3GPP LTE System, Proceedings of ICCSA 2009,
Suwon, Korea.
Choi, S.; Jun, K.; Shin, Y.; Kang, S. & Choi, B. (2007). MAC Scheduling Scheme for VoIP
Traffic Service in 3G LTE, Proceedings of IEEE Vehicular Technology Conference Fall
(VTC-2005-Fall), pp.1441-1445, Baltimore, USA, Sept. 30-Oct. 3, 2007.
Iversen, V.B. (2010). Teletraffic Engineering Handbook, Technical University of Denmark.
Available at: http://oldwww.com.dtu.dk/teletraffic/handbook/telenook.pdf
Jeong, S. S.; Han, J. A. & Jeon, W. S. (2005). Adaptive Connection Admission Control Scheme
For High Data Rate Mobile Networks, Proceedings of IEEE Vehicular Technology
Conference Fall (VTC-2005-Fall), vol.4, pp. 2607- 2611, Dallas, Texas, USA, Sept. 25-
28, 2005.
Koenen, R. (2000). Coding of Moving Pictures and Audio, ISO/IEC JTC1/SC29/WG11
N4668, March 2000.
Kwan, R.; Arnott, R. & Kubota, M. (2010). On Radio Admission Control for LTE Systems,
Proceedings of Vehicular Technology Conference Fall (VTC 2010-Fall), pp.1-5, Ottawa,
Canada, Sept. 6-9, 2010.
Lei, H.; Yu, M.; Zhao, A.; Chang, Y. & Yang, D (2008). Adaptive Connection Admission
Control Algorithm for LTE Systems, Proceedings of IEEE Vehicular Technology
Conference (VTC) 2008, pp.2336-2340, Marina Bay, Singapore, May 11-14, 2008.
Puttonen, J.; Kolehmainen, N.; Henttonen, T.; Moisio, M. & Rinne, M. (2008). Mixed Traffic
Packet Scheduling in UTRAN Long Term Evolution Downlink, Proceedings of IEEE
19th International Symposium on Personal, Indoor and Mobile Radio Communications
(PIMRC) 2008, pp.1-5, Cannes, France, Sept. 15-18, 2008.
Qian, M.; Huang, Y.; Shi, J.; Yuan, Y.; Tian, L. & Dutkiewicz, E. (2009). A Novel Radio
Admission Control Scheme for Multiclass Services in LTE Systems, Proceedings of
IEEE Global Telecommunications Conference (GLOBECOM) 2009, pp.1-6, Honolulu,
Hawaii, USA, Nov. 30-Dec. 4, 2009.
Report Study (2009). Enterprise VoIP Market Trends 2009-2012, Osterman Research Inc., Feb.
2009.
Saha, S. & Quazi, R. (2009). Priority-coupling-a semi-persistent MAC scheduling scheme for
VoIP traffic on 3G LTE, Proceedings of 10th International Conference on
Telecommunications (ConTEL 2009), 2009, pp.325-329, Zagreb, Croatia, June 8-10,
2009.
360 Recent Advances in Wireless Communications and Networks
Sallabi, F. & Khaled Shuaib, K. (2009). Downlink Call Admission Control Algorithm with
Look-Ahead Calls for 3GPP LTE Mobile Networks, Proceedings of IWCMC’09,
Leipzig, Germany, June 21–24, 2009.
Weber, J. (1968). Dictionary of English Language Traffic Terms, , IEEE Transactions on
Communication Technology, vol.16, no.3, pp.365-369, June 1968.
17
A Semantics-Based Mobile
Web Content Transcoding Framework
Chichang Jou
Tamkang University
Taiwan
1. Introduction
With the rapid development of wireless communication technology, in addition to desktop
computers, many users are accessing the internet from hand-held appliances, such as
tablets, PDAs, and cellular phones. Many new computation paradigms, such as pervasive
computing and ubiquitous computing, have been proposed to embrace this emerging
portable computation framework. However, because of the difference in users’ speed in
adopting new technologies, hand-held devices in use have miscellaneous hardware
limitations, such as CPU speed, power, memory, bandwidth, and image resolutions. They
also have various restrictions in software support, such as operating system, installed
programs, real-time processing capability, and rendering functionality. These ad hoc
limitations have become barriers in human-computer interaction. Most web contents, such
as web pages and images, are mainly in the HTML format, which is designed for desktop
computers. Without proper modification, most rendered web contents in hand-held devices
encounter distorted or fragmented user interface, broken images, slow responses, etc. These
ad hoc characteristics of hand-held devices have become a barrier in enhancing web
availability.
In this chapter, we illustrate how a semantics-based content adaptation framework could be
utilized to fill up the computational gap between mobile devices and desktop computers.
The transcoding mechanism of our framework, called Content Adaptation Proxy Server
[CAPS], resides behind web servers. In CAPS, web pages and image files are transcoded
according to: (1) RDF (Resource Description Framework) (Manola et al., 2004) of web
content; and (2) semantics extracted from the CC/PP (Composite Capability Preferences
Profiles) (Klyne et al., 2004) client device configuration. These semantic properties will be
stored and interpreted inside the Jena Inference System (Carroll et al., 2004) as knowledge
facts to obtain proper transcoding parameters for each particular device. Then web pages
with proper layout modification and images with proper rendering parameters for each
particular device will be constructed and delivered. This technology will recreate contents
suitable for resource-limited devices to balance information loss and information
availability.
For the rest of this chapter, we will review related work in Section 2. In Section 3, we
describe the design principle and system architecture of CAPS. Semantics extraction and
knowledge base construction for the Jena Inference System are discussed in Sections 4 and 5.
362 Recent Advances in Wireless Communications and Networks
2. Related work
According how many web content types are handled, web content adaptation could be
classified into: universal and specific web content adaptation. Universal web content
adaptations are mostly proxy-based and could be applied to web pages and various
multimedia types. Their functions include integrating various web content types for the
rendering. Section 2.1 will cover proxy-based universal web content adaptation. Specific
web content adaptation focuses on the algorithm design. The most frequently studied web
content type is HTML files. Due to the complexity in analyzing HTML files, proper
adaptation of HTML files in mobile devices is very difficult. Section 2.2 will cover works in
using heuristics to adjust layouts of HTML documents to fit a particular mobile device. We
will cover how the semantic web technology has been applied to web content adaptation in
Section 2.3.
Hsu at el. (2009) proposed a hybrid transcoding approach to combine the traditional
transcoding technologies based on ontology-based metadata to improve the rendering
problem caused by heterogeneous devices. This heterogeneous markup document
transcoding platform was then presented to serve as a transcoding service broker to
facilitate interoperability between distributed heterogeneous transcoders.
CAPS
Client
1. HTTP Request
Proxy Listener
2. Dispatched Request
3.1 Content Request
Internet
3.3 web content request Cached web
Web Content Fetcher content
Transcoder
1JTidy, http://jtidy.sourceforge.net
A Semantics-Based Mobile Web Content Transcoding Framework 367
requested URL will be handled in CAPS: (1) XHTML files: Their metadata are about layouts
of the document, possibly with hyperlinks to external textual or binary files. (2) Image files:
These are binary files with adjustable parameters, like color depths and resolution.
Currently, CAPS could handle JPEG, PNG, and GIF images. For files encoded in
indestructible formats, like Java applets, since they could not be adjusted, CAPS would
directly forward them to the Transcoder for delivery to the client device.
To extend CAPS to new file types, we need to specify just the metadata about the new file
type, and to build the semantics extraction component and transcoding rules for web
contents of the new file types.
For XHTML files, the semantic extractor module collects the following schema information:
the identification of each XHTML element, and the layout of the XHTML page. We apply
XHTML Document Object Model [DOM] (Le Hégaret et al., 2005) tree node scanning to
extract node information and relationships among XHTML elements. We solve the element
identification problem in an XHTML page by XPath (Clark & DeRose, 1999) so that each
node in the DOM tree could be specified accurately.
Statistical or inferred semantics data for the following Web Page Auxiliary Vocabulary will
be extracted for each XHTML DOM tree node:
1. NumberOfWords: This data indicates number of words in a paragraph. It is used to
determine whether the paragraph corresponding to the XHTML node should be split.
2. NumberOfImages: This data indicates number of the <IMG> tags in a specific XHTML
node. It is used to decide whether a tabular cell is an advertisement banner.
3. AverageLink: This is the quotient of the number of links and the number of words
within a XHTML node. In web contents with useful information, this value tends to be
very high, and all contents in the node should be preserved.
4. Title: For XHTML nodes with the <H1> or <H2> tag, or with texts surrounded by pairs
of the <B></B> or <STRONG> </STRONG> tags and followed by <BR> immediately,
the collected content is treated as a title. This could be used as the title of the sub-page
corresponding to this node.
5. Layout: This information indicates whether the node is used for layout composition.
For example, to determine whether a <TD> is a layout element or an actual tabular cell,
we calculate the number of words for the element. If its number of words exceeds a
specific threshold, we mark such a <TD> element as a layout element.
Consider the following simplified XHTML page:
<HTML>
<BODY>
<TABLE>
<TR>
<TD>Gentoo Linux is a totally new linux distribution.
</TD>
</TR>
</TABLE>
</BODY>
</HTML>
We can describe the <TD> tag in the above page with RDF, XPath and Web Page Auxiliary
Vocabulary as follows:
368 Recent Advances in Wireless Communications and Networks
<rdf:Description rdf:about="/HTML/BODY/TABLE/TD[1]">
<rdf:type rdf:resource="html:ELEMENT_NODE" />
<html:NumberOfWords>8</html:NumberOfWords>
<html:IsLayout>false</html:IsLayout>
<html:NumberOfImage>0</html:NumberOfImage>
<html:NodeName>TD</html:NodeName>
<html:ChildNodeNumber>0</html:ChildNodeNumber>
<html:ParentNode rdf:parseType=”Resource”
rdf:resource=”_:/HTML/BODY/TABLE/TR[1]”/>
</rdf:Description>
Knowledge Base
Facts
3. Facts – These are facts supported in the form of instantiated predicates. In CAPS, they
are the semantic data collected by the Semantic Extractor.
The transcoding rules of CAPS are to link the web content description and device
information in CC/PP, which are transmitted via CCPP diff. In other words, these rules
would map the user’s or device’s requirements into parameter settings of web content. We
follow the semantic network model (Hayes & McBride, 2004) defined by W3C, and define
the following sets of facts to explain formal meaning of the transcoding rules:
1. D: CC/PP Facts transmitted from the client side. These are used to describe
characteristics of devices or user preferences.
2. Ct: All web content semantics for MIME type t obtained by “semantics extractor”.
3. L: All constraints and limitations of web content. For example, image width less than
screen width, image color depth less than or equal to 24 bit, etc.
In addition, we define several vocabularies to represent the actions in removing an element
in text/html document, and in changing the coding of a web page. For MIME type t,
suppose the set of transcoding operations for type t is Ot. The union of the above sets forms
the set of all statements of our RDF model:
SRDF = ∪ (Ct ∪ Ot ) ∪ L ∪ D
t
The preconditions of the transcoding rules is a subset of ∪Ct ∪ L ∪ D . The result of these
t
transcoding rules is a sequence of operations. An example sequence is: update image size,
change coding, etc. Suppose the set of possible transcoding actions for MIME type t is called
Mt. In CAPS, Mt is formally defined as:
Mt = Ot ∪ C t
We call Mt the transcoding module for MIME type t. The result of transcoding rules for web
content with type t could be represented a subset of Mt. Finally, the set of all possible
transcoding rules for MIME type t could be defined as:
Rt = P(Ct ∪ D ∪ L ) × P( Mt )
where P( ) is the power set function. Thus, the input of the transcoding rules is a set of
statements about web content (Ct), device CC/PP configurations (D), and constraints (L).
The output of the transcoding rules then is a member of P(Mt) that are the required actions
for the transcoding.
We apply heuristics to design the transcoding rules in the “IF…THEN…” format. If the
precedent parts of a rule are all true, then the consequent part of the rule would be added as
a statement of transcoding parameters into the knowledge base. We provide rules regarding
device characteristics by defining restriction rules using first order predicate logic. Rules are
categorized to back up each other. For example, if rules for HP 6530 PDA are not sufficient,
then rules for PPC Pocket PC could be used. The following example rule is to reduce the
width of a JPG image file to fit the screen width of the mobile device:
In the above RDF rule, DV, I, DW, IW are variables for device, image, device width, and
image width. Accept(DV, “image/jpeg”) is a statement of the RDF model to express that the
device could render the multimedia type “image/jpeg”. The other predicates before the
“→“ symbol could be easily interpreted similarly. So the predicates before the “→“ symbol
are to check the conditions about web content (Format and ImageWidth), device CC/PP
configurations(Accept), and constraints(LessThan). The predicate after the “→“symbol
indicate the action to be performed: ScaleImageByWidth. The above inference rule could be
expressed by the following Jena rule:
[ ScaleImageByWidth:
(system:Content content:Width ?image_width),
(system:HardwarePlatform ccpp:DisplayWidth ?display_width),
lessThan( ?display_width, ?image_width ) ->
(system:Content content:ScaleImageByWidth ?display_width) ]
The above rule is named ScaleImageByWidth. In Jena rules, names prefixed with ‘?’ are
variables. The namespaces “system”, “ccpp”, and “Content” point to the content adaptation
proxy server, the standard UAProf Schema (WAP, 2001), and web content under
transcoding, respectively. The above rule means that if the width of the device
(?dispaly_width) is less than the width of the image (?image_width), then set width of the
image as width of the device, and set height of the image proportionally with respect to the
adjustment ratio of the width.
6. Transcoder of CAPS
The Transcoder is composed of several transcoding modules corresponding to file types of
XHTML, JPEG, etc. It could be extended to handle other file types. According to the
transcoding actions and parameters produced by Jena, it performs detailed content
adjustment and filtering. For image files, currently the system not only transforms image
files into the same format with different parameters, but also transforms image files into
different formats.
