Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
org/journal/wet
Wireless Engineering
and Technology
ISSN: 2152-2294 (Print), 2152-2308 (Online)
ISSN: 2152-2294
9 7 7 2 1 5 2 2 2 9 0 0 4 0 1
ISSN: 2152-2294 (Print) ISSN: 2152-2308 (Online)
http://www.scirp.org/journal/wet
Editorial Assistant
TABLE OF CONTENTS
F. Foukalas………………………………………………………………………………………………………………………………10
WiMAX System Simulation and Performance Analysis under the Influence of Jamming
Design of an Acoustic Communication System Based on FHMA for Multiple Underwater Vehicles
Z. X. Zhao, S. X. Guo……………………………………………………………………………………………………………27
Sensor Placement to Improve the Positioning Performance Based on Angle of Arrival (AOA)
SUBSCRIPTIONS
The Wireless Engineering and Technology (Online at Scientific Research Publishing, www.SciRP.org) is published quarterly by
Scientific Research Publishing, Inc., USA.
Subscription rates:
Print: $50 per issue.
To subscribe, please contact Journals Subscriptions Department, E-mail: sub@scirp.org
SERVICES
Advertisements
Advertisement Sales Department, E-mail: service@scirp.org
COPYRIGHT
All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by
any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as described below, without the
permission in writing of the Publisher.
Copying of articles is not permitted except for personal and internal use, to the extent permitted by national copyright law, or under
the terms of a license issued by the national Reproduction Rights Organization.
Requests for permission for other kinds of copying, such as copying for general distribution, for advertising or promotional purposes,
for creating new collective works or for resale, and other enquiries should be addressed to the Publisher.
Statements and opinions expressed in the articles and communications are those of the individual contributors and not the statements
and opinion of Scientific Research Publishing, Inc. We assumes no responsibility or liability for any damage or injury to persons or
property arising out of the use of any materials, instructions, methods or ideas contained herein. We expressly disclaim any implied
warranties of merchantability or fitness for a particular purpose. If expert assistance is required, the services of a competent
professional person should be sought.
PRODUCTION INFORMATION
For manuscripts that have been accepted for publication, please contact:
E-mail: wet@scirp.org
Wireless Engineering and Technology, 2010, 1, 1-9 1
doi:10.4236/wet.2010.11001 Published Online July 2010 (http://www.SciRP.org/journal/wet)
Received July 15th, 2010; revised July 19th, 2010; accepted July 25th, 2010.
ABSTRACT
Under the background of intelligent transportation application, QoS for various services is different in wireless com-
munication. Based on the MAC layer protocol, this paper analyzes the QoS in IEEE 802.11 MAC protocol framework,
and proposes a new design of a Differentiation Enhanced Adaptive EDCA (enhanced distribution channel access) ap-
proach. The proposed approach adjusts the window zooming dynamically according to the collision rate in sending
data frames, makes random offset, and further distinguishes the competition parameters of the data frames that have the
same priority, so as to reduce the conflict among the data frames, and improve the channel utilization. Experiments
with different service cases were conducted. The simulation results show that: comparing with the conventional EDCA
method, the proposed approach can ensure that high priority services are sent with priority, and the overall QoS is
highly improved.
Keywords: Intelligent Transportation Systems, Wireless Communi-Cation, Mac Layer Protocol, Enhanced Distribution
Channel Access
1. Introduction of voice data stream can’t exceed 1%. QoS can be descri-
bed in different aspects in the communication, such as the
In the intelligent transportation systems (ITS), there are network throughput and delays. At present, the method
two wireless communication modes: car to car and car to of improving QoS generally uses separate-layer or cross-
road. They are the foundation of providing information layer. Cross-layer program has the advantage of improv-
exchange and service. Wireless communication improves ing the efficiency of the protocol stack. But its network
the service active safety technology further. In early days,
protocol is complex and is difficult to maintain. Theref-
the main research topics of the intelligent transportation
ore, in the application background, the main issue is
wireless communication technology are vehicles location
separate-layer QoS program in recent days.
and distance measurement between vehicles etc [1,2] in
The MAC layer protocol controls node accessing to
collaborative driving application. In recent years, more
wireless channel and message transmission occupying wi-
and more researches focus on transmission of service inf-
ormation and mass data flows such as audio and video reless medium, so as to provide reliable data transfer for
and so on. In researches and applications, the modern wir- upper layer, and guarantee the overall performance of the
eless communication technologies are adopted. For exa- network. Therefore, MAC layer is the focus of commu-
mple, in Fleetnet-road network project (see http://www. nication protocol in intelligent transportation application.
et2.tu-harburg.de/fleetnet, Fleetnet) and CarTalk 2000 For example, in the EDCA (enhanced distribution chan-
project (see http://www.cartalk2000.net, Cartalk 2000 nel access) mechanism of the IEEE 802.11p [3] standard,
web site), wireless LAN and cellular networks are em- the service data accesses to channel by a competitive way.
ployed. And further distinction of priority-based QoS throu- gh
In different intelligent transportation application sce- distributing competitive parameters is achieved. CarTalk
narios, each service has stringent requirements for QoS 2000 Project proposed the mechanism of Ad Hoc MAC
of wireless communications. For example, in the active [4]. It adopts dynamic TDMA mechanism, and each ser-
safety application scenarios, the delay of sending the se vice accesses to the channel by making an appointment.
curity message requires to reach ms level. While in emer- The article [5] proposed the D-MAC mechanism, which
gency voice communication application, packet loss rate reduces transmission conflict by using the directional
antenna. Kaichi F. et al. proposed the VRCP mechanism need to send data. So it can’t use channel resources ef-
[6], which can work in Central control or ad hoc ne- fectively. For example, in Japan ALOHA is mainly used
twork. And it can dynamically switch according to whet- in MAC layer protocol of Dedicated Short Range Com-
her the node is in the coverage area of the central contro- munication (DSRC) [7]. It is designed for the electronic
ller. toll collection and other applications, and it can’t meet
However, the existing programs for intelligent transpo- the demands in many service application scenarios and
rtation cannot fully meet the requirements in real-world services.
applications. For network throughput and delay, this pa- CSMA-based protocol does not require time synchro-
per lays special stress on analyzing the MAC layer, and nization. It uses carrier sense method to judge whether
emphatically studies the performance of QoS of EDCA the channel is idle before sending data. If the channel is
mechanism in intelligent transportation and designs a busy, it adopts backoff mechanism to make the node re-
new mechanism to improve it. Then simulate the algorithm turn to sense, and tries again. So the conflict probability
and analyze the experiment results. This paper is struct- is small and the channel utilization is effective. CSMA-
ured as follows: Section 2 introduces the principle of ED- based protocol is more suitable for the rapid movement
CA mechanism and the support to QoS. Section 3 desig- of vehicles. Therefore, this paper focuses on the MAC
ns and describes a differentiation enhanced adaptive ED- protocol based on CSMA/CD mechanism.
CA mechanism. Section 4 simulates on the OPNET plat-
form and analyzes the results. Section 5 is the summary.
3. Conventional EDCA Mechanisms and
Support of QoS
2. Related Work
QoS refers to a series of performance indexes that need
The MAC layer provides three mechanisms and protoc- to be satisfied when the network transmits some data
ols in the intelligent transportation with wireless com- flows. QoS guarantee reflects the capabilities that net-
munication, which are described as follows: work devices or protocols ensure data transmission and
1) CSMA/CD-based Protocol, such as the 802.11p. meet specific service. It is described by the throughput,
CSMA/CD uses the mechanism of listen-before-talk delay, delay jitter and packet loss rate and other parame-
(LBT). Each node in the system senses the channel be- ters. In order to support the application of the Intelligent
fore sending the packet. If the channel is idle, send data. Transportation System, IEEE 802.11 Working Group
If the channel is busy, continue to sense until it becomes established wireless access standard for the vehicle envi-
idle, and then use binary backoff mechanism to reduce ronment, named IEEE 802.11p. In this standard, the
the probability of collision. MAC layer adopted the EDCA mechanism based on
2) TDMA-based protocol, such as RR-ALOHA. Proto- CSMA/CD.
col, a channel is divided into several time slots (called The working principle of EDCA mechanism is shown
BASIC CHANNEL, BC). Besides the payload of each in Figure 1.
channel, FI (Frame Information) is also transmitted. FI EDCA provides the priority-based QoS function. This
includes the idle state of each slot. Any terminal can ask mechanism defines the access category (AC). Reference
for the establishment of BC in idle time slot. And the ch- to 802.1D standard, it casts 8 priorities into 4 ACs, each
annel is remained by the terminal that occupies it before of which has a separate backoff parameter. Hence, there
in busy time slot. are 4 separate competition entities in each node. The dis-
3) Directional antenna-based mechanism, such as D- tinction between priorities is obtained by setting the val-
MAC protocol. It is developed from IEEE 802.11. The ues of different parameters such as Arbitration Inter Fra-
protocol requires each node to know the location of the- me Space (AIFS), minimum contention window (CWmin)
mselves and their neighbors. Source node first launches a and maximum contention window (CWmax) are used for
RTS/CTS/ACK handshake mechanism before sending different ACs. For each AC[i] (i = 1,2,3), the backoff
data packets. RTS or Omni are sent directionally accord- mechanisms are the same as DCF. To achieve the dis-
ing to the situation of the transmission around. The direc- tinction between priorities, for 0 ≤ i < j ≤ 3, demand
tional antenna will be blocked when receiving the RTS or CWmin[i] ≥ CW min[ j], CWmax[i] ≥ CW max[ j] and AIFS[i] ≥
CTS, and the source nodes delay sending packets acco- AIFS[ j]. As can be seen, higher-priorities have smaller
rding to the received information. The conflict of trans- CWmin, CWmax, AIFS parameters. They can enter the
mission can be reduced by using directional antennas and backoff process and finish it firstly in the competition.
channel reusing rate can be increased. But the directional Thus they have a top priority to access to channel. If
antenna systems are expensive, and it’s hard to maintain several entities finish backoff at the same time, the
in the actual implementation. higher-priority entity will be sent as a priority.
TDMA-based MAC protocols require strict time syn- Furthermore, the EDCA mechanism introduces the con-
chronization and its slot is fixed. When a node sends no cept of transmission opportunity (TXOP). After AC com-
data, its slots cannot be occupied by other nodes that peting for channels and having sent a frame successfully,
if there are still data frames need to be sent, the channel Adaptive EDCA (DE-AEDCA). The mechanism can
can be used all the time in the TXOP time limit. When adapt to different network congestions by calculating the
we reach the TXOP time limit or there are no data frames collision rate of the sending-data frames, dynamically
to send, TXOP is over and starts a new competition. adjusting the window zooming, maintaining an appropri-
The EDCA mechanism ensures the higher-priority ate contention window range. While the random offset
service to be sent as a priority by the means of distin- achieves the further distinction of data frames competi-
guishing priorities. However, in high load, for middle tion parameters between the same priority, and reduces
and low-priority service flows, the performance will be- their conflict probability. Consequently, it cuts down the
come rather poor. For EDCA mechanism, parameters numbers of idle time slots caused by conflict, and im-
configuration is the key of effectively using channel re- proves the channel utilization.
sources. And the reasonable parameter adjustment algo-
rithm plays an important role in expressing the system 4.1 Selection of Determining the Network Status
performance. Parameters
4. New Design of Differentiation Enhanced In the successive, same interval of time period Tn n
Adaptive EDCA (1,2,3,) , we record the collision rate of different AC [i ]
(i 1, 2,3) access types periodic. We assume the num-
On one hand, the EDCA mechanism supports to send the
high priority service firstly, but backoff parameters can ber of data frame conflicts to be Numncollision [i] in one Tn ,
not be adjusted dynamically with the change of network using parameter Pn [i ] to show the conflicts in the cur-
situation. Thus the network performance can’t be utilized
effectively. On the other hand, EDCA can distinguish rent time period Tn . The range of the Pn [i] value is 0 to
competition parameters from different ACs that belong to 1. The formula is shown in (1).
the same node. It leads to data frames from the same AC Pn [i ] Numncollision [i ] / Numntotal [i ] (n 1, 2,3,) (1)
of multiple sites choosing the same competition parame-
ters, which tries to send at the same time, especially for Collision rate changes in each time period Tn dyna-
the high priority AC with the same AIFS, its scope of the mically, which Tn is an integer multiple of slot duration.
CW is small, thus the probability of choosing the same
If Tn is too large, it cannot reflect real-time network
parameters is very large. This phenomenon is even more
evident with the nodes increasing. For the above two status. On the contrary, if Tn is too small, the computa-
aspects, this paper will design a Differentiation Enhanced tion will increase. When OFDM technology is adopted in
the physical layer, one time slot length is 9 s , data in- cations of this template. You will need to determine whe-
terval is 0.01s in this article. Then we take the time da- ther or not your equation should be typed using either the
ta sources to produce 9 data frames as a statistical cycle, Times New Roman or the Symbol font (please no other
which means Tn 90000 s . In order to suppress judg- font). To create multileveled equations, it may be neces-
sary to treat the equation as a graphic and insert it into
ing errors of network state due to the burst of data frame, the text after your paper is styled.
we deal with the current Pn [i ] with weighted average First, we define a variable i whose value shows the
method of multiple time periods collision rate. Weights current consecutively sending number of data frame of
after treatment is Pnweight [i ] , which is computed as (2): node AC[i ] . Its value adds 1 when it successfully sends
a data frame, and the value is cleared when a conflict
Pn [i ] k Pn [i ] (1 k ) Pnweight [i ], (n 2)
weight
1
weight (2) occurred.
