Ph.D. Thesis Defense June 2005 - MIT Media Lab · PDF fileIntelligent Antenna Sharing in...
-
Upload
truongkhuong -
Category
Documents
-
view
220 -
download
1
Transcript of Ph.D. Thesis Defense June 2005 - MIT Media Lab · PDF fileIntelligent Antenna Sharing in...
Intelligent Antenna Sharing in Cooperative Diversity WirelessNetworks
Ph.D. Thesis DefenseJune 2005
Aggelos Bletsas
Viral Communications Group, MIT Media Laboratory
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 1/50
Thesis Committee
Andy Lippman,Principal Research Scientist, MIT Media Lab.
Joe Paradiso,Associate Professor, MIT Media Lab.
Moe Win,Associate Professor, MIT LIDS.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 2/50
Motivation and Inspirations
You are (probably) here because you have all experienced:
bad reception...
battery problems...
no connectivity during large gatherings (4th of July problem!)...
Could we fix all the above problems?
Inspirations:
Gupta and Kumar IT 2000 result: local communication helps...
Multiple Antennas at each radio help...
Could we merge the two above? More users ?= better wireless communication?
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 3/50
Motivation and Inspirations
You are (probably) here because you have all experienced:
bad reception...
battery problems...
no connectivity during large gatherings (4th of July problem!)...
Could we fix all the above problems?
Inspirations:
Gupta and Kumar IT 2000 result: local communication helps...
Multiple Antennas at each radio help...
Could we merge the two above? More users ?= better wireless communication?
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 3/50
Motivation and Inspirations
You are (probably) here because you have all experienced:
bad reception...
battery problems...
no connectivity during large gatherings (4th of July problem!)...
Could we fix all the above problems?
Inspirations:
Gupta and Kumar IT 2000 result: local communication helps...
Multiple Antennas at each radio help...
Could we merge the two above? More users ?= better wireless communication?
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 3/50
Additional Problem Constraint: Low Complexity and Implementation
SourceRelay
Relay
Destination
In general, multi-antenna systems increase:
reliability (diversity gain).
spectral efficiency bps/Hz (multiplexing gain)
Explore multiple antennas in the Relay channel, via cooperative relays.
IMPLEMENTATION TODAY, with existing RF-front ends.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 4/50
Additional Problem Constraint: Low Complexity and Implementation
SourceRelay
Relay
Destination
In general, multi-antenna systems increase:
reliability (diversity gain).
spectral efficiency bps/Hz (multiplexing gain)
Explore multiple antennas in the Relay channel, via cooperative relays.
IMPLEMENTATION TODAY, with existing RF-front ends.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 4/50
Main Difficulties
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Information is not a priori known at the relays.
Number of participating antennas is unknown.
Number of useful participating antennas is unknown.
Coordination and Group formation ought to be distributed, not "genie-aided".
MIMO ST-coding 6= coding for the Relay channel.
Radio transceiver complexity.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 5/50
Main Difficulties
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Information is not a priori known at the relays.
Number of participating antennas is unknown.
Number of useful participating antennas is unknown.
Coordination and Group formation ought to be distributed, not "genie-aided".
MIMO ST-coding 6= coding for the Relay channel.
Radio transceiver complexity.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 5/50
Main Difficulties
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Information is not a priori known at the relays.
Number of participating antennas is unknown.
Number of useful participating antennas is unknown.
Coordination and Group formation ought to be distributed, not "genie-aided".
MIMO ST-coding 6= coding for the Relay channel.
Radio transceiver complexity.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 5/50
Main Difficulties
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Information is not a priori known at the relays.
Number of participating antennas is unknown.
Number of useful participating antennas is unknown.
Coordination and Group formation ought to be distributed, not "genie-aided".
MIMO ST-coding 6= coding for the Relay channel.
Radio transceiver complexity.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 5/50
Main Difficulties
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Information is not a priori known at the relays.
Number of participating antennas is unknown.
Number of useful participating antennas is unknown.
Coordination and Group formation ought to be distributed, not "genie-aided".
MIMO ST-coding 6= coding for the Relay channel.
Radio transceiver complexity.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 5/50
Main Difficulties
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Information is not a priori known at the relays.
Number of participating antennas is unknown.
Number of useful participating antennas is unknown.
Coordination and Group formation ought to be distributed, not "genie-aided".
MIMO ST-coding 6= coding for the Relay channel.
Radio transceiver complexity.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 5/50
Outline
Assumptions and Background
Approach
Performance
Implementation Example
Relevant Technologies
Conclusion
Acknowledgements
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 6/50
Assumptions and System Model
Inline with prior art in the field:
Half-duplex radios.
Simple RF-front ends:
Half-duplex radios.
No rate adaptation (no CSI at the source).
No phased arrays (No beamforming).
yd = asd xs + nd.
Neighboring interfering streams: noise.
(Mostly) Rayleigh fading. E[|asd|2] = 1/dv
Slow Fading (most difficult communication problem).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 7/50
Assumptions and System Model
Inline with prior art in the field:
Half-duplex radios.
Simple RF-front ends:
Half-duplex radios.
