Interference Mitigation with Selective Retransmissions in Wireless Sensor Networks

Interference Mitigation with Selective Retransmissions in Wireless Sensor Networks
Author: Selig, Marc
Publisher: kassel university press GmbH
Total Pages: 123
Release: 2016
Genre:
ISBN: 373760178X

Download Interference Mitigation with Selective Retransmissions in Wireless Sensor Networks Book in PDF, Epub and Kindle

A wireless sensor network with single-antenna sensors on the transmitter side and an access point (AP) equipped with multiple antennas on the receiver side is considered. In order to reduce the number of outages resulting from the noise amplification by the linear reconstruction within the successive interference cancellation (SIC) procedure, the AP is given the possibility to request retransmissions of signals from selected sensors in a subsequent time slot (TS). In case retransmissions are needed also in the subsequent time slot, the AP postpones the signal detection until all requested signals have been retransmitted making the signal detection a recursive procedure. The number of sensors required to retransmit depends on the order of the processed sensor signals within the SIC procedure. We propose an optimal algorithm based on a QR-decomposition and a depth-first search through all possible decoding orders, which finds the decoding order necessitating a minimum number of retransmissions suitable for zero-forcing (ZF) and minimum mean square error (MMSE) linear reconstruction approaches. Since the computational complexity of the optimal algorithm is high, different suboptimal algorithms with lower computational complexity are proposed for the case of ZFSIC and MMSE-SIC, respectively. The recursive nature of the retransmission procedure may lead to an unlimited detection delay, because the linear reconstruction followed by SIC starts only when no sensor needs a retransmission from the previous TS. By reducing the number of transmitting sensors for a fixed number of receiving antennas the receive diversity of the AP can be exploited, which leads to less retransmissions. Therefore, we propose an optimal transmit policy, which selects the best set of sensors to maximize the system throughput. This optimal transmit policy is found by means of a Markov decision process in combination with dynamic programming.

Interference Mitigation Strategy Design and Applications for Wireless Sensor Networks

Interference Mitigation Strategy Design and Applications for Wireless Sensor Networks
Author: Fang Yao
Publisher:
Total Pages:
Release: 2010
Genre:
ISBN:

Download Interference Mitigation Strategy Design and Applications for Wireless Sensor Networks Book in PDF, Epub and Kindle

The Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 standard presents a very useful technology for implementing low-cost, low-power, wireless sensor networks. Its main focus, which is to applications requiring simple wireless connectivity with relaxed throughout and latency requirements, makes it suitable for connecting devices that have not been networked, such as industrial and control instrumentation equipments, agricultural equipments, vehicular equipments, and home appliances. Its usage of the license-free 2.4 GHz frequency band makes the technique successful for fast and worldwide market deployments. However, concerns about interference have arisen due to the presence of other wireless technologies using the same spectrum. Although the IEEE 802.15.4 standard has provided some mechanisms, to enhance capability to coexist with other wireless devices operating on the same frequency band, including Carrier Sensor Multiple Access (CSMA), Clear Channel Assessment (CCA), channel alignment, and low duty cycle, it is essential to design and implement adjustable mechanisms for an IEEE 802.15.4 based system integrated into a practical application to deal with interference which changes randomly over time. Among the potential interfering systems (Wi-Fi, Bluetooth, cordless phones, microwave ovens, wireless headsets, etc) which work on the same Industrial, Scientific, and Medical (ISM) frequency band, Wi-Fi systems (IEEE 802.11 technique) have attracted most concerns because of their high transmission power and large deployment in both residential and office environments. This thesis aims to propose a methodology for IEEE 802.15.4 wireless systems to adopt proper adjustment in order to mitigate the effect of interference caused by IEEE 802.11 systems through energy detection, channel agility and data recovery. The contribution of this thesis consists of five parts. Firstly, a strategy is proposed to enable IEEE 802.15.4 systems to maintain normal communications using the means of consecutive transmissions, when the system s default mechanism of retransmission is insufficient to ensure successful rate due to the occurrence of Wi-Fi interference. Secondly, a novel strategy is proposed to use a feasible way for IEEE 802.15.4 systems to estimate the interference pattern, and accordingly adjust system parameters for the purpose of achieving optimized communication effectiveness during time of interference without relying on hardware changes and IEEE 802.15.4 protocol modifications. Thirdly, a data recovery mechanism is proposed for transport control to be applied for recovering lost data by associating with the proposed strategies to ensure the data integrity when IEEE 802.15.4 systems are suffering from interference. Fourthly, a practical case is studied to discuss how to design a sustainable system for home automation application constructed on the basis of IEEE 802.15.4 technique. Finally, a comprehensive design is proposed to enable the implementation of an interference mitigation strategy for IEEE 802.15.4 based ad hoc WSNs within a structure of building fire safety monitoring system. The proposed strategies and system designs are demonstrated mainly through theoretical analysis and experimental tests. The results obtained from the experimental tests have verified that the interference caused by an IEEE 802.11 system on an IEEE 802.15.4 system can be effectively mitigated through adjusting IEEE 802.15.4 system s parameters cooperating with interference pattern estimation. The proposed methods are suitable to be integrated into a system-level solution for an IEEE 802.15.4 system to deal with interference, which is also applicable to those wireless systems facing similar interference issues to enable the development of efficient mitigation strategies.

Interference Mitigation in Device-to-Device Communications

Interference Mitigation in Device-to-Device Communications
Author: Masood Ur Rehman
Publisher: John Wiley & Sons
Total Pages: 244
Release: 2022-03-17
Genre: Technology & Engineering
ISBN: 1119788811

Download Interference Mitigation in Device-to-Device Communications Book in PDF, Epub and Kindle

Explore this insightful foundational resource for academics and industry professionals dealing with the move toward intelligent devices and networks Interference Mitigation in Device-to-Device Communications delivers a thorough discussion of device-to-device (D2D) and machine-to-machine (M2M) communications as solutions to the proliferation of ever more data hungry devices being attached to wireless networks. The book explores the use of D2D and M2M technologies as a key enabling component of 5G networks. It brings together a multidisciplinary team of contributors in fields like wireless communications, signal processing, and antenna design. The distinguished editors have compiled a collection of resources that practically and accessibly address issues in the development, integration, and enhancement of D2D systems to create an interference-free network. This book explores the complications posed by the restriction of device form-factors and the co-location of several electronic components in a small space, as well as the proximity of legacy systems operating in similar frequency bands. Readers will also benefit from the inclusion of: A thorough introduction to device-to-device communication, including its history and development over the last decade, network architecture, standardization issues, and regulatory and licensing hurdles An exploration of interference mitigation in device-to-device communication underlaying LTE-A networks A rethinking of device-to-device interference mitigation, including discussions of the challenges posed by the proliferation of devices An analysis of user pairing for energy efficient device-to-device content dissemination Perfect for researchers, academics, and industry professionals working on 5G networks, Interference Mitigation in Device-to-Device Communications will also earn a place in the libraries of undergraduate, graduate, and PhD students conducting research into wireless communications and applications, as well as policy makers and communications industry regulators.

Minimizing Interference in Wireless Sensor Networks

Minimizing Interference in Wireless Sensor Networks
Author: Haisheng Tan
Publisher: Open Dissertation Press
Total Pages:
Release: 2017-01-26
Genre:
ISBN: 9781361250525

Download Minimizing Interference in Wireless Sensor Networks Book in PDF, Epub and Kindle

This dissertation, "Minimizing Interference in Wireless Sensor Networks" by Haisheng, Tan, 谈海生, was obtained from The University of Hong Kong (Pokfulam, Hong Kong) and is being sold pursuant to Creative Commons: Attribution 3.0 Hong Kong License. The content of this dissertation has not been altered in any way. We have altered the formatting in order to facilitate the ease of printing and reading of the dissertation. All rights not granted by the above license are retained by the author. DOI: 10.5353/th_b4641932 Subjects: Wireless sensor networks

Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications

Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications
Author: Yan Zhang
Publisher: CRC Press
Total Pages: 634
Release: 2006-10-25
Genre: Computers
ISBN: 1420013610

Download Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications Book in PDF, Epub and Kindle

Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks, and ex