According to file type of the web content, the Transcoder dispatches them to the
corresponding adaptation component. To perform the required content transcoding
operations, it will query the inferred RDF model through Jena’s RDF query language RDQL
to obtain the required transcoding parameters. The use of RDQL could prevent tight
coupling of the transcoding components. An example RDQL query is demonstrated as
follows:
SELECT ?predicate, ?object
WHERE ( system:Content, ?predicate, ?object)
USING system FOR http://www.im.abc.edu/~def/proxy.rdfs#
USING is to specify the name space. This query could obtain all RDF statements with subject
system:Content, where system is the name space and Content represents web content
currently under transcoding. Transcoding query results are represented as instantiated
predicates. For example, if the transcoding predicate for an image file is
ScaleImageByWidth, then the Transcoder would adjust the image width and height
proportionally. After all RDQL query results are handled, the resulting web content would
be returned to the client.
A Semantics-Based Mobile Web Content Transcoding Framework 371
7. Implementation of CAPS
We implement the content adaptation proxy server in the Fedora Linux 13 operating system
by the Java Language J2SDK 1.6.0. We use the package org.w3c.dom for handling XHTML
DOM trees of the web pages, and use the java.awt.image.BufferedImage package for
handling the JPEG, PNG, and GIF image files.
2 Asciizer, http://asciizer.sourceforge.net
372 Recent Advances in Wireless Communications and Networks
[ExtractColor: Modify
(system:Content content:Width ?image_color_depth), image color
(system:HardwarePlatform ccpp:ScreenColorDepth ?device_color_depth), depth to
lessThan( ?device_color_depth, ?image_color_depth ) match the
->(system:Content content:ReduceColorDepth ?device_color_depth), display
(system:ReduceColorDepth system:TranscodeType "text/jpeg")] capability of
the device.
[PngToJpeg: Transform
(system:Content content:Type “image/png”), PNG files to
(system:SoftwarePlatform ccpp:CcppAccept ?Bag), JPEG.
noValue(?Bag ?li "image/png"),
(?Bag ?li "image/jpeg")
-> (system:Content system:TransformTo "image/jpeg"),
(system:TransformTo system:TranscodeType "text/jpeg")]
[JpegToPlainText: Transform
(system:Content content:Type “image/jpeg”), JPEG to plain
(system:SoftwarePlatform ccpp:CcppAccept ?Bag), text.
noValue(?Bag ?li "image/jpeg"),
(?Bag ?li "text/plain")
-> (system:Content system:TransformTo "text/plain"),
(system:TransformTo system:TranscodeType "text/jpeg")]
transcoding modules to improve the scalability of the system. Only MARCH and CAPS
provide dynamic adaptor loading of transcoding modules. In MARCH, the transcoding
server was dynamically determined by the dynamic transcoding path, where each node
represents a transcoding server. After traversing all nodes in the path through message
passing, in which web content is encapsulated in HTTP/1.1, the web content transcoding is
also finished. In CAPS, the dynamic adapter loading is implemented through Java’s
dynamic binding and Run-Time Type Identification [RTTI]. The transcoding modules are
decided on-the-fly and thus require less loading than MARCH.
MoCA
MARCH Lum and Lau Nagao et al. CAPS
Systems (Sacramento
(Ardon et al.) (2002) (2001) (this study)
et al., 2004)
QoS for universal,
Purpose universal multimedia universal
multimedia caching
Implementa
application - middleware application application
tion level
Server server-driven,
- server-driven proxy-based proxy-based
deployment proxy-based
Dynamic
adapter yes no yes no yes
loading
Transcoding
parameter
rules heuristics rules heuristics rules
selection
method
Table 5. Comparison of CAPS with related work
In parameter selection, there are two approaches: heuristics and rules. The benefits of
heuristics-controlled parameter selection are easy to be implemented in programs and faster
response time. It drawbacks include less number of handled cases, and less flexibility. Once
logic used in parameter selection is changed, the programs must be re-compiled. On the
other hand, use of rules in parameter selection provides better flexibility. Additionally, with
the capability of reasoning, more transcoding strategies could be obtained than heuristics.
However, the drawback of rules-controlled parameter selection is the difficulty to write
correct and proper rules.
CAPS uses light-weight transcoding components through flexible API. It could be easily
deployed as distributed processing by RMI or Web Services. Therefore, the costs for
deployment, allocation, and scalability could be greatly reduced.
8. Conclusion
We designed and implemented a flexible and robust framewrok, called CAPS, for web
content adaptation using RDF semantics from CC/PP device characteristics, XHTML web
pages, and JPEG, PNG, and GIF image files. Past researches in this area either did not take
device characteristics into consideration, or were not a general purpose solution for
A Semantics-Based Mobile Web Content Transcoding Framework 377
miscellaneous mobile devices. We made use of the Jena Inference System to obtain the
transcoding parameters through the fact and knowledge base built from the collected
semantics.
In CAPS, a single copy of the web pages could serve many different mobile devices.
Previous tedious web page rewriting labour for mobile devices could be saved. Our
framework could be easily extended to new file types by importing related semantics and
transcoding modules.
We plan to incorporate support of style sheet and web form specifications, such as
CSS/Mobile (Schubert & Berjon, 2008) and XHTML for Mobile (McCarron et al., 2010), into
this semantics-based content adaptation framework. By supporting these dynamic web
pages, the increased user interactivity would accelerate user acceptance of pervasive
computing.
9. Acknowledgment
This work was supported in part by Taiwan’s National Science Council under Grant NSC
95-2221-E-032 -027.
10. References
Ardon S.; Gunningberg P.; Landfeldt B.; Ismailov Y.; Portmann M. & Seneviratne A. (2003).
MARCH: a distributed content adaptation architecture. International Journal of
Communication Systems, Vol. 16, No. 1, pp. 97-115, ISSN 1074-5351
Bickmore T. & Girgensohn A. (1999). Web page filtering and re-authoring for mobile users.
The Computer Journal, Vol. 42, No. 6, pp. 534-546, ISSN 1460-2067
Butler M. (2001). Current Technologies for Device Independence, HP Laboratories Technical
Report, No. 83
Butler M. (2002). DELI: A Delivery context library for CC/PP and UAProf, External technical
report, HP Semantic Lab
Buyukkokten O.; Garcia-Molina H. & Paepcke A. (2001). Accordion summarization for end-
game browsing on PDAs and cellular phones, Proceeding Of the 2001 SIGCHI
Conference on Human Factors in Computing Systems, pp. 213-220, ISBN 1-58113-327-8
Carroll J.; Dickinson I.; Dollin C.; Reynolds D.; Seaborne A. & Wilkinson K. (2004). Jena:
implementing the semantic web recommendations, Proceedings of the 13th World
Wide Web Conference, pp. 74-83, ISBN 1-58113-844-X
Clark J. & DeRose S. (1999). XML Path Language (XPath) v. 1.0, W3C, Available from
http://www.w3.org/TR/xpath
Endler M.; Rubinsztejn H.; Rocha R. C. A.; Sacramento V. (2005). Proxy-based Adaptation
for Mobile Computing, Technical Report, Departamento de Informática, Pontifícia
Universidade Católica do Rio de Janeiro, Available from http://ftp.inf.puc-
rio.br/pub/docs/techreports/05_24_endler.pdf
Gimson R.; Finkelstein S. R.; Maes S. & Suryanarayana L. (2003). Device Independence
Principles, W3C Working Group Note, Available from
http://www.w3.org/TR/di-princ/
Glover T. & Davies J. (2005). Integrating device independence and user profiles on the web.
BT Technology Journal, Vol. 23, No.3, pp. 239-248, ISSN 1358-3948
378 Recent Advances in Wireless Communications and Networks
Hayes P. & McBride B. (2004). RDF Semantics, W3C Recommendation, Available from
http://www.w3.org/TR/rdf-mt/
Hori M.; Kondoh G.; Ono K.; Hirose S. & Singhal S. (2000). Annotation-based web content
transcoding, Computer Networks, Vol. 33, No. 1-6, pp. 197-211, ISSN 1389-1286
Hsiao J. L.; Hung H. P. & Chen M. S. (2008). Versatile transcoding proxy for internet content
adaptation. IEEE Transactions on Multimedia, Vol. 10, No. 4, pp. 646 - 658, ISSN 1520-
9210
Hsu I. C.; Chi L. P. & Bor S. S. (2009). A platform for transcoding heterogeneous markup
documents using ontology-based metadata. Journal of Network and Computer
Applications, Vol. 32, No. 3, pp. 616-629, ISSN 1084-8045
Hua Z.; Xie X.; Liu H.; Lu H. & Ma W. (2006). Design and performance studies of an
adaptive scheme for serving dynamic web content in a mobile computing
environment, IEEE Transactions on Mobile Computing, Vol. 5, No. 12, pp. -1662, ISSN
1536-1233
Huang A. W. & Sundaresan N. (2000). A semantic transcoding system to adapt web services
for users with disabilities, Proceeding of the 4th international ACM conference on
Assistive technologies, pp. 156-163, ISBN 1-58113-313-8
Hwang Y.; Kim J. & Seo E. (2003) Structure-aware web transcoding for mobile devices. IEEE
Internet Computing, Vol. 7, No. 5, pp. 14-21, ISSN 1089-7801
Klyne G.; Reynolds F.; Woodrow C.; Ohto H.; Hjelm J.; Butler M. & Tran L. (2004).
Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0,
W3C, Available from http://www.w3.org/TR/CCPP-struct-vocab
Le Hégaret P.; Whitmer R. & Wood L. (2009). Document Object Model (DOM), W3C,
Available from http://www.w3.org/DOM/
Lum W. Y. & Lau F. C. M. (2002). A context-aware decision engine for content adaptation.
IEEE Pervasive Computing, Vol. 1, No. 3, pp. 41-49, ISSN 1536-1268
Manola F. & Miller E. (2004). RDF Primer, W3C, Available from
http://www.w3.org/TR/rdf-primer/
McCarron S.; Ishikawa M.; Baker M.; Matsui S.; Stark P.; Wugofski T. & Yamakami T. (2010).
XHTML™ Basic 1.1 - Second Edition, W3C Recommendation, Avail able from
http://www.w3.org/TR/2010/REC-xhtml-basic-20101123/
Nagao K.; Shirai Y. & Squire K. (2001). Semantic annotation and transcoding: making web
content more accessible, IEEE MultiMedia, Vol. 8, No. 2, pp. 69-81, ISSN 1070-986X
Nimmagadda Y.; Kumar K. & Lu Y. H. (2010). Adaptation of multimedia presentations for
different display sizes in the presence of preferences and temporal constraints,
IEEE Transactions on Multimedia, Vol. 12, No. 7, pp. 650 - 664, ISSN 1520-9210
Ohto H. & Hjelm J. (1999) CC/PP exchange protocol based on HTTP Extension Framework,
W3C, Available from http://www.w3.org/TR/NOTE-CCPPexchange
Schubert S. & Berjon R. (2008). CSS Mobile Profile 2.0, W3C Candidate Recommendation,
Available from http://www.w3.org/TR/2008/CR-css-mobile-20081210/
Wireless Application Protocol Forum, Ltd. (2001). Wireless Profiled HTTP, Available from
http://read.pudn.com/downloads19/doc/comm/67224/WAP-229-HTTP-
20010329-a.pdf
Wireless Application Protocol Forum, Ltd. (2001). WAG UAProf, Available from
http://read.pudn.com/downloads19/doc/comm/67224/WAP-248-UAProf-
20011020-a.pdf
18
1. Introduction
Many wireless systems develop in present days relay on discontinuous transmission and
reception or TDD access technology, (Time Division Duplex), as this way of operation has
several advantages, provided it is not required a dedicated link based only on FDD access,
(Frequency Division Duplex). The used of TDD access improves the spectral efficiency,
which increases the number of communication channels available sharing the same
spectrum resources, besides, it enhances the energetic efficiency of the system as the
hardware only works during a limited period of time and, in spite of the FDD access
technique, which requires a continuous power transmission, is becoming more popular
through communication systems like WIFI, MIMO and the like, the road maps for 4G radio
access technologies are based on both TDD and FDD (E. Dahlman et al.,2006). The new LTE,
(3GPP Long Term Evolution), standard for 3GPP flexible spectrum usage is supported
through FDD/TDD harmonisation, where there is a convergence between paired spectrum
and unpaired spectrum solutions (K. Fazel & S. Kaiser, 2008). To illustrate the basic time
domain behaviour of the TDD and FDD channels, Fig. 1 represents their simplified time
versus frequency channel distribution.
The Fig. 1 provides hints of how the communication access scheme affects several
parameters of the wireless system. The present chapter discusses those issues concerning the
power supply system which reverts back to the general performance of wireless systems.
Fig. 1. TDMA, TDD and FDD time versus frequency and code channel distribution
In spite of there are many architectures of power supplies to cope with discontinuous
consumption, due to the special characteristics of the wireless systems, not all of them are
suitable or appropriate to all types of wireless systems. This fact is especially true or
significant for battery powered wireless devices, as the restrictions in size and autonomy
imposed are key factors or introduce new variables or constrains.
380 Recent Advances in Wireless Communications and Networks
The research work that will be presented in this chapter is devoted to developing generic
architectures of power supply systems for wireless systems, which possess the current
consumption pattern of a discontinuous load. It also tries to answer, or at least eases to
understand and face the design, development and production challenges related with the
performance of wireless devices whenever they face with this type of current consumption.
2.1 Characteristics
From the power supply perspective, one of the main attributes of a wireless system with
TDD access scheme is its periodic consumption pattern, Fig. 2. The characteristics
parameters of the consumption are represented in the picture and are the following:
- Period and duty cycle of the consumption (t1, t2).
- Magnitude of the consumption (IPEAK, ILOAD, ISTANDBY).
- Time mask and slopes of the communication burst.
ILOAD
Q1 = t1·I1
T=t2 + t1
I1 IPEAK I2 / I1= kI
Q2 = t2·I2
Time
mask detail
t t1
tON=t1 t2 = kt · t1 I2 = ISTANDBY
Fig. 2. Power versus time load current consumption for wireless system with discontinuous
transmission, and detail of the current pulse
These parameters are the tools to determine or dimension the power supply system of a
wireless system. Period, duty cycle and magnitude set the energy demands place upon the
power supply. Meanwhile, the time mask and slopes of the communication burst are
relevant to control the switching harmonics of the signal and, at the same time, maintain the
signal spectrum within its assigned bandwidth. Fast transitions mean switching harmonics
of high frequency difficult to be restrained within regulation specifications, particularly at
extreme conditions of temperature and voltage.
Power Supply Architectures for Wireless Systems with Discontinuous Consumption 381
2.2 Effects
The noticeable effects of discontinuous consumption in wireless systems are fluctuations
and drops in the supply voltage, applied to the terminals of the load, around the nominal
value; this fluctuation follows the consumption pattern. Voltage drop is ruled by the Ohm
law, but not only must be considered the distributed resistive component of electric path
between load and source, but also its reactive part. The resistive component conditions or
determines the magnitude of voltage drop, meanwhile; the reactive one defines the shape
and damping of consumption rise and fall slopes.
panel, a battery or the mains AC power lines, this fact will only affect the architecture of the
voltage converter. There are tree generic alternatives: AC-DC isolated converter, DC-DC
isolated converter and DC-DC converter (B. Sahu & G.A. Rincon-mora, 2004).
Whenever AC power source is used, it is mandatory an AC-DC isolated converter, but the
need of isolation between DC power source and the wireless systems is only a matter of
electromagnetic compatibility standards, electrostatic discharges and security regulation.
3.2.1 Battery
The main power source of portable or battery powered wireless systems is the battery cell
itself (Saft, 2008). The battery could be primary or secondary, i.e., rechargeable or not
rechargeable, respectively. From the point of view o the chapter, the battery equivalent
circuit is made of its internal resistance, RIN. It use to be of low value and depends on the
technology, tenths of milliohms for 1 Ahour capacity Ion-Lithium battery.
Fig. 3. Detail of an Ion-Lithium battery internal protection circuit and its true table
Due to the characteristics of wireless systems stress onto battery voltage supply level, size
and weight the battery technologies more suitable are, among others, the following:
- Niquel-Metal-Hydrite (NiMH) and Niquel-Cadmium (NiCd), both require fuse for
safety.
- Ion-Lithium and Ion-Lithium-Polymer, both need a protection circuit plus the fuse.
The basic circuit architecture of a Lithium battery is shown in the following picture, Fig. 3.
The schematic shows that the equivalent resistance of the cell is made of the internal
resistance of the battery, plus the resistance of contact and the resistance of the protection
circuit. The protection circuit is made of the resistance of the fuse, recommended a
polyswitch type, and a couple of mosfets. The contribution of all these electronic elements
must be considered as they increase the ripple of the voltage supply.
recommended suppress or attenuate the voltage ripple with filtering and voltage regulation.
Filtering is achieved by means of high-value capacitors of low ESR and inductors;
meanwhile, regulation is obtained through DC-DC converters, linear or witched ones.
As long as it is not always feasible a direct connection to the power source, power
converters are used to adapt the power supply voltage and current level to those of the
wireless systems, even if the power source is a battery. Moreover, depending on the systems
architecture, may be required a second regulator to stabilize the output of the former one.
There is a wide range of power supply architectures available, switched or linear (R. W.
Erikson, 1997). If AC-DC conversion is required, in spite of it is possible its integration
within the wireless systems, is better employing an external one of a plug-in type. External
AC-DCs are widespread as they ease the design and certification of the equipment
electronics. This is true because external plug-in are already certified. Besides, in the
particular case of wireless modules, their manufactures usually translate the discontinuous
consumption impact to the application integrator or to the converter manufacturer. The
Fig. 4 shows an example of such a problem; the manufacturer provides a small size chipset,
already certified, but on its application note highlight that it requires to work a capacitor of
the same size plus a voltage regulator.
and the voltage drop in the active device over cut and saturation. The power is delivered to
the load through the energy store in an inductor, which charging cycle is a function of the
energy demanded by the load. So, the energy drained from the source is used mostly to
feeding the load, which reduces the power losses that are limited to those of the control
circuit and the component leakages. Therefore, a performance analysis of switched
converters shows that they provide a better balance between input and output voltages than
the linear ones. They are, also, smaller and lighter than its linear counterparts for the same
power rating, mainly because the isolation transformer is smaller. Furthermore, the size and
value of the transformer or the switching inductance and the capacitors are reduced as the
switching frequency is increased. Lower value capacitors contribute to reduce the voltage
ripple, because it is possible used ceramic capacitors of low ESR, in the order of tenths
milliohms or lower.
On the other hand, a switched power supply introduces electromagnetic fields, radiated and
conducted, that make the technical requirements restrictive, as the complexity of electronic
design increases. Switched regulators are, also, more complex to design due to they require
a higher number of discrete components, which reduces the electronic liability.
Moreover, switched converter has another issue that must be bear in mind for green design
applications. As long as the current consumption is discontinuous, the load remains inactive
for some periods of time; during those periods its current consumption may reach zero.
Hence, switched converter has poor efficiency under no-load conditions as there is a
quiescent current in the electronic of the power supply. For example, standard 12 V and 4 W
commercial DC-DC have a quiescent current consumption between 30 and 50 mA.
Unless solutions switched regulation based may appear the most suitable, many
manufactures employ linear regulation, especially when; there is available a power source
with voltage levels close to those required by the wireless system, and size it is not a
restriction. Doing so it is avoided EM fields, which increase cost and technical requirements.
3.2.3 Capacitors
Power supply of wireless systems employs capacitors to store energy and filtering. The
challenges to face are finding capacitors of high value, small size and low ESR that
withstand the voltage levels applied to the electronics.
Sometimes, the equipment size does not allow the use of high-value capacitors; the
alternative is employ capacitors of hundred microfarads that only help to smooth voltage
transitions. This is the case of GSM cellular terminals that when transmitting at maximum
power, the peak current consumption may reach 3 A.
Furthermore, capacitor ESR produces load voltage ripple, and its leakage resistance
introduces a continuous discharge of the battery. For example, an standard tantalum
capacitor, AVX model TPCL106M006#4000, has 10 µF nominal capacitance and ESR of 4000
mΩ. An electrolytic capacitor provides higher capacitance value on a bigger size and with
more ESR. On the other hand, a ceramic one has small size and low ESR, but there are not
feasible for high capacitance. Table 1 highlights the differences between technologies for the
same capacitance value.
Then the main limiting factors of capacitors are their ESR and size. The Table 1 provides a
comparison between different types of capacitors. High value capacitors are intended to be
used in the equipment, close to the load. To reduce the impact of the size it is possible;
redistribute several capacitors in parallel, or use the technology of super-capacitors.
386 Recent Advances in Wireless Communications and Networks
I MEAN = I LOAD ⋅
tON
+ I STANDBY ⋅
(T − tON ) (1)
T T
energy when the load is active. The higher the capacitor or super-capacitor value the lower
the load voltage ripple. The impact of capacitor on the power supply performance will differ
depending on where is located. It could be placed in two different locations:
- In the battery cell or at the ends of the battery terminals.
- Close to the load, within the wireless electronics.
(a) (b)
Fig. 6. Load voltage and battery current waveforms of a wireless system with discontinuous
consumption for (a) maximum consumption and (b) mean consumption
Unless it may appear a satisfactory technique, it has some drawbacks. The main limiting
factors of capacitors are their ESR value and size. The first produces voltage ripples,
consequently. The second may lead to a capacitor size that does not fit within the wireless
device. This inconvenient could be overcome, to a certain extent, by means of distribute the
capacity in several capacitors in parallel or by using the technology of super-capacitors.
Fig. 7. Un-loaded equivalent circuit of battery, distributed resistance, capacitor and load,
and detail of the load voltage ripple showing the capacitor charge and discharge
Whenever the load, or wireless system, is not activated, the capacitor voltage is equal to V1,
so the capacitor discharge time is a function of RLOAD=VLOAD/IPEAK, through Ec. 2.
⎡ E − V (0 + ) ⎤
tCHARGE = R 2 ⋅ C 1 ⋅ ln ⎢ ⎥ (2)
⎣⎢ E − V (t ) ⎥⎦
Where V1 and V2 are equal to:
V (0 + ) = V 1 = E ⋅ (1 − ε ) − ΔV (3)
V (t ) = V 2 = ⋅E ⋅ (1 − ε ) (4)
⎡ E − E ⋅ (1 − ε ) + ΔV ⎤ ⎡ E ⋅ ε + ΔV ⎤
tCHARGE = R 2 ⋅ C 1 ⋅ ln ⎢ ⎥ = R 2 ⋅ C 1 ⋅ ln ⎢ (5)
⎣ E − E ⋅ (1 − ε ) ⎦ ⎣ E ⋅ ε ⎥⎦
Being the capacitor load at VC(0+) = V2, it starts a discharge cycle that last a maximum time
of tON. So, the new equivalent circuit of the load plus the power supply is represented in
Fig. 7. Solving the Thevenin, the circuit is simplified as it shows Fig. 8, being the Thevening
voltage, Ee, equals to:
1 (6)
Ee = E ⋅
R2
R1 + 1
Fig. 8. Equivalent circuit of battery, distributed resistance, capacitor and load over the
capacitor discharge cycle
390 Recent Advances in Wireless Communications and Networks
Fig. 9. Equivalent circuit of battery, distributed resistance, capacitor and load including the
capacitor ESR
In these conditions, the capacitor discharge time is defined with the expression Ec. 7.
⎡ E − V (0 + ) ⎤
t DISCHARGE = t ON = R 1 // R 2 ⋅ C 1 ⋅ ln ⎢ ⎥ (7)
⎣⎢ E − V (t ) ⎥⎦
Where V1 and V2 are equal to:
V (t ) = V 1 = ⋅E ⋅ (1 − ε ) − ΔV (8)
V (0 + ) = V 2 = ⋅E ⋅ (1 − ε ) (9)
⎡ Ee − E ⋅ (1 − ε ) ⎤
(10)
t DISCHARGE = t ON = R 1 // R 2 ⋅ C 1 ⋅ ln ⎢ ⎥
⎣ Ee − (E ⋅ (1 − ε ) − ΔV ) ⎦
The mathematical expressions obtained may further complicated by adding to the circuits of
Fig. 7 and Fig. 8 the capacitor ESR, which is a function of the capacitance through the loss
tangent, Fig. 9. The expression that relates the ESR with the capacitance is, approximately:
1 (11)
R ESR = tgδ ⋅
2π ⋅ f ⋅ C 1
Consequently, the total voltage ripple, Fig. 10, is the sum of the one that causes the
capacitive discharge, plus the one produce in the ESR of the capacitor is:
Bearing mind the reasoning followed on the previous lines, and replacing Ec. 5 and 12 in Ec.
5, the capacitor discharge time, with its ESR effect, is qual to:
⎡ E ⋅ ε + ΔV ⎤
t CHARGE = (R 2 + R ESR )⋅ C 1 ⋅ ln ⎢ (13)
⎣ E ⋅ ε ⎥⎦
In the same way, replacing in Ec. 10, the discharge time is equal to:
⎡ Ee − E ⋅ (1 − ε ) ⎤
t DISCHARGE = (R ESR + R 1 // R 2 ) ⋅ C 1 ⋅ ln ⎢ ⎥ (14)
⎣ Ee − (E ⋅ (1 − ε ) − ΔV ) ⎦
Power Supply Architectures for Wireless Systems with Discontinuous Consumption 391
This lasts equations estimate the capacitance as a function of the targeted voltage ripple.
Fig. 10. Ideal waveform detail of the load voltage ripple showing the capacitor charge and
discharge, and including the capacitor ESR contribution
They also have some technical disadvantages. Whenever the load drains current, it creates a
resistive path between the battery and load, which is made of the battery contact resistance,
ΣRCONN, sense resistance, RSENSE and the distributed serial resistance of the PCB tracks,
RPCB_TRACKS. These increase the voltage drop at the load terminals.
Fig. 12. Load voltage ripple, battery current, capacitor current and current load for
capacitors of 2200, 4700 and 6800 µF at the battery terminals
Capacitors
ILOAD
(a) (b)
Fig. 13. (a) Schematic diagram of high-value capacitor at the load terminals. (b) Picture
Detail of an M2M application with tantalum capacitors at the load terminals (4000 µF)
Fig. 14. Voltage ripple in the load, V(LOAD), battery, capacitor and load current with super-
capacitors of 60, 200 and 500 mF
The second group reproduces the same waveforms when three electrolytic capacitors of
2200, 4700 and 6800 µF are used instead of super-capacitors. The voltage ripple is depicted
as VLOAD in the first trace; it shows the charge and discharge of the capacitors, and the
contribution of theirs ESR to the voltage ripple.
The behaviour represented in Fig. 13 and Fig. 15 could be summarizing as follows; the
current through the battery is lower than the current drain by the load, and voltage drops at
the load ends are further diminished because most of the energy demanded is extracted
directly from the capacitor. Unfortunately, place high-value capacitor at the load ends
394 Recent Advances in Wireless Communications and Networks
causes a high current peak each time the battery is replaced, Fig. 16. Eventually, this current
surge may destroy or damage the connectors after a certain number of battery replacements.
Fig. 15. (a) Voltage ripple in the load, V(LOAD), (b) battery, (c) capacitor and (d) load
current with capacitors of 2200, 4700 and 6800 µF
Fig. 16. Instantaneous voltage and current at the connexion of a 60 mF with the battery
Power Supply Architectures for Wireless Systems with Discontinuous Consumption 395
4.2.3 LC network
This alternative is based on a LC network made of a series inductor and followed by a
parallel capacitor, at is shown in the Fig. 17(b), and it is seldom used in older cellular
terminals and radio modules with discontinuous consumption. The LC network of
Fig. 17(a), from the frequency point of view, constitutes a low-pass filter, although, it also
should be analyzed in the time domain to completely characterize its behaviour.
The series inductor limits the capacitor charge current; this fact smoothes the input current
fluctuations, but it is required a minimum value of inductance and capacitance to be
effective. The technology constrains the inductance values available through size and
current parameters, which may make not feasible the required values, and consequently, the
impact of an LC network is reduced to a small smooth of the transitions slopes. The table 3
illustrates SMD inductors availability of inductance higher than 680 µH that withstand
currents above 2 A.
Pogo-pin
Battery
Inductance connector
(22 µH)
(a) (b)
Fig. 17. (a) Schematic detail of the power supply system and load with LC network.
(b) Detail of and LC network in the power supply of a cellular terminal
bigger that hundreds of microfarads to make the LC network effective in reducing the
voltage output ripple and the input current fluctuation.
As a final remark, an LC network may generate oscillations, periodic or damped, which
depend on the values of the LC network and the equivalent load resistance, as it constitutes
a RLC network affected by a pulsed signal. This also means that the input current could have
negative values, which implies a current send back to the battery, i.e., a charging current.
The behaviour of the LC network is represented in the following picture for three LC
combinations. The first group of waveforms, Fig. 18, represents the load current, ILOAD. The
trace of IBATT shows, how the inductance L charges over the consumption pulse, and how it
delivers the energy to the capacitor over the inactive part of the cycle. At the same time,
ILOAD illustrates the capacitor providing current to the load meanwhile the pulse current last.
When the current pulse ends the capacitor is being charged through the inductance until the
next pulse came. The waveform at the capacitor ends, VC, is equal to the load voltage, VLOAD.
This voltage shows the charge and discharge cycles of the capacitor which follows the
current cycles of the load, ILOAD. On Fig. 19 could be appreciated the same behaviour for
different pairs of LC.
Fig. 18. Current and voltage for the power supply of a wireless system with LC filtering
Fig. 19. Load voltage ripple, battery and load current for a capacitor of 470 µF and de 22µ,
100µ and 1mH inductors
matter if they are linear or switched, the discontinuous consumption produces current
peaks at the input of the power supply. A current peak causes voltage drops in the load
input voltage due to the internal resistance of the power lines and the power source
connectors. If linear regulation is used, the regulators input and output current peaks are
equals. On the other hand, if the converter is switched, the bigger the differences between
input and output voltage, the lower the current peaks are. Nevertheless, independently of
the type of power converter used, it must be design to deliver the maximum current peak.
To cope with the effects of a discontinuous consumption, in M2M modules for wireless
communications, manufactures such as Wavecom, Sony Ericsson, Telit, Freescales or
Siemens, recommend on theirs application notes employ high value and size capacitors,
which lead to, in many design conditions, a size of recommended capacitor bigger or of the
same size as the M2M module itself, at is shown in Fig. 4.
Bearing in mind what was exposed above, the technical alternatives of power supply
systems with converters for wireless systems are detailed in the following headings.
consumption. Consequently, unless the maximum mean current will never overcome, IIN
follows the load consumption fluctuations, at it is described in the following expression:
I IN = I PEAK ⋅ t ON /T (15)
Where,
- tON o tdischarge is the duty cycle of consumption, equal to the capacitive discharge time.
- T is the consumption period.
- IPEAK is the maximum peak consumption over a period.
Thus, the required capacitance is obtained through the following reasoning. Being the
current through the capacitor:
I = C ⋅ dV / dt (16)
And considering that, on an ideal situation, the charge and discharge of a capacitor is lineal.
This is feasible as the maximum drive current of the voltage converted is limited to a fixed
value. Thus, doing the differential voltage equal to the voltage increment, Vripple, and the
differential time equal to the time increment, tON, the current is equal:
I = C ⋅ ΔV / Δt (17)
Solving for the capacitance value, and considering that the voltage ripple ΔVC, for an ideal
capacitor, has only a capacitive discharging contribution, the capacitance results:
C = I ⋅ t ON / ΔVC (18)
For example, if the mean load current is 250 mA, for a maximum peak current of 2 A, and a
period time of 4,64 ms, the capacitance value, (without including the effect of its ESR), for a
maximum load voltage ripple of 0,4 V, is:
Fig. 20. Block diagram power supply system with regulated input and output capacitor
The high-value capacitor is placed at the output of the voltage converter. The capacitor
stores the energy that requires the discontinuous load of the wireless system over its active
time, for GSM this time corresponds to a time slot. The capacitor charge and discharge
produces voltage ripple, VC, at its terminals. Fig. 21(a) shows this voltage ripple and the
regulator input current, when the load current peak is maximum, i.e., when the wireless
system transmits at maximum power, and if the capacitor charge and discharge is produced
at constant current.
To ease the computation of the voltage ripple an ideal capacitor is used, and two ideal
sources of charge and discharge, that represents the converter and the load, respectively.
Thus, the voltage ripple is a function of the current peak and capacitor value. If the capacitor
is not ideal, the capacitor ESR introduces an extra voltage drop that must be added to the
total voltage ripple, as it could be seen in the VC detail of Fig. 10.
The expression for a generic wireless system with discontinuous consumption could be
written as states Ec. 20, being T the consumption period, and Δt or tON the time the
consumption last.
dVC IC I
IC = C ⋅ , si I C = Cte ⇒ ΔV = ⋅ Δt = C ⋅ tON (20)
dt C C
Over the capacitor discharge the instantaneous voltage, VC, could be represent as Ec. 21:
I PEAK − I IN I −I
Discharge : ΔV = ⋅ Δt = PEAK IN ⋅ tON (21)
C C
And the capacitor charging time, VC(t), is:
I IN I
Charge : ΔV = ⋅ (T − tON ) ⇒ ΔV = IN ⋅ 7 ⋅ Δt(GSM ) (22)
C C
400 Recent Advances in Wireless Communications and Networks
Fig. 21. PA GSM cellular terminal voltage and current waveforms for three power levels,
(a) maximum and (b) (c) intermediate
At the load terminals, there is a ripple proportional to the capacitor discharge, plus the
voltage drop at the current sensor, RSENSE. If the sense resistance is small enough, VC is
almost equals to VLOAD. The Fig. 21(a) shows the shape of the voltage ripple, VLOAD, at the
load ends, for different TX output power levels or discontinuous consumption.
The circuit of Fig. 20 allows to reduce the current peaks at the wireless systems input to the
average value, IIN, as it could be seen in Fig. 21(a). Considering the two current situations
represented in the figure it could be deduce that:
- When the load is maximum, (PA transmits at its maximum power), the current
consumption through the input is constant, IIN, Fig. 21(a).
- If the power transmission is reduced, so the current consumption, and the current
through the output, IIN, is discontinuous but its maximum peak value never overcome
the average current consumption for the maximum power, Fig. 21(b) and (c).
Consequently, on a GSM terminal the input current never reach a value greater than 1/8,
(tON/T for a generic application), of the current peak demanded by the wireless system at
maximum consumption rating.
is low and will not affect the efficiency of the overall power systems. The purpose of the
output converter is suppress the capacitor voltage ripple. Fig. 23 shows the load voltage,
VLOAD, and its drive current, ILOAD, obtained when using this power supply architecture. The
second voltage conversion element absorbs the voltage fluctuation of charge and discharge
of the capacitor in the power supply voltage, allowing a capacitor of lower value.
Fig. 22. Block diagram of constant current and constant input current power supply
Fig. 23. PA GSM cellular terminal voltage and current waveforms for power levels,
(a) maximum and (b) intermediate
If the ripple requirements for input current and load voltage are quite restrictive, this
alternative reduces its effects and, if there is also current and efficiency restrictions the
linear, converter could be replace by a standard switched one of any manufacturer, for
402 Recent Advances in Wireless Communications and Networks
example, a MAX1678. This device has some advantage as it is specially design for GSM and
UMTS, with the remark that is only efficiency in boost mode.
5.4 Summary
The ideas exposed are summarized in the Fig. 24 and Table 5. Fig. 24 provides a graphic
comparison between input and output voltages and currents for the different architectures
of power supply to cope with wireless systems discontinuous consumption.
The first group of waveforms, Fig. 24(a), represent the most unfavourable conditions, where
the power source and the wireless systems are directly connected. The input and output
current and voltages exhibit ripple with abrupt slopes.
Fig. 24(b) shows the alternative of a high value capacitor place in the load. Its charge and
discharge smoothes the slopes of input and output current and voltages.
Fig. 24. Comparison between voltage and current waveforms of power supply architectures
for wireless systems with discontinuous consumption
On Fig. 24(c), the alternative represented is an LC network; the graphics unveils that the
input current could become negative over part of the consumption cycle, also presents over-
damp, in voltage and current, that may produce oscillation.
The waveforms for regulated supply systems with fixed input current limit and a high-value
capacitor are represented in Fig. 24(d). The fixed input current limit is the average value of
the maximum peak current consumed in the load.
On Fig. 24(e), it is represented the voltage and current for a Constant Current and Constant
Input Current Power Supply.
The Table 5 summarizes those parameters to balance in order to choose the more suitable
power supply architecture for wireless systems. The table sorted the architectures in two
columns, one for battery powered systems and the second for systems that require output
voltage level conditioning. From the data shown, it could be inferred that: the preferred
Power Supply Architectures for Wireless Systems with Discontinuous Consumption 403
6. Conclusions
Wireless systems and communication electronics have their functionality and performance
conditioning by the type of power consumption they present. This chapter highlights the
effects of discontinuous consumption on wireless systems. It also provides keys and
guidelines to identify the phenomena, and how they restrict wireless device functionality.
The effects identified are:
- Power supply voltage drops produced by the current through the equivalent series
resistance between source and load.
- Existence of variable electromagnetic fields, generated by the discontinuous current flux
that affects the EMC performance of the electronics
Bearing in mind these two issues, the characterization of discontinuous consumption is
made through the study of power supply systems suitable for such type of consumption.
This is the reason why it has been proposed and analyzed two generic types of power
supply systems for wireless systems that encompass all: systems directly battery powered,
and systems that required supply voltage levels that differ from those provided by power
source.
Commonly, power supply systems are dimensioned for the required output voltage and the
maximum peak power consumption, which do not guaranty wireless systems proper
operation whenever their consumption or presented load is discontinuous. Therefore, the
effects of discontinuous current consumption and its solution are presented. The study
analyses two power supply scenarios, direct connection between source and load through
404 Recent Advances in Wireless Communications and Networks
passive components, and voltage regulation. In such conditions, the most common
architectures could be restricted to:
- High-value capacitor in the load or the source.
- Voltage converter with input current limit plus high-value capacitor al the load ends.
- Current Limit and Constant Input Current power supply system made of two
converters, plus a high-value parallel capacitor between both converters.
Comparing and analyzing the different architectures studied, summarized in Table 5, could
be concluded that suitable architectures are:
- A high-value capacitor in the load or power source.
- Current Limited and Constant Input Current power supply system if it is required
conditioning the voltage levels.
Unless two regulators architecture may appear cumbersome, it is interesting highlight that
increasing the switching frequency of DC-DC converters make feasible the use of such
regulators, as high-frequency allows the reduction the size of the inductor and capacitors
required.
In spite of there were identified valid architectures, the effects of the discontinuous
consumption are not eliminated completely, as shows Fig. 24. None of the architectures gets
an input current drain from the source constant.
If it is placed a high-value capacitor close to the load, there is a high current surge at the
connexion instant between power source and wireless system. This current surge damages
the connector reducing its lifetime. Moreover, high-value capacitor or super-capacitor may
not be feasible, for they do not fit in the mechanics. Consequently, a trade-off between size
and maximum available capacity and performance must be achieved.
If Current Limited and Constant Input Current power supply is used, the input current is
discontinuous for consumptions below the maximum, Fig. 24(e). The direct consequence is
variable current flux that produces electromagnetic fields.
7. References
B. Arbetter, R. Erikson & D. Maksimovic, DC-DC converter design for battery-operated systems, in
Proceeding of IEEE Power Electronic Specialist Conference, 1995, vol. 1, pp. 103-109.
B. Sahu & G.A. Rincon-mora, A Low Voltage, Non-Inverting, Dynamic, Synchronous Buck-Boost
Converter for Portable Applications, IEEE Transactions on Power Electronics, vol. 19,
no. 2, Feb. 2004, pp. 443-452.
E. Dahlman, H. Ekström, A. Furuskär, Y. Jading, J. Karlsson, M. Lundevall & S. Parkvall, The
3G Long-Term Evolution - Radio Interface Concepts and Performance Evaluation, IEEE
Vehicular Technology Conference (VTC) , Melbourne, Australia, May 2006.
K. Fazel & S. Kaiser, 2008, Multi-Carrier and Spread Spectrum Systems: From OFDM and MC-
CDMA to LTE and WiMAX, 2nd Edition, John Wiley & Sons, ISBN 978-0-470-99821-2.
M. I. Montrose, 1996, Printed circuit Board Design techniques for EMC Compliance, Piscataway,
NJ, IEEE Press.
R. W. Erikson, 1997, Fundamentals of Power Electronics, Chapman and Hall, 1st ed., New
York.
Saft Rechargeable Battery Systems, 2008, Rechargeable Battery Systems Handbook, Available
from: http://www.saftbatteries.com.
W. Schroeder, July 2007, Direct Battery Connection Benefits Portable Designs, White Paper,
Semtech.
19
1. Introduction
Recent advances in wireless communication, as well as embedded computing, have opened
many new exciting opportunities for wireless sensor networks. Miniature and low-cost
wireless sensors are expected to become available in the next decade, offering countless
possibilities for a wide range of applications. Among them is smart structural technology, an
active research domain that holds significant promise for enhancing infrastructure
management and safety. A smart structure refers to a specially equipped structure (e.g.
buildings, bridges, dams, etc.) that can monitor and react to surrounding environment and
the structure’s own conditions, in a pre-designed and beneficial manner.
Smart structural technology encompasses at least two major fields, i.e. structural health
monitoring and structural control. A structural health monitoring (SHM) system measures
structural responses and predicts, identifies, and locates the onset of structural damage, e.g.
due to deterioration or hazardous events. Structural sensors, such as micro-electro-
mechanical system (MEMS) accelerometers, metal foil strain gages, fiber optic strain sensors,
among others, have been developed and employed to collect important information about
civil structures that could be used to infer the safety conditions of the structure (Farrar, et al.
2003, Sohn, et al. 2003, Chang 2009). On the other hand, structural control technology aims to
mitigate adverse effects due to excessive dynamic loads (Yao 1972, Soong 1990, Housner, et
al. 1997, Spencer and Nagarajaiah 2003).
Structural monitoring and control both involve acquiring response data in real time. In
order to transmit real-time data, coaxial cables are normally employed as the primary
communication link. Cable installation is labor intensive and time consuming, and can cost
as much as $5,000 US dollars per communication channel (Çelebi 2002). To eradicate the
high cost incurred by the use of cables, wireless systems could serve as a viable alternative
(Straser and Kiremidjian 1998). Wireless communication standards, such as Bluetooth (IEEE
802.15.1), Zigbee (IEEE 802.15.4), Wi-Fi (IEEE 802.11b), are now mature and reliable
technologies widely adopted in many industrial applications (Cooklev 2004). Potential
applications of wireless technologies in structural health monitoring have been explored by
a number of researchers, as reviewed by Lynch and Loh (2006). By incorporating a control
interface, wireless sensors have also been extended to potentially command control devices
for structural control applications (Wang, et al. 2007b).
406 Recent Advances in Wireless Communications and Networks
Compared to cable-based systems, wireless structural monitoring and control systems have
a unique set of advantages and technical challenges. Besides the desire for portable long-
lasting energy sources, such as batteries, reliable data communication is a key issue for
implementation. The purpose of this chapter is to review the important issues and metrics
for adopting wireless sensor networks in smart structural systems. In a structural health
monitoring system, sensors are typically deployed in a passive manner, primarily for
measuring structural responses. Structural control systems, on the other hand, need to
respond in real time to mitigate excess dynamic response of structures. Typical feedback
control systems require real-time information and measurements to instantly determine
control decisions. Although structural monitoring and control applications pose different
needs and requirements, efficient information flow plays a key and critical role in both
implementations. For example, the transmission latency and limited bandwidth of wireless
devices can impede real-time operations as required by control or monitoring systems. In
addition, communication in a wireless network is inherently less reliable than that in cable-
based systems, particularly when node-to-node communication range lengthens. These
information constraints, including bandwidth, latency, range, and reliability, need to be
considered carefully using an integrated system approach and pose many challenges in the
selection of hardware technologies and the design of software/algorithmic strategies.
The chapter adopts a previously designed wireless structural monitoring and control system
as an example to discuss various intriguing research challenges (Wang, et al. 2005, Wang
2007). The system contains wireless sensing and control units that can be used for both
wireless structural health monitoring and real-time feedback structural control.
Modularized software is designed for the wireless units, so that application programs can be
conveniently embedded into the units. The architectural details of the wireless structural
monitoring and control system are presented. For different structural applications, including
health monitoring and control, special communication protocols have been designed to
efficiently manage the information flow among the wireless units. Finally, laboratory and
field validation tests have been conducted to assess the performance of the prototype
wireless structural monitoring and control system.
2.1 Hardware and software of the wireless sensing and control unit
The wireless sensing unit consists of three functional modules: sensor signal digitization,
computational core, and wireless communication. The sensing interface converts analog
sensor signals into digital data, which is then transferred to the computational core through
a high-speed Serial Peripheral Interface (SPI) port. Besides a low-power 8-bit Atmel
ATmega128 microcontroller, external Static Random Access Memory (SRAM) is integrated
Wireless Sensor Networks in Smart Structural Technologies 407
Computational Core
Fig. 1. Functional diagram detailing the hardware design of the wireless sensing unit.
Additional off-board modules can be interfaced to the wireless sensing unit to condition
sensor signals and issue control commands
with the computational core to accommodate local data storage and analysis. The
computational core communicates with a wireless transceiver (24XStream or 9XCite models
currently provided by Digi International) through a Universal Asynchronous Receiver and
Transmitter (UART) interface. The auxiliary sensor signal conditioning module assists in
amplifying, filtering, and offsetting analog sensor signals prior to digitization. The auxiliary
control signal generation module offers an interface through which the wireless sensor can
send analog control commands to structural control devices. Hardware design of the
wireless unit and auxiliary modules have been described in details elsewhere (Wang, et al.
2005, Wang 2007, Wang, et al. 2007a). The key parameters of the prototype wireless sensing
unit are summarized in Table 1. Peer-to-peer communication among wireless units is
supported for collaborative data analysis.
In order to manage the hardware components in a wireless sensing unit, software modules
are implemented and embedded in the ATmega128 microcontroller. For the ATmega128
microcontroller, software can be written in a high-level programming language, such as C,
compiled into binary instructions, and loaded into the non-volatile flash memory of the
microcontroller. When the wireless unit is powered on for normal operation, the
microcontroller automatically starts executing the embedded instructions. The software
design of the wireless sensing and control units follows the hierarchical structure as shown
in Fig. 2. At the bottom level are the software modules that manage the basic peripherals of
the microcontroller. The middle layer consists of software modules that manage other
onboard hardware components. Specific software modules for structural health monitoring
and control are implemented in the top level application layer.
408 Recent Advances in Wireless Communications and Networks
Computing /
Communication Sensing Actuation
Data Storage
External Static Analog-to- Digital- to-
System Wireless Digital(A2D) Analog (D2 A)
Random Access
Management Communication Conversion Conversion
Memory (SRAM)
Fig. 2. Three-layer software architecture for the ATmega128 microcontroller in the wireless
sensing and control unit
As shown in Fig. 2, the lowest level of the embedded software manages the peripherals of
the ATmega128 microcontroller and serves as the fundamental modules to support the
functions of other hardware components. Embedded modules include: timer interrupt
functions, byte-by-byte communication through the UART and SPI ports, and internal
memory management. The timer interrupt service is implemented to achieve a constant time
step for sensor data sampling. The interrupt function is also a powerful feature that allows
the software to momentarily pause an executing task (such as data processing or wireless
communication) to sample data from the sensing interface according to a precise timing
schedule. Immediately after servicing the sensing interface, the paused task is resumed and
the program continues its execution. This timer interrupt feature is utilized to implement
continuous data streaming from multiple wireless sensing units, where sensor data
sampling has to occur at a constant sampling step amidst the execution of the wireless
communication or data interrogation program. In effect, the software supports concurrency
thereby allowing multiple software tasks to execute at the same time.
Building on top of the microcontroller peripherals are the software drivers that manage
other hardware components in the wireless unit. Utilizing the UART peripheral, the
wireless communication driver provides the following functions interfacing the
microcontroller with the wireless transceiver: 1) reading or setting the radio parameters of
the attached wireless transceiver; 2) sending or receiving data through the wireless
transceiver; 3) implementing the state machine representing the wireless communication
protocol. A driver module is implemented to manage the 128kB external Static Random
Access Memory (SRAM). This module includes functions to enable and disable the external
SRAM, as well as functions that allow access to the lower 64kB half or higher 64kB half of
the memory chip. The other two hardware drivers, the A2D and the D2A modules, manage
the interfaces with the structural sensors and control devices. The ATmega128
microcontroller provides only one SPI port, which is shared by both the A2D converter
(ADS8341) for sensing and the D2A converter (AD5542) for control. The A2D module
commands the ADS8341 to convert a 0 to 5V analog sensor signal into a 16-bit integer.
Knowing the sensitivity and offset of the sensor signal, the microcontroller can then
compute a floating-point number quantifying the physical parameter being measured by the
sensor. Conversely, the D2A module takes a floating-point number between -5V and 5V as
input, converts the number into a 16-bit integer, and pushes the integer to the AD5542 to
output the corresponding control voltage signal.
Utilizing the hardware drivers for communication, computing, sensing, and control,
software can be developed to support structural health monitoring and control applications.
A number of engineering algorithms, such as Fast Fourier Transform (FFT), autoregressive
(AR) analysis, linear quadratic regulator (LQR) control, and Kalman Filter, have been
implemented and embedded in the wireless units. The ability to execute embedded
application software allows the wireless sensing units to make and execute decisions.
Onboard data processing also helps save energy resources (i.e. preserving limited battery
power) by reducing wireless transmission of large amounts of raw sensor data. With the
application software executing in the wireless unit, each unit acts as an autonomous node in
a wireless monitoring and control network. This architecture of distributed sensing and
control represents a new paradigm in structural health monitoring and control, as
opposed to traditional centralized systems, where data are processed in a centralized
location.
410 Recent Advances in Wireless Communications and Networks
Fig. 3. Three-layer software architecture for the ATmega128 microcontroller in the wireless
sensing and control unit
Bandwidth and latency are about the timing characteristics of the communication links.
Bandwidth refers to the data transfer rate once a communication link is established. Using
the MaxStream 24XStream transceiver as an example, the anticipated transmission time for a
single data packet is illustrated in Fig. 3. The transmission time consists of the communication
latency, TLatency, of the transceivers and the time to transfer data between the microcontroller
and the transceiver using the universal asynchronous receiver and transmitter (UART)
interface, TUART. Assume that the data packet to be transmitted contains N bytes and the
UART data rate is TUART bps (bits per second), which is equivalent to RUART /10 bytes per
second, or RUART /10000 bytes per millisecond. It should be noted that the UART is set to
transmit 10 bits for every one byte (8 bits) of sensor data, including one start bit and one
stop bit. The communication latency in a single transmission of this data packet can be
estimated as:
10000 × 11
TSingleTransm = 15 + ≈ 17.86 (ms) (2)
38400
Wireless Sensor Networks in Smart Structural Technologies 411
This amount of latency typically has minimal effect in most monitoring applications, but has
noticeable effects to the timing-critical feedback control applications. This single-
transmission delay represents one communication constraint that needs to be considered
when calculating the upper bound for the maximum sampling rate of the control system. A
few milliseconds of safety cushion time at each sampling step are a prudent addition that
allows a certain amount of randomness in the wireless transmission latency without
undermining the reliability of the communication system. Although the achievable
transmission latency, TLatency, is around 15ms for the MaxStream 24XStream transceiver, it
can be as low as 5ms for the 9XCite transceiver. This lower latency makes the 9XCite
transceiver more suitable for real-time feedback control applications compared with the
24XStream transceiver. However, the 9XCite transceiver may only be used in countries and
regions where the 900MHz band is for free public usage, such as the North America, Israel,
South Korea, among others. On the other hand, operating in the 2.4GHz international ISM
(Industrial, Science, and Medical) band, the 24XStream transceiver can be used in most
countries in the world.
The other two constraints, reliability and range, are related to the attenuation of the wireless
signal traveling along the transmission path. The path loss PL (in decibel) of a wireless
signal is measured as the ratio between the transmitted power, PTX [mW] , and the received
power, PRX [mW] (Molisch 2005):
PTX [mW]
PL [ dB] = 10log10 (3)
PRX [mW]
Path loss generally increases with the distance, d, between the transmitter and the receiver.
However, the loss of signal strength varies with the environment along the transmission
path and is difficult to quantify precisely. Experiments have shown that a simple empirical
model may serve as a good estimate to the mean path loss (Rappaport and Sandhu 1994):
−n
PRX [ mW ] = P0 [ mW ] ⎛⎜ d ⎞⎟ (5)
⎝ d0 ⎠
where P0 is the received power at the reference distance d0. Typical values of n are reported
to be between 2 and 6. Table 2 shows examples of measured n and σ values in different
buildings for 914 MHz signals (Rappaport and Sandhu 1994).
A link budget analysis can be used to estimate the range of wireless communication
(Molisch 2005). To achieve a reliable communication link, it is required that
where AG denotes the total antenna gain for the transmitter and the receiver, RS the receiver
sensitivity, FM the fading margin to ensure quality of service, and PL(d) the realized path
loss at some distance d within an operating environment. Table 3 summarizes the link
budget analysis for the 9XCite and 24XStream transceivers, and their estimated indoor
ranges.
Building n σ [dB]
Grocery store 1.8 5.2
Retail store 2.2 8.7
Suburban office building – open plan 2.4 9.6
Suburban office building – soft partitioned 2.8 14.2
Table 2. Values of path loss exponent n at 914MHz
9XCite 24XStream
PTX [dBm] 0.00 16.99
AG [dBi] 4.00 4.00
RS [dBm] -104.00 -105.00
FM [dB] 22.00 22.00
PL = PTX +AG-RS-FM [dB] 86.00 103.99
PL ( d0 ) [dB], d0 = 1 m 31.53 40.05
PL − PL ( d0 ) [dB] 54.47 63.94
n 2.80 2.80
d [m] 88.20 192.18
Table 3. Link budget analysis to the wireless transceivers
The path loss exponent n is selected to be 2.8, which is the same as the soft-partitioned office
building in Table 2. Generally, 2.4GHz signals typically have higher attenuation than
900MHz signals, and, thus, a larger path loss exponent n. The transmitter power PTX ,
receiver sensitivity RS, and fading margin FM of the two wireless transceivers are obtained
from the MaxStream datasheets. A total antenna gain AG of 4 is employed by assuming that
low-cost 2dBi whip antennas are used by both the transmitting and the receiving sides. The
free-space path loss at d0 is computed using the Friis transmission equation (Molisch 2005):
where λ is the wavelength of the corresponding wireless signal. Finally, assuming that the
variance Xσ is zero, the mean communication range d can be derived from Eq. (4) as:
( PL − PL ( d0 ) ) (10 n )
d = d010 (8)
Table 3 shows that the transceivers can achieve the communication ranges indicated in
Table 1. It is important to note the sensitivity of the communication range with respect to the
path loss exponent n in Eq. (8). For instance, if the exponent of 3.3 for indoor traveling
(through brick walls, as reported by Janssen & Prasad (1992) for 2.4 GHz signals) is used for
the 24XStream transceiver, its mean communication range reduces by half to 87m.
Wireless Sensor Networks in Smart Structural Technologies 413
Wireless Sensor
Network Server
A unique feature of the embedded wireless sensing unit software is that it can continue
collecting data from interfaced sensors in real-time as the wireless sensing unit is
transmitting data to the server. In its current implementation, at each instant in time, the
server can only communicate with one wireless sensing unit. In order to achieve real-time
continuous data collection from multiple wireless sensing units with each unit having up to
four analog sensors attached, a dual stack approach has been implemented to manage the
SRAM memory (Wang, et al. 2007a). When a wireless sensing unit starts collecting data, the
embedded software establishes two memory stacks dedicated to each sensing channel for
storing the sensor data. For each sensing channel, at any point in time, only one of the stacks
is used to store the incoming data stream. While incoming data is being stored into the
dedicated memory stack, the system transfers the data in the other stack out to the server.
For each sensing channel, the role of the two memory stacks alternate as soon as one stack is
filled with newly collected data.
Received 01 Inquiry
State 1 State 2
Init. and and data is ready
Wait for Wait for
Sync . Send 03 DataReady
01 Inquiry 04 PlsSend
Finite state machine concepts are employed in designing the communication protocol for the
wireless sensing units and the server. A finite state machine consists of a set of states and
definable transitions between the states (Tweed 1994). At any point in time, the state
machine can only be in one of the possible states. In response to different events, the state
machine transits between its discrete states. The communication protocol for initialization
and synchronization can be found in (Wang, et al. 2007a). Fig. 5(a) shows the communication
state diagram of the server for one round of sensor data collection, and Fig. 5(b) shows the
corresponding state diagram of the wireless units. During each round of data collection, the
server collects sensor data from all of the wireless units; note that the server and the units
have separate sets of state definitions.
At the beginning of data collection, the server and all the units are all set in State 1. Starting
with the first wireless unit in the network, the server queries the sensor for the availability of
data by sending the ‘01Inquiry’ command. If the data is not ready, the unit replies
‘02NotReady’, otherwise the unit replies ‘03DataReady’ and transits to State 2. After the
server ensures that the data from this wireless unit is ready for collection, the server transits
to State 3. To request a data segment from a unit, the server sends a ‘04PlsSend’ command
that contains a packet sequence number. One round of data collection from one wireless
unit is ended with a two-way handshake, where the server and the unit exchange
‘05EndTransm’ and ‘06AckEndTransm’ commands. The server then moves on to the next
unit and continuously collects sensor data round-by-round.
6.1
Abut. 1
m
Bent 1 Bent 2 Bent 3
6 .1
m
Abut. 2
N
Wireless network server One pair of wireless and wired accelerometers
(a) Plan view of the bridge illustrating locations of wired and wireless sensing systems
Wireless accelerometer
10 .7 m
Section A- A
(b) Elevation view to section A-A (c) Side view of the bridge over Interstate 5
Fig. 6. Voigt Bridge test comparing the wireless and wired sensing systems
Two types of accelerometers are associated with each monitoring system. At locations #3, 4,
5, 9, 10, and 11 in Fig. 6(a), PCB Piezotronics 3801 accelerometers are used with both the
cabled and the wireless systems. At the other seven locations, Crossbow CXL01LF1
accelerometers are used with the cabled system, while Crossbow CXL02LF1Z
accelerometers are used with the wireless system. Table 4 summarizes the key parameters of
the three types of accelerometers. Signal conditioning modules are used for filtering noise,
amplifying and shifting signals for the wireless accelerometers. The signals of the wired
accelerometers are directly digitized by a National Instruments PXI-6031E data acquisition
board (Fraser, et al. 2006). Sampling frequencies for the cable-based system and the wireless
system are 1,000 Hz and 200 Hz, respectively.
-3
x 10
5
Acceleration (g)
Wired #6
-5
0 2 4 6 8
-3
x 10
5
Wired #12
-5
0 2 4 6 8
Time (s)
-3
x 10
5
Acceleration (g)
Wireless #6
-5
0 2 4 6 8
-3
x 10
5
Wireless #12
-5
0 2 4 6 8
Time (s)
FFT Magnitude
Wired #6
0
0 5 10 15
4
Wired #12
2
0
0 5 10 15
Frequency (Hz)
FFT Magnitude
Wireless #6
0.5
0
0 5 10 15
Wireless #12
0.5
0
0 5 10 15
Frequency (Hz)
(b) Comparison between FFT to the wired data, as computed offline by a computer, and FFT
to the wireless data, as computed online by the wireless sensing units
Fig. 7. Comparison between wired and wireless data for the Voigt Bridge test
The bridge is under normal traffic operation during the tests. Fig. 7(a) shows the time
history data at locations #6 and #12, collected by the cable-based and wireless monitoring
systems when a vehicle passes over the bridge. A close match is observed between the data
collected by the two systems. The minor difference between the two data sets can be mainly
attributed to two sources: 1) the signal conditioning modules are used in the wireless system
but not in the cabled system; 2) the wired and wireless accelerometer locations are not
exactly adjacent to each other, as previously described. Fig. 7(b) shows the Fourier spectra
determined from the time history data. The FFT results using the data collected by the
cabled system are computed offline, while the FFT results corresponding to the wireless
data are computed online in real-time by each wireless sensing unit. After each wireless
sensing unit executes its FFT algorithm, the FFT results are wirelessly transmitted to the
420 Recent Advances in Wireless Communications and Networks
network server. Strong agreement between the two sets of FFT results validates the
computational accuracy of the wireless sensing units. It should be pointed out that because
the sampling frequency of the cabled system is five times higher than that of the wireless
system, the magnitude of the Fourier spectrum for the wired data is also about five times
higher than those for the wireless data.
One attractive feature of the wireless sensing system is that the locations of the sensors can
be re-configured easily. To determine the operating deflection shapes of the bridge deck, the
configuration of the original wireless sensing system is changed to attain a more suitable
spatial distribution. Twenty wireless accelerometers and the wireless network server are
mounted to the bridge sidewalks (Fig. 8). The communication distance between the server
and the farthest wireless sensing unit is close to the full length of the bridge. The installation
and calibration of the wireless monitoring system, including the placement of all the
wireless sensors, again takes about an hour. Sampling frequency for the wireless monitoring
system is kept at 200 Hz.
A
1 2 3 4 5 6 7 8 9 10
6.1
Abut. 1
m
Bent 1 Bent 2 Bent 3
6 .1
m
11 12 13 14 15 16 17 18 19 20 Abut. 2
16.2 m 29 .0 m A 29 .0 m 15 .2 m
N
Wireless network server Wireless accelerometer Hammer location
Wireless accelerometer
1.8
m
10 .7 m
Section A -A
(b) Elevation view to section A-A (c) Side view of the bridge over Interstate 5
Fig. 8. Wireless accelerometer deployment for the operating deflection shape analysis to
Voigt Bridge
The communication protocol described before is implemented in the server and the wireless
sensing units. For the tests described in this chapter, the server collects sensor data or FFT
results from all 20 wireless units. Due to the length of the bridge and continuous traffic
conditions, the wireless communication experienced some intermittent difficulty during the
two days of field testing. However, the wireless monitoring system proved robust by
recognizing communication failures and successfully retransmitting the lost data according
to the communication protocol rules.
Wireless Sensor Networks in Smart Structural Technologies 421
Fig. 9 shows the operating deflection shapes (ODS) extracted from one set of test data
collected during a hammer excitation test. The hammer excitation is applied at the location
shown in Fig. 8(a) and during intervals of no passing vehicles. DIAMOND, a modal analysis
software package, is used to extract the operating deflection shapes (ODS) of the bridge
deck (Doebling, et al. 1997). Under hammer excitation, the operating deflection shapes at or
near a resonant frequency should be dominated by a single mode shape (Richardson 1997).
Fig. 9 presents the first four dominant operating deflection shapes of the bridge deck using
wireless acceleration data. The ODS #1 (4.89 Hz), #2 (6.23 Hz), and #4 (11.64 Hz) show
primarily flexural bending modes of the bridge deck; a torsional mode is observed in ODS
#3 (8.01 Hz). Successful extraction of the ODS shows that the acceleration data from the 20
wireless units are well synchronized.
0.5 0.5
0 0
0 0
-10 -10
-0.5 -0.5
-20 -20
-60 -40 -20 0 20 40 60 -60 -40 -20 0 20 40 60
ODS #3, 8.01Hz ODS #4, 11.64Hz
0.5 0.5
0 0
0 0
-10 -10
-0.5 -0.5
-20 -20
-60 -40 -20 0 20 40 60 -60 -40 -20 0 20 40 60
and potentially suffers from single-point failure at the controller. Wireless decentralized
control architectures can offer an alternative solution. In a decentralized architecture,
multiple sensors and controllers can be distributively placed in a large structure, where the
controller nodes can be closely collocated with the control devices. As each controller only
needs to communicate with sensors and control devices in its vicinity, the requirement on
communication range can be significantly reduced, and the communication latency
decreases by reducing the number of sensors or control devices that each controller has to
communicate with.
Controller
Controller & Controller & Controller & Controller & Controller &
Ctrl. device Ctrl. device Ctrl. device Ctrl. device Ctrl. device
illustrated in Fig. 11(a), and the pseudo code implementing the feedback loop is presented
in Fig. 11(b). As shown in the figures, sensing is designed to be clock-driven, while control
is designed to be event-driven. The wireless sensing nodes collect sensor data at a preset
sampling rate, and transmit the data during an assigned time slot. Upon receiving the
required sensor data, the control nodes immediately compute control decisions and apply
the corresponding command signals to the control devices. If due to occasional data
packet loss, a control node doesn’t receive the expected sensor data at one time step, the
control node may use a projected data sample for control decisions, or doesn’t take any
action at this time step.
4.2 Communication protocol design for the wireless structural control system
Similar to the structural monitoring application, a reliable communication protocol must be
properly designed for the wireless structural control system. Fig. 12 illustrates the
communication state diagrams of a coordinator unit and other wireless units within a
wireless sensing and control subnet. To initiate the system operation, the coordinator unit
first broadcasts a start command ‘01StartCtrl’ to all other sensing and control units. Once the
start command and its acknowledgement ‘03AcknStartCtrl’ are received, the system starts
real-time feedback control operation, i.e. both the coordinator and other units are in State 2.
Sensor Controller
Structural Control
System device
(a) Feedback control loop between the wireless sensing nodes and control nodes
At every sampling time step, the coordinator unit broadcasts a beacon signal ‘02BeaconData’
together with its own sensor data, announcing the start of a new time step. Upon receiving
the beacon signal, other sensing units broadcast their sensor data following a preset
transmission sequence, so that transmission collision is avoided. The wireless control units
responsible for commanding the control devices receive the sensor data, calculate desired
control forces, and apply control commands at each time step. In order to guarantee a
constant sampling time step and to minimize feedback latency, timeout checking or
retransmission is not recommended during the feedback control operation. This design is
suitable for both centralized control and decentralized control.
Coordinator Unit
State1 State2
Got 03AcknStartCtrl
wait wait
AcknStart sensor
Ctrl data
Fig. 12. Communication state diagram of a coordinator unit and other sensing/control units
in one wireless subnet
For illustration purpose, a 3-story structure instrumented with the prototype wireless
control system is shown in Fig. 13. The steel frame structure is designed and constructed
by researchers affiliated with the National Center for Research on Earthquake Engineering
(NCREE) in Taipei, Taiwan. The prototype wireless system consists of wireless sensors
and controllers that are mounted on the structure for measuring structural response data
and commanding MR dampers in real-time. Besides the wireless sensing and control units
Wireless Sensor Networks in Smart Structural Technologies 425
that are necessary for data collection and the operation of the control devices, a remote
command server with a wireless transceiver is also included for experimental purpose. In
a laboratory setup, the server is designed to initiate the operation of the control system
and to log the data flow in the wireless network. To initiate the operation, the command
server first broadcasts a start signal to all the wireless sensing and control units. Once the
start command is received, the wireless units that are responsible for collecting sensor
data start acquiring and broadcasting data at a preset time interval. Accordingly, the
wireless units responsible for commanding the MR dampers receive the sensor data,
calculate desired control forces, and apply control commands within the specified time
interval.
S3 V3
Ci : Wireless control unit (with one
wireless transceiver included) Floor-3
Ti : Wireless transceiver D2 V2
Floor-2
Di : MR Damper
Vi : Velocity meter C1
3m
Floor plan: 3m x 2m D1 V1
Floor weight: 6,000kg Floor-1
Steel I-section beams and
columns: H150 x 150 x 7 x 10
C0
3m
T0
Lab experiment
command server D0 V0
Floor-0
80ms
Compute
C1
Beacon with data
Compute
C2
S3
Data only
collected by both the wired DAQ system and the three wireless control units. During the
test, unit C1 measures the data from the associated velocity meter directly, stores the data in
its own memory bank, and transfers the data wirelessly to units C0 and C2. After the test run
is completed, data from all the three control units are sequentially streamed to the
experiment command server, where the results are plotted as shown in Fig. 15(a). These
plots illustrate strong agreement among data recorded by the three wireless control units
and by the wired system using a separate set of velocity meters and data acquisition system.
It is shown that the velocity data are not only reliably measured by unit C0, but also
properly transmitted to other wireless control units in real-time.
-0.1
0 5 10 15 20 25 30 35 40
Time (s)
0.1
Velocity (m/s)
Recorded by Unit C0
0
-0.1
0 5 10 15 20 25 30 35 40
Time (s)
0.1
Velocity (m/s)
Recorded by Unit C1
0
-0.1
0 5 10 15 20 25 30 35 40
Time (s)
0.1
Velocity (m/s)
Recorded by Unit C2
-0.1
0 5 10 15 20 25 30 35 40
Time (s)
(a) Floor-1 absolute velocity data recorded by the cabled and wireless sensing systems
428 Recent Advances in Wireless Communications and Networks
-0.01
-0.02
0 2 4 6 8 10
Time (s)
Floor 2/1 Inter-Story Drift under El Centro Excitation (Peak 1 m/s2)
0.02
0.01
Drift (m)
-0.01
-0.02
0 2 4 6 8 10
Time (s)
Floor 1/0 Inter-Story Drift under El Centro Excitation (Peak 1 m/s2)
0.02
0.01
Drift (m)
-0.01
-0.02
0 2 4 6 8 10
Time (s)
(b) Inter-story drifts of the structure with and without control
The time histories of the inter-story drifts from the same centralized wireless control test are
plotted in Fig. 15(b), together with the drifts of a centralized wired control test and a bare
structure test when the structure is not instrumented with any control system (i.e. the MR
dampers are not installed). The same ground excitation (1940 El Centro NS earthquake
record scaled to a peak ground acceleration of 1m/s2) is used for all the three cases shown in
Fig. 15(b). The results show that both the wireless and wired control systems achieve
considerable performance in mitigating inter-story drifts. Running at a much shorter
sampling time step, the wired centralized control system achieves slightly better control
performance than the wireless centralized system in terms of mitigating inter-story drifts.
To further study different decentralized schemes with different communication latencies,
three wireless control architectures are compared: (#1) decentralized, (#2) partially
decentralized, and (#3) centralized. Fig. 16 illustrates the information feedback pattern of
each control architecture. The fully decentralized pattern (Wireless #1) specifies that when
computing control decisions, the MR damper at each floor only needs the inter-story
velocity difference at Story 1. The partially decentralized pattern (Wireless #2) specifies that
the control decisions require inter-story velocity from a neighboring floor. Finally, the
centralized pattern (Wireless #3) indicates all velocities relative to ground are required by
the control decisions. Different information patterns result in different sampling frequencies
for each control architecture. Compared with the centralized scheme, the advantage of a
decentralized architecture is that fewer communication and data processing are needed at
each sampling time step, thereby reducing sampling time step length. As shown in Fig. 16,
the wireless system can achieve a sampling rate of 16.67Hz for partially decentralized
control and 50Hz for fully decentralized control.
control scheme (Wireless #1) results in low peak inter-story drifts and the smallest peak
floor accelerations at most of the floors. This result illustrates that in the decentralized
wireless control cases, the higher sampling rate (achieved due to lower communication
latency) potentially compensates for the lack of data from faraway floors.
1
0 0.005 0.01 0.015 0.02 0.025
Drift (m)
1
0 0.5 1 1.5 2 2.5 3 3.5
2
Acceleration (m/s )
Fig. 17. Experimental results of different control schemes under 1940 El Centro NS earthquake
excitation with peak ground accelerations (PGA) scaled to 1m/s2
Wireless Sensor Networks in Smart Structural Technologies 431
6. Acknowledgment
This research was partially funded by the National Science Foundation under grants CMS-
9988909 and CMMI-0824977 (Stanford University), as well as CMMI-0928095 (Georgia
Institute of Technology). The first author was supported by an Office of Technology
Licensing Stanford Graduate Fellowship. Prof. Jerome P. Lynch at University of Michigan
kindly provided insightful advices to the development of the prototype wireless sensing
and control system. Prof. Chin-Hsiung Loh, Dr. Pei-Yang Lin, and Dr. Kung-Chun Lu at the
National Taiwan University offered generous support for conducting the shake table
experiments at NCREE, Taiwan. The authors would also like to express their gratitude to
432 Recent Advances in Wireless Communications and Networks
Prof. Ahmed Elgamal and Dr. Michael Fraser of the University of California, San Diego, for
their generous assistance throughout the field validation tests at Voigt Bridge.
7. References
Çelebi, M. (2006). Real-time seismic monitoring of the new Cape Girardeau Bridge and
preliminary analyses of recorded data: an overview. Earthquake Spectra, Vol. 22, No.
3, pp. 609-630
Çelebi, M. (2002). Seismic Instrumentation of Buildings (with Emphasis on Federal Buildings).
Report No. 0-7460-68170, United States Geological Survey, Menlo Park, CA
Chang, F.-K. (Ed.) Structural Health Monitoring 2009: From System Integration to
Autonomous Systems, Proceedings of the 6th International Workshop on Structural
Health Monitoring, Lancaster, PA, USA, September 9-11, 2009
Cooklev, T. (2004). Wireless Communication Standards : a Study of IEEE 802.11, 802.15, and
802.16, Standards Information Network IEEE Press, New York
Doebling, S. W., Farrar, C. R. & Cornwell, P. J. (1997). DIAMOND: A graphical interface
toolbox for comparative modal analysis and damage identification, Proceedings of
the 6th International Conference on Recent Advances in Structural Dynamics,
Southampton, UK, July 14 - 17, 1997
Farrar, C. R., Sohn, H., Hemez, F. M., Anderson, M. C., Bement, M. T., Cornwell, P. J.,
Doebling, S. W., Schultze, J. F., Lieven, N. & Robertson, A. N. (2003). Damage
Prognosis: Current Status and Future Needs. Report No. LA-14051-MS, Los Alamos
National Laboratory, Los Alamos, NM
Fraser, M., Elgamal, A. & Conte, J. P. (2006). UCSD Powell Laboratory Smart Bridge Testbed.
Report No. SSRP 06/06, Department of Structural Engineering, University of
California, San Diego, La Jolla, CA
Housner, G. W., Bergman, L. A., Caughey, T. K., Chassiakos, A. G., Claus, R. O., Masri, S. F.,
Skelton, R. E., Soong, T. T., Spencer, B. F., Jr. & Yao, J. T. P. (1997). Structural control:
past, present, and future. Journal of Engineering Mechanics, Vol. 123, No. 9, pp. 897-971
Janssen, G. J. M. & Prasad, R. (1992). Propagation measurements in an indoor radio
environment at 2.4 GHz, 4.75 GHz and 11.5 GHz, Proceedings of IEEE 42nd Vehicular
Technology Conference, Denver, CO, May 10 - 13, 1992
Kim, S., Pakzad, S., Culler, D., Demmel, J., Fenves, G., Glaser, S. & Turon, M. (2007). Health
monitoring of civil infrastructures using wireless sensor networks, Proceedings of the
6th International Conference on Information Processing in Sensor Networks (IPSN '07),
Cambridge, MA, April 25 - 27, 2007
Ko, J. M. & Ni, Y. Q. (2005). Technology developments in structural health monitoring of
large-scale bridges. Engineering Structures, Vol. 27, No. 12, pp. 1715-1725
Kurino, H., Tagami, J., Shimizu, K. & Kobori, T. (2003). Switching oil damper with built-in
controller for structural control. Journal of Structural Engineering, Vol. 129, No. 7, pp.
895-904
Lin, P.-Y., Roschke, P. N. & Loh, C.-H. (2005). System identification and real application of
the smart magneto-rheological damper, Proceedings of the 2005 International
Symposium on Intelligent Control, Limassol, Cyprus, June 27 - 29, 2005
Lynch, J. P. & Loh, K. J. (2006). A summary review of wireless sensors and sensor networks
for structural health monitoring. The Shock and Vibration Digest, Vol. 38, No. 2, pp.
91-128
Wireless Sensor Networks in Smart Structural Technologies 433
Lynch, J. P., Wang, Y., Loh, K. J., Yi, J.-H. & Yun, C.-B. (2006). Performance monitoring of the
Geumdang Bridge using a dense network of high-resolution wireless sensors. Smart
Materials and Structures, Vol. 15, No. 6, pp. 1561-1575
Lynch, J. P., Wang, Y., Swartz, R. A., Lu, K.-C. & Loh, C.-H. (2008). Implementation of a
closed-loop structural control system using wireless sensor networks. Structural
Control and Health Monitoring, Vol. 15, No. 4, pp. 518-539
MaxStream, Inc. (2004). 9XCite™ OEM RF Module Product Manual v1.1. Lindon, UT
MaxStream, Inc. (2005). XStream™ OEM RF Module Product Manual v4.2B. Lindon, UT
Molisch, A. F. (2005). Wireless Communications, John Wiley & Sons, IEEE Press, Chichester,
West Sussex, England
Ni, Y. Q., Li, B., Lam, K. H., Zhu, D., Wang, Y., Lynch, J. P. & Law, K. H. (2011). In-
construction vibration monitoring of a super-tall structure using a long-range
wireless sensing system. Smart Structures and Systems, Vol. 7, No. 2, pp. 83-102
Rappaport, T. S. & Sandhu, S. (1994). Radio-wave propagation for emerging wireless
personal-communication systems. Antennas and Propagation Magazine, IEEE, Vol. 36,
No. 5, pp. 14-24
Rice, J. A., Mechitov, K., Sim, S.-H., Nagayama, T., Jang, S., Kim, R., B. F. Spencer, J., Agha,
G. & Fujino, Y. (2010). Flexible smart sensor framework for autonomous structural
health monitoring. Smart Structures and Systems, Vol. 6, No. 5, pp. 423-438
Richardson, M. H. (1997). Is it a mode shape, or an operating deflection shape? Sound and
Vibration Magazine, Vol. 31, No. pp. 54-61
Shimizu, K., Yamada, T., Tagami, J. & Kurino, H. (2004). Vibration tests of actual buildings
with semi-active switching oil damper, Proceedings of the 13th World Conference on
Earthquake Engineering, Vancouver, B.C., Canada, August 1 - 6, 2004
Sohn, H., Farrar, C. R., Hemez, F. M., Shunk, D. D., Stinemates, D. W. & Nadler, B. R. (2003).
A Review of Structural Health Monitoring Literature: 1996-2001. Report No. LA-13976-
MS, Los Alamos National Laboratory, Los Alamos, NM
Soong, T. T. (1990). Active Structural Control: Theory and Practice, Wiley, Harlow, Essex,
England
Spencer, B. F., Jr. & Nagarajaiah, S. (2003). State of the art of structural control. Journal of
Structural Engineering, Vol. 129, No. 7, pp. 845-856
Straser, E. G. & Kiremidjian, A. S. (1998). A Modular, Wireless Damage Monitoring System for
Structures. Report No. 128, John A. Blume Earthquake Eng. Ctr., Stanford
University, Stanford, CA
Swartz, R. A. & Lynch, J. P. (2009). Strategic network utilization in a wireless structural
control system for seismically excited structures. Journal of Structural Engineering,
Vol. 135, No. 5, pp. 597-608
Tweed, D. (1994). Designing real-time embedded software using state-machine concepts,
Circuit Cellar Ink, (53), pp. 12-19.
Wang, Y., Lynch, J. P. & Law, K. H. (2005). Design of a low-power wireless structural
monitoring system for collaborative computational algorithms, Proceedings of SPIE,
Health Monitoring and Smart Nondestructive Evaluation of Structural and Biological
Systems IV, San Diego, CA, March 9, 2005
Wang, Y. (2007). Wireless Sensing and Decentralized Control for Civil Structures: Theory and
Implementation. PhD Thesis, Department of Civil and Environmental Engineering,
Stanford University, Stanford, CA
434 Recent Advances in Wireless Communications and Networks
Wang, Y., Lynch, J. P. & Law, K. H. (2007a). A wireless structural health monitoring system
with multithreaded sensing devices: design and validation. Structure and
Infrastructure Engineering, Vol. 3, No. 2, pp. 103-120
Wang, Y., Swartz, R. A., Lynch, J. P., Law, K. H., Lu, K.-C. & Loh, C.-H. (2007b).
Decentralized civil structural control using real-time wireless sensing and
embedded computing. Smart Structures and Systems, Vol. 3, No. 3, pp. 321-340
Wang, Y. & Law, K. H. (2011). Structural control with multi-subnet wireless sensing
feedback: experimental validation of time-delayed decentralized H∞ control design.
Advances in Structural Engineering, Vol. 14, No. 1, pp. 25-39
Weng, J.-H., Loh, C.-H., Lynch, J. P., Lu, K.-C., Lin, P.-Y. & Wang, Y. (2008). Output-only
modal identification of a cable-stayed bridge using wireless monitoring systems.
Engineering Structures, Vol. 30, No. 7, pp. 1820-1830
Whelan, M. J. & Janoyan, K. D. (2009). Design of a robust, high-rate wireless sensor network
for static and dynamic structural monitoring. Journal of Intelligent Material Systems
and Structures, Vol. 20, No. 7, pp. 849-863
Wong, K.-Y. (2004). Instrumentation and health monitoring of cable-supported bridges.
Structural Control and Health Monitoring, Vol. 11, No. 2, pp. 91-124
Yao, J. T. P. (1972). Concept of structural control. Journal of Structural Division, ASCE, Vol. 98,
No. 7, pp. 1567-1574
Zhu, D., Yi, X., Wang, Y., Lee, K.-M. & Guo, J. (2010). A mobile sensing system for structural
health monitoring: design and validation. Smart Materials and Structures, Vol. 19,
No. 5, pp. 055011
20
Extending Applications of
Dielectric Elastomer Artificial
Muscles to Wireless Communication Systems
Seiki Chiba and Mikio Waki
Chiba Science Institute
Wits Inc.
Japan
1. Introduction
Electro active polymers (EAPs) are used for actuators that can electrically control their
motions to resemble those of actual muscles. Thus, they are called artificial muscles. In
addition, since EAPs are often made of flexible materials, they have also come to be called
“soft actuators” in recent years. There are many types of EAPs such as dielectric elastomers
(Perline & Chiba, 1992a), ionic polymer-metal composites (Oguro et al., 1999),
electroconductive Polymers (Otero & Sansinera, 1998), and ion polymer gels (Osada et al.,
1992b). Figure 1 shows typical EAPs.
typically can exert relatively high pressures and can be driven by low voltages. However,
they are relatively slow and limited in size (since they are dependent on molecular
trnasport), require high current and relatively energy inefficient. They can operate best over
a narrow range of temperatures and must often be kept moist (Kornbluh et al., 2004a). In
contrast, field-activated polymers can be fast, efficient ,and relatively insensitive to
temperature and humidity fluctuations. These polymers can operate at relatively high
voltages and low currents, that usually requires additional voltage conversion components
but makes the size and capacity of wires and interconnects lighter and less ctritical
(Kornbluh et al., 2004a).
A type of field-activated EAP transducer that embodies the desirable proprties of polymer is
dielectric elastomers (Pelrine et al., 2000).
Dielectric elastomer is a new transducer technology uses rubber like polymer (elastomer) as
actuator materials. They have been gaining attention as technologies that have reached the
practical use level as actuators and even as devices that can generate electricity efficiently
(Chiba et al., 2008a).
The present paper examines the possibilities of frequency-variable antennas that utilize the
actuator mode of dielectric-type artificial muscles, and sensor networks that utilize this
electric generator mode (Chiba et al., 2007a; Chiba et al., 2008a).
where εo and ε are the permittivity of free space (8.85 x 10-12 F/m) and the relative permittivity
(dielectric contact) of polymer, respectively; E is the applied electric field in V/m; V is the
applied voltage; and t is the film thickness. The response of the polymer is functionally
similar to that of electrostrictive polymers, in that the response is directly related to the
square of the applied electric field,
principle devices for use in leg robots (see Fig. 4), swimming robots, snakelike robots,
compact inspection robots, geckolike robots for climbing up perpendicular walls or across
ceilings, and flying robots, as well as in achieving compatibility with living organisms are
currently developed (Stanford et. al., 2004b). The main feature of the dielectric elastomers is
that they do not use any gears and cams, thus enabling high efficiency and safe and smooth
driving even if the speed or direction of movement are suddenly changed.
(b)
Fig. 4. Biologically inspired robots powered by dielectric elastomer rolls (Pei et al, 2003;
Chiba et al, 2006a). (a) Role Actuator Having 3-DOF (b) Application example to a robot: it
enables sideways stepping like a crab without turning around, when it collides with wall
The 3-DOF actuator may be used as actuator for variable antenna of wireless communication
device (see section 3 “Proof-of-principle experiment on a frequency-variable antenna
utilizing the actuator mode of dielectric-type artificial muscles”).
Moreover, as this actuator has a wide dynamic range (DC to several tens of kHz), its
applications to speakers and vibrational devices have been advanced (see Fig. 5) (Chiba et
al., 2007a).
This device may be suitable for vibrators and speakers of wireless communication devices.
In addition, as there is a direct proportionality between the change in the capacitance and
elongation of dielectric elastomer actuators, they can be used for pressure- and position-
sensors (see Fig. 6). It may be possible to use the sensor function of dielectric elastomers to
pick up electric waves for wireless communication devices.
440 Recent Advances in Wireless Communications and Networks
Fig. 5. Structure of speaker using dielectric elastomer (The black shaped part is dielectric
elastromer) (Chiba et al., 2007a)
Fig. 6. Linear relation between capacitance and stroke of actuator (Kornbluh et al., 2004b)
Methods to create an antenna that is compatible for multiple frequencies include integrating
antenna elements that can respond to multiple frequencies, and using an antenna that is
shaped so that it can tune to a broad range of frequencies. The easiest method is to change
the length of the antenna element, but because this changes the length of the antenna device,
it requires equipment such as motors and gears. This makes it difficult to use as a small,
lightweight frequency-variable antenna.
One way to resolve these problems may be to create a lightweight frequency-variable
antenna with a simple structure by utilizing dielectric-type artificial muscles in the actuator
part of a variable antenna.It may be possible to change the position of the reflection element
and/or changing the length of dipolar- or monopolar antenna elements. Furthermore, by
forming this structure onto polymers, it is possible to create a changeable-type planar
antenna that can be installed in small, lightweight portable devices.
The present experiment corroborated the possibility of creating such variable-type antennas
by using artificial muscle to change the length and tuning frequency of a monopolar
antenna.
The variable-type monopolar antenna used in this experiment had a very simple structure. It
was composed of a radial section that was attached to the dielectric artificial muscle
actuator, and an antenna element section that was installed vertically on the core. (see
Photo 2)
the changeable width of the actuator was 4 mm. This made it possible to change the tuning
frequency within a range of about 300 MHz.
The change in the tuning frequency was confirmed by measuring V. S. W. R. (Voltage
Standing Wave Ratio) using a network analyzer (Photo 3).
electrical energy produced therefrom can generate electricity. Since this power generation
phenomenon is not dependent on the speed of transformation, its power generation device
can generate electric energy by utilizing natural energies such as up-and-down motions of
waves, slowly flowing river water, human and animal movements, and vibration energies
produced from vehicles and buildings.
where C1 and C2 are the total capacitances of the dielectric elastomer films in the stretched
and contracted states, respectively, and V b is the bias voltage.
Considering then changes with respect to voltages, the electric charge Q on a dielectric
elastomer film can be considered to be constant over a short period of time and in the basic
circuit. Since V = Q/C, the voltages in the stretched state and the contracted state can be
expressed as V1 and V2, respectively, and the following equation is obtained:
(a)
(b)
Fig. 8. Voltage for compression of dielectric elastomer and measurement circuit. (a) Typical
scope trace from contraction of dielectric elastomer. Voltage spike occurs at contraction and
gradually back to (stretched) voltage due to load resistance. (b) Measurement circuit of
generated energy
Extending Applications of Dielectric Elastomer
Artificial Muscles to Wireless Communication Systems 445
Figure 8(a) shows a typical scope trace from contraction of dielectric elastomer. Figure 8(b)
shows a simplified circuit for oscilloscope measurement of voltage. The voltage peak
generated for one cycle is typically on the order of a few ms to several tens of ms for a
piezoelectric element. However, in the case of dielectric elastomer, the peak width is on the
order of 150-200 ms or longer (Chiba et al., 2008a). The long power-generation pulse
duration of dielectric elastomer can allow for the direct use of generated energy for activities
such as lighting LEDs. This can even power wireless equipment that is evolving today at a
rapid pace. In continuous cyclical motions, it is easy to continuously obtain electrical energy
by using flat and smooth circuits, even with gentle kinetic energy below a few Hz (Chiba et
al., 2007b)
(a)
Fig. 9. Harvesting energy system from human body. (a) Conceptual rendering of dielectric
elastomers put up to side and chest of arm and body: (b) Stretched state of dielectric
elastomer (left) and Relaxed state of the elastomer (right)
446 Recent Advances in Wireless Communications and Networks
areas salt and dust can dramatically reduce the electrical output. All this makes it difficult to
maintain a stable sensor system.
(a)
(b)
Photo 4. Small scale power generation device. a) Cartridge of used for small generator.
The black ring-shaped part is dielectric elastomer. b) A power of approximately 0.12 W can
be generated, by pushing the central part of dielectric elastomer by 3- 4 mm once a second
As one way of resolving these issues, power generation systems that utilize artificial
muscles to generate power through transformation alone are attracting attention. Already,
experiments using wave power to generate electricity have been able to produce a few watts
of electrical energy with small artificial muscle power generation equipment loaded onto
448 Recent Advances in Wireless Communications and Networks
weather observation buoys, (see photo 6 and fig. 11) and this has also been confirmed to
recharge batteries (Chiba et al., 2009).
Photo 5. Small scale power generation device & LED controlled by wireless signals
Fig. 12. Conceptual rendering of water mill generator using dielectric elastomer (Chiba et al.,
2010)
Fig. 14. Conceptual rendering of wave power generator system using dielectric elastomers
Because of its simplicity, efficiency, and size scalability, we believe that dielectric elastomer-
based wave generator systems can be attractive not only for large wave applications but for
many applications where the waves are much smaller. An estimate based on data from our
sea trial demonstration experiments has shown that even in seas where the wave height is
only 1 m throughout the year (e.g., the sea close to Japan), if there are spaces of
approximately 500 m in length and 10 m in width, the establishment of a sea-based facility
generating 6 MW of power is possible (Chiba et al., 2008b). This is a useful amount of
power, be it for general use or for providing energy for nearby residential or industrial
needs. The ability to produce the power where it is needed can eliminate the losses and costs
associated with power transmission over long distances and make wave power even more
attractive. The power generation efficiency estimated on the basis of the data obtained from
in-tank experiments in 2006 (Chiba et al, 2006b) and ocean demonstration experiments in
2007 (Chiba et al, 2008a) and 2008 (Chiba et al, 2009) is approximately 19 US cents/kWh. In
the near future, we expect that the electric power generation per unit mass or volume of
dielectric elastomer material can double, and that the expected power generation cost per
452 Recent Advances in Wireless Communications and Networks
kilowatt-hour is 5 - 7.5 US cents. This value is comparable to that for fossil fuel thermal
power plants. Of course, the wave power systems have the additional benefit of not
releasing any pollution or greenhouse gasses.
Fig. 15. Sites where power generation using dielectric elastomers is possible and conceptual
rendering of the generation systems: (a) Wind Power Generator on tops of buildings (Chiba
et al., 2007b) (b) Water Mill Generators (Chiba et al., 2007a) (c) Waste energy Generators
(Chiba et al., 2011) (d) Drain Generators (Chiba et al., 2011) (e) Wind Power Generators for
Personal Houses (f) Solar Heat Generators (Chiba et al., 2007b) (g) Wave Generators (Chiba
et al., 2006; Chiba et al., 2008a) (h) Wave Generators in Ocean (Chiba et al., 2008a) (i) Hydrogen
Production Plant (Chiba et al., 2008b)
6. References
Chiba S., et al. (2007a). Extending Applications of Dielectric Elastomer Artificial Muscle.
Proceedings of SPIE, San Diego, March 2007.
Extending Applications of Dielectric Elastomer
Artificial Muscles to Wireless Communication Systems 453
Chiba S.; Stanford S., Pelrine R., Kornbluh R., and Prahlad H. (2006a), Electroactive Polymer
Artificial Muscle, JRSJ, Vol. 24, No.4, pp 38-42. 2006.
Chiba S,; Prahad H, Pelrine R, Konbluh R, Stanford S and Eckerle J. (2006b). Electro Power
Generation Using Electro active Polymers (EPAM). Proceedings of 15th Japan
Institute of Energy Conference (Kogakuuin University, Japan) JIE pp 297-298, July
2006.
Chiba S.; Pelrine R., Kornbluh R., Prahlad H., Stanford S., & Eckerle J. (2007b). New
Opportunities in Electric Generation Using Electroactive Polymer Artificial Muscle
(EPAM). J. Japan. Inst. Energy, Vol. 86, No. 9, pp. 38-42, 2007.
Chiba S (2002), Dielectric Elastomer for MEMS and NEMS and Toward the Future. Electro
Packing Technology, Vol.18, No. 1, pp 33-38, 2002.
Chiba S.; Waki M., Kormbluh R., & Pelrine R. (2008a). Innovative Power Generators for
Energy Harvesting Using Electroactive Polymer Artificial Muscles, Electroactive
Polymer Actuators and Devices (EAPAD), ed. Y. Bar-Cohen. Proceedings of SPIE.
Vol. 6927, 692715 (1-9), San Diego, March 2008.
Chiba, S., Kornbluh R., Pelrine R., and Waki M. (2008b) “Low-cost Hydrogen Production
From Electroactive Polymer Artificial Muscle Wave Power Generators”, Proceedings
of World Hydrogen Energy Conference, Brisbane, Australia, June 16-20, 2008.
Chiba, S., Waki M., Kornbluh K., and Pelrine R.. (2009). Innovative Wave Power Generation
System Using EPAM. Proceedings of Oceans’ 09, Bremen, Germany, May 2009.
Chiba S. and Waki M. (2011). Recent Progress in Dielectric Elastomers (Harvesting Energy
Mode and High Efficient Actuation Mode), To be published in Clean Tech, Nihon
Kogyo Shuppan, Tokyo, Japan, April, 2011.
Harsha P, Kornbluh R, Pelrine R, Stanford S, Eckerle J and Oh S. (2005). Polymer Power:
Dielectric elastomers and their applications in distributed actuation and power
generation. Proceedings of ISSS 2005, International Conference on Smart Materials
Structures and Systems. Bangalore, India.
Kornbluh R., Pelrine R., and Chiba S. (2004b). Silicon to Siliocon: Stretching the Capabilities
of Micromachines with Electroactive polymers, IEEJ, Vol.124, No. 8, 2004, ISSN
1341-8939.
Miyazaki T and Osawa H. (2007). Search Report of Wave Power Devices Proceedings of
Spring Conference of the Japan Socity of Naval Architects and Ocean Engineers, No.4
pp43-46, April 2007.
Pelrine R., and Chiba S. (1992a). Review of Artificial Muscle Approaches. Proceedings of
Third International Symposium on Micromachine and Human Science, Nagoya, Japan,
June 1992.
Pelrine R.; Kornbluh K., Pei Q., & Joseph J. (2000a). High Speed Electrically Actuated
Elastomers with Over 100% Strain. Science 287: 5454, pp 836–839, 2000.
Pei Q., Rosenthal M., Pelrine R., Stanford S., and Kornbluh R (2003) Multifunctional
electroelastmer roll actuators and their application for biomimetic walking robots,
proceedings of SPIE, Smart Structures and mterials, Electroactive Polymer
Actuators and Devices (EAPAD), ed. Y. Bar-Cohen, San Diego, CA, March 2003.
Stanford S, Bonwit N, Pelrine R, Kornbluh R, Pei Q and Chiba S (2004b). Electro Polymer
Artificial Muscle (EPAM) for Biomimetics Robots. Proceedings of 2nd Conference on
Artificial Muscles. AIST Kansai Center, Osaka, Japan, 2004.
454 Recent Advances in Wireless Communications and Networks
Oguro K., Fujiwara N., Asaka K., Onishi K. and Sewa S. (1999). Polymer electrolyte actuator
with gold electrodes. Proceedings of the SPIE’s 6th Annual International Symposium on
Smart Structures and Materials, SPIE Proc. Vol. 3669,(1999), pp. 64-71.
Otero F. and Sansiñena M. (1998). Soft and wet conducting polymers for artificial muscles”,
Advanced Materials, 10 (6), (1998) pp. 491-494.
Osada Y., Okuzaki H. and Hori H. (1992b). A polymer gel with electrically driven motility”,
Nature, Vol. 355, pp. 242-244, (1992).
Ashida A., Ichiki M., Tanaka T. and Kitahara T. (2000b). Power Generation Using Piezo
Element: Energy Conversion Efficiency of Piezo Element”, Proc. of JAME annual
meeting, pp.139-140, (2000).