No rate adaptation (no CSI at the source).
No phased arrays (No beamforming).
yd = asd xs + nd.
Neighboring interfering streams: noise.
(Mostly) Rayleigh fading. E[|asd|2] = 1/dv
Slow Fading (most difficult communication problem).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 7/50
Approaches
Non-cooperative communication.
Cooperative Repetition.
Simultaneous transmissions(Space-Time Coding).
Our Approach.
Proactive single relay selection.
Instantaneous channel conditions(instead of average).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 8/50
Approaches
Non-cooperative communication.
Cooperative Repetition.
Simultaneous transmissions(Space-Time Coding).
Our Approach.
Proactive single relay selection.
Instantaneous channel conditions(instead of average).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 8/50
Approaches
Non-cooperative communication.
Cooperative Repetition.
Simultaneous transmissions(Space-Time Coding).
Our Approach.
Proactive single relay selection.
Instantaneous channel conditions(instead of average).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 8/50
Approaches
Non-cooperative communication.
Cooperative Repetition.
Simultaneous transmissions(Space-Time Coding).
Our Approach.
Proactive single relay selection.
Instantaneous channel conditions(instead of average).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 8/50
Outline
Assumptions and Background
Approach
Performance
Implementation Example
Relevant Technologies
Conclusion
Acknowledgements
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 9/50
Wireless Channel Observations
v = 3.98
Distance d
Receiver cares about signal strength (not distance).
Selection based on distance or average SNR... is suboptimal.
Instantaneous channel conditions matter!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 10/50
Wireless Channel Observations
v = 3.98
Distance d
Receiver cares about signal strength (not distance).
Selection based on distance or average SNR... is suboptimal.
Instantaneous channel conditions matter!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 10/50
Wireless Channel Observations
v = 3.98
Distance d
Receiver cares about signal strength (not distance).
Selection based on distance or average SNR... is suboptimal.
Instantaneous channel conditions matter!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 10/50
Our Approach: Opportunistic Relaying
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Policy I : hi = min{|asi|2, |aid|
2} Policy II : hi =2
1|asi|2
+ 1|aid|
2
=2 |asi|
2 |aid|2
|asi|2 + |aid|2
Ti =λ
hi(1)
Here λ has the units of time. For the discussion in this work, λ has simply values of µsecs.
hb = max{hi}, ⇐⇒ (2)
Tb = min{Ti}, i ∈ [1..M ]. (3)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 11/50
Our Approach: Opportunistic Relaying
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
RTS
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Policy I : hi = min{|asi|2, |aid|
2} Policy II : hi =2
1|asi|2
+ 1|aid|
2
=2 |asi|
2 |aid|2
|asi|2 + |aid|2
Ti =λ
hi(4)
Here λ has the units of time. For the discussion in this work, λ has simply values of µsecs.
hb = max{hi}, ⇐⇒ (5)
Tb = min{Ti}, i ∈ [1..M ]. (6)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 11/50
Our Approach: Opportunistic Relaying
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
CTS
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Policy I : hi = min{|asi|2, |aid|
2} Policy II : hi =2
1|asi|2
+ 1|aid|
2
=2 |asi|
2 |aid|2
|asi|2 + |aid|2
Ti =λ
hi(7)
Here λ has the units of time. For the discussion in this work, λ has simply values of µsecs.
hb = max{hi}, ⇐⇒ (8)
Tb = min{Ti}, i ∈ [1..M ]. (9)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 11/50
Our Approach: Opportunistic Relaying
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Policy I : hi = min{|asi|2, |aid|
2} Policy II : hi =2
1|asi|2
+ 1|aid|
2
=2 |asi|
2 |aid|2
|asi|2 + |aid|2
Ti =λ
hi(10)
Here λ has the units of time. For the discussion in this work, λ has simply values of µsecs.
hb = max{hi}, ⇐⇒ (11)
Tb = min{Ti}, i ∈ [1..M ]. (12)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 11/50
Discussion: a note on CSI and time synchronization
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
RTS/CTS exchange is only needed at the relays to estimate uplink/downlink channel.
CTS reception is not exploited at the source.
No beamforming or rate adaptation at the relays.
No need for an explicit time sync protocol.
It is a multi-hop scheme.