Pn [i ] Pn [i ], (n 1) Secondly, we subtract the value CWmin [i] (1 Pnweight [i])
where k(0 k 1) is the smoothness factor. It is changed of the contention window when i 1 . Subtract 2
by the emergent state of network, for instance, estimated CWmin [i ] (1 Pnweight [i ]) of the contention window when
by comparing Numntotal [i ] with Numntotal
1 [i ] . If the nodes i 2 , and so on. That means the decreasing value incre-
generate stable value of data frames in each time period,
ases when i increases every time. Every time, the inc-
k can take a higher value. In this paper, it is more stable
to produce data of source node. According to experi- reasing value is :
mental results, k takes 0.8 in the simulation of this paper. CWmin [i ] (1 Pnweight [i ]) (6)
4.2 Conflict Process of Data Frame Finally, when the value of contention window reduced
The algorithm for conflict process of data frame is given to half of the initial value, it achieves the congestion
as: avoidance phase, in order to avoid excessive competition
which results from contention window decreasing too
CWnew [i ] min{CWmax [i ], CWold [i ] (1 2 )},
fast. Hereafter, when i keeps on increasing, it resumes
Pn
weight
[i ], (3)
taking CW min [i ] (1 Pnweight [i ]) as original decreasing
(i 0,1, 2,3)
value and beginning to accelerate declining as before-
where is the current weighted value of collision rate, mentioned steps until declining to CWmin [i ] .
[0,1]. The scope of 1 2 is [2,3], thus the comp- The basic idea of this algorithm is similar to slow-start
etition window of AC[i ] can progressively increase in decreasing algorithm SSDS (Slow-start Decrease Scheme.
different multiples depending on collision rate of its data But it increases the adaptive capacity of the decreasing
window, and it adds congestion control to avoid further
frame. The larger the value of Pnweight [i ] is, the greater
competition which results from contention window de-
the progressively increasing multiples is, and vice versa,
creasing too fast. The range of (1 Pnweight [i ]) is [0,1] in
thus competition window can adaptively adjust depend-
ing on network status indication. the algorithm, and the range of is [0, CWmin [i ]] . The
In this algorithm, each access category Pnweight [i ] is larger Pnweight [i ] is, the more severe the current network
statistical respectively, because the high-priority data has congestion is, and the smaller is, the slower the de-
higher right to access to channel than that of the low- clining pace of contention window is, and vice versa. The
priority data, so Pnweight [i ] Pnweight [ j ], (0 i j 3) , it algorithm can judge the current network state and adjust
means that the higher the priority is, the smaller collision the contention window size dynamically, and maintain a
rate is. Thus the progressively increasing multiples of th- good state of congestion avoidance.
eir competition window are smaller. Therefore, this algo- The algorithm can be described as (7):
rithm still strictly ensure the priority relations among all CW i [i ] max{CWmin [i ], CW i 1[i ] i }, ( i m)
categories of data, it is critical for the application of in-
telligent transportation system, because it must ensure CW i [i ] max{CWmin i , CW i 1[i ] ( i m)}, ( i m)
that high-priority data (such as emergency short message (7)
data) to send first. where i is the number of sending data frame successfu-
4.3 Judgement of Sending the Data Frames lly after the congestion avoidance phase, and CW i [i ] is
Successfully the value of the contention window which is calculated
The equations are an exception to the prescribed specifi- by the algorithm. For example, CW0 [i ] shows the initial
contention window before the first time successfully sen- same AC by AIFS offset. First of all, assign an offset sc-
ding data frame. m means the number of sending data ope [ N i , M i ] for each AC by its priority. Random select
frames continuous successful before the congestion avoi- an integer as the number of slot time of AIFS [i ] .
dance phase.
AIFSoffset [i ] Random[ Ni , M i ] aSlotTime (12)
1
CWm [i ] 2 CW0 [i ], Secondly, we put it as offset and add it to AIFS [i ] ,
m i (8)
CW [i ] 1 CW [i ], then computing the AIFSnew [i ] .
m 1 2
0
AIFSnew [i ] AIFS [i ] AIFSoffset [i ] (13)
4.4 Discrimination of Same Access Categories Though the introduction of the offset, we decline the
Another improvement in this paper is the differentiation probability of the same AC data frame choosing the same
enhancement. It is designed to resolve the problem that competition parameter and reduce the collision rate be-
the same AC data frames of different nodes compete with tween them, which is in favor of improving the perform-
each other leads to the drastic decline of the whole net- ance of the whole network.
work’s performance when EDCA is under the high load. The flow chart of the algorithm is shown in Figure 2.
Usually, the waiting time before trying to transfer each
AC data frame equals to the sum of the avoidance time 5. Simulation Studies and Analysis
and the delay time. The avoidance time is random gener- The simulation experiments are conducted on OPNET pl-
ated between 0 and CW [i ] . The delay time which is de- atform. The OPNET uses process domain model, node
cided by AIFS [i ] is the time necessary to wait before domain model and network domain model to react the re-
avoidance. So the basic idea of this algorithm is to incr- levant features of the networks comprehensively. Finite-
ease the probability of the same AC choosing different state machines, OPNET core function, and standard C
competition parameter value by designing an added rand- and C++ can make up the process model to describe bot-
om offset to AIFS[i] and CW [i ] , on this condition, it’s tom layer algorithm and the pipe stage model. OPNET
Modeler uses discrete-time driven simulation mechanism
easier to distinguishing the competition parameters of the that can get very detailed simulation results. It greatly
same AC data frames of different nodes. The concrete improves the efficiency of the simulation.
processes of the algorithm are as follows:
● The CW-based offset 5.1 Design of Simulation Cases
max
The biggest offset CWoffset [i ] is computed by The simulation in this paper only considers the impact of
MAC layer protocol on QoS requirements of multiple in-
CW [i ] [(1 CWmin [i ]) ],
max
telligent transportation service. Meanwhile, to cast the
(i 0,1, 2,3) .
offset
(9)
Pn
weight
[i ], impact of routing layer on the wireless communication
performance, this paper only considers one-leap commu-
max
Then a random value between 0 and CWoffset [i ] is se- nication without considering the impact on wireless com-
munication of barrier and relative speed. The results in
lected as the real offset by [11] shows that in one-hop range, the impact on thro-
max
CWoffset [i ] Random(0, CWoffset
max
[i ]), (i 0,1, 2,3) . (10) ughput and delay of distance and speed of the cars is not
obvious, but it has much relation with the number of the
Finally, according to (11), the real avoidance time can vehicles communicating at the same time. This paper ma-
be computed as inly simulates different cases by setting different numb-
T [ random(0, CW [i ]) ers of vehicles. In the simulation, the service scenario can
be divided into high density case, middle density case
CWoffset [i ] aSlotTime], (11) and low density case by the number of vehicles commu-
(i 0,1, 2,3) nicating at the same time.
Equations (10) and (11) show that the random offset 5.2 Parameter Settings
changes with the state of the whole network. The larger The services in Intelligent transportation systems can be
the value of network congestion condition is, the larger divided into four categories: active safety, such as warning
max
CWoffset [i ] is, it means the larger the choice scope of the of dangerous road, collision warning; public service, su-
offset is, the smaller the probability of choosing the same ch as emergency vehicles (fire engine, ambulance) which
offset is. can pass prior on congested road, emergency speech com-
● AIFS-based offset munications; driving assistance service, such as roads na
Above all, this algorithm can further distinguish the vigation, video monitoring; business and entertainment
start
Sense channel
NO Idle time
≧
AIFS new [i ]
YES
NO
idle Freeze the
Avoidance counter
YES
NO End of CWold [i ] (1 2 )
back off
YES
NO YES
i m Try to ranslate
Numntotal [i ] 1
NO
YES
NO
1 NO YES
i 0 Reach the
CWnew [i] CWmin [i] Pnweight [i ] i 1 collide maximal
4 Numncollision [i ] 1
retry count
YES
discard
service, such as Internet access, electronic map down- case; and 12 nodes are set in low-density vehicle case. In
load. each case every vehicle node carries only one service,
In view of the above service categories, applica- and in different cases the numbers of vehicle nodes
tion-layer sets four services in the simulation: emergency which carry different services are same. The parameters of
short message, speech, video, background, and the prior-
ity are from high to low. The service parameters are in Table 1. Parameter list
Table 1. This paper only considers the MAC layer’s ef-
fects for QoS, neglect routing layer and the above ones. Inter-packet Packet Transmission rate
service
Gap(s) size (Kbits/s)
The high layer is simulated by sending source modules.
Physical layer uses OFDM modulation technique, its emergence 0.01 12 9.6
bandwidth is 20 MHz, transmission rate is 24 Mbits/s,
speech 0.01 80 64
SIFS is 16 us, DIFS is 34 us, and a SlotTime is 9 us. It
distinguishes the different cases by setting different num- video 0.01 1250 1000
bers of vehicle nodes. 32 nodes are set in high-density
background 0.01 1500 1200
vehicle case; 20 nodes are set in middle-density vehicle
MAC layer are showed in Table 2, AC[3], AC[2], AC[1], 1850 kbits/s to 3250 kbits/s. Thus throughput of the
AC[0] are emergency short message, speech, video, back- video service and the background service respectively
ground services. increases by 31.1% and 75.7%. Therefore the total throu-
The AIFSN offset range of the mechanism proposed in ghput improves 38.6%. To sum up, the overall perform-
this paper is in Table 3. ances are improved.
For the middle-density case, the delay of various ser-
5.3 Simulation Results vices has a certain decrease; the bandwidth needs of back-
In the simulation, the performance of network throughput ground service are met; no packet loss occurs; and the
and delay are analyzed. Network throughput refers to the throughput performance is improved. In comparison to
summation of data packets received and successfully the EDCA mechanism, its overall performance is impro-
transmitted to application layer by MAC layer in all sites. ved to some extent.
Delay means different packets start when sending node For the low-density vehicles, the delay is smaller than
in the application layer generates and end when destina- that in EDCA mechanism. Network packet loss does not
tion node receives those packets, including media access occur any more. So the DE-AEDCA mechanism can
delay and transmission delay (ms). meet the needs of various service applications properly.
Figures 3, 4 and 5 are the simulation results with high As can be seen from the simulation results in the three
density, medium density, and low density, respectively. situations of high-density and high network load, middle-
The corresponding values of the four data streams in ED- density and high network load, as well as low-density
CA mechanism are described as the curves with round, and low network load, DE-AEDCA mechanism has both
left triangle, upper triangle and square symbols, accord- a higher network throughput and a smaller delay comp-
ing to their descending priority. The corresponding val- ared with EDCA mechanism. The reason is DE-AEDCA
ues of the four data streams in DE-AEDCA mechanism
are described as the curves with the plus sign, lower tri-
angle, right triangle and diamond symbols, by their prior-
ity from high to low. In figures, the x-axis represents the
simulation time (sec.), the y-axis represents the delay ti-
me (sec.) and throughput (bit/s) separately. Table 4 is the
statistic results for the three types of cases in simulation.
The simulation results with high-density of vehicles,
show that, in comparison to conventional EDCA, the del-
ays of various services in the proposed DE-AEDCA me-
chanism are decreasing. Thus, it can meet the demands of
security-related emergency short messages and QoS req-
uirements of speech service. Meanwhile the throughput
of video service increases from 6100 kbits/s up to 8000
kbits/s, and the packet loss rate drops to 6.25%. In addi-
tion, the throughput of background service rises from
(a)
Ni Mi
AC[3] 0 6
AC[2] 0 6 (b)
AC[1] 3 9
Figure 3. The simulate results at high density. (a) medium
AC[0] 3 9
access delay; (b) network throughput
(a) (b)
Figure 4. The simulate results at middle density. (a) medium access delay; (b) network throughput
(a) (b)
Figure 5. The simulate results at low density. (a) medium access delay; (b) network throughput
EDCA DE-AEDCA
mechanism considers the adjustment of competition pa- DE-AEDCA mechanism increases the range of the pa-
rameters in conditions of a low network load and a high rameters and reduces the possibility of choosing the same
network load, so whenever in high-density and middle- parameter by choosing a random offset, thus it can re-
density, or in the low-density vehicle cases, DE-AEDCA duce conflict of the same priority data in network and
mechanism can have better QoS performance than improve the channel utilization. Experiments show that
EDCA mechanism. the DE-AEDCA mechanism always has better perform-
In addition, among the data flows of same priority, ance than EDCA mechanism in all kinds of intelligent
Received December 24th, 2009; revised January 25th, 2010; accepted March 30th, 2010.
ABSTRACT
Cognitive radio is considered as one of the main enablers for provisioning dynamic and flexible spectrum/channel al-
location in wireless communications. The reliable data transmission over cognitive radio should employ modulation,
coding etc. and thus the performance of such a new communication system should be realized. In this paper, we provide
the performance analysis of adaptive modulation over a cognitive radio system in order to study the potential gain of
cognitive radios in terms of spectral efficiency. The results obtained show that the performance gain of cognitive radio
in adaptive modulation is remarkable.
each user l is trying to transmit by using an optimum being sensed as void from user l to user l + 1 over the
power control policy. The system’s operation is consid- total bandwidth W. This gain is obtained as follows:
ered to be under a wide-band context. Hence, the N 1 exp( SNR coff ) (4)
sub-bands of the cognitive radio channel extend to infi-
nite (N → ∞). The channel is assumed with fading com- where SNRcoff denotes the cut-off level in the correspo-
ponents that are varying slowly in time, i.e. the receiver nding SNR values. Taking into account the aforementi-
is able to sense and track the channel fluctuations. The oned formulas for the Rayleigh fading channel, we can
channel fluctuations represent the channel gains hl for note that the SNR cut-off value for the Rayeligh fading
each user l and are assumed over a block fading length in channel is equal to SNRcoff 0 / . In case of the
order to be able to retain their values constant during the
whole radio system, the sum spectral efficiency is con-
processed block. Under these assumptions, the average
sidered which is obtained as follows [3]
capacity of user l in bits/sec/Hz obtained by the follow-
ing equation: 1 L
Sesum C1, (5)
Rayleigh
1 Rayleigh
1 P (t )t t
Cl , l e dt (1) Figure 1 shows the spectral efficiency achieved in cog-
0
0 N0
nitive radio and the one achieved in conventional radio
for l [1, L ] that is the number of users being served systems. The numerical results derived from the aforem-
by the cognitive system with N sub-bands. However, the entioned analysis are dedicated to Rayleigh channels.
channel allocation for each user is performed in order to More specific, the line with cross marker type illustrates
maximize the transmission rate when the optimal power the spectral efficiency of optimal power and rate adapta-
is achieved. Hence, the power of Pl is subject to the av- tion using the closed-form (3). The line with square mar-
erage constraint: ker type depicts the sum spectral efficiency of cognitive
radio using the combination of closed-forms (3-6). It is
1 evident that the propagation over cognitive radio yields
0 ) et dt 1
0
( (2)
0 t an increase in capacity that has a considerable value in
low average SNR regions that is ranged between 0.2-0.3
This technique for optimal power and rate adaptation bits/sec/Hz. For comparison purposes, we also depict the
is relied on water-filling algorithm and the corresponding sum spectral efficiency of cognitive radio when only the
SNR cut-off levels. In our case, the cut-off SNR levels primary user is considered that is in fact the capacity of
are equal to 0 Ν 0 that denote the values of the chan- user 1 over Rayleigh fading channel model.
nel gain above which a user can transmit on a sub-band.
The term N 0 denotes the additive Gaussian noise at the
2.2 Spectral Efficiency of Adaptive Modulation
receiver, while the 0 is calculated by keeping the
Although, adaptive modulation was introduced in [5]
aforementioned transmit power constraint expressed by
studying both variable rate and variable power (VRVP)
equation (2). However, in order to obtain the perform-
ance of adaptive modulation over cognitive radio, we
keep below the formulation of Rayleigh channel fading Capacity of Cognitive Radio over Rayleigh Fading Channel
6
Capacity per Unit Bandwidth [Bits/Sec/Hz]
efficiency of VRVP is the sum of data rates multiplied by Figure 2. The spectral efficiency of adaptive modulation
the probability that the fading level falls in that region over cognitive radio
Gain in A daptive Modulation with 5 regions be noted that the performance gain of cognitive radio at
1.25
the physical layer in general, is remarkable at low fading
1.2 regions and is retained at the same level for more than a
Spectral Efficiency Gain
1
Department of Information Science and Engineering, Acharya Institute of Technology, Bangalore, Karnataka, India; 2 Department
of Computer Science and Engineering, B.M.S. College of Engineering, Bangalore, Karnataka, India; 3Department of Electronics and
Communication Engineering, B.M.S. College of Engineering, Bangalore, Karnataka, India.
Email: rameshbabu@acharya.ac.in, {gowrishankar.cse, pssvittala.ece}@bmsce.ac.in
Received April 13th, 2010; revised May 12th, 2010; accepted June 10th, 2010.
ABSTRACT
To understand the characteristics of the wireless networks, the network usage data from wireless measurement tools are
essential. The data collection is a process of collecting the network time-varying information in standardized format
and from standard interfaces. The characteristics include signal propagation, received signal quality, network traffic,
active applications and mobility of the mobile terminal (MT). The purpose of the measurement is to collect vital data of
the wireless network. There are several tools available for this purpose. The most widely used network measurement
tools are client side measurement tool, Syslog, Simple Network Management protocol (SNMP), network sniffing, wire-
less sniffing. This paper discusses the different wireless measurement tools and their benefits and limitation these tools.
search works reported on wireless performance using ● The location of the sniffer plays an important role in
Wireless sniffers .The measurement of streaming media the wireless sniffing. For example, a location very close
over wireless link using independent sniffers [29,30], to an AP is helpful when studying the AP behaviour, but
measurement of congestion in wireless LAN [31], in the may miss some traffic sent from a distant client due to
network monitor research in [32], a complete wireless signal attenuation and on the other hand the similar effect
sniffer system is implemented and used to characterize a is experienced when the sniffer is near to the client and
typical computer science department WLAN traffic. away from the AP. This results in ‘Generic losses.
Wireless measurement can be applied to the mobile ● The wireless sniffing suffers from ‘AP losses due to
host. This is accomplished by placing wireless network the firmware incompatibility between AP and monitoring
interface card in a monitor mode. In this mode, the wire-
device. These losses can be minimized by using redun-
less card captures all types of frames/packets. These
dant sniffers or sniffers with interface cards having dif-
frames/packets may be analyzed similar to those of net-
ferent chipset and using antennas of different gains and
work sniffing. Since this mode is not a promiscuous
mode it limits the wireless sniffer in the mobile host as a positioning the sniffers at strategic places [34].
simple network monitoring tool. Figure 5 shows an ex- 3. Conclusions
ample of wireless sniffing trace.
The advantages and disadvantages of wireless sniffing The wireless Measurement is an important phase of any
are as listed below. study on wireless networks. The data collection phase
Advantages of wireless sniffing are: acts as the building stone of the study of wireless meas-
● Wireless Sniffing done be an independent sniffer in urements. The various wireless measurements tools used
a promiscuous mode will not cause any interference with to measure the characteristics will have their own
the hosts under test in wireless experiment. Therefore, strength and weaknesses. The wireless sniffing is one of
sniffing can be used to measure these devices, such as the the measurement techniques that could be used for effec-
wireless game consoles, which do not provide general tive measurement of wireless network time varying
accesses for measurement purpose. characteristics. The data collection of wireless networks
● Wireless sniffing can provide frame level informa- can be supported by standardization of interfaces and
tion and wireless network conditions, such as the RSSI formats of information which is common to all network
and sending capacity. vendors. The archival of the network data will help in
● Wireless sniffers can be used as wireless network better understanding and methodical study of wireless
diagnostic tools as they are capable to capture wireless networks. Our future work includes the building up the
management frames, such as RTS, CTS, Authentication / effective measurement framework and step ahead for
De-authentication frames and Association / Disassocia- predicting the missing values in measurements by apply-
tion frames. ing intelligent hybrid technique like Fuzzy neural ap-
Disadvantages of Wireless sniffers are: proach.
● Wireless sniffers cannot record all the frames that
are transmitted over the network [31,33] since the sniffer REFERENCES
is only capturing the frames at its own location this re-
sults in non capturing of the packets lost due to a hid- [1] M. S. Kuran and T. Tugcu, “A Survey on Emerging
den ter- minal and packets lost due bit errors. Broadband Wireless Access Technologies,” Computer
● The Received Signal Strength Indicator (RSSI) is Networks, Vol. 51, No. 11, 2007, pp. 3013-3046.
measured relative to the wireless sniffer installation loca- [2] F. Siddiqui and S. Zeadally, “Mobility Management
tion. This measurement of received signal strength may across Hybrid Wireless Networks: Trends and Chal-
not be same as the AP or the clients that are remote from lenges,” Computer Communications, Vol. 29, No. 9, 2006,
pp. 1363-1385.
the wireless sniffer installation location.
[3] W. Chen and Y. Shu, “Active Application Oriented Ver-
tical Handoff in Next-generation Wireless Networks,”
No. Time Source Destination Protocol Info IEEE Wireless Communication and Networking Confer-
2458 55.951347 XXX_1a:97:ab (RA) IEEE 802.11 Clear-to-send ence, Vol. 3, 2005, pp. 1383-1388.
2459 55.951553 XXX_1a:97:ab YYY_11:30:a8 IEEE 802.11 Data [4] T. Al-Gizawi, K. peppas, D. Axiotis, et al., “Interopera-
2460 55.951831 XXX_1a:97:ab (RA) IEEE 802.11 Clear-to-send bility Criteria, Mechanisms and Evaluation of System
2461 55.952174 XXX_1a:97:ab YYY_11:30:a8 IEEE 802.11 Data Performance for Transparently Interoperating WLAN and
2462 55.952847 XXX_1a:97:ab (RA) IEEE 802.11 Clear-to-send UCLIENTS-HSDPA Networks,” IEEE Networks, Vol. 19,
2463 55.953895 XXX_1a:97:ab YYY_11:30:a8 IEEE 802.11 Data
No. 1, 2005, pp. 66-72.
2464 55.954070 XXX_1a:97:ab(RA)IEEE 802.11 Acknowledgement [5] Q. Song and A. Jamalipour, “Network Selection in an
Integrated Wireless LAN and UCLIENTS Environment
Figure 5. Wireless sniffing trace in WLAN using Mathematical Modeling and Computing Tech-
niques,” IEEE Wireless Communication Magazine, Vol. [20] D. Tang and M. Baker, “Analysis of a Local-Area Wire-
12, No. 3, 2005, pp. 42-48. less Network,” Proceedings of MOBICOM’00, Boston,
[6] F. Zhu and J. McNair, “Optimization for Vertical Handoff August 2000, pp. 1-10.
Decision Algorithms,” IEEE Wireless Communication [21] M. Balazinska and P. Castro, “Characterizing Mobility
and Networking Conference, Vol. 2, 2004, pp. 867-872. and Network Usage in a Corporate Wireless Local-Area
[7] J. Zhang, L. Cheng and I. Marsik, “Models for Non-in- Network,” Proceedings of MOBISYS’03, San Francisco,
trusive Estimation of Wireless Channel Bandwidth,” 9th May 2003, pp. 303-316.
IFIP International Conference on Personal Wireless Com- [22] M. Subramanian, “Network Management: Principles and
munication Conference, 2003, pp. 334-348. Practice,” Addison-Wesley, Reading, 2000
[8] M. Papadopouli, H. Shen, E. Raftopoulos, et al., “Short- [23] J. Flick and J. Jhonson, “Definitions of Managed Objects
term Traffic Forecasting in Campus-wide Wireless Net- