US20110116421A1 - Rapid on-off-division duplex network communications - Google Patents

Rapid on-off-division duplex network communications Download PDF

Info

Publication number
US20110116421A1
US20110116421A1 US12/924,391 US92439110A US2011116421A1 US 20110116421 A1 US20110116421 A1 US 20110116421A1 US 92439110 A US92439110 A US 92439110A US 2011116421 A1 US2011116421 A1 US 2011116421A1
Authority
US
United States
Prior art keywords
devices
slots
pattern
user
unique pattern
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/924,391
Inventor
Dongning Guo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern University
Original Assignee
Northwestern University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern University filed Critical Northwestern University
Priority to US12/924,391 priority Critical patent/US20110116421A1/en
Assigned to NORTHWESTERN UNIVERSITY reassignment NORTHWESTERN UNIVERSITY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GUO, DONGNING
Publication of US20110116421A1 publication Critical patent/US20110116421A1/en
Priority to US14/509,667 priority patent/US9832769B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/50Allocation or scheduling criteria for wireless resources
    • H04W72/535Allocation or scheduling criteria for wireless resources based on resource usage policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0446Resources in time domain, e.g. slots or frames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/04Wireless resource allocation
    • H04W72/044Wireless resource allocation based on the type of the allocated resource
    • H04W72/0466Wireless resource allocation based on the type of the allocated resource the resource being a scrambling code