We do know that the term "Opportunistic" has been used before...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 12/50
Outline
Assumptions and Background
Approach
Performance
Implementation Example
Relevant Technologies
Conclusion
Acknowledgements
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 13/50
Outage Performance (1)best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
Outage event between source s and destination d:
log(1 + |asd|2 SNR) ≤ ρ⇔ |asd|
2 ≤ (2ρ − 1)/SNR⇔ γsd ≤ Θ
"Best" opportunistic relay is chosen, according to instantaneous, end-to-end channelconditions:
b = arg︸︷︷︸i
max{min{γsi, γid}}, i ∈ [1..M ] (13)
Probability of outage via "best" relay:
Pr(γsb < Θ2⋃
γbd < Θ2), Θ2 = 2 (22ρ − 1)/SNR (14)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 14/50
Outage Performance (2)
The above outage probability of opportunistic relaying is calculated for the case ofRayleigh Fading:
Pr(γsb < Θ2⋃
γbd < Θ2) =
M∏
i=1
(1− exp(−Θ2 (1
γsi+
1
γid))) (15)
Taking into account the direct path between source and destination, the overall outageprobability becomes:
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 15/50
Outage Performance (2)
The above outage probability of opportunistic relaying is calculated for the case ofRayleigh Fading:
Pr(γsb < Θ2⋃
γbd < Θ2) =
M∏
i=1
(1− exp(−Θ2 (1
γsi+
1
γid))) (16)
Taking into account the direct path between source and destination, the overall outageprobability becomes:
P outr = (1− exp(−Θ2/γsd))︸ ︷︷ ︸
direct
M∏
i=1
(1− exp(−Θ2 (1
γsi+
1
γid)))
︸ ︷︷ ︸relaying
(17)
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 15/50
Outage Performance (3)
1 2 3 4 5 6 7 810-2
10-1
100
101
Number of relays
bps/
Hz
Capacity for outage prob.=0.01 and FIXED total transmissionpower (SNR=10)
cooperative with dsd
=dsr
+ drd
(dsr
=drd
)cooperative with d
sd=d
sr=d
rdNon-cooperative, direct
A single relay doesn’t help... [has been shown before...]
Opportunistic relays do help, even under a total tx power constraint!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 16/50
Outage Performance (3)
1 2 3 4 5 6 7 810-2
10-1
100
101
Number of relays
bps/
Hz
Capacity for outage prob.=0.01 and FIXED total transmissionpower (SNR=10)
cooperative with dsd
=dsr
+ drd
(dsr
=drd
)cooperative with d
sd=d
sr=d
rdNon-cooperative, direct
v = 4
v = 3
A single relay doesn’t help... [has been shown before...]
Opportunistic relays do help, even under a total tx power constraint!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 16/50
Outage Performance (4)
0 5 10 15 20 25 30 35 400
1
2
3
4
5
6
7
SNR [dB]
bps/
Hz
Direct communication1 relay2 Opportunistic Relays4 Opportunistic Relays6 Opportunistic Relays8 Opportunistic Relays
Capacity for outage probability=0.01, dsd= dsr = drd
0 5 10 15 20 25 30 35 40
0
1
2
3
4
5
6
7
8
SNR [dB]
bps/
Hz
Direct communication1 relay2 Opportunistic Relays4 Opportunistic Relays6 Opportunistic Relays8 Opportunistic Relays
v = 4
Capacity for outage probability=0.01, dsd= dsr + drd
Prout = δ.
ρopport =1
2log2(1− ln(1− δ1/M )
SNR
2γsid) (18)
ρdirect = log2(1− ln(1− δ) SNR γsid) (19)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 17/50
Diversity-Multiplexing Tradeoff (1)
d∆= − lim
SNR→∞
logPe(ρ)
logSNRr∆= lim
SNR→∞
ρ(SNR)
logSNR
Diversity-Multiplexing Gain tradeoff tool averages out geometry.
cooperative diversity 6= multihop communication. This tool can reveal associatedgains/losses.
Theorem 0: The achievable diversity multiplexing tradeoff for the decode and forwardstrategy with M intermediate relay nodes is given by d(r) = (M + 1)(1− 2r) forr ∈ (0, 0.5).
Theorem 1∗: Under opportunistic relaying, the decode and forward protocol with Mintermediate relays achieves the same diversity multiplexing tradeoff, as in Theorem 0.
Theorem 2∗: Opportunistic amplify and forward achieves the same diversity multiplexingtradeoff stated in Theorem 0.
*: In cooperation with Ashish Khisti.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 18/50
Diversity-Multiplexing Tradeoff (1)
d∆= − lim
SNR→∞
logPe(ρ)
logSNRr∆= lim
SNR→∞
ρ(SNR)
logSNR
Diversity-Multiplexing Gain tradeoff tool averages out geometry.
cooperative diversity 6= multihop communication. This tool can reveal associatedgains/losses.
Theorem 0: The achievable diversity multiplexing tradeoff for the decode and forwardstrategy with M intermediate relay nodes is given by d(r) = (M + 1)(1− 2r) forr ∈ (0, 0.5).
Theorem 1∗: Under opportunistic relaying, the decode and forward protocol with Mintermediate relays achieves the same diversity multiplexing tradeoff, as in Theorem 0.
Theorem 2∗: Opportunistic amplify and forward achieves the same diversity multiplexingtradeoff stated in Theorem 0.
*: In cooperation with Ashish Khisti.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 18/50
Diversity-Multiplexing Tradeoff (1)
d∆= − lim
SNR→∞
logPe(ρ)
logSNRr∆= lim
SNR→∞
ρ(SNR)
logSNR
Diversity-Multiplexing Gain tradeoff tool averages out geometry.
cooperative diversity 6= multihop communication. This tool can reveal associatedgains/losses.
Theorem 0: The achievable diversity multiplexing tradeoff for the decode and forwardstrategy with M intermediate relay nodes is given by d(r) = (M + 1)(1− 2r) forr ∈ (0, 0.5).
Theorem 1∗: Under opportunistic relaying, the decode and forward protocol with Mintermediate relays achieves the same diversity multiplexing tradeoff, as in Theorem 0.
Theorem 2∗: Opportunistic amplify and forward achieves the same diversity multiplexingtradeoff stated in Theorem 0.
*: In cooperation with Ashish Khisti.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 18/50
Diversity-Multiplexing Tradeoff (2)
d(r)
r10.51/(M+1)
1
M+1Ideal
Space Time Coding
OpportunisticRelaying
Direct
Repetition
Opportunistic, single relay selection is as good as space-time coding simultaneoustransmissions!
This result holds for decode/forward as well as amplify/forward!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 19/50
Diversity-Multiplexing Tradeoff (2)
d(r)
r10.51/(M+1)
1
M+1Ideal
Space Time Coding
OpportunisticRelaying
Direct
Repetition
Opportunistic, single relay selection is as good as space-time coding simultaneoustransmissions!
This result holds for decode/forward as well as amplify/forward!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 19/50
Diversity-Multiplexing Tradeoff (2)
d(r)
r10.51/(M+1)
1
M+1Ideal
Space Time Coding
OpportunisticRelaying
Direct
Repetition
Opportunistic, single relay selection is as good as space-time coding simultaneoustransmissions!
This result holds for decode/forward as well as amplify/forward!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 19/50
Diversity-Multiplexing Tradeoff (2)
d(r)
r10.51/(M+1)
1
M+1Ideal
Space Time Coding
OpportunisticRelaying
Direct
Repetition
Opportunistic, single relay selection is as good as space-time coding simultaneoustransmissions!
This result holds for decode/forward as well as amplify/forward!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 19/50
Diversity-Multiplexing Tradeoff (2)
d(r)
r10.51/(M+1)
1
M+1Ideal
Space Time Coding
OpportunisticRelaying
Direct
Repetition
Opportunistic, single relay selection is as good as space-time coding simultaneoustransmissions!
This result holds for decode/forward as well as amplify/forward!
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 19/50
Results: Transmission Energy Gains
0 5 10 15 20 25 30 35 4010-7
10-6
10-5
10-4
10-3
10-2
10-1
100
E = E1 + E2
Symbol Error Probability for 8-PSK
noncooperativecooperative digital
v = 2
v = 3
v = 4
v = 5
Energy Gains
0 1 2 3 4 5 6 7
5
10
15
20
25
30
35
40
v
Ratio of Energy without cooperation vs (Total energy with cooperation)
Energy gains counterbalance the decrease of rate by a factor of 2.
For the example above, 50% throughput increase is possible(8-PSK uncoded cooperative vs 2-PSK uncoded direct).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 20/50
Results: Reception Energy Gains
Cooperative reception of M relays ⇒reception energy cost increases by a factor of M .
Rx energy is comparable to Tx energy in modern radios [R. Min 2003].
Proactive nature of Opportunistic Relaying, reception energy cost is fixed.
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 21/50
Results: Power Allocation Optimality (1)
What if TOTAL power allocated to the relays was fixed?
For amplify and forward networks, the equivalent system equation can be shown to be:
It can be shown that opportunistic relaying is superior to other approaches in the field.
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 22/50
Results: Power Allocation Optimality (1)
What if TOTAL power allocated to the relays was fixed?
For amplify and forward networks, the equivalent system equation can be shown to be:
yD,1
yD,2ω
=
√PSD aSD 0
1ω
∑Mi=1
√PSRi
√PRiD√
PSRi+N0aSRi aRiD
1ω
√PSD aSD
[x1
x2
]+
nD,1
nD,2ω
E[nD,2 n∗D,2 |HR→D ] = N0 (1 +
M∑
i=1
PRiD |aRid|2
PSRi + N0
)
︸ ︷︷ ︸ω2
= ω2
N0 (20)
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 22/50
Results: Power Allocation Optimality (1)
What if TOTAL power allocated to the relays was fixed?
For amplify and forward networks, the equivalent system equation can be shown to be:
y =
[ √PSD hSD 0
H211ω
√PSD hSD
]x + n (21)
y = H x + n (22)
IAF =1
2log2(1 +
PSD
N0
|hSD|2 +|H21|2
N0
) (23)
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 22/50
Results: Power Allocation Optimality (2)
Three cases considered, with all relays equivalent (same AVERAGE received SNR) :
Power to one relay (selection based on Average SNR).
Power distributed to all relays (space-time coding).
Power to opportunistic relay (Our Approach).
0 0.5 1 1.5 2 2.5 3 3.5 40
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
16 relays
CD
F of
Mut
ual I
nfor
mat
ion
bps/Hz
Selection one random relaySelecting all relaysOpportunistic Relaying
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 23/50
Results: Power Allocation Optimality (2)
Three cases considered, with all relays equivalent (same AVERAGE received SNR) :
Power to one relay (selection based on Average SNR).
Power distributed to all relays (space-time coding).
Power to opportunistic relay (Our Approach).
0 0.5 1 1.5 2 2.5 3 3.5 40
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
16 relays
CD
F of
Mut
ual I
nfor
mat
ion
bps/Hz
Selection one random relaySelecting all relaysOpportunistic Relaying
Single
All
Oppor
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 23/50
Results: Power Allocation Optimality (3)
1 2 3 4 5 6 7 8 9 102
2.5
3
3.5Average spectral efficiency
bps/
Hz
Number of Relays
Selection one random relaySelecting all relaysOpportunistic Relaying
Under a sum power constraint (and no beamforming capabilities) using all relays issuboptimal compared to opportunistic relaying.
Similar results for decode and forward.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 24/50
Results: Power Allocation Optimality (3)
1 2 3 4 5 6 7 8 9 102
2.5
3
3.5Average spectral efficiency
bps/
Hz
Number of Relays
Selection one random relaySelecting all relaysOpportunistic Relaying
Single
All
Oppor
Under a sum power constraint (and no beamforming capabilities) using all relays issuboptimal compared to opportunistic relaying.
Similar results for decode and forward.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 24/50
Overhead: Collision Probability (1)
best path @ kT
best path @ (k+1)T
Direct Relayed
|as,i|2 |ai,d|2
Source Destination
|as,j|2 |aj,d|2
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Policy I : hi = min{|asi|2, |aid|
2} Policy II : hi =2
1|asi|2
+ 1|aid|
2
=2 |asi|
2 |aid|2
|asi|2 + |aid|2
Ti =λ
hi(24)
Here λ has the units of time. For the discussion in this work, λ has simply values of µsecs.
hb = max{hi}, ⇐⇒ (25)
Tb = min{Ti}, i ∈ [1..M ]. (26)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 25/50
Overhead: Collision Probability (2)
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Worst case scenario:
Pr(Collision) ≤ Pr(any Tj < Tb + c | j 6= b)
where Tb = min{Tj}, j ∈ [1,M ] and c > 0.
(a) No Hidden Relays : c = rmax + |nb − nj |max + ds
(b) Hidden Relays : c = rmax + |nb − nj |max + 2ds + dur + 2nmax
nj : propagation delay between relay j and destination. nmax is the maximum.
r: propagation delay between two relays. rmax is the maximum.
ds: receive-to-transmit switch time of each radio.
dur: duration of flag packet, transmitted by the "best" relay.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 26/50
Overhead: Collision Probability (2)
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
Worst case scenario:
Pr(Collision) ≤ Pr(any Tj < Tb + c | j 6= b)
where Tb = min{Tj}, j ∈ [1,M ] and c > 0.
(a) No Hidden Relays : c = rmax + |nb − nj |max + ds
(b) Hidden Relays : c = rmax + |nb − nj |max + 2ds + dur + 2nmax
nj : propagation delay between relay j and destination. nmax is the maximum.
r: propagation delay between two relays. rmax is the maximum.
ds: receive-to-transmit switch time of each radio.
dur: duration of flag packet, transmitted by the "best" relay.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 26/50
Overhead: Collision Probability (3)
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
If Tb = min{Tj}, j ∈ [1,M ] and Y1 < Y2 < . . . < YMthe ordered random variables {Tj} with Tb ≡ Y1, and Y2 thesecond minimum timer, then:
Pr(any Tj < Tb + c | j 6= b) ≡ Pr(Y2 < Y1 + c) (27)
Given that Yj = λ/h(j), Y1 < Y2 < . . . < YM is equivalent to1/h(1) < 1/h(2) < . . . < 1/h(M)
Pr(Y2 < Y1 + c) = Pr(1
h(2)<
1
h(1)+
c
λ) (28)
Ratio λc
needs to be as high as possible. λ and c are user controlled.
However λ needs to be kept small:
E[Tj ] = E[λ/hj ] ≥ λ/E[hj ] (29)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 27/50
Overhead: Collision Probability (3)
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
If Tb = min{Tj}, j ∈ [1,M ] and Y1 < Y2 < . . . < YMthe ordered random variables {Tj} with Tb ≡ Y1, and Y2 thesecond minimum timer, then:
Pr(any Tj < Tb + c | j 6= b) ≡ Pr(Y2 < Y1 + c) (30)
Given that Yj = λ/h(j), Y1 < Y2 < . . . < YM is equivalent to1/h(1) < 1/h(2) < . . . < 1/h(M)
Pr(Y2 < Y1 + c) = Pr(1
h(2)<
1
h(1)+
c
λ) (31)
Ratio λc
needs to be as high as possible. λ and c are user controlled.
However λ needs to be kept small:
E[Tj ] = E[λ/hj ] ≥ λ/E[hj ] (32)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 27/50
Overhead: Collision Probability (3)
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
If Tb = min{Tj}, j ∈ [1,M ] and Y1 < Y2 < . . . < YMthe ordered random variables {Tj} with Tb ≡ Y1, and Y2 thesecond minimum timer, then:
Pr(any Tj < Tb + c | j 6= b) ≡ Pr(Y2 < Y1 + c) (33)
Given that Yj = λ/h(j), Y1 < Y2 < . . . < YM is equivalent to1/h(1) < 1/h(2) < . . . < 1/h(M)
Pr(Y2 < Y1 + c) = Pr(1
h(2)<
1
h(1)+
c
λ) (34)
Ratio λc
needs to be as high as possible. λ and c are user controlled.
