Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292488
C. Suarez-Rodriguez, B. Jayawickrama, Ying He, F. Bader, M. Heimlich
The advent of 5G networks, where a plethora of spectrum-sharing schemes are expected to be adopted as an answer to the ever-growing users' need for data traffic, will require addressing mobility ubiquitously. The trend initiated with the deployment of heterogeneous networks and past standards will give way to a multitiered network where different services will coexist, such as device-to-device, vehicle-to-vehicle or massive-machine communications. Because of the high variability in the cell sizes given the different transmit powers, the classical handover process, which relies solely on measurements, will lead to an unbearable network overhead as a consequence of the high number of handovers. The use of spatial databases, also known as radio environment maps (REM), was first introduced as a tool to detect opportunistic spectrum access opportunities in cognitive radio applications. Since then, REM usage has been widely expanded to cover deployment optimization, interference management or resource allocation to name a few. In this paper, we introduce a handover algorithm that can predict the best network connection for the current user's trajectory from a radio environment map. We consider a geometric approach to derive the handover and handover-failure regions and compare the current handover algorithm used in Long-Term Evolution with our proposed one. Results show a drastic reduction in the number of handovers while maintaining a trade-off between the ping-pong shandover and the handover-failure probabilities.
{"title":"Performance analysis of REM-based handover algorithm for multi-tier cellular networks","authors":"C. Suarez-Rodriguez, B. Jayawickrama, Ying He, F. Bader, M. Heimlich","doi":"10.1109/PIMRC.2017.8292488","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292488","url":null,"abstract":"The advent of 5G networks, where a plethora of spectrum-sharing schemes are expected to be adopted as an answer to the ever-growing users' need for data traffic, will require addressing mobility ubiquitously. The trend initiated with the deployment of heterogeneous networks and past standards will give way to a multitiered network where different services will coexist, such as device-to-device, vehicle-to-vehicle or massive-machine communications. Because of the high variability in the cell sizes given the different transmit powers, the classical handover process, which relies solely on measurements, will lead to an unbearable network overhead as a consequence of the high number of handovers. The use of spatial databases, also known as radio environment maps (REM), was first introduced as a tool to detect opportunistic spectrum access opportunities in cognitive radio applications. Since then, REM usage has been widely expanded to cover deployment optimization, interference management or resource allocation to name a few. In this paper, we introduce a handover algorithm that can predict the best network connection for the current user's trajectory from a radio environment map. We consider a geometric approach to derive the handover and handover-failure regions and compare the current handover algorithm used in Long-Term Evolution with our proposed one. Results show a drastic reduction in the number of handovers while maintaining a trade-off between the ping-pong shandover and the handover-failure probabilities.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127866034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292222
Jad Oueis, Razvan Stanica, F. Valois, V. Conan, D. Lavaux
An isolated base station is a base station having no connection to a traditional core network. To provide services to users, an isolated base station is colocated with an entity providing the same functionalities as the traditional core network, referred to as Local EPC. In order to cover wider areas, several base stations are interconnected, forming a network that should be served by a single Local EPC. In this work, we tackle the Local EPC placement problem in the network, to determine with which of the base stations the Local EPC must be co-located. We propose a novel centrality metric, flow centrality, which measures the capacity of a node to receive the total amount of flows in the network. We show that co-locating the Local EPC with the base station having the maximum flow centrality maximizes the total amount of traffic the Local EPC can receive from all base stations, under certain capacity and load distribution constraints. We compare the flow centrality to other state of the art centrality metrics, and emphasize its advantages.
{"title":"Core network function placement in mobile networks","authors":"Jad Oueis, Razvan Stanica, F. Valois, V. Conan, D. Lavaux","doi":"10.1109/PIMRC.2017.8292222","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292222","url":null,"abstract":"An isolated base station is a base station having no connection to a traditional core network. To provide services to users, an isolated base station is colocated with an entity providing the same functionalities as the traditional core network, referred to as Local EPC. In order to cover wider areas, several base stations are interconnected, forming a network that should be served by a single Local EPC. In this work, we tackle the Local EPC placement problem in the network, to determine with which of the base stations the Local EPC must be co-located. We propose a novel centrality metric, flow centrality, which measures the capacity of a node to receive the total amount of flows in the network. We show that co-locating the Local EPC with the base station having the maximum flow centrality maximizes the total amount of traffic the Local EPC can receive from all base stations, under certain capacity and load distribution constraints. We compare the flow centrality to other state of the art centrality metrics, and emphasize its advantages.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121650096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292558
Mengying Ren, Jun Zhang, L. Khoukhi, H. Labiod, V. Vèque
Effective clustering algorithms are indispensable in order to solve the scalability problem in Vehicular Ad-hoc Networks (VANETs). Due to the highly dynamic network topology, an effective cluster merging scheme is always required in clustering algorithms, aiming to prevent the collapse of clusters. In the literature, there is a lack of comparison of cluster merging schemes, which makes it hard to analyze the impact of this component on clustering performance. In this paper, we analyze the existing cluster merging schemes and propose a Leadership-based Cluster Merging (LCM) scheme. Then, a comprehensive comparison of different cluster merging schemes under various traffic scenarios is presented, and our scheme is shown to achieve better performance on cluster stability.
{"title":"A study of the impact of merging schemes on cluster stability in VANETs","authors":"Mengying Ren, Jun Zhang, L. Khoukhi, H. Labiod, V. Vèque","doi":"10.1109/PIMRC.2017.8292558","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292558","url":null,"abstract":"Effective clustering algorithms are indispensable in order to solve the scalability problem in Vehicular Ad-hoc Networks (VANETs). Due to the highly dynamic network topology, an effective cluster merging scheme is always required in clustering algorithms, aiming to prevent the collapse of clusters. In the literature, there is a lack of comparison of cluster merging schemes, which makes it hard to analyze the impact of this component on clustering performance. In this paper, we analyze the existing cluster merging schemes and propose a Leadership-based Cluster Merging (LCM) scheme. Then, a comprehensive comparison of different cluster merging schemes under various traffic scenarios is presented, and our scheme is shown to achieve better performance on cluster stability.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292200
H. D. Trinh, N. Bui, J. Widmer, L. Giupponi, P. Dini
The analysis of real mobile traffic traces is helpful to understand usage patterns of cellular networks. In particular, mobile data may be used for network optimization and management in terms of radio resources, network planning, energy saving, for instance. However, real network data from the operators is often difficult to be accessed, due to legal and privacy issues. In this paper, we overcome the lack of network information using a LTE sniffer capable of decoding the unencrypted LTE control channel and we present a temporal and spatial analysis of the recorded traces. Moreover, we present a methodology to derive a stochastic characterization for the daily variation of the LTE traffic. The proposed model is based on a discrete-time Markov chain and is compared with the real traces. Results show that, with a limited number of states, our model presents a high level of accuracy in terms of first and second order statistics.
{"title":"Analysis and modeling of mobile traffic using real traces","authors":"H. D. Trinh, N. Bui, J. Widmer, L. Giupponi, P. Dini","doi":"10.1109/PIMRC.2017.8292200","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292200","url":null,"abstract":"The analysis of real mobile traffic traces is helpful to understand usage patterns of cellular networks. In particular, mobile data may be used for network optimization and management in terms of radio resources, network planning, energy saving, for instance. However, real network data from the operators is often difficult to be accessed, due to legal and privacy issues. In this paper, we overcome the lack of network information using a LTE sniffer capable of decoding the unencrypted LTE control channel and we present a temporal and spatial analysis of the recorded traces. Moreover, we present a methodology to derive a stochastic characterization for the daily variation of the LTE traffic. The proposed model is based on a discrete-time Markov chain and is compared with the real traces. Results show that, with a limited number of states, our model presents a high level of accuracy in terms of first and second order statistics.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292242
Wafae Bakkali, M. Kieffer, M. Lalam, T. Lestable
This paper addresses the problem of estimating the location of Internet of Things (IoT) Long Range Wide Area Networks (LoRaWAN) devices from time of arrival differences measured at gateways. An Extended Kalman Filter (EKF) based approach is considered to aggregate the measurements obtained at different time instants. Particular attention is paid to the processing of outliers. Based on experimental data obtained from field measurements conducted on a real LoRaWAN™ network an insight into the realistic localization accuracy of the considered localization approach is provided.
{"title":"Kalman filter-based localization for Internet of Things LoRaWAN™ end points","authors":"Wafae Bakkali, M. Kieffer, M. Lalam, T. Lestable","doi":"10.1109/PIMRC.2017.8292242","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292242","url":null,"abstract":"This paper addresses the problem of estimating the location of Internet of Things (IoT) Long Range Wide Area Networks (LoRaWAN) devices from time of arrival differences measured at gateways. An Extended Kalman Filter (EKF) based approach is considered to aggregate the measurements obtained at different time instants. Particular attention is paid to the processing of outliers. Based on experimental data obtained from field measurements conducted on a real LoRaWAN™ network an insight into the realistic localization accuracy of the considered localization approach is provided.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292267
Affoua Thérèse Aby, M. Servajean, M. Misson
Many protocols for wireless sensor networks are proposed in the literature. In most of this work, comparisons are made with existing protocols to show that the proposed protocol provides better overall performance without precise specifications of the simulation environment. In this paper we show that for a given propagation model, the value of its main parameters retained in the simulation process has very significant effects on the quantitative results. To do this, we use an asynchronous MAC protocol that we proposed which was compared with the reference MAC protocol specified in the standard IEEE 802.15.4 in beacon enabled mode. We use a realistic propagation model like log-Shadowing and we modify the parameters of this model. In this contribution, we also vary the capture threshold. We intuitively known that the asynchronous MAC protocol will ensure a better overall performance than the standard, we will try to show the diversity of results by intensive simulations. To the best of our knowledge, there are existing studies that show the impact of different propagation models on simulation results. However, no studies have shown this impact with such an important level of detail. From this study we estimate that when two communication protocols are compared, it is important to associate the performance curves with the precise and detailed conditions used for the simulation and to assess the global influence. According to this influence, a vigilance can be reported on the accuracy of results.
{"title":"Impact of the simulation parameters on the quantitative results of protocols for WSNs","authors":"Affoua Thérèse Aby, M. Servajean, M. Misson","doi":"10.1109/PIMRC.2017.8292267","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292267","url":null,"abstract":"Many protocols for wireless sensor networks are proposed in the literature. In most of this work, comparisons are made with existing protocols to show that the proposed protocol provides better overall performance without precise specifications of the simulation environment. In this paper we show that for a given propagation model, the value of its main parameters retained in the simulation process has very significant effects on the quantitative results. To do this, we use an asynchronous MAC protocol that we proposed which was compared with the reference MAC protocol specified in the standard IEEE 802.15.4 in beacon enabled mode. We use a realistic propagation model like log-Shadowing and we modify the parameters of this model. In this contribution, we also vary the capture threshold. We intuitively known that the asynchronous MAC protocol will ensure a better overall performance than the standard, we will try to show the diversity of results by intensive simulations. To the best of our knowledge, there are existing studies that show the impact of different propagation models on simulation results. However, no studies have shown this impact with such an important level of detail. From this study we estimate that when two communication protocols are compared, it is important to associate the performance curves with the precise and detailed conditions used for the simulation and to assess the global influence. According to this influence, a vigilance can be reported on the accuracy of results.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"68 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113994443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292626
W. Silva, D. Macedo, M. N. Lima, T. Nguyen, J. Nogueira
An ever-growing number of embedded devices supports different kinds of applications, such as healthcare, surveillance, gas monitoring, and others, that require an elevated level of communication reliability. However, the expected high density of those embedded devices increases the competition for frequency spectrum, making it difficult to achieve a reliable machine-to-machine (M2M) communication. To overcome these difficulties, the use of link quality estimators (LQE) is crucial to provide a solid communication. In order to provide robust and faster communication under harsh conditions, this paper proposes a new LQE, called PRR2, which uses two metrics and two levels of PRR (Packet Received Ratio). The use of two PRR sliding windows captures link quality variations in the short term and also considers the long-term. PRR2 is compared against the state of the art on a prototype using USRPs, and the results show that the proposal reduces the number of retransmissions and increases the delivery rate, which are two important metrics for link layer reliability.
{"title":"A multilayer link quality estimator for reliable machine-to-machine communication","authors":"W. Silva, D. Macedo, M. N. Lima, T. Nguyen, J. Nogueira","doi":"10.1109/PIMRC.2017.8292626","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292626","url":null,"abstract":"An ever-growing number of embedded devices supports different kinds of applications, such as healthcare, surveillance, gas monitoring, and others, that require an elevated level of communication reliability. However, the expected high density of those embedded devices increases the competition for frequency spectrum, making it difficult to achieve a reliable machine-to-machine (M2M) communication. To overcome these difficulties, the use of link quality estimators (LQE) is crucial to provide a solid communication. In order to provide robust and faster communication under harsh conditions, this paper proposes a new LQE, called PRR2, which uses two metrics and two levels of PRR (Packet Received Ratio). The use of two PRR sliding windows captures link quality variations in the short term and also considers the long-term. PRR2 is compared against the state of the art on a prototype using USRPs, and the results show that the proposal reduces the number of retransmissions and increases the delivery rate, which are two important metrics for link layer reliability.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122338380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292457
Thanh Nguyen, B. Vrigneau, O. Berder
The linear closed-loop MIMO precoding technique employs the channel state information (CSI) at both sides of the link to optimize various criteria such as the capacity, the mean square error, the signal to noise ratio (SNR), etc. Besides classical criteria such as capacity or bit error rate, the diversity-multiplexing trade-off (DMT) is now widely used to evaluate the performance of designed precoders. Indeed, it is known that a fundamental tradeoff between the spatial multiplexing and the diversity order exists. The first definition was given for asymptotic SNR, then was extended to finite values. The DMT was studied for open-loop scheme (Alamouti or V-BLAST) and we propose in this paper a method to obtain DMT of multi-form MIMO precoders. Although several multi-form solutions were found, to obtain their theoretical performance is still difficult. In order to tackle this challenge, we propose to investigate the minimal distance approach: starting from the probability density function of a square minimum distance, we obtain the outage probability and diversity-multiplexing trade-off (DMT) at operational SNR. We arbitrarily choose the max-dmin precoder based on the maximization of a minimal distance using the CSI at the transmitter (closed-loop). This expression is validated by simulations and comparisons between different MIMO precoding schemes are performed. The method can be applied to others precoders and fading channels.
{"title":"Minimal distance approach for studying multi-form MIMO precoders, application to finite-SNR DMT","authors":"Thanh Nguyen, B. Vrigneau, O. Berder","doi":"10.1109/PIMRC.2017.8292457","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292457","url":null,"abstract":"The linear closed-loop MIMO precoding technique employs the channel state information (CSI) at both sides of the link to optimize various criteria such as the capacity, the mean square error, the signal to noise ratio (SNR), etc. Besides classical criteria such as capacity or bit error rate, the diversity-multiplexing trade-off (DMT) is now widely used to evaluate the performance of designed precoders. Indeed, it is known that a fundamental tradeoff between the spatial multiplexing and the diversity order exists. The first definition was given for asymptotic SNR, then was extended to finite values. The DMT was studied for open-loop scheme (Alamouti or V-BLAST) and we propose in this paper a method to obtain DMT of multi-form MIMO precoders. Although several multi-form solutions were found, to obtain their theoretical performance is still difficult. In order to tackle this challenge, we propose to investigate the minimal distance approach: starting from the probability density function of a square minimum distance, we obtain the outage probability and diversity-multiplexing trade-off (DMT) at operational SNR. We arbitrarily choose the max-dmin precoder based on the maximization of a minimal distance using the CSI at the transmitter (closed-loop). This expression is validated by simulations and comparisons between different MIMO precoding schemes are performed. The method can be applied to others precoders and fading channels.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116509308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292380
B. Chang, C. Rocha, H. Fhima, R. Zayani, H. Shaiek, D. Roviras
In this paper, a new widely linear equalizer for single carrier systems using frequency domain equalization (SC-FDE) that takes into account up to K known interferers in the symbol estimation process is proposed. It was found out that the error performance of the proposed widely linear equalizer is nearly immune to the effect of one interferer, regardless of its power; when compared to its strictly linear version, the proposed structure also has a better error performance for up to three interferers.
{"title":"On the performance of a widely linear SC-FDE system under multiple independent interferences","authors":"B. Chang, C. Rocha, H. Fhima, R. Zayani, H. Shaiek, D. Roviras","doi":"10.1109/PIMRC.2017.8292380","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292380","url":null,"abstract":"In this paper, a new widely linear equalizer for single carrier systems using frequency domain equalization (SC-FDE) that takes into account up to K known interferers in the symbol estimation process is proposed. It was found out that the error performance of the proposed widely linear equalizer is nearly immune to the effect of one interferer, regardless of its power; when compared to its strictly linear version, the proposed structure also has a better error performance for up to three interferers.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127176658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-08DOI: 10.1109/PIMRC.2017.8292278
Faton Maliqi, Francesca Bassi, P. Duhamel, Ilir Limani
Relaying protocols are usually deterministic, i.e. they commute from one action to the next one in a predefined manner, depending on the success of the transmission. This paper demonstrates the advantages that probabilistic protocols (i.e. the next action to be undertaken depends on some probability) may have in this context. The whole study is performed on a simple source-relay-destination network, the relay working in demodulate and forward mode, in order to obtain insights on the interaction between relaying and HARQ. So far, probabilistic protocols have been mainly proposed for higher layers of communication systems, but are applied here to physical and MAC layers. Since it contains only two parameters, we demonstrate that our probabilistic protocol can easily be tuned for best performance using a Finite State Markov Chain (FSMC), and that it brings improvement over deterministic protocols in the same scenario.
{"title":"A probabilistic retransmission protocol on a relaying network","authors":"Faton Maliqi, Francesca Bassi, P. Duhamel, Ilir Limani","doi":"10.1109/PIMRC.2017.8292278","DOIUrl":"https://doi.org/10.1109/PIMRC.2017.8292278","url":null,"abstract":"Relaying protocols are usually deterministic, i.e. they commute from one action to the next one in a predefined manner, depending on the success of the transmission. This paper demonstrates the advantages that probabilistic protocols (i.e. the next action to be undertaken depends on some probability) may have in this context. The whole study is performed on a simple source-relay-destination network, the relay working in demodulate and forward mode, in order to obtain insights on the interaction between relaying and HARQ. So far, probabilistic protocols have been mainly proposed for higher layers of communication systems, but are applied here to physical and MAC layers. Since it contains only two parameters, we demonstrate that our probabilistic protocol can easily be tuned for best performance using a Finite State Markov Chain (FSMC), and that it brings improvement over deterministic protocols in the same scenario.","PeriodicalId":397107,"journal":{"name":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128768627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}