Definitions

  • the present application relates to communication techniques, and more particularly, but not exclusively, relates to wireless network communications techniques involving rapid on-off-division duplex techniques. These techniques find application in Mobile ad hoc Networks (MANETs), nonmobile networks, and other communication systems.
  • MANETs Mobile ad hoc Networks
  • nonmobile networks and other communication systems.
  • the half-duplex constraint mandates that a given wireless device cannot transmit and receive simultaneously over the same frequency band.
  • this constraint is typically intrinsic to implementation of one or more of the lower layers, such as the physical layer and/or the data link layer—typically involving the Media Access Control (MAC) sublayer of the data link layer.
  • OSI Open System Interconnection
  • MAC Media Access Control
  • One embodiment of the present application is directed to a unique communication technique.
  • Other embodiments include unique methods, systems, devices, and apparatus involving wireless network communications.
  • Further embodiments, forms, features, aspects, benefits, and advantages of the present application shall become apparent from the description and figures provided herewith.
  • FIG. 1 is diagrammatic view of a system including a population of wireless communication devices operable to define an ad hoc communication network;
  • FIG. 2 is a schematic view of one of the devices of the system of FIG. 1 ;
  • FIG. 3 is a plot of RODD signaling with respect to time
  • FIG. 4 is a graphical comparison of the throughput of RODD and ALOHA over an OR-channel
  • FIG. 5 is a graphical comparison of the throughput of RODD and ALOHA over a Gaussian Channel.
  • MAC medium access control
  • RODD Rapid On-Off-Division Duplex
  • frame generally refers to a transmission unit or data packet, typically having a number of symbols of information intended to be conveyed as well as other “overhead” data so the intended receiver can recognize it as such.
  • each frame is partitioned into a number of slots and each nodal transmission is through a unique on-off mask, or signature, relative to those slots.
  • the signature controls over which slots the user transmits a signal, where a slot could span one or several symbols.
  • Each user while transmitting over its transmission or “on” slots, receives signals over its own reception or “off” slots.
  • every user simultaneously broadcasts a message to all users in its neighborhood (and receives a message from every neighbor in the meantime).
  • transmission and reception switching occurs over slots, so that delay is minimized and overhead is significantly reduced; and “collision” is not avoided but embraced by taking advantage of the superposition nature of the multiaccess channel, so that throughput is maximized.
  • RODD also typically has advantages in the special case where each user has only a small amount of data to send, e.g., a few or tens of bits.
  • the error-control coding overhead in RODD can be much less than that of usual networks designed based on the collision model.
  • FIG. 1 illustrates system 20 of another embodiment of the present application involving a multiple time slot communication technique during a given network frame.
  • System 20 includes a number of wireless communication devices 22 distributed over an area of interest A.
  • Devices 22 are structured to participate as a communication node 23 of a communication network 25 to be defined by system 20 as further described hereinafter.
  • Devices 22 are spaced apart from each other and may be remote from one another.
  • devices 22 represent only a subset of the total number of nodes 23 in communication with each other through an ad hoc network arrangement.
  • Ad hoc networks generally refer to networks in which terminals or nodes are self-organized due to lack of existing infrastructure. Moreover, data communication between two nodes in the network often has to traverse multiple hops.
  • Wireless ad hoc networks can play a significant role in emergency situations (such as locating victims of accidents or disasters), tracking objects/people, various other enterprise solutions, and battlefield/military applications; and further are also emerging as a desirable extension of future wide area networks.
  • Devices 22 may communicate via any wireless signal type, such as Radio Frequency (RF), InfraRed (IR), acoustic signal waveform (sonic and/or ultrasonic), visible light, and/or other varieties known to those skilled in the art.
  • RF Radio Frequency
  • IR InfraRed
  • acoustic signal waveform sonic and/or ultrasonic
  • visible light and/or other varieties known to those skilled in the art.
  • some or all of devices 22 may be equipped with “wired” or cable-based communication links/interfaces.
  • Devices 22 may be of any form or implementation, including without limitation, building and other environmental monitoring, disaster relief, emergency location of victims of an accident, military battlefield communications and logistics monitoring, cellular telephone communications, Personal Digital Assistant (PDA) networking, RFID tag applications, wireless computer networks, inventory tracking equipment, and/or other equipment or applications as would occur to those skilled in the art.
  • PDA Personal Digital Assistant
  • Device 22 includes a transmitter (TXR) 34 and a receiver (RXR) 36 integrated to define a transceiver 32 . In other embodiments, transmitter 34 and receiver 36 may be separate from one another.
  • Device 22 further includes a processing device 48 in operative communication with transceiver 32 .
  • Processing device 48 includes memory 50 .
  • Memory 50 stores a unique binary identifier (ID) 52 (alternatively designated a signature) that may be used to distinguish devices 22 from one another (as further described hereinafter).
  • processing device 48 executes operating logic 54 to perform various routines with device 22 , including those further described as follows.
  • ID unique binary identifier
  • processing device 48 executes operating logic 54 to perform various routines with device 22 , including those further described as follows.
  • Transceiver 32 sends communication signals to and receives communication signals from antenna 42 , and communicates with processing device 48 to provide desired encoding of information/data in the signals, as might be desired for various applications of system 20 .
  • Processing device 48 includes appropriate signal conditioners to transmit and receive desired information (data), and correspondingly may include filters, amplifiers, limiters, modulators, demodulators, CODECs, signal format converters (such as analog-to-digital and digital-to-analog converters), clamps, power supplies, power converters, and the like as needed to perform various control, communication, and regulation operations described herein.
  • Processing device 48 can be comprised of one or more components of any type suitable to process the signals received from transceiver 32 or elsewhere, and provide desired output signals.
  • Processing device 48 can be of a programmable type; a dedicated, hardwired state machine; or a combination of these; and can further include multiple processors, Arithmetic-Logic Units (ALUs), Central Processing Units (CPUs), or the like. For forms of processing device 48 with multiple processing units, distributed, pipelined, and/or parallel processing can be utilized as appropriate. Processing device 48 may be dedicated to performance of just the operations described herein or may be utilized in one or more additional applications. In the depicted form, processing device 48 is of a programmable variety that executes algorithms and processes data in accordance with operating logic 54 as defined by programming instructions (such as software or firmware) stored in memory 50 . Alternatively or additionally, operating logic 54 for processing device 48 is at least partially defined by hardwired logic or other hardware.
  • Memory 50 may be of one or more types, such as a solid-state variety, electromagnetic variety, optical variety, or a combination of these forms. Furthermore, memory 50 can be volatile, nonvolatile, or a mixture of these types, and some or all of memory 50 can be of a portable variety, such as a disk, tape, memory stick, cartridge, or the like. In addition to identifier 52 , memory 50 can store data that is manipulated by the operating logic 54 of processing device 48 , such as data representative of signals received from and/or sent to transceiver 32 in addition to or in lieu of storing programming instructions defining operating logic 54 , just to name one example.
  • two particular nodes 23 are further designated as receiving device 24 a and transmitting device 24 b as a “snapshot” in time of network 25 , where the arrows direct away from a node 23 indicate transmission and towards a node 23 indicate reception.
  • Nodes 23 labeled with T/R are in a transmit mode and nodes 23 labeled with a R/T are in a receive mode for this particular snapshot.
  • the circles designated by 26 a and 26 b represent the wireless communication range of devices 24 a and 24 b , respectively.
  • wireless communication range refers to the nominal range over which wireless communications can occur directly between two wireless communication devices without being relayed or repeated through a third device spaced apart from either of the others.
  • each circular region 26 a and 26 b defines a different network neighborhood each enclosing five nodes 23 .
  • the overlapping region designated by 26 c encloses three nodes 23 , including nodes 24 a and 24 b . Accordingly, nodes 23 in each of regions 26 a and 26 b , but outside of region 26 c can communicate with each other through devices 24 a and 24 b , even if their respective communication ranges do not overlap.
  • each device 22 cooperates to define an ad hoc network 25 with nodes 23 .
  • a given node 23 may have a direct radio link with only a small number of nearby nodes 23 , which are referred to as its “neighbors”—these neighbors being those nodes 23 (devices 22 ) within the communication range of the given node 23 .
  • neighboring nodes 23 it is desired that each node 23 discover and identify the network interface address of its neighboring nodes 23 before efficient routing or other higher-layer activities can take place as applicable.
  • routines by which nodes 23 define network 25 include those described in U.S. Provisional Patent Applications No. 61/277,573, filed on Sep. 25, 2009 and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein).
  • Operating logic 54 is further configured to permit all nodes 23 to transmit simultaneously and synchronously over every frame interval in a RODD model as further described hereinafter; where each nodal transmission is through a unique on-off mask (or signature), which is known to other nodes within its communication range.
  • the signature of a user typically consists of many more off-slots (receiving) than on-slots (transmitting). The amount of information that a user can transmit during a frame may be proportional to the on-slots (or channel users) depending on the metrics of a given implementation.
  • Each node 23 while transmitting over its on-slots, receives signal over its own off slots.
  • Error control code is applied in each frame of transmission, so that user data can be recovered despite of erasures due to one's own transmission in the on-slots.
  • every node 23 or “user” simultaneously broadcasts a message to all users in its network neighborhood (and receives a message from every network neighbor in the meantime).
  • the proposed wireless RODD departs from not only the collision model, but also the time-sharing scheme for dealing with the half-duplex constraint.
  • a deterministic function may be used to generate user (node 23 ) signatures from their network interface addresses, e.g., let the signature of a user be a (biased) pseudorandom sequence produced with the seed set to the other users within the radio range.
  • the signature can be a random Bernoulli sequence, which can be generated as a random function of the user's network interface address (NIA).
  • NIA network interface address
  • the function and the pseudorandom number generator could be distributed as a component of hardware/software. There is no need to distribute the entire set of signatures, because they can be enumerated by each user during network setup/neighbor discovery.
  • the signature may be based on a second order Reed Muller code.
  • the signatures of all nodal network neighbors are identified using the neighbor discovery techniques described in U.S. Provisional Patent Applications No. 61/277,573, filed on Sep. 25, 2009 and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein).
  • Each user is assigned a unique on-off signature—corresponding to a unique pattern of one or more transmission time slots (on slots) and one or more reception time slots (off slots).
  • Each user determines, out of all users in the network, which ones are neighbors, based on the superposition of the on-off signatures it observes.
  • one frame can be designated to neighbor discovery by requiring all users transmit their signatures, so that each user can run the RODD neighbor discovery process; where data transmission and neighbor discovery use the same type of signaling.
  • a demonstrative channel code for RODD is applicable to the case where the message from each user consists of a small number of bits, i.e., the number of possible messages is not large (e.g., up to several thousand possible messages).
  • a user is then assigned a set of distinct on-off signatures, where each signature corresponds to one possible message. The user shall transmit the signature corresponding to its message. All signatures are known to all users. Compressed sensing techniques are applied by each user to identify, out of all possible messages (signatures) from all users, which messages were transmitted.
  • the channel for RODD is a multiaccess channel with erasure.
  • Typical codes for multiaccess channels are generally suitable for RODD.
  • Existing codes can achieve up to 70% of the capacity with manageable complexity.
  • the slot be much larger than the propagation delay over the diameter of a neighborhood.
  • some absolute timing is supplied to each user, e.g., using GPS or some other infrastructure.
  • a user can infer about the relative delay of other users, and then shift its timing such that its delay is the mean value of the delays of all users in its neighborhood, including itself.
  • the signatures are designed to include cues so that timing can be recovered easily, even in the presence of other users with arbitrary time shifts.
  • the largest gain of RODD is realized when several users each has data to broadcast to all other users.
  • existing schemes allow only one user to succeed at a time, because if two users broadcast simultaneously, they fail to receive data from each other.