However λ needs to be kept small:
E[Tj ] = E[λ/hj ] ≥ λ/E[hj ] (35)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 27/50
Overhead: Collision Probability (3)
tL tHtC
Tb ds
dur
tb
tj
|nb-nj|
r r ds+2nb
CTS
CTS
CTS
flag packet
If Tb = min{Tj}, j ∈ [1,M ] and Y1 < Y2 < . . . < YMthe ordered random variables {Tj} with Tb ≡ Y1, and Y2 thesecond minimum timer, then:
Pr(any Tj < Tb + c | j 6= b) ≡ Pr(Y2 < Y1 + c) (36)
Given that Yj = λ/h(j), Y1 < Y2 < . . . < YM is equivalent to1/h(1) < 1/h(2) < . . . < 1/h(M)
Pr(Y2 < Y1 + c) = Pr(1
h(2)<
1
h(1)+
c
λ) (37)
Ratio λc
needs to be as high as possible. λ and c are user controlled.
However λ needs to be kept small:
E[Tj ] = E[λ/hj ] ≥ λ/E[hj ] (38)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 27/50
Overhead: Collision Probability (4)
Lemma: Given M ≥ 2 i.i.d. positive random variables T1, T2, . . . , TM , each withprobability density function f(x) and cumulative distribution function F (x), andY1 < Y2 < Y3 . . . < YM are the M ordered random variables T1, T2, . . . , TM , thenPr(Y2 < Y1 + c), where c > 0, is given by the following equations:
Pr(Y2 < Y1 + c) = 1− Ic (39)
Ic =M (M − 1)
∫ +∞
cf(y) [1− F (y)]M−2 F (y − c) dy (40)
Wireless channel statistics of h⇒ pdf f and cdf F of T = λ/h⇒ Pr(collision).
Example: for a mobility of 0− 3 km/h ⇒ maximum Doppler shift is fm = 2.5 Hz ⇒
minimum coherence time on the order of Tc ' 200 milliseconds.
For c/λ ≈ 1/200⇒ Pr(Collision) ≤ 0.6% for policy I.
For c ≈ 5µs⇒ λ ≈ 1ms ' 1100
Tc.
For c ≈ 1µs⇒ λ ≈ 200µs ' 11000
Tc.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 28/50
Overhead: Collision Probability (4)
Lemma: Given M ≥ 2 i.i.d. positive random variables T1, T2, . . . , TM , each withprobability density function f(x) and cumulative distribution function F (x), andY1 < Y2 < Y3 . . . < YM are the M ordered random variables T1, T2, . . . , TM , thenPr(Y2 < Y1 + c), where c > 0, is given by the following equations:
Pr(Y2 < Y1 + c) = 1− Ic (41)
Ic =M (M − 1)
∫ +∞
cf(y) [1− F (y)]M−2 F (y − c) dy (42)
Wireless channel statistics of h⇒ pdf f and cdf F of T = λ/h⇒ Pr(collision).
Example: for a mobility of 0− 3 km/h ⇒ maximum Doppler shift is fm = 2.5 Hz ⇒
minimum coherence time on the order of Tc ' 200 milliseconds.
For c/λ ≈ 1/200⇒ Pr(Collision) ≤ 0.6% for policy I.
For c ≈ 5µs⇒ λ ≈ 1ms ' 1100
Tc.
For c ≈ 1µs⇒ λ ≈ 200µs ' 11000
Tc.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 28/50
Rigorous analysis earns you trips around the world...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 29/50
Overhead: Collision Probability (5)
200 220 240 260 280 300 320 340 360 380 4003
4
5
6
7
8
9
10x 10-3 Rayleigh and Ricean Fading vs lambda /c, for M=6
lambda /c
Pro
babi
lity
of C
ollis
ion
Policy II (harmonic), Rayleigh, SimulationPolicy II (harmonic), Rayleigh, AnalysisPolicy I (min), Ricean, SimulationPolicy I (min), Rayleigh, SimulationPolicy I (min), Rayleigh, Analysis
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 30/50
Overhead: Collision Probability (6)
Case 1
Case 2
Case 3
Case 4 Case 1 Case 2 Case 3 Case 4 1
2
3
4
5
6
7
8
9
10x 10-3
Pro
babi
lity
of C
ollis
ion
4 different topologies for M=6
Assymetry and collision probability
v=3,Policy II (harmonic)v=4,Policy II (harmonic)v=3,Policy I (min)v=4,Policy I (min)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 31/50
...and a Remark...
Stream I Stream II
Relay i
b = arg︸︷︷︸i
max{min{SNRsi, SNRid}} = max{SNRsid}, i ∈ [1..M ] (43)
b = arg︸︷︷︸i
max{min{SINRsi, SINRid}} = max{SINRsid}, i ∈ [1..M ] (44)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 32/50
...and a Remark...
Stream I Stream II
Relay i
b = arg︸︷︷︸i
max{min{SNRsi, SNRid}} = max{SNRsid}, i ∈ [1..M ] (45)
b = arg︸︷︷︸i
max{min{SINRsi, SINRid}} = max{SINRsid}, i ∈ [1..M ] (46)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 32/50
Outline
Assumptions and Background
Approach
Performance
Implementation Example
Relevant Technologies
Conclusion
Acknowledgements
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 33/50
Implementation: Hardware
Rethinking wireless:approach needs access to physical (layer 1), link (layer 2), routing (layer 3).
COTS radios usually give limited access to all layers ⇒
We built our own low cost embedded Software Defined Radios (SDRs).
We built a room size cooperative diversity demo.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 34/50
Implementation: Demo Setup
left view
right view
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 35/50
Implementation: Demo Setup
Receiver
Relay
Relay
Relay Relay
Relay
Relay
left view
right view
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 35/50
Implementation: Signal Structure
Direct transmission of 16 frames
Signal structure of each frame
Preamble 32 bits (on-off keying)
CTS Flag �packet 16/32 data frames
Direct and best relay transmission� (16 + 16 = 32 frames)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 36/50
Outline
Assumptions and Background
Approach
Performance
Implementation Example
Relevant Technologies
Conclusion
Acknowledgements
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 37/50
Coordination, Cooperation and Time Keeping
Relays (or receiver) might be busy or in sleep mode!
Time keeping could simplify required scheduling.
Time keeping as the basis of scalable communication.
Extensive work on Network Time Keeping:
centralized
decentralized
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 38/50
Coordination, Cooperation and Time Keeping
Relays (or receiver) might be busy or in sleep mode!
Time keeping could simplify required scheduling.
Time keeping as the basis of scalable communication.
Extensive work on Network Time Keeping:
centralized
decentralized
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 38/50
Centralized Time Keeping
... ... ... ...
... ... ... ...
CLIENT SERVER
No control over the network: noisyenvironment.
No control over the time server: wouldlike to use existing infrastructure.
Three End-to-End algorithms werecompared:
Averaging (NIST).
Linear Programming (proposedbefore).
Kalman Filtering (our proposal).
Estimation of φ and θ, with minimum communication BW and computation requirements.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 39/50
Centralized Time Keeping
... ... ... ...
... ... ... ...
CLIENT SERVER
No control over the network: noisyenvironment.
No control over the time server: wouldlike to use existing infrastructure.
Three End-to-End algorithms werecompared:
Averaging (NIST).
Linear Programming (proposedbefore).
Kalman Filtering (our proposal).
Estimation of φ and θ, with minimum communication BW and computation requirements.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 39/50
Centralized Time Keeping Results
0 20 40 60 80 100 120-600
-400
-200
0
200
400
600
800
number N of packets used in calculation
frequency offset estimate (ppm)
KalmanLinear ProgrammingAveraged Time Differences"Naive" Estimator
Improving accuracy (error) and precision (variance of error), compared to existingapproaches.
Computation efficient (since it is recursive) -
Implemented and tested using existed NTP infrastructure.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 40/50
Centralized Time Keeping Results
0 20 40 60 80 100 120-600
-400
-200
0
200
400
600
800
number N of packets used in calculation
frequency offset estimate (ppm)
KalmanLinear ProgrammingAveraged Time Differences"Naive" Estimator
Kalman
Average
Improving accuracy (error) and precision (variance of error), compared to existingapproaches.
Computation efficient (since it is recursive) -
Implemented and tested using existed NTP infrastructure.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 40/50
Decentralized Time Keeping
Network The network is the time server.
Only local communication.
Exchange timestamps and keep the highest(Lamport’s idea).
Redefine time as a periodic function!
The network re-calibrates periodically and au-tonomously.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 41/50
Decentralized Time Keeping Results
0 1 2 3 4 5 60
2
4
6
8
10
12
14
Network diameter (maximum number of hops)
Abs
olut
e er
ror a
nd s
tand
ard
devi
atio
n in
ms
Measured error in ms vs. diameter of the network
r1r2
Error could decrease with increasingNetwork diameter!
ε(tc) = Ci(tc)− Cj(tc) =
= ε(t0 + x) + (φi − φj) ∆t
∆t = tc − (t0 + x)
Error depends on communication BW.x =
propagationdelay+ transmissiondelay+
+ operating system delay.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 42/50
Decentralized Time Keeping Demo
Objective: play music in synchrony, display heartbeat at the edges...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 43/50
Decentralized Time Keeping Demo (2)
This algorithm is based on oscillator’s coupling (no averaging).
Coupling among terminals with semi-periodic signal ≡ Entrainment.
It is relevant to natural phenomena of synchronization (fireflies, cardiac neurons etc.)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 44/50
Outline
Assumptions and Background
Approach
Performance
Implementation Example
Relevant Technologies
Conclusion
Acknowledgements
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 45/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
ConclusionsBigger Picture:
No more bad reception...
Improved battery duration...
Improved spectral efficiency (bps/Hz).
Tx/Rx energy savings.
Towards more scalable wireless networks...Additionally:
No performance loss compared to simultaneous transmissions and space-timecoding.
Cross-layer research is needed.
Centralized/decentralized network time-keeping contributions.
Method was implemented in low-cost hardware.
Applications: WiFi, Zigbee, Tetra...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 46/50
PapersConferencesA. Bletsas, A. Lippman, D.P. Reed, "A Simple Distributed Method for Relay Selection in Cooperative Diversity Wireless Networks, based onReciprocity and Channel Measurements", accepted for publication, IEEE 61st Semiannual Vehicular Technology Conference May 30 - June 1 2005,Stockholm, Sweden.
A. Bletsas and A. Lippman, "Spontaneous Synchronization in Multi-hop Embedded Sensor Networks: Demonstration of a Server-free Approach",Second European Workshop on Wireless Sensor Networks, January 31 - February 2 2005, Istanbul, Turkey.
A. Bletsas and A. Lippman, "Efficient Collaborative (Viral) Communication in OFDM Based WLANs", IEEE/ITS International Symposium onAdvanced Radio Technologies (ISART 2003),Institute of Standards and Technology, Boulder Colorado, March 4-7, 2003.
A. Bletsas, "Evaluation of Kalman Filtering for Network Time Keeping", IEEE International Conference on Pervasive Computing and Communications(PerCom 2003), Dallas-Fort Worth Texas, March 23-26, 2003.
B. Hubert, A. Bletsas, J. Jacobson, "Nano-Scale Structures Fabricated By All-Additive AFM -Assisted Nanoassembly", Materials Research Society(MRS), San Francisco, April 16-20, 2001.
JournalsA. Bletsas, A. Khisti, D.P. Reed, A. Lippman, "A Simple Cooperative Diversity Method based on Network Path Selection", submitted for publication,IEEE Journal on Selected Areas of Communication, special Issue on 4G, January 2005, revised April 2005.
A. Bletsas, "Evaluation of Kalman Filtering for Network Time Keeping", accepted for publication, IEEE Transactions in Ultrasonics, Ferromagneticsand Frequency Control (TUFFC).
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 47/50
Acknowledgements
"Tolerating ambiguity is a sign of maturity..."
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 48/50
Acknowledgements
"Tolerating ambiguity is a sign of maturity..."
In memory of Stephen A. Benton (1941-2003)
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 48/50
Acknowledgements
Thesis Committee: Andy Lippman, Joe Paradiso and Moe Win.
Colleagues at MIT: Ashish Khisti, Josh Lifton, David Reed and Joe Jacobson.
My UROPs: Vimal Bhalodia, Amanda Lechman and Marios Michalakis.
Colleagues outside MIT: Thucydides (Duke) Xanthopoulos.
Office-mates: Dean Christakos, Ilia Mirkin and Dimitris Vyzovitis.
Group Mates: Jamie Cooley, Jeff Hallbig, Casey Muller, Hector Yuen and the rest of the Viral Comm Gang: Arthur Petron, Kwan Hong Leeand Fulu Li.
MIT people: Judith Donath, Neil Gershenfeld’s Physics and Media Group, Hyundong Shin and Walter Bender.
Necsys Crew: Paula Aguilera, Steve Berezansky, Jon Ferguson, Jeannie Finks, Will Glesnes, Tom Greene, Elizabeth Harvey-Forsythe, HenryHoltzman, Jane Wojcik, Chi Yuen.
ML colleagues: Betsy Chimento, Tamara Hearn, Kevin Davis, Cornelle King, Sandy Sener and Stacie Slotnick.
My sweet aunts here at Media Lab: Polly Guggenheim and Deborah Widener.
Crazy Roomates: Maziar Tavakoli-Dastjerdi, Saul Griffith, Yael Maguire, John Maloney and Noah Vawter.
To all my friends at Crete: Yiannis, Dia, Olga, Andonis, Costas, Mihalis.
Friends here in Boston (including Greek Mafia): Thodoros Konstantakopoulos, Anna Stefanidou, Ioannis Kitsopanidis, Nikol Papadopoulou,Duke Xanthopoulos, Margarita Dekoli, Vasilis Ntziachristos, Christina Benou, Eirini Iliaki, Ioannis Kizanis, Anna Kondyli, Yiannis Zacharakis,George Themelis, Dimitris Rovas, Christina Samaraki, Georgia Konstadinopoulou, Karrie Karrahalios, Paris Smaragdis, Costas Pelekanakis,Thais Aleluia, Petros Bufunos, Thodoros Akiskalos, Christi Electris, Constadinos Caramanis, George Constadinidis, Maria-KaterinaNikolinakou, Angelina Aessopou, Wei Chai...
Brother and his family here in Boston, sister and her family in Norway, Eleftheria and her family in Thessaloniki, and parents and grandaunt inCrete...
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 49/50
Thank you!
...to Eleftheria, Thodoris, Aimilia-Anastasia, Constadinos, Christina and to my family.
[email protected], Ph.D. Thesis Defense, MIT June 2005. – p. 50/50