Efficient message exchange protocols exploiting state-of-the-art PHY layer
نویسندگان
چکیده
The paper focuses on the two-way relay channel (TWRC) and the multi-way wireless network with three terminals, where all three want to exchange or share data and have to do that with the help of a relay. This paper shows how it is possible to significantly decrease the number of time slots required to exchange messages between terminals in networks based on time-division multiple access (TDMA), by taking into consideration new techniques at the physical (PHY) layer. The paper considers a PHY layer where physical-layer network coding (PLNC), multiple-input multiple-output (MIMO), and in-band “full-duplex” (IBFD) with loopback interference cancellation are all integrated, so that it is possible to significantly increase the overall throughput of the network. This is entirely attained by transferring the burden from the time domain to the spatial domain, via spatial multiplexing and by simultaneously resorting to non-orthogonal multiple access, which is the consequence of using both PLCN and IBFD. For the TWRC, it is shown that, if a massive MIMO relay is used, a simple lattice-based PLNC can be directly applied and, with typical IBFD interference cancellation amounts, a TWRC can effectively use only one time slot instead of the four needed when adopting the traditional TDMA exchange. In the case of the Y-network (i.e., with three terminals), a technique is presented that allows all the information exchange between terminals to be cut from the six time slots required in TDMA to only one time slot, provided that the information packets are not too short. The error performance of these systems is measured by means of simulation using MIMO Rayleigh fading channels.
منابع مشابه
Contention techniques for opportunistic communication in wireless mesh networks: a cross-layer perspective on opportunistic routing and opportunisitic scheduling under career sensing multiple access
In the field of wireless communication, a tremendous progress can be observed especially at the lower layers. Innovative physical layer (PHY) concepts and technologies can be rapidly assimilated in cellular networks. Wireless mesh networks (WMNs), on the other hand, cannot keep up with the speed of innovation at the PHY due to their flat and decentralized architecture. Many innovative PHY techn...
متن کاملNetwork Parameters Evaluation in Vehicular Ad-hoc Network (VANET) Routing Protocols for Efficient Message Delivery in City Environment
Abstract- Efficient message delivery in city environment is required to ensure driver’s safety and passenger’s comfortability. In cities of developed nations, routing of data in vehicular Ad hoc Network (VANET) faces many challenges such as radio obstacles, mobility constraints and uneven nodes distribution. These factors primarily makes communication between vehicles complex. To overcome and t...
متن کاملMiracle : TheMulti - Interface Cross - Layer Extension of ns 2 Nicola
We present Miracle, a novel framework which extends ns2 to facilitate the simulation and the design of beyond 4G networks. Miracle enhances ns2 by providing an efficient and embedded engine for handling cross-layer messages and, at the same time, enabling the coexistence of multiple modules within each layer of the protocol stack. We also present a novel framework developed as an extension of M...
متن کاملPHY-MAC dialogue with Multi-Packet Reception
Cross-layer design has been considered recently as a new approach when designing MAC protocols in systems with diversity such as CDMA. This paper goes one step further in the cross layer design by proposing a PHY-MAC dialogue involving the exchange of parameters such as BER and active users. By means of this PHY-MAC dialogue, system performance can be improved. A two-stage receiver is used at P...
متن کاملTransmitter authentication using hierarchical modulation in dynamic spectrum sharing
One of the critical challenges in dynamic spectrum sharing (DSS) is identifying non-conforming transmitters that violate spectrum access rules prescribed by a spectrum regulatory authority. One approach for facilitating identification of the transmitters in DSS is to require every transmitter to embed an uniquely-identifiable authentication signal in its waveform at the PHY-layer. In most of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017