  • the usual approach to the half-duplex constraint is to define a time-division protocol which determines a priori, a schedule for separating transmission slots and listening slots.
  • the reason for the inferior performance of such schemes is largely due to the collision model assumption.
  • Such improvement can always be matched by RODD by proper design of the signatures and proper design of the encoders and decoders.
  • random access schemes such as ALOHA
  • scheduling of transmissions under the half-duplex constraint need not be at the timescale of the frame level.
  • a user's transmission follows an on-off signaling mask over a sequence of sub-frame slots on approximately the same time-scale of a symbol interval, then the user can receive a useful signal during each off slot.
  • FIG. 1 illustrates a snapshot of RODD taken at a slot, during which transceivers labeled with bigger “T” transmit, whereas transceivers labeled with bigger “R” do not and hence can receive.
  • the delay is typically smaller and more stable than in conventional reservation or scheduling schemes.
  • the proposed scheme can have significant advantage in the special case where each user has only a small amount of data to send, e.g., a few or tens of bits, under tight delay constraint.
  • the error-control coding overhead in RODD can be much less than that of usual networks designed based on the collision model.
  • the total delay induced by the RODD technique is exactly one frame length, which is a constant, as opposed to a variable length depending on collision situation if some random access scheme is used.
  • on-off signaling over a slot which spans one or several symbols is easy to achieve because the response time of an RF circuit (in nanoseconds) is orders of magnitude smaller than the symbol interval (in microseconds).
  • on-off signaling over sub-millisecond slots is a defining feature of TDMA in 2G cellular systems such as GSM. It is more challenging to maintain symbol-level synchronization so that the slots of all users in a neighborhood of the ad hoc network are aligned. It should be appreciated that local symbol-level synchronization can be achieved using consensus algorithms, which is typically amenable to small neighborhoods, because the propagation delay over the diameter of the neighborhood is still much smaller than the symbol interval.
  • RODD radio access technology
  • RODD frequency division duplex decoding
  • a simple distributed protocol leads to an efficient network-wide TDMA schedule.
  • Another application is distributed interference management by exchanging interference prices.
  • the physical link between every pair of users is an additive white Gaussian noise channel with the same (instantaneous) channel gain equal to y.
  • the received signal of user k during slot i is then described by:
  • h kj denotes the channel coefficient
  • X ji denotes the transmitted symbol of user j at time slot i
  • W ki denote additive noise.
  • a user Before data communication can take place, a user needs to acquire the identities or network interface addresses of its neighbors. This is frequently referred to as neighbor discovery.
  • neighbor discovery is carried out over a given period of time, where users each transmit a distinct signal to announce its own identity.
  • the signal each user k transmits over the entire discovery period to identify itself is then the signature s k .
  • the goal here is to identify which B j 's are 1. It should be appreciated that to identify a small number of neighbors out of a large collection of users based on the signal received over a linear channel is fundamentally a compressed sensing problem, for which a small number of measurements (channel users) suffice.
  • FIG. 2 An illustration of the signaling is depicted in FIG. 2 .
  • the dotted lines represent non-transmissions.
  • the received signal of user 1 is Y 1 , which is the outcome of the OR operation of Z 1 ,Z 2 ,Z 3 . Note that the received signal Y 1 of user 1 is valid only during non-transmission slots of user 1 .
  • the model captures the multiaccess nature of the channel, while ignoring the effect of noise, although noise can also be easily included.
  • the symmetric capacity is achieved by random codebook with i.i.d. Bernoulli (p) entries. To see this result, consider the slots over which m users transmit while the remaining K ⁇ m of them listen. The achievable rate is given by the mutual information between the binary received signal Y and the transmitted symbols Z in a given slot:
  • FIG. 3 illustrates the RODD signals of four nodes over 30 slots in a frame, where symbol-level synchronous transmission is assumed for simplicity.
  • Z 1 , . . . , Z 4 represent the transmitted signals of node 1 through node 4 , respectively, where the dotted lines represent off-slots and rectangles represent on-slots.
  • the received signal of node 1 through its own off-slots is Y 1 , which is the superposition of Z 1 , Z 2 , and Z 3 with erasures (blanks in FIG. 3 ) at the on-slots of node 1 . If no node transmits at a slot then node 1 receives zero signal represented by a solid line.
  • every node can “simultaneously” broadcast a message to its neighbors and receive a message from every neighbor at the same time.
  • FIG. 4 comparatively plots RODD and ALOHA over a Gaussian channel for different user populations.
  • the symmetric capacity of RODD given by (5) is greater than that of ALOHA for all number of users and every value of q.
  • the amount of data different users transmit/broadcast can be very different.
  • a corresponding protocol for RODD is designed where the data rate, transmit power and modulation format of each user is adapted to the amount of data to be transmitted. Because the amount of information each user receives is typically several times the amount of information it transmits, the signature of a user usually consists of many more off-slots than on-slots, i.e., it is somewhat sparse. The amount of information that a user can transmit during a frame may be proportional to the on-slots (or channel users).
  • a typically effective way to assign on-off signatures is to produce a set of random i.i.d. Bernoulli sequences.
  • a deterministic function h( ⁇ ) of user network interface address is used as the signature, e.g., let the signature be a (biased) pseudorandom sequence produced with the seed set to the NIA—in which case there is then no need to distribute the set of signatures, except for the pseudorandom number generator.
  • each user can produce a list of all K possible signatures in the network: h( 0 ), h( 1 ), h( 2 ), . . . .
  • the neighbor discovery schemes previously described in connection with U.S. Provisional Patent Applications No. 61/277,573, filed Sep. 25, 2009, and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein) can be used.
  • one frame can be designated to neighbor discovery by requiring all users to transmit their signatures, so that each user can run the compressed neighbor discovery algorithm.
  • Data transmission and neighbor discovery share the same linear channel model. In fact, if the signaling for the data frame is such that a user always transmits energy over an on-slot, then neighbor discovery can be carried out solely based on a frame of data transmission.
  • the scaling and efficiency of compressed sensing techniques generally suggest that group testing is feasible for up to about one million users (20-bit NIA), but becomes too slow for larger systems.
  • the n-bit signature can be divided to two N/2-bit signatures for separate identification, because for long signatures, the problem is still RODD neighbor discovery when half of the observations are made.
  • group testing for each half of the observations identifies half of the NIA, which are bin numbers, based on which the full NIA and the signature can be recovered.
  • deterministic signatures based on second-order Reed-Muller codes are used as the number of nodes grows larger.
  • One advantage of such signatures is that the corresponding chirp decoding algorithm has sub-linear complexity, which allows practical, efficient discovery even if the NIA space is 10 30 or larger.
  • a channel code is considered that does not achieve the capacity but is simple and useful when the message is short.
  • the short message can be information about the local state of the user, such as the channel quality, the queue length, the code and modulation format, a request for some common resource, etc.
  • a coding scheme can be prepared for which decoding is essentially via compressed sensing. Consider the simplest case, where each user has one bit to broadcast to all other users.
  • each user k be assigned two on-off signatures, s k,0 and s k,1 , where user k transmits s k,1 to send message “1” whereas user k transmits s k,0 to send message “0.” All users transmit their signatures simultaneously, and listen to the channel through their respective off-slots. This approach is similar to the neighbor discovery problem, except that each user tries to identify which signature from each neighbor was transmitted so as to recover 1 bit of information from the user.
  • the preceding coding scheme can be easily extended to the case where the message m k from user k is chosen from a small set of messages ⁇ 1 , . . . , M ⁇ .
  • user k is assigned M distinct on-off signatures, and transmits the signature corresponding to its message. All signatures are known to all users.
  • the channel for RODD is a multiaccess channel with erasures. All codes suitable for multiaccess channels are generally suitable for RODD. Coding schemes for the OR multiaccess channel have been identified, such as certain nonlinear trellis codes that achieves about 60% of the sum-capacity. Gaussian codebooks achieve the capacity. In practice, however, QAM or PSK signaling is often used depending on the SNR. It should be appreciated that trellis-coded multiple access can be particularly suitable for higher constellations.
  • the user's observation of other user's signals is only partial.
  • the user can infer about the delay of other users, and then shift its timing such that its delay is the mean value of the delays of all users in its neighborhood, including itself.
  • the synchronization problem is fundamentally a filtering problem of a hidden Markov process, which suggest that over time the delays converge to synchronized transmission in each local area.
  • the accuracy is still limited by two factors: the channel impairments and the propagation delay. Also, over the entire network there is still the possibility of fluctuation of the relative delay, but the delay of all users is typically a smooth function geographically.
  • synchronization is not a necessary condition for various RODD embodiments of the present application to function.
  • each user observes essentially the same amount (in time) of signals through its own off-slots.
  • a receiver knows the relative delay of every user in the neighborhood, then decoding asynchronous signals is in principle a multiuser detection/decoding problem.
  • the RODD protocol can be designed in certain embodiments such that the signatures include cues so that timing can be recovered easily, even in presence of other users with arbitrary time shifts.
  • the embodiments of the present application lead to transformative design of the physical and MAC layers of such networks, with significantly improved performance in many instances, while being robust with respect to wide variations in interference and channel conditions.
  • deterministic signatures based on second-order Reed-Muller (RM) codes are used to overcome the scalability problem.
  • RM Reed-Muller
  • One advantage of such signatures is that the corresponding chirp decoding algorithm has sub-linear complexity, which allows practical, efficient discovery even if the NIA space is 10 30 or larger.
  • the Kerdock set ⁇ (m) consisting of 2 m binary symmetric m ⁇ m matrices.
  • the matrices may be considered binary Hankel matrices where the top row consists of arbitrary entries and each of the remaining reverse diagonals is computed from a fixed linear combination of the entries in the top row.
  • matrix P ⁇ (l) can be padded to an m ⁇ m symmetric matrix represented by (P), where the lower left l ⁇ l submatrix is P and other entries are all zeros if any.
  • P m ⁇ m symmetric matrix
  • Each node can then map its NIA into a signature as follows.
  • the NIA consists of n+m bits, which is divided into two binary vectors: b ⁇ and c ⁇ with n ⁇ m(m+1)/2.
  • the corresponding signature is of 2 m symbols, whose entry indexed by each a ⁇ is given by
  • the chirp reconstruction algorithm can be applied for a query node to recover its neighborhood based on the observations.
  • the general idea of the iterative algorithm is as follows: 1) initialize the residual signal to Y, 2) take the Hadamard transform of the auto-correlation function of Y to expose the coefficient of the digital chirps, 3) extract the Kerdock matrix P(c j ) corresponding to the largest energy component in the residual signal and determine the corresponding X j , and 4) update the residual signal and repeat steps 2 to 4 until the residual falls below a threshold.
  • the query node has thus acquired the signatures of all peers with high probability.
  • the signatures can also be used to recover the NIAs if needed.
  • RM signatures consist of QPSK symbols, which do not allow a node to transmit and measure the channel at the same time, thus prohibiting full-duplex discovery.
  • RM signatures are converted to on-off signals by introducing 50% erasures, so that each node emits energy over half of its slots, and make measurements over the remaining half. This allows neighbors to observe about 25% of each others' on-slots (this is the maximum).
  • Numerical results indicate that reliable half-duplex discovery is achievable for a network of 2 20 nodes, where the neighborhood size is on average 50, at SNRs well below 10 dB, using signatures of merely 1,024 symbols.
  • the performance degrades with up to 25% erasures, which can be compensated for by proportionally longer signatures.
  • RODD enables (virtual) full-duplex transmission using half-duplex radios, which generally simplifies the design of higher-layer protocols.
  • the throughput of RODD-based schemes substantially exceeds that of random access schemes.
  • RODD signaling takes advantage of the superposition and broadcast nature of the wireless medium and is particularly suitable for advanced transmission techniques, such as cooperative relaying and network coding.
  • RODD-based technology is generally most efficient when the traffic is broadcast from every node to all its neighbors, such as in mobile systems used in spontaneous social networks, emergency situations, or on battlefield.
  • Communication overhead is generally an afterthought in network design; however RODD enables efficient exchange of a small amount of state information amongst neighbors based on sparse recovery (i.e., compressed sensing). Because nodes may simultaneously transmit, the channel-access delay is typically smaller and more stable than in conventional reservation or scheduling schemes.

