Multiuser Diversity Gain Enhancement by Guard Time Reduction Hend Koubaa, Vegard Hassel, Geir E. Øien Norwegian University of Science and Technology (NTNU)

Slides:



Advertisements
Similar presentations
February 20, Spatio-Temporal Bandwidth Reuse: A Centralized Scheduling Mechanism for Wireless Mesh Networks Mahbub Alam Prof. Choong Seon Hong.
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
PHY-MAC Dialogue with Multi-Packet Reception Workshop on Broadband Wireless Ad-Hoc Networks and Services 12 th -13 th September 2002 ETSI, Sophia Antipolis,
MIMO Broadcast Scheduling with Limited Feedback Student: ( ) Director: 2008/10/2 1 Communication Signal Processing Lab.
Opportunistic Scheduling Algorithms for Wireless Networks
Bandwidth-Efficient, Energy-Constrained Short Range Wireless Communications.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
Ethernet – CSMA/CD Review
Multiple access What if multiple machines are sharing the same link?
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
A Novel Finger Assignment Algorithm for RAKE Receivers in CDMA Systems Mohamed Abou-Khousa Department of Electrical and Computer Engineering, Concordia.
MULTI-BAND CSMA/CA- BASED COGNITIVE RADIO NETWORKS Jo Woon Chong, Youngchul Sung, and Dan Keun Sung School of EECS KAIST IWCMC
1 “Multiplexing Live Video Streams & Voice with Data over a High Capacity Packet Switched Wireless Network” Spyros Psychis, Polychronis Koutsakis and Michael.
Rate-Optimal Multiuser Scheduling with Reduced Feedback Vegard Hassel, Mohamed-Slim Alouini, Geir Øien and David Gesbert Gotland Workshop August.
1 Pertemuan 13 Teknik Akses Jaringan - Random Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
Two Media Access Control Protocols (MAC) for Wireless Networks.
ECE358: Computer Networks Spring 2012
Submission doc.: IEEE /1452r0 November 2014 Leif Wilhelmsson, EricssonSlide 1 Frequency selective scheduling in OFDMA Date: Authors:
“On the Integration of MPEG-4 streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network” Spyros Psychis, Polychronis.
Computer Networks: Local Area Networks 1 LANs Studying Local Area Networks via the Media Access Control (MAC) SubLayer.
MAC Layer Protocols for Sensor Networks Leonardo Leiria Fernandes.
Spatial Diversity and Multiuser Diversity in Wireless Communications Bengt Holter Dept. of Electronics and Telecommunications NTNU IKT-2010 seminar, Lillestrøm,
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
Fair Real-time Traffic Scheduling over Wireless Local Area Networks Insik Shin Joint work with M. Adamou, S. Khanna, I. Lee, and S. Zhou Dept. of Computer.
Opersating Mode DCF: distributed coordination function
A Virtual Collision Mechanism for IEEE DCF
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
On Optimizing the Backoff Interval for Random Access Scheme Zygmunt J. Hass and Jing Deng IEEE Transactions on Communications, Dec 2003.
Opportunistic Scheduling in Wireless Networks Mohammed Eltayeb Obaid Khattak.
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Statistical-Time Access Fairness Index of One-Bit Feedback Fair Scheduler Fumio Ishizaki Dept. of Systems Design and Engineering Nanzan University, Japan.
Chapter 6 Multiple Radio Access
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Priority Scheduling in Wireless Ad Hoc Networks Xue Yang and NitinVaidya University of Illinois at Urbana-Champaign.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Quality of Service Schemes for IEEE Wireless LANs-An Evaluation 主講人 : 黃政偉.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
Announcements Deadline extensions –HW 1 dues May 17 (next Wed) –Progress report due May 24 HW 1 clarifications: –On problem 3 users can lower their power.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 10.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
MEDIUM ACCESS CONTROL PROTOCOL
Topics in Distributed Wireless Medium Access Control
6. Opportunistic Communication and Multiuser Diversity
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Opportunistic Beam-forming with Limited Feedback
Submission Title: [Distributed Contention Access Scheme]
Presented By Riaz (STD ID: )
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Chapter 6 Multiple Radio Access.
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Multiuser Diversity Gain Enhancement by Guard Time Reduction Hend Koubaa, Vegard Hassel, Geir E. Øien Norwegian University of Science and Technology (NTNU) Dept. of Electronics and Telecommunications Trondheim, Norway

Outline Multi-user diversity scheduling Performance criteria Contention-less feedback algorithm Contention feedback algorithm Results Conclusion

Multiuser diversity scheduling Multiple users with different channel fluctuation characteristics Exploiting this diversity among users by selecting the best user to transmit with the best rate Increasing the Maximum Average System Spectral Efficiency (MASSE) Basic mechanism The sender requests the CNRs of users The users send back their CNRs: feedback mechanism The sender chooses the best CNR user and transmits with the rate corresponding to this CNR

Performance criteria Maximising network throughput Maximising the potential rate to be used Reducing the cost of the feedback mechanism Minimising the number of users feedbacks (saving users powers) Reducing the guard time (overhead time between BS queries) Trade off between 1 and 2! Realising fairness among users Fairness: Deeper study in a future work

Using multiple feedback thresholds Opportunistic scheduling algorithm to be presented at VTC Spring 2005 (Hassel, Alouini, Gesbert, and Øien). Employing multiple (nested) optimized feedback CNR thresholds to minimize average feedback load. Denote the thresholds by th,L>th,L1> · · ·>th,0 (For convenience th,L = and th,0 = 0) The base station initially requests feedback from those users whose CNRs are above th,L1. If there are none, the threshold is successively lowered, to th,L2, th,L3, · · ·, th,0. The best user is thus always selected, but the average feedback load is significantly reduced compared to the conventional rate-optimal MCS (Max Channel SNR) scheduling algorithm.

Contention-less feedback algorithm (1) Assume N users. 1. Check if any CNRs are above th,L1. All users wait for a mini-slot T MS. If there are none, the threshold is successively lowered to th,L2 - and users again wait for their mini-slot T MS. And so on In the interval [th,l,th,l+1], all users having a CNR above th,l will send their feedback - all others stay silent. If only one user is above the threshold, there is no collision problem. If multiple users have a CNR above th,l: collision problem. Solution: ranking the users The base station sends a ranked user list The time is initially slotted to N ranked mini-slots T MS The user of rank j will start sending his feedback at the start of the j th minislot, if his CNR is above th,l. Those users having a CNR lower than th,l will simply be silent during their assigned mini-slots.

Contention-less feedback algorithm (2) Assume T FB is the total time needed to send one users feedback (and assume T FBT MS ). [th,l, th,l+1] denotes the best user interval. Assume that all users can detect feedback initiated from others, and stay silent if feedback from another user is detected. After each feedback transmission from one user (of rank j), the time is again slotted, now to N-j mini-slots. This mechanism is repeated until the user of rank N sends his feedback - or is silent - during the N th (last) mini-slot. The base station finally schedules the best user out of those who gave feedback within the current interval.

Contention-less feedback algorithm (3) Example 4 thresholds (th,3>th,2> th,1>th,0 ) 3 users The CNRs of the best users, u 1 and u 3, are assumed to reside in the interval [th,1,th,2] First step [th,2,th,3] T ms u 1 sends his feedback u1u1 The remaining time is slotted to 2 mini-slots u3u3 u2u2 u 2 is silent and u 3 sends his feedback u3u3 u2u2 th,0=0th,1th,2 th,3= Second step [th,1,th,2]: collision T ms u 1 & u 3 Third step slotting u1u1 u3u3 u2u2 T FB T ms

Contention feedback algorithm N users If only one user exists in the best user interval, then this user will send his feedback just after the base station's query, and data transmission can start. However if multiple users have a CNR above th,l: all send simultaneously, and a collision takes place. Solution: exponential backoff scheme Each user having a CNR above th,l and detecting a collision (by not receiving data) will retransmit his feedback with probability q < 1. After a collision have occurred i times, each user will send his feedback with probability q i This mechanism will last until one successful feedback transmission takes place.

Comparison between both proposed algorithms Contention-less The best user is selected (highest rate but also highest guard time) Contention A random user in the best user interval is selected (suboptimal rate but also lower guard time)

Results: (general and Rayleigh fading model) Expressions for the guard time (GT) are derived for both approaches (see the TD). The MASSE in the contentionless approach (Rayleigh): The MASSE in the contention approach (Rayleigh): NB: The above MASSEs both have to be multiplied by the fraction where T TS is total time between base station queries.

MASSE for both approaches (5 users) Masse with 5 users Masse (bits/sec/Hz) Number of thresholds

MASSE for both approaches (10 users) Masse with 10 users Masse (bits/sec/Hz) Number of thresholds

MASSE for both approaches (long data packet) Masse with 10 users Masse (bits/sec/Hz) Number of thresholds

MASSE for both approaches (short data packet) Masse with 10 users Masse (bits/sec/Hz) Number of thresholds

Guard time in both approaches Contention- less feedback Contention channel for feedback Number of thresholds Guard time (T MS ) Guard time with 5 users

MASSE for both approaches (short data packet case: T TS = 20T MS ) Contention- less feedback Contention channel for feedback Number of thresholds Masse (bits/sec/Hz) Masse with 5 users

Conclusion (1) Study of guard time and MASSE in a certain multi-user diversity scheduling algorithm with two different feedback protocols. Use of multiple thresholds is better than the full feedback mechanism (=no thresholds) w.r.t. overall MASSE. The impact of the feedback mechanism has to be studied in detail. Preliminary conclusion: To maximize overall MASSE, choose the number of feedback thresholds such that the overall guard time is: not too long if the data packet size is short not too short if the date packet size is long

Conclusion (2) Two proposed feedback mechanisms Contention-less: ranked user list Contention: exponential backoff scheme The contention-less feedback protocol is more suitable for long data packet applications (optimal rate counts for more than short guard time) The contention mechanism is more suitable for short data packet applications (shorter guard time compensates for suboptimal rate)