Interference Mitigation With Selective Retransmissions In Wireless Sensor Networks

Download Interference Mitigation With Selective Retransmissions In Wireless Sensor Networks PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Interference Mitigation With Selective Retransmissions In Wireless Sensor Networks book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Interference Mitigation with Selective Retransmissions in Wireless Sensor Networks

Author: Selig, Marc
language: en
Publisher: kassel university press GmbH
Release Date: 2016
A wireless sensor network with single-antenna sensors on the transmitter side and an access point (AP) equipped with multiple antennas on the receiver side is considered. In order to reduce the number of outages resulting from the noise amplification by the linear reconstruction within the successive interference cancellation (SIC) procedure, the AP is given the possibility to request retransmissions of signals from selected sensors in a subsequent time slot (TS). In case retransmissions are needed also in the subsequent time slot, the AP postpones the signal detection until all requested signals have been retransmitted making the signal detection a recursive procedure. The number of sensors required to retransmit depends on the order of the processed sensor signals within the SIC procedure. We propose an optimal algorithm based on a QR-decomposition and a depth-first search through all possible decoding orders, which finds the decoding order necessitating a minimum number of retransmissions suitable for zero-forcing (ZF) and minimum mean square error (MMSE) linear reconstruction approaches. Since the computational complexity of the optimal algorithm is high, different suboptimal algorithms with lower computational complexity are proposed for the case of ZFSIC and MMSE-SIC, respectively. The recursive nature of the retransmission procedure may lead to an unlimited detection delay, because the linear reconstruction followed by SIC starts only when no sensor needs a retransmission from the previous TS. By reducing the number of transmitting sensors for a fixed number of receiving antennas the receive diversity of the AP can be exploited, which leads to less retransmissions. Therefore, we propose an optimal transmit policy, which selects the best set of sensors to maximize the system throughput. This optimal transmit policy is found by means of a Markov decision process in combination with dynamic programming.
Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications

Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in the single-hop or multi-hop wireless networks, and explores trusted communication in mobile computing scenarios. Focusing on the background, technique survey, protocol design, and analytical methods, the book discusses standards in 802.11x/3G/4G, HotSpot Wireless, Bluetooth sensor networks, and access control in wireless Ad Hoc networks. Other topics include call admission control (CAC), routing, multicast, medium access control (MAC), scheduling, bandwidth adaptation, handoff management, location management, network mobility, secure routing, key management, authentication, security, privacy, and performance simulation and analysis. This book is a comprehensive source of information on basic concepts, major issues, design approaches, future research directions, and the interaction between these components. With its broad coverage allowing for easy cross reference, the book also provides detailed techniques for eliminating bandwidth insufficiency, increasing location management performance, and decreasing the associated authentication traffic. Features: Offers competitive, self-contained information on resource, mobility, and security management in wireless networks Explains the interaction and coupling among the most important components in wireless networks Examines background, applications, and standard protocols Addresses challenges and solutions in key management of wireless sensor networks Covers how to provide effective and efficient authentication and key agreements for cellular access security
Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks

Author: Azzedine Boukerche
language: en
Publisher: John Wiley & Sons
Release Date: 2008-11-03
Learn the fundamental algorithms and protocols for wireless and mobile ad hoc networks Advances in wireless networking and mobile communication technologies, coupled with the proliferation of portable computers, have led to development efforts for wireless and mobile ad hoc networks. This book focuses on several aspects of wireless ad hoc networks, particularly algorithmic methods and distributed computing with mobility and computation capabilities. It covers everything readers need to build a foundation for the design of future mobile ad hoc networks: Establishing an efficient communication infrastructure Robustness control for network-wide broadcast The taxonomy of routing algorithms Adaptive backbone multicast routing The effect of inference on routing Routing protocols in intermittently connected mobile ad hoc networks and delay tolerant networks Transport layer protocols ACK-thinning techniques for TCP in MANETs Power control protocols Power saving in solar powered WLAN mesh networks Reputation and trust-based systems Vehicular ad hoc networks Cluster interconnection in 802.15.4 beacon enabled networks The book is complemented with a set of exercises that challenge readers to test their understanding of the material. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks is appropriate as a self-study guide for electrical engineers, computer engineers, network engineers, and computer science specialists. It also serves as a valuable supplemental textbook in computer science, electrical engineering, and network engineering courses at the advanced undergraduate and graduate levels.