Abstract

A wireless network device is structured to transmit and receive information over a unique pattern of one or more transmission slots and one or more reception slots within each of a sequence of communication frames.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • The present application claims the benefit of U.S. Provisional Patent Applications No. 61/277,573, filed Sep. 25, 2009, No. 61/395,222, filed May 10, 2010, and No. 61/372,449, filed Aug. 10, 2010, and the same are each incorporated herein by reference in their entirety.
  • GOVERNMENT RIGHTS
  • This invention was made with government support under Grant No. W911NF-07-1-0028 awarded by the Army Research Office (managed under DARPA: IT-MANET Program) to the University of Texas, Austin, Northwestern University Subcontract Number UTA06-790/A2). The government has certain rights in the invention.
  • BACKGROUND
  • The present application relates to communication techniques, and more particularly, but not exclusively, relates to wireless network communications techniques involving rapid on-off-division duplex techniques. These techniques find application in Mobile ad hoc Networks (MANETs), nonmobile networks, and other communication systems.
  • In a typical wireless network, the half-duplex constraint mandates that a given wireless device cannot transmit and receive simultaneously over the same frequency band. In the Open System Interconnection (OSI) model, this constraint is typically intrinsic to implementation of one or more of the lower layers, such as the physical layer and/or the data link layer—typically involving the Media Access Control (MAC) sublayer of the data link layer.
  • There have been numerous works on the design of MAC protocols for wireless ad hoc networks. Typically, the collision model is assumed, where if multiple users simultaneously transmit to the same user, their transmissions are lost due to collision at the receiver. Thus, state-of-the-art designs either apply ALOHA-type of random access scheme or schedule users orthogonally ahead of transmissions, or use a mixture of random access and scheduling/reservation. However, random access leads to poor efficiency (e.g., ALOHA's efficiency is generally no more than about 30%), while scheduling users is often difficult and subject to the hidden terminal and exposed terminal problems. Moreover, the fundamental constraint of half-duplex is that a terminal can only listen to the channel during its non-transmission (or silence) time slots. For example, if several users each have data to broadcast to other users, existing schemes allow only one user to succeed at a time, because if two users broadcast simultaneously, they fail to receive data from each other. The usual approach to the half-duplex constraint is to define a time-division protocol which determines a priori, a schedule for separating transmission slots and listening slots. There have been studies of achieving full duplex communication using two radios or two radio frequencies, but such convenience comes at the expense of reduced spectral efficiency. Thus, there remains a demand for further contributions in this area of technology.
  • SUMMARY
  • One embodiment of the present application is directed to a unique communication technique. Other embodiments include unique methods, systems, devices, and apparatus involving wireless network communications. Further embodiments, forms, features, aspects, benefits, and advantages of the present application shall become apparent from the description and figures provided herewith.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The description herein makes reference to the accompanying drawings wherein like reference numerals refer to like parts throughout the several views, and wherein:
  • FIG. 1 is diagrammatic view of a system including a population of wireless communication devices operable to define an ad hoc communication network;
  • FIG. 2 is a schematic view of one of the devices of the system of FIG. 1;
  • FIG. 3 is a plot of RODD signaling with respect to time;
  • FIG. 4 is a graphical comparison of the throughput of RODD and ALOHA over an OR-channel; and
  • FIG. 5. is a graphical comparison of the throughput of RODD and ALOHA over a Gaussian Channel.
  • DETAILED DESCRIPTION OF REPRESENTATIVE EMBODIMENTS
  • For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles of the invention as described herein are contemplated as would normally occur to one skilled in the art to which the invention relates.
  • In one embodiment of the present application, a new paradigm for designing the physical and medium access control (MAC) layers of wireless ad hoc networks is described. The design explicitly addresses the half-duplex constraint through a novel approach referred to as Rapid On-Off-Division Duplex (“RODD”) that allows all nodes of the wireless network to transmit over every frame. Here, “frame” generally refers to a transmission unit or data packet, typically having a number of symbols of information intended to be conveyed as well as other “overhead” data so the intended receiver can recognize it as such. In this embodiment, each frame is partitioned into a number of slots and each nodal transmission is through a unique on-off mask, or signature, relative to those slots. The signature controls over which slots the user transmits a signal, where a slot could span one or several symbols. Each user, while transmitting over its transmission or “on” slots, receives signals over its own reception or “off” slots. Thus over the period of a single RODD frame, every user simultaneously broadcasts a message to all users in its neighborhood (and receives a message from every neighbor in the meantime). Contrary to standard schemes, transmission and reception switching occurs over slots, so that delay is minimized and overhead is significantly reduced; and “collision” is not avoided but embraced by taking advantage of the superposition nature of the multiaccess channel, so that throughput is maximized.
  • Preliminary results indicate that the throughput of this and other embodiments of the present application are greater than that of ALOHA-type random access, and more than twice as large in many cases. RODD also typically has advantages in the special case where each user has only a small amount of data to send, e.g., a few or tens of bits. In this case, the error-control coding overhead in RODD can be much less than that of usual networks designed based on the collision model.
  • FIG. 1 illustrates system 20 of another embodiment of the present application involving a multiple time slot communication technique during a given network frame. System 20 includes a number of wireless communication devices 22 distributed over an area of interest A. Devices 22 are structured to participate as a communication node 23 of a communication network 25 to be defined by system 20 as further described hereinafter. Devices 22 are spaced apart from each other and may be remote from one another. Typically, devices 22 represent only a subset of the total number of nodes 23 in communication with each other through an ad hoc network arrangement. Ad hoc networks generally refer to networks in which terminals or nodes are self-organized due to lack of existing infrastructure. Moreover, data communication between two nodes in the network often has to traverse multiple hops. Wireless ad hoc networks can play a significant role in emergency situations (such as locating victims of accidents or disasters), tracking objects/people, various other enterprise solutions, and battlefield/military applications; and further are also emerging as a desirable extension of future wide area networks. Devices 22 may communicate via any wireless signal type, such as Radio Frequency (RF), InfraRed (IR), acoustic signal waveform (sonic and/or ultrasonic), visible light, and/or other varieties known to those skilled in the art. In addition to wireless communication links/interfaces, some or all of devices 22 may be equipped with “wired” or cable-based communication links/interfaces. Devices 22 may be of any form or implementation, including without limitation, building and other environmental monitoring, disaster relief, emergency location of victims of an accident, military battlefield communications and logistics monitoring, cellular telephone communications, Personal Digital Assistant (PDA) networking, RFID tag applications, wireless computer networks, inventory tracking equipment, and/or other equipment or applications as would occur to those skilled in the art.
  • Referring additionally to FIG. 2, further details of a representative device 22 are depicted. Device 22 includes a transmitter (TXR) 34 and a receiver (RXR) 36 integrated to define a transceiver 32. In other embodiments, transmitter 34 and receiver 36 may be separate from one another. Device 22 further includes a processing device 48 in operative communication with transceiver 32. Processing device 48 includes memory 50. Memory 50 stores a unique binary identifier (ID) 52 (alternatively designated a signature) that may be used to distinguish devices 22 from one another (as further described hereinafter). Furthermore, processing device 48 executes operating logic 54 to perform various routines with device 22, including those further described as follows.
  • Transceiver 32 sends communication signals to and receives communication signals from antenna 42, and communicates with processing device 48 to provide desired encoding of information/data in the signals, as might be desired for various applications of system 20. Processing device 48 includes appropriate signal conditioners to transmit and receive desired information (data), and correspondingly may include filters, amplifiers, limiters, modulators, demodulators, CODECs, signal format converters (such as analog-to-digital and digital-to-analog converters), clamps, power supplies, power converters, and the like as needed to perform various control, communication, and regulation operations described herein. Processing device 48 can be comprised of one or more components of any type suitable to process the signals received from transceiver 32 or elsewhere, and provide desired output signals. Such components may include digital circuitry, analog circuitry, or a combination of both. Processing device 48 can be of a programmable type; a dedicated, hardwired state machine; or a combination of these; and can further include multiple processors, Arithmetic-Logic Units (ALUs), Central Processing Units (CPUs), or the like. For forms of processing device 48 with multiple processing units, distributed, pipelined, and/or parallel processing can be utilized as appropriate. Processing device 48 may be dedicated to performance of just the operations described herein or may be utilized in one or more additional applications. In the depicted form, processing device 48 is of a programmable variety that executes algorithms and processes data in accordance with operating logic 54 as defined by programming instructions (such as software or firmware) stored in memory 50. Alternatively or additionally, operating logic 54 for processing device 48 is at least partially defined by hardwired logic or other hardware.
  • Memory 50 may be of one or more types, such as a solid-state variety, electromagnetic variety, optical variety, or a combination of these forms. Furthermore, memory 50 can be volatile, nonvolatile, or a mixture of these types, and some or all of memory 50 can be of a portable variety, such as a disk, tape, memory stick, cartridge, or the like. In addition to identifier 52, memory 50 can store data that is manipulated by the operating logic 54 of processing device 48, such as data representative of signals received from and/or sent to transceiver 32 in addition to or in lieu of storing programming instructions defining operating logic 54, just to name one example.
  • Referring back to FIG. 1, two particular nodes 23 are further designated as receiving device 24 a and transmitting device 24 b as a “snapshot” in time of network 25, where the arrows direct away from a node 23 indicate transmission and towards a node 23 indicate reception. Nodes 23 labeled with T/R are in a transmit mode and nodes 23 labeled with a R/T are in a receive mode for this particular snapshot. Further, the circles designated by 26 a and 26 b represent the wireless communication range of devices 24 a and 24 b, respectively. As used herein, “wireless communication range” refers to the nominal range over which wireless communications can occur directly between two wireless communication devices without being relayed or repeated through a third device spaced apart from either of the others. Accordingly, each circular region 26 a and 26 b defines a different network neighborhood each enclosing five nodes 23. The overlapping region designated by 26 c encloses three nodes 23, including nodes 24 a and 24 b. Accordingly, nodes 23 in each of regions 26 a and 26 b, but outside of region 26 c can communicate with each other through devices 24 a and 24 b, even if their respective communication ranges do not overlap.
  • Operating logic 54 of each device 22 cooperates to define an ad hoc network 25 with nodes 23. In network 25, a given node 23 may have a direct radio link with only a small number of nearby nodes 23, which are referred to as its “neighbors”—these neighbors being those nodes 23 (devices 22) within the communication range of the given node 23. In the absence of a central controller, it is desired that each node 23 discover and identify the network interface address of its neighboring nodes 23 before efficient routing or other higher-layer activities can take place as applicable. Among the routines by which nodes 23 define network 25 include those described in U.S. Provisional Patent Applications No. 61/277,573, filed on Sep. 25, 2009 and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein).
  • Operating logic 54 is further configured to permit all nodes 23 to transmit simultaneously and synchronously over every frame interval in a RODD model as further described hereinafter; where each nodal transmission is through a unique on-off mask (or signature), which is known to other nodes within its communication range. In a typically implementation, the signature of a user typically consists of many more off-slots (receiving) than on-slots (transmitting). The amount of information that a user can transmit during a frame may be proportional to the on-slots (or channel users) depending on the metrics of a given implementation. Each node 23, while transmitting over its on-slots, receives signal over its own off slots. Error control code is applied in each frame of transmission, so that user data can be recovered despite of erasures due to one's own transmission in the on-slots. Over the period of a single RODD frame, every node 23 or “user” simultaneously broadcasts a message to all users in its network neighborhood (and receives a message from every network neighbor in the meantime). As a novel physical/MAC-layer paradigm for ad hoc networks, the proposed wireless RODD departs from not only the collision model, but also the time-sharing scheme for dealing with the half-duplex constraint.
  • A deterministic function may be used to generate user (node 23) signatures from their network interface addresses, e.g., let the signature of a user be a (biased) pseudorandom sequence produced with the seed set to the other users within the radio range. The signature can be a random Bernoulli sequence, which can be generated as a random function of the user's network interface address (NIA). The function and the pseudorandom number generator could be distributed as a component of hardware/software. There is no need to distribute the entire set of signatures, because they can be enumerated by each user during network setup/neighbor discovery. Alternatively, the signature may be based on a second order Reed Muller code.
  • In one embodiment, the signatures of all nodal network neighbors are identified using the neighbor discovery techniques described in U.S. Provisional Patent Applications No. 61/277,573, filed on Sep. 25, 2009 and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein). Each user is assigned a unique on-off signature—corresponding to a unique pattern of one or more transmission time slots (on slots) and one or more reception time slots (off slots). Each user then determines, out of all users in the network, which ones are neighbors, based on the superposition of the on-off signatures it observes. In one form of this approach, one frame can be designated to neighbor discovery by requiring all users transmit their signatures, so that each user can run the RODD neighbor discovery process; where data transmission and neighbor discovery use the same type of signaling.
  • In one embodiment, a demonstrative channel code for RODD is applicable to the case where the message from each user consists of a small number of bits, i.e., the number of possible messages is not large (e.g., up to several thousand possible messages). A user is then assigned a set of distinct on-off signatures, where each signature corresponds to one possible message. The user shall transmit the signature corresponding to its message. All signatures are known to all users. Compressed sensing techniques are applied by each user to identify, out of all possible messages (signatures) from all users, which messages were transmitted.
  • From every receiver's viewpoint, the channel for RODD is a multiaccess channel with erasure. Typical codes for multiaccess channels are generally suitable for RODD. Existing codes can achieve up to 70% of the capacity with manageable complexity.
  • Using various distributed algorithms for reaching consensus, it is not difficult to achieve synchronization in a small neighborhood. Let the slot be much larger than the propagation delay over the diameter of a neighborhood. To fully synchronize all users in the network, some absolute timing is supplied to each user, e.g., using GPS or some other infrastructure. Alternatively, a user can infer about the relative delay of other users, and then shift its timing such that its delay is the mean value of the delays of all users in its neighborhood, including itself. For ease of time acquisition, the signatures are designed to include cues so that timing can be recovered easily, even in the presence of other users with arbitrary time shifts.
  • In certain implementations, the largest gain of RODD is realized when several users each has data to broadcast to all other users. In this case, existing schemes allow only one user to succeed at a time, because if two users broadcast simultaneously, they fail to receive data from each other. The usual approach to the half-duplex constraint is to define a time-division protocol which determines a priori, a schedule for separating transmission slots and listening slots. The reason for the inferior performance of such schemes is largely due to the collision model assumption. Note that if multi-packet reception is allowed, the throughput improves. Such improvement, however, can always be matched by RODD by proper design of the signatures and proper design of the encoders and decoders. Moreover, in the case the goal is for each user to broadcast to all other users, there is essentially no improvement for random access schemes, such as ALOHA, because if two users simultaneously and successfully transmit their packets to all other users, they still have to exchange their messages.
  • Unlike the usual packet scheduling paradigm, which is in part an extension of wired network to the wireless medium, scheduling of transmissions under the half-duplex constraint need not be at the timescale of the frame level. In particular, if a user's transmission follows an on-off signaling mask over a sequence of sub-frame slots on approximately the same time-scale of a symbol interval, then the user can receive a useful signal during each off slot.
  • Referring in more detail to the RODD model of various embodiments of the present invention, FIG. 1 illustrates a snapshot of RODD taken at a slot, during which transceivers labeled with bigger “T” transmit, whereas transceivers labeled with bigger “R” do not and hence can receive. These and the operations that follow can be incorporated into the operating logic 54 of each of devices 22 (nodes 23 or users). Each user, while transmitting over its on slots (transmission time slots), receives signal over its own off slots (reception time slots). One way to view this is that the received signal of a user is erased during its own on-slots. Still, with sufficient redundancy in the transmissions, all user data can be recovered. Therefore, over the period of a single RODD frame, every user “simultaneously” broadcasts a message to all users in its neighborhood (and receives a message from every neighbor in the meantime).
  • Because users simultaneously transmit, the delay is typically smaller and more stable than in conventional reservation or scheduling schemes. Furthermore, the proposed scheme can have significant advantage in the special case where each user has only a small amount of data to send, e.g., a few or tens of bits, under tight delay constraint. In this case, the error-control coding overhead in RODD can be much less than that of usual networks designed based on the collision model. Generally, the total delay induced by the RODD technique is exactly one frame length, which is a constant, as opposed to a variable length depending on collision situation if some random access scheme is used.
  • It should be appreciated that on-off signaling over a slot which spans one or several symbols is easy to achieve because the response time of an RF circuit (in nanoseconds) is orders of magnitude smaller than the symbol interval (in microseconds). In fact, on-off signaling over sub-millisecond slots is a defining feature of TDMA in 2G cellular systems such as GSM. It is more challenging to maintain symbol-level synchronization so that the slots of all users in a neighborhood of the ad hoc network are aligned. It should be appreciated that local symbol-level synchronization can be achieved using consensus algorithms, which is typically amenable to small neighborhoods, because the propagation delay over the diameter of the neighborhood is still much smaller than the symbol interval.
  • It should be appreciated that for mobile communication systems used in an emergency situations, battlefields, and the like, the traffic is often broadcast from every mobile station to all others, in which case RODD is particularly efficient. Further, it should be noted that RODD can, if so desired, also play a limited role of a physical/MAC layer technique for exchanging state information amongst wireless terminals for purpose of resource allocation or scheduling.
  • One application of RODD is to assist distributed scheduling by letting each node choose whether to transmit based on its own state and the states of its neighbors. A simple distributed protocol leads to an efficient network-wide TDMA schedule. Another application is distributed interference management by exchanging interference prices.
  • Several basic aspects of the RODD model of the present application are next described. Consider a neighborhood with K users, indexed by 1, . . . , K, in an ad hoc network (such as network 25). Suppose all transmissions are over the same frequency band. Let time be slotted, where one or a few symbols can be transmitted over each slot, and suppose for now all users are perfectly synchronized. Let the binary on-off signature (mask) of user k be sk=[sk1, . . . , skN] over slots 1 through N. For each slot n, user k may transmit a symbol during the slot if skn=1, whereas if skn=0, the user does not transmit any energy during this slot, rather, it listens to the channel during this slot. Assume that the physical link between every pair of users is an additive white Gaussian noise channel with the same (instantaneous) channel gain equal to y. The received signal of user k during slot i is then described by:
  • Y ki = ( 1 - s ki ) γ j k h kj s ji X ji + W ki , i = 1 , , N ( 1 )
  • where hkj denotes the channel coefficient, Xji denotes the transmitted symbol of user j at time slot i, and Wki denote additive noise. Clearly, if user k transmits during slot i (i.e., ski=1), then its received signal during the slot can be viewed as an erasure. It is also assumed that the signaling of each user is subject to unit average power constraint, i.e.:
  • i = 1 N s ki x ki 2 N for k = 1 , , K .
  • Consider information exchange among K users in a neighborhood. Suppose each user has a message to broadcast to all other K−1 users over N slots. An N-slot block is regarded as being successful if the message from every user is decoded correctly by all other users; otherwise the block is in error. A rate tuple for the K users is achievable if there exists a code which the users can transmit at their respective rates with vanishing error probability in the limit of N→∞. In case all messages are of the same number of bits, the rate tuple collapses to a single number, where the maximum achievable such rate is the symmetric capacity.
  • Before data communication can take place, a user needs to acquire the identities or network interface addresses of its neighbors. This is frequently referred to as neighbor discovery. Typically neighbor discovery is carried out over a given period of time, where users each transmit a distinct signal to announce its own identity. In conventional neighbor discovery schemes based on random access, each user transmits its identity many times with random delay, so that every user is able to identify every neighbor at least once without collision. It is not difficult to see that the linear multiaccess channel model (1) also applies to the neighbor discover problem if we replace Xji by Bj for all i=1, . . . , N, where Bj=1 if user j is present in the neighborhood, and Bj=0 otherwise. The signal each user k transmits over the entire discovery period to identify itself is then the signature sk. The goal here is to identify which Bj's are 1. It should be appreciated that to identify a small number of neighbors out of a large collection of users based on the signal received over a linear channel is fundamentally a compressed sensing problem, for which a small number of measurements (channel users) suffice.
  • In U.S. Provisional Patent Application No. 61/277,573, filed Sep. 25, 2009, and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein), techniques have been proposed, in which each user is assigned a unique signature of on-off signaling. Each user then determines, out of all users in the network, which ones are neighbors, based on the superposition of the on-off signatures it observes. This approach can be implemented using the method of elimination (or group testing), which is much faster than most other compressed sensing algorithms in this case. It should be observed that from one user's viewpoint, for each slot with (essentially) no energy received, all users who would have transmitted a pulse during that slot cannot be a neighbor; the surviving users are the regarded as neighbors. (In case of noisy environment, more conservative elimination of a node as a non-neighbor can be carried out by requiring multiple measurements (or slots) to point to its elimination.) This RODD neighbor discovery process requires only noncoherent energy detection and has been shown to be effective and efficient at moderate SNRs; moreover, it requires many fewer symbol transmissions than standard neighbor discovery schemes. In another embodiment, the signatures are not necessarily superimposed when a second order Reed-Muller code is used to form the signatures.
  • A result for the capacity of RODD over a (simplified) deterministic model for multiaccess channels is next presented: Let the signal Xji take values from {0,1}. Then the received signal is:
  • Y ki = j k ( s ji X ji ) ( 2 )
  • for every i=1, . . . , N with ski=0, which describes an “inclusive or” multiaccess channel (referred to as OR-channel). An illustration of the signaling is depicted in FIG. 2. Here Z1, . . . , Z4 represents the transmitted signals of user 1 through user 4, i.e., Zji=sjiXji for all l, j. The dotted lines represent non-transmissions. The received signal of user 1 is Y1, which is the outcome of the OR operation of Z1,Z2,Z3. Note that the received signal Y1 of user 1 is valid only during non-transmission slots of user 1. In fact the deterministic model can be regarded as a simplification of the Gaussian multiaccess channel with non-coherent transmission and simple energy detection, so that as long as some terminals transmit energy (“1”) during slot i, the receiver decides there is energy (Yki=1), whereas if no terminal transmits any energy (all send “0”) during slot i, the receiver decides there is no energy (Yki=0). The model captures the multiaccess nature of the channel, while ignoring the effect of noise, although noise can also be easily included.
  • As to throughput evaluation, consider the OR-channel described by (2). Suppose the elements skn of the signatures are i.i.d. Bernoulli random variables with P(Skn=1)=q. Assume every node has complete knowledge of the signatures of all users. Also assume that the codebook of each user is designed independent of the signatures except for the parameters (q, K). A user's codeword is basically punctured by its own signature mask before transmission. Preliminary Result 1: the symmetric capacity of the OR-channel (2) is:
  • C = max p [ 0 , 1 ] 1 K - 1 m = 0 K - 1 ( K - 1 m ) q m ( 1 - q ) K - m H 2 ( ( 1 - p ) m ) ( 3 )
  • where H2(p)=−p log p−(1−p) log(1−p) is the binary entropy function. The symmetric capacity is achieved by random codebook with i.i.d. Bernoulli (p) entries. To see this result, consider the slots over which m users transmit while the remaining K−m of them listen. The achievable rate is given by the mutual information between the binary received signal Y and the transmitted symbols Z in a given slot:

  • I(Z;Y)=H(Y)−H(Y|Z)=H(Y)=H 2((1−p)m)  (4)
  • where the second equality is due to the deterministic nature of the model.
  • FIG. 3 illustrates the RODD signals of four nodes over 30 slots in a frame, where symbol-level synchronous transmission is assumed for simplicity. Here, Z1, . . . , Z4 represent the transmitted signals of node 1 through node 4, respectively, where the dotted lines represent off-slots and rectangles represent on-slots. The received signal of node 1 through its own off-slots is Y1, which is the superposition of Z1, Z2, and Z3 with erasures (blanks in FIG. 3) at the on-slots of node 1. If no node transmits at a slot then node 1 receives zero signal represented by a solid line. With sufficient redundancy in each frame, all desired data in Z2, Z3, Z4 can be recovered from Y1. Therefore, over the period of a single RODD frame, every node can “simultaneously” broadcast a message to its neighbors and receive a message from every neighbor at the same time.
  • Preliminary results for a Gaussian Multiaccess Channel are next considered FIG. 4 comparatively plots RODD and ALOHA over a Gaussian channel for different user populations. Consider now a (non-fading) Gaussian multiaccess channel described by (1), where hkj=1 for all k; j, and {Wji} are i.i.d. Gaussian random variables. For simplicity, let all users be of the same SNR. Let the average power of each transmitted codeword be 1. Since each user only transmits over about qN slots, the average SNR during each active slot is essentially y/q. It is easy to see that the throughput of ALOHA over the Gaussian channel is Kq(1−q)K−1g(y/q), where g(x)=(½) log(1+x). Similar to the results for the deterministic model, the capacity for the Gaussian multi-access channel is achieved by Gaussian codebooks and admits a similar format. Preliminary Result 2: The symmetric capacity of the non-fading Gaussian multi-access channel described by (1) is
  • C = 1 K - 1 m = 0 K - 1 ( K - 1 m ) q m ( 1 - q ) K - m g ( m γ q ) . ( 5 )
  • Again, as is shown in FIG. 4, the symmetric capacity of RODD given by (5) is greater than that of ALOHA for all number of users and every value of q. In many applications, the amount of data different users transmit/broadcast can be very different. In random access schemes, users with more data will contend for more resources. In certain embodiments, a corresponding protocol for RODD is designed where the data rate, transmit power and modulation format of each user is adapted to the amount of data to be transmitted. Because the amount of information each user receives is typically several times the amount of information it transmits, the signature of a user usually consists of many more off-slots than on-slots, i.e., it is somewhat sparse. The amount of information that a user can transmit during a frame may be proportional to the on-slots (or channel users).
  • Based on preceding descriptions, a typically effective way to assign on-off signatures (that is a unique transmit-receive slot pattern) is to produce a set of random i.i.d. Bernoulli sequences. In certain embodiments, a deterministic function h() of user network interface address is used as the signature, e.g., let the signature be a (biased) pseudorandom sequence produced with the seed set to the NIA—in which case there is then no need to distribute the set of signatures, except for the pseudorandom number generator.
  • Using the function h(), each user can produce a list of all K possible signatures in the network: h(0), h(1), h(2), . . . . The neighbor discovery schemes previously described in connection with U.S. Provisional Patent Applications No. 61/277,573, filed Sep. 25, 2009, and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein) can be used. For example, one frame can be designated to neighbor discovery by requiring all users to transmit their signatures, so that each user can run the compressed neighbor discovery algorithm. Data transmission and neighbor discovery share the same linear channel model. In fact, if the signaling for the data frame is such that a user always transmits energy over an on-slot, then neighbor discovery can be carried out solely based on a frame of data transmission.
  • The scaling and efficiency of compressed sensing techniques generally suggest that group testing is feasible for up to about one million users (20-bit NIA), but becomes too slow for larger systems. As proposed in U.S. Provisional Patent Applications No. 61/277,573, filed Sep. 25, 2009, and No. 61/372,449, filed Aug. 10, 2010 (previously incorporated by reference herein), in certain embodiments with larger numbers of users, the n-bit signature can be divided to two N/2-bit signatures for separate identification, because for long signatures, the problem is still RODD neighbor discovery when half of the observations are made. In this case, group testing for each half of the observations identifies half of the NIA, which are bin numbers, based on which the full NIA and the signature can be recovered.
  • In one embodiment, deterministic signatures based on second-order Reed-Muller codes are used as the number of nodes grows larger. One advantage of such signatures is that the corresponding chirp decoding algorithm has sub-linear complexity, which allows practical, efficient discovery even if the NIA space is 1030 or larger.
  • Further considering channel coding for certain RODD embodiments of the present application, a channel code is considered that does not achieve the capacity but is simple and useful when the message is short. Consider a problem frequently seen in practice: each user in a neighborhood wishes to broadcast a few bits to all other users. The short message can be information about the local state of the user, such as the channel quality, the queue length, the code and modulation format, a request for some common resource, etc. A coding scheme can be prepared for which decoding is essentially via compressed sensing. Consider the simplest case, where each user has one bit to broadcast to all other users. Let each user k be assigned two on-off signatures, sk,0 and sk,1, where user k transmits sk,1 to send message “1” whereas user k transmits sk,0 to send message “0.” All users transmit their signatures simultaneously, and listen to the channel through their respective off-slots. This approach is similar to the neighbor discovery problem, except that each user tries to identify which signature from each neighbor was transmitted so as to recover 1 bit of information from the user.
  • The preceding coding scheme can be easily extended to the case where the message mk from user k is chosen from a small set of messages {1, . . . , M}. In this case, user k is assigned M distinct on-off signatures, and transmits the signature corresponding to its message. All signatures are known to all users. The problem is now for each user to identify, out of a total of MK messages (signatures) from all users, which K messages (signatures) were selected. For example, in the case of 5 users each with a message of 10 bits, the problem is to identify 5 out of 5×210=5120 signatures. This is essentially a compressed sensing problem, for which a rich set of efficient and effective decoding algorithms can be used to solve it. Consider the deterministic OR-channel, where the observation of user k through all of its off-slots can be regarded as a vector signal Yk=Vj≠ksj,m j corresponds to message mj from user j, and the “or” operation for vectors is element-wise. To determine which signatures constitute the observation Yk is again a group testing problem. The only possible type of error is false alarm, and the larger the number of tests, the smaller the error probability. Comparing the compressed sensing code with ALOHA in terms of achieving the same error probability ε=0.003, it should be appreciated that in ALOHA, an error event occurs when at least one user has not been able to transmit its message without collision within given number of contention periods. Consider a neighborhood of K=5 users each with a message of 15 bits (M=215). If the compressed sensing code is used, 4 Klog(MK/ε)≈357 channel uses suffice. For ALOHA, the smallest number of contention periods that achieves the same error probability is 68 (with q=0.2), which corresponds to 68×15=1020 channel uses. Clearly, the compressed sensing based codes outperforms ALOHA by a factor of 3 in terms of code rate.
  • From every receiver's viewpoint, the channel for RODD is a multiaccess channel with erasures. All codes suitable for multiaccess channels are generally suitable for RODD. Coding schemes for the OR multiaccess channel have been identified, such as certain nonlinear trellis codes that achieves about 60% of the sum-capacity. Gaussian codebooks achieve the capacity. In practice, however, QAM or PSK signaling is often used depending on the SNR. It should be appreciated that trellis-coded multiple access can be particularly suitable for higher constellations.
  • Considering synchronization in ad hoc networks, with the use of various distributed algorithms for reaching consensus, it is not difficult to achieve synchronization in a small neighborhood. It should be appreciated that if the slot is much larger than the propagation delay over the diameter of a neighborhood, one may simply use some pilot or beacon signal to achieve synchronism. (For example, with 10K slots per second, the slot interval at 100 microseconds, which is 100 times the propagation delay over a 300-meter neighborhood.) To fully synchronize all users in the network requires some form of absolute timing, e.g., through GPS or some other type of infrastructure. However, for the problem at hand, local synchronization is sufficient, namely, it succeeds if all transmissions in a given neighborhood are approximately aligned. Given that the observation of each user is through its off-slots (reception time slots), the user's observation of other user's signals (and timings) is only partial. The user can infer about the delay of other users, and then shift its timing such that its delay is the mean value of the delays of all users in its neighborhood, including itself. The synchronization problem is fundamentally a filtering problem of a hidden Markov process, which suggest that over time the delays converge to synchronized transmission in each local area. The accuracy is still limited by two factors: the channel impairments and the propagation delay. Also, over the entire network there is still the possibility of fluctuation of the relative delay, but the delay of all users is typically a smooth function geographically.
  • It should be understood that synchronization is not a necessary condition for various RODD embodiments of the present application to function. In particular, whether the network is synchronized or not, each user observes essentially the same amount (in time) of signals through its own off-slots. Suppose for now that a receiver knows the relative delay of every user in the neighborhood, then decoding asynchronous signals is in principle a multiuser detection/decoding problem. For ease of time acquisition, the RODD protocol can be designed in certain embodiments such that the signatures include cues so that timing can be recovered easily, even in presence of other users with arbitrary time shifts.
  • Indeed, the embodiments of the present application lead to transformative design of the physical and MAC layers of such networks, with significantly improved performance in many instances, while being robust with respect to wide variations in interference and channel conditions.
  • In another embodiment, deterministic signatures based on second-order Reed-Muller (RM) codes are used to overcome the scalability problem. One advantage of such signatures is that the corresponding chirp decoding algorithm has sub-linear complexity, which allows practical, efficient discovery even if the NIA space is 1030 or larger. RM signatures form excellent measurement matrices which satisfy the restricted isometry property (RIP) statistically. Due to their group structure, the decoding complexity is sublinear in N and feasible for networks of any practical size, e.g., with M=1,024, decoding is viable for a network of N=265 distinct signatures.
  • The construction of the signatures can be briefly described as follows. Given a positive integer m, construct the Kerdock set κ(m) consisting of 2m binary symmetric m×m matrices. Generally, the matrices may be considered binary Hankel matrices where the top row consists of arbitrary entries and each of the remaining reverse diagonals is computed from a fixed linear combination of the entries in the top row. It is known that κ(m) is a m-dimensional vector space with basis {P(em i)}i=1 m, where P(em i) corresponds to the m×m matrix in which all but the i-th entry in the top row are 0 and the i-th entry is set to 1. For any l≦m, matrix Pεκ(l) can be padded to an m×m symmetric matrix represented by
    Figure US20110116421A1-20110519-P00001
    (P), where the lower left l×l submatrix is P and other entries are all zeros if any. Putting together all padded bases {
    Figure US20110116421A1-20110519-P00001
    (P(em i))}i=1 m, {
    Figure US20110116421A1-20110519-P00001
    (P(em−1))}i=1 m−1, . . . , {
    Figure US20110116421A1-20110519-P00001
    (P(e1 1))} forms a new set B, which can be regarded as basis of the m(m+1)/2-dimensional vector space formed by all m×m symmetric matrices. Given n≦m(m+1)/2, any c=(c1, . . . , cn)Tε
    Figure US20110116421A1-20110519-P00002
    corresponds to an m×m symmetric matrix represented by
  • P ( c ) = i = 1 n c i ( B ( i ) )
  • mod 2, where B(i) is the i-th element in the set B.
  • Each node can then map its NIA into a signature as follows. Let the NIA consists of n+m bits, which is divided into two binary vectors: bε
    Figure US20110116421A1-20110519-P00003
    and cε
    Figure US20110116421A1-20110519-P00004
    with n≦m(m+1)/2. The corresponding signature is of 2m symbols, whose entry indexed by each aε
    Figure US20110116421A1-20110519-P00003
    is given by
  • φ P ( c ) , b ( a ) = exp [ ( 1 2 a T P ( c ) a + b T a ) ] . ( 6 )
  • The system can thus accommodate up to 2m(m+3)/2 nodes with distinct signatures, each of length 2m. For example, if m=10, then there will be up to 265 signatures of length 210=1,024. The chirp reconstruction algorithm can be applied for a query node to recover its neighborhood based on the observations. The general idea of the iterative algorithm is as follows: 1) initialize the residual signal to Y, 2) take the Hadamard transform of the auto-correlation function of Y to expose the coefficient of the digital chirps, 3) extract the Kerdock matrix P(cj) corresponding to the largest energy component in the residual signal and determine the corresponding Xj, and 4) update the residual signal and repeat steps 2 to 4 until the residual falls below a threshold. The query node has thus acquired the signatures of all peers with high probability. The signatures can also be used to recover the NIAs if needed.
  • Unfortunately, the RM signatures consist of QPSK symbols, which do not allow a node to transmit and measure the channel at the same time, thus prohibiting full-duplex discovery. To overcome the lack of full-duplex discovery, RM signatures are converted to on-off signals by introducing 50% erasures, so that each node emits energy over half of its slots, and make measurements over the remaining half. This allows neighbors to observe about 25% of each others' on-slots (this is the maximum). Numerical results indicate that reliable half-duplex discovery is achievable for a network of 220 nodes, where the neighborhood size is on average 50, at SNRs well below 10 dB, using signatures of merely 1,024 symbols. Moreover, the performance degrades with up to 25% erasures, which can be compensated for by proportionally longer signatures.
  • The present application has several features. For example, RODD enables (virtual) full-duplex transmission using half-duplex radios, which generally simplifies the design of higher-layer protocols. The throughput of RODD-based schemes substantially exceeds that of random access schemes. RODD signaling takes advantage of the superposition and broadcast nature of the wireless medium and is particularly suitable for advanced transmission techniques, such as cooperative relaying and network coding. RODD-based technology is generally most efficient when the traffic is broadcast from every node to all its neighbors, such as in mobile systems used in spontaneous social networks, emergency situations, or on battlefield. Communication overhead is generally an afterthought in network design; however RODD enables efficient exchange of a small amount of state information amongst neighbors based on sparse recovery (i.e., compressed sensing). Because nodes may simultaneously transmit, the channel-access delay is typically smaller and more stable than in conventional reservation or scheduling schemes.
  • Any experimental (including simulation) results are exemplary only and are not intended to restrict any inventive aspects of the present application. Any theory, mechanism of operation, proof, or finding stated herein is meant to further enhance understanding of the present application and is not intended to make the present application in any way dependent upon such theory, mechanism of operation, proof, or finding. Simulations of the type set forth herein are recognized by those skilled in the art to demonstrate that methods, systems, apparatus, and devices, are suitable for their intended purpose. It should be understood that while the use of the word preferable, preferably or preferred in the description above indicates that the feature so described may be more desirable, it nonetheless may not be necessary and embodiments lacking the same may be contemplated as within the scope of the invention, that scope being defined by the claims that follow. In reading the claims it is intended that when words such as “a,” “an,” “at least one,” “at least a portion” are used there is no intention to limit the claim to only one item unless specifically stated to the contrary in the claim. Further, when the language “at least a portion” and/or “a portion” is used the item may include a portion and/or the entire item unless specifically stated to the contrary. While the invention has been illustrated and described in detail in the drawings and foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that only the selected embodiments have been shown and described and that all changes, modifications and equivalents that come within the spirit of the invention as defined herein or by any claims that follow are desired to be protected.

Claims (28)

1. A method, comprising:
establishing an ad hoc network of several wireless communication devices distributed over a region, the devices each including a transmitter and a receiver;
for each of the devices, designating a unique pattern of one or more transmission slots and one or more reception slots within each of a sequence of communication frames; and
during one of the frames, a first one of the devices transmitting information to each of the other devices in accordance with the one or more transmission slots of the unique pattern for the first one of the devices and receiving other information during the one or more reception slots of the unique pattern for the first one of the devices, wherein the devices may concurrently transmit information during the one or more transmission slots.
2. The method of claim 1, wherein the ad hoc network is of a mobile type.
3. The method of claim 1, wherein the frames each correspond to a data packet in a link layer of a multilayer communication protocol.
4. The method of claim 3, wherein the multilayer communication protocol corresponds to the OSI model.
5. The method of claim 1, which includes applying an error control code for each of the frames.
6. The method of claim 1, which includes each of the devices:
transmitting data to each of the other devices in accordance with the pattern of the one or more transmission slots; and
receiving data from each of the other devices in accordance with the pattern of the one or more reception slots.
7. The method of claim 1, wherein the designating of the pattern for each of the devices includes performing a compressed sensing process.
8. The method of claim 1, wherein the devices are all within communication range of each other to define a first network region.
9. The method of claim 1, further comprising:
providing a number of wireless communication nodes spaced apart form one another over an area;
identifying the devices as a subset of the nodes neighboring a designated one of the devices by excluding each of the nodes for which a unique identifier is not indicated by the concurrent identifier transmissions to the designated one of the devices, the unique identifier corresponding to the unique pattern for each of the devices.
10. The method of claim 1, wherein the transmitter and the receiver are in the form of a transceiver unit for each of the devices.
11. The method of claim 1, wherein the network serves at least one of a military application and an emergency locating application.
12. The method of claim 1, which includes with a second one of the devices:
receiving the information during the one or more reception slots of the unique pattern for the second one of the devices; and
transmitting the other information to the first one of the devices.
13. The method of claim 1, which includes during another of the frames, sending data from a third one of the devices during the one or more transmission slots for the third one of the devices and receiving other data from each of the other devices during the one or more reception slots for the third one of the devices.
14. The method of claim 1, wherein each unique pattern is based on a second order Reed-Muller code.
15. The method of claim 1, wherein the number of transmission slots is approximately half of each device's total number of slots for each frame.
16. The method of claim 1, further comprising:
with each device, observing approximately 25% of the other devices' transmission slots.
17. An apparatus, comprising: a number of wireless communication nodes within communication range of each other to define an ad hoc communication network, the communication devices each including a transmitter and a receiver, and further including:
means for designating a unique pattern of one or more transmission slots and one or more reception slots within each of a sequence of communication frames for each of the devices, wherein one or more transmission slots for one unique pattern may overlap with one or more transmission slots from another unique pattern;
means for transmitting information from a first one of the device to each of the other devices in accordance with the one or more transmission slots of the unique pattern for the first one of the devices; and
means for receiving the information with a second one of the devices during the one or more reception slots of the unique pattern for the second one of the devices.
18. The apparatus of claim 17, wherein each frame includes an error control code.
19. The apparatus of claim 17, wherein the unique pattern for each of the devices is based on a compressed sensing process.
20. The apparatus of claim 17, wherein the unique pattern for each of the devices is based on a second order Reed-Muller code.
21. The apparatus of claim 17, wherein the transmitter and the receiver are in the form of a transceiver unit for each of the devices.
21. The apparatus of claim 17, wherein the network serves at least one of a military application and an emergency locating application.
22. The apparatus of claim 17, wherein the number of transmission slots is approximately half of each device's total number of slots for each frame.
23. A wireless communication device operable to wirelessly communicate with one or more other devices through an ad hoc wireless network, comprising:
a wireless transmitter;
a wireless receiver; and
a signal processor operatively coupled to the wireless transmitter and the wireless receiver, the signal processor being structured to execute operating logic to communicate in accordance with a pattern unique to the device relative to the other devices for each of a sequence of data packets, the pattern including one or more data transmission time periods and one or more data reception time periods for each of the sequence of data packets, the operating logic being structured to transmit information during the one or more transmission time periods and receive information during the one or more reception time periods, wherein one or more data transmission time periods for one unique pattern may overlap with one or more data transmission time periods from another unique pattern.
24. The device of claim 23, wherein each packet includes an error control code.
25. The device of claim 23, wherein the pattern is based on a compressed sensing technique.
26. The device of claim 23, wherein the pattern is based on a second order Reed-Muller code.
27. The device of claim 23, wherein the network serves at least one of a military application and an emergency locating application.
US12/924,391 2009-09-25 2010-09-27 Rapid on-off-division duplex network communications Abandoned US20110116421A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/924,391 US20110116421A1 (en) 2009-09-25 2010-09-27 Rapid on-off-division duplex network communications
US14/509,667 US9832769B2 (en) 2009-09-25 2014-10-08 Virtual full duplex network communications

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US27757309P 2009-09-25 2009-09-25
US39522210P 2010-05-10 2010-05-10
US37244910P 2010-08-10 2010-08-10
US12/924,391 US20110116421A1 (en) 2009-09-25 2010-09-27 Rapid on-off-division duplex network communications

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/509,667 Continuation-In-Part US9832769B2 (en) 2009-09-25 2014-10-08 Virtual full duplex network communications

Publications (1)

Publication Number Publication Date
US20110116421A1 true US20110116421A1 (en) 2011-05-19

Family

ID=44011235

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/924,413 Active 2032-01-17 US8665063B2 (en) 2009-09-25 2010-09-27 Neighbor discovery techniques
US12/924,391 Abandoned US20110116421A1 (en) 2009-09-25 2010-09-27 Rapid on-off-division duplex network communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/924,413 Active 2032-01-17 US8665063B2 (en) 2009-09-25 2010-09-27 Neighbor discovery techniques

Country Status (1)

Country Link
US (2) US8665063B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013087432A1 (en) * 2011-12-16 2013-06-20 Siemens Aktiengesellschaft Method for transmitting data in a communications network
US20140241207A1 (en) * 2013-02-28 2014-08-28 Ricoh Company, Ltd. Method and apparatus for discovering network node
CN105338509A (en) * 2014-07-15 2016-02-17 富士通株式会社 Discovery method of neighbor node and apparatus thereof
CN106572070A (en) * 2015-10-12 2017-04-19 中兴通讯股份有限公司 Hidden terminal determine method in full duplex communication, and corresponding device and system
CN110365584A (en) * 2019-08-06 2019-10-22 北京润科通用技术有限公司 A kind of network management and device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2633471A4 (en) * 2010-10-26 2017-04-05 Andexor Pty Ltd Reader and method for reading data
CN103384364B (en) * 2012-05-02 2016-05-11 上海贝尔股份有限公司 Be configured for the discovery cycle of compression neighbours discovery and the method for signature sequence
US9094778B2 (en) 2013-03-01 2015-07-28 Qualcomm Incorporated Autonomous adaptation of discovery packet transmission frequency
CN104429142B (en) * 2013-07-12 2019-03-26 华为技术有限公司 A kind of multi-user collaborative communications triggered method and apparatus

Citations (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5068654A (en) * 1989-07-03 1991-11-26 Hazard Detection Systems Collision avoidance system
US6483828B1 (en) * 1999-02-10 2002-11-19 Ericsson, Inc. System and method for coding in a telecommunications environment using orthogonal and near-orthogonal codes
US20030176195A1 (en) * 2002-02-13 2003-09-18 Interdigital Technology Corporation System and method for efficiently detecting the identification of a received signal
US20030189893A1 (en) * 2002-04-05 2003-10-09 Tom Richardson Phase sequences for timing and access signals
US20040170121A1 (en) * 2003-02-28 2004-09-02 Samsung Electronics Co., Ltd. Apparatus and method for transmitting header information in an ultra wide band communication system
US6823191B2 (en) * 2001-01-08 2004-11-23 Lucent Technologies Inc. Apparatus and method for use in paging mode in wireless communications systems
US20040261004A1 (en) * 2003-06-23 2004-12-23 Ziad Asghar Sparse maximum likelihood decoder for block codes
US20050058116A1 (en) * 2003-09-12 2005-03-17 Arto Palin Method and system for processing acknowledgments in a wireless communications network
US20050152329A1 (en) * 2004-01-08 2005-07-14 Ranganathan Krishnan Time-hopping systems and techniques for wireless communications
US20050169463A1 (en) * 2004-01-29 2005-08-04 Ahn Kyoung-Moon Hardware cryptographic engine and hardware cryptographic method using an efficient S-BOX implementation
US20050185729A1 (en) * 2004-02-20 2005-08-25 Mills Diane G. Reduced complexity multi-turbo multi-user detector
US20060203795A1 (en) * 2005-03-11 2006-09-14 Freescale Semiconductor Inc. Method for sharing bandwidth using reduced duty cycle signals and media access control
US20070027656A1 (en) * 2005-05-10 2007-02-01 Baraniuk Richard G Method and Apparatus for Distributed Compressed Sensing
US20070104248A1 (en) * 2005-11-08 2007-05-10 Freesystems Pte., Ltd. Digital wireless audio communication system employing time diversity
US20070104285A1 (en) * 2005-11-08 2007-05-10 Freesystems Pte., Ltd. Digital wireless audio transmitter system employing time diversity
US20070104249A1 (en) * 2005-11-08 2007-05-10 Freesystems Pte., Ltd. Digital wireless audio receiver system employing time diversity
US20070174726A1 (en) * 2005-11-02 2007-07-26 Samsung Electronics Co., Ltd. System and method for monitoring group of devices on network
US20070208986A1 (en) * 2006-02-06 2007-09-06 Qualcomm Incorporated Message remapping and encoding
US7289049B1 (en) * 2006-08-21 2007-10-30 L3 Communications Integrated Systems L.P. Method and apparatus for compressed sensing
US20080037623A1 (en) * 2006-05-02 2008-02-14 Commissariat A L'energie Atomique Noncoherent uwb cooperative communications system
US7345603B1 (en) * 2006-11-07 2008-03-18 L3 Communications Integrated Systems, L.P. Method and apparatus for compressed sensing using analog projection
US20080107013A1 (en) * 2006-11-06 2008-05-08 Nokia Corporation Signature generation using coded waveforms
US20080165797A1 (en) * 2007-01-04 2008-07-10 Aceves J J Garcia Luna Distributed determination of dynamic frame sizes in a network
US20080188259A1 (en) * 2007-01-09 2008-08-07 Qualcomm Incorporated CQI reporting for MIMO transmissionin a wireless communication system
US20080242321A1 (en) * 2007-03-26 2008-10-02 Kabushiki Kaisha Toshiba Radio communication system, base station apparatus, and terminal apparatus
US7436911B2 (en) * 2005-10-11 2008-10-14 L-3 Communications Integrated Systems L.P. Nyquist folded bandpass sampling receivers with narrow band filters for UWB pulses and related methods
US20080304551A1 (en) * 2004-01-29 2008-12-11 Neocific, Inc. Methods and Apparatus for Overlaying Multi-Carrier and Direct Sequence Spread Spectrum Signals in a Broadband Wireless Communication System
US20080309481A1 (en) * 2007-06-15 2008-12-18 Hitachi, Ltd. Sensor node and sensor network system
US20090040985A1 (en) * 2005-08-26 2009-02-12 University Of Bradford Method and apparatus for supporting ad-hoc networking over umts protocol
US20090040998A1 (en) * 2007-08-06 2009-02-12 Lg Electronics Inc. Method of transmitting channel information in wireless communication system
US20090082888A1 (en) * 2006-01-31 2009-03-26 Niels Thybo Johansen Audio-visual system control using a mesh network
USRE40686E1 (en) * 1998-02-19 2009-03-31 Keystone Technology Solutions, Llc Method of addressing messages and communications system
US20090191814A1 (en) * 2008-01-29 2009-07-30 Qualcomm Incorporated Sparse sampling of signal innovations
US20090222226A1 (en) * 2005-10-25 2009-09-03 Baraniuk Richard G Method and Apparatus for On-Line Compressed Sensing
US20090286482A1 (en) * 2008-05-15 2009-11-19 Qualcomm Incorporated Spatial interference mitigation schemes for wireless communication
US7653003B2 (en) * 2002-03-21 2010-01-26 Stine John A Access protocol for wireless ad hoc networks using synchronous collision resolution
US20100079891A1 (en) * 2008-09-29 2010-04-01 Robert Glenn Biskeborn Track-adapted data clocking
US20100079896A1 (en) * 2008-09-29 2010-04-01 Robert Glenn Biskeborn Error correction mapping
US20110134878A1 (en) * 2009-12-04 2011-06-09 Geiger John Andrew Media Access Control Scheme for a Multi-Frequency TDMA Network
US7965671B2 (en) * 2007-10-01 2011-06-21 Powerwave Cognition, Inc. Dynamic channel sharing using bandwidth metrics

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7613156B2 (en) * 2006-06-08 2009-11-03 Motorola, Inc. Method for energy efficient prospective peer discovery in an ad hoc network
US7747223B2 (en) * 2007-03-29 2010-06-29 Research In Motion Limited Method, system and mobile device for prioritizing a discovered device list

Patent Citations (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5068654A (en) * 1989-07-03 1991-11-26 Hazard Detection Systems Collision avoidance system
USRE40686E1 (en) * 1998-02-19 2009-03-31 Keystone Technology Solutions, Llc Method of addressing messages and communications system
US6483828B1 (en) * 1999-02-10 2002-11-19 Ericsson, Inc. System and method for coding in a telecommunications environment using orthogonal and near-orthogonal codes
US6823191B2 (en) * 2001-01-08 2004-11-23 Lucent Technologies Inc. Apparatus and method for use in paging mode in wireless communications systems
US20030176195A1 (en) * 2002-02-13 2003-09-18 Interdigital Technology Corporation System and method for efficiently detecting the identification of a received signal
US7653003B2 (en) * 2002-03-21 2010-01-26 Stine John A Access protocol for wireless ad hoc networks using synchronous collision resolution
US20030189893A1 (en) * 2002-04-05 2003-10-09 Tom Richardson Phase sequences for timing and access signals
US6804191B2 (en) * 2002-04-05 2004-10-12 Flarion Technologies, Inc. Phase sequences for timing and access signals
US20040170121A1 (en) * 2003-02-28 2004-09-02 Samsung Electronics Co., Ltd. Apparatus and method for transmitting header information in an ultra wide band communication system
US20040261004A1 (en) * 2003-06-23 2004-12-23 Ziad Asghar Sparse maximum likelihood decoder for block codes
US7600179B2 (en) * 2003-06-23 2009-10-06 Texas Instruments Incorporated Sparse maximum likelihood decoder for block codes
US20050058116A1 (en) * 2003-09-12 2005-03-17 Arto Palin Method and system for processing acknowledgments in a wireless communications network
US20050152329A1 (en) * 2004-01-08 2005-07-14 Ranganathan Krishnan Time-hopping systems and techniques for wireless communications
US20050169463A1 (en) * 2004-01-29 2005-08-04 Ahn Kyoung-Moon Hardware cryptographic engine and hardware cryptographic method using an efficient S-BOX implementation
US20080304551A1 (en) * 2004-01-29 2008-12-11 Neocific, Inc. Methods and Apparatus for Overlaying Multi-Carrier and Direct Sequence Spread Spectrum Signals in a Broadband Wireless Communication System
US6967598B2 (en) * 2004-02-20 2005-11-22 Bae Systems Information And Electronic Systems Integration Inc Reduced complexity multi-turbo multi-user detector
US20050185729A1 (en) * 2004-02-20 2005-08-25 Mills Diane G. Reduced complexity multi-turbo multi-user detector
US20060203795A1 (en) * 2005-03-11 2006-09-14 Freescale Semiconductor Inc. Method for sharing bandwidth using reduced duty cycle signals and media access control
US7511643B2 (en) * 2005-05-10 2009-03-31 William Marsh Rice University Method and apparatus for distributed compressed sensing
US7271747B2 (en) * 2005-05-10 2007-09-18 Rice University Method and apparatus for distributed compressed sensing
US20070027656A1 (en) * 2005-05-10 2007-02-01 Baraniuk Richard G Method and Apparatus for Distributed Compressed Sensing
US20080129560A1 (en) * 2005-05-10 2008-06-05 Baraniuk Richard G Method and Apparatus for Distributed Compressed Sensing
US20090040985A1 (en) * 2005-08-26 2009-02-12 University Of Bradford Method and apparatus for supporting ad-hoc networking over umts protocol
US7436911B2 (en) * 2005-10-11 2008-10-14 L-3 Communications Integrated Systems L.P. Nyquist folded bandpass sampling receivers with narrow band filters for UWB pulses and related methods
US7436912B2 (en) * 2005-10-11 2008-10-14 L-3 Communications Integrated Systems L.P. Nyquist folded bandpass sampling receivers and related methods
US20090222226A1 (en) * 2005-10-25 2009-09-03 Baraniuk Richard G Method and Apparatus for On-Line Compressed Sensing
US20070174726A1 (en) * 2005-11-02 2007-07-26 Samsung Electronics Co., Ltd. System and method for monitoring group of devices on network
US20070104248A1 (en) * 2005-11-08 2007-05-10 Freesystems Pte., Ltd. Digital wireless audio communication system employing time diversity
US7680202B2 (en) * 2005-11-08 2010-03-16 Freesystems Pte Ltd Digital wireless audio communication system employing time diversity
US20070104249A1 (en) * 2005-11-08 2007-05-10 Freesystems Pte., Ltd. Digital wireless audio receiver system employing time diversity
US20070104285A1 (en) * 2005-11-08 2007-05-10 Freesystems Pte., Ltd. Digital wireless audio transmitter system employing time diversity
US7551681B2 (en) * 2005-11-08 2009-06-23 Freesystems Pte. Ltd. Digital wireless audio transmitter system employing time diversity
US7555031B2 (en) * 2005-11-08 2009-06-30 Freesystems Pte. Ltd. Digital wireless audio receiver system employing time diversity
US20090082888A1 (en) * 2006-01-31 2009-03-26 Niels Thybo Johansen Audio-visual system control using a mesh network
US20070208986A1 (en) * 2006-02-06 2007-09-06 Qualcomm Incorporated Message remapping and encoding
US20080037623A1 (en) * 2006-05-02 2008-02-14 Commissariat A L'energie Atomique Noncoherent uwb cooperative communications system
US7289049B1 (en) * 2006-08-21 2007-10-30 L3 Communications Integrated Systems L.P. Method and apparatus for compressed sensing
US20080107013A1 (en) * 2006-11-06 2008-05-08 Nokia Corporation Signature generation using coded waveforms
US7345603B1 (en) * 2006-11-07 2008-03-18 L3 Communications Integrated Systems, L.P. Method and apparatus for compressed sensing using analog projection
US20080165797A1 (en) * 2007-01-04 2008-07-10 Aceves J J Garcia Luna Distributed determination of dynamic frame sizes in a network
US20080188259A1 (en) * 2007-01-09 2008-08-07 Qualcomm Incorporated CQI reporting for MIMO transmissionin a wireless communication system
US20080242321A1 (en) * 2007-03-26 2008-10-02 Kabushiki Kaisha Toshiba Radio communication system, base station apparatus, and terminal apparatus
US20080309481A1 (en) * 2007-06-15 2008-12-18 Hitachi, Ltd. Sensor node and sensor network system
US20090040998A1 (en) * 2007-08-06 2009-02-12 Lg Electronics Inc. Method of transmitting channel information in wireless communication system
US7965671B2 (en) * 2007-10-01 2011-06-21 Powerwave Cognition, Inc. Dynamic channel sharing using bandwidth metrics
US20090191814A1 (en) * 2008-01-29 2009-07-30 Qualcomm Incorporated Sparse sampling of signal innovations
US20090286482A1 (en) * 2008-05-15 2009-11-19 Qualcomm Incorporated Spatial interference mitigation schemes for wireless communication
US20090286562A1 (en) * 2008-05-15 2009-11-19 Qualcomm Incorporated Spatial interference mitigation for wireless communication
US20100079891A1 (en) * 2008-09-29 2010-04-01 Robert Glenn Biskeborn Track-adapted data clocking
US20100079896A1 (en) * 2008-09-29 2010-04-01 Robert Glenn Biskeborn Error correction mapping
US20110134878A1 (en) * 2009-12-04 2011-06-09 Geiger John Andrew Media Access Control Scheme for a Multi-Frequency TDMA Network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013087432A1 (en) * 2011-12-16 2013-06-20 Siemens Aktiengesellschaft Method for transmitting data in a communications network
RU2609137C2 (en) * 2011-12-16 2017-01-30 Сименс Акциенгезелльшафт Method of transmitting data in communication network
US10171625B2 (en) 2011-12-16 2019-01-01 Siemens Aktiengesellschaft Communications network and method for transmitting data in a communications network
US20140241207A1 (en) * 2013-02-28 2014-08-28 Ricoh Company, Ltd. Method and apparatus for discovering network node
CN105338509A (en) * 2014-07-15 2016-02-17 富士通株式会社 Discovery method of neighbor node and apparatus thereof
CN106572070A (en) * 2015-10-12 2017-04-19 中兴通讯股份有限公司 Hidden terminal determine method in full duplex communication, and corresponding device and system
CN110365584A (en) * 2019-08-06 2019-10-22 北京润科通用技术有限公司 A kind of network management and device

Also Published As

Publication number Publication date
US8665063B2 (en) 2014-03-04
US20110121949A1 (en) 2011-05-26

Similar Documents

Publication Publication Date Title
US20110116421A1 (en) Rapid on-off-division duplex network communications
Haxhibeqiri et al. Low overhead scheduling of LoRa transmissions for improved scalability
Balevi et al. ALOHA-NOMA for massive machine-to-machine IoT communication
Cayirci et al. Security in wireless ad hoc and sensor networks
US11432291B2 (en) System and scheme on group based identity and scrambling for UE cooperation transmission
US11588569B2 (en) Method and apparatus for transmitting and receiving sidelink synchronization signal in wireless communication system
JP2020526129A (en) Characteristic hopping pattern for repeatedly transmitting and reacting data and method for realizing it
Guo et al. Virtual full-duplex wireless communication via rapid on-off-division duplex
CN114503730A (en) Sequence-based physical uplink control channel transmission
Zhang et al. Neighbor discovery in wireless networks using compressed sensing with Reed-Muller codes
Masri et al. Common control channel allocation in cognitive radio networks through UWB communication
Shahjalal et al. Implementation of a secure LoRaWAN system for industrial Internet of Things integrated with IPFS and blockchain
CN110419179B (en) Method and network for transmitting multiple signals
US8599719B1 (en) Discovery of neighbors during wireless network joining
US9832769B2 (en) Virtual full duplex network communications
US20150256219A1 (en) Fast automated radio link establishment
Zhang et al. Wireless peer-to-peer mutual broadcast via sparse recovery
Taneja et al. A Novel Multiple Access Scheme for 6G Assisted Massive Machine Type Communication
Cohen et al. Secured data gathering protocol for IoT networks
CN110784244B (en) Data transmission method and full-duplex Ad Hoc network system
Shafiq et al. MSMA/CA: Multiple Access Control Protocol for Cognitive Radio-Based IoT Networks
Tan et al. SAUCeR: a QoS‐aware slotted‐aloha based UWB MAC with cooperative retransmissions
Thomas Situation awareness issues in tactical cognitive radio
Yao et al. Enabling Massive IoT in 5G and Beyond Systems: Evolution and Challenges
De Nardis et al. Joint communication, ranging, and positioning in low data-rate UWB networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: NORTHWESTERN UNIVERSITY, ILLINOIS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GUO, DONGNING;REEL/FRAME:025922/0471

Effective date: 20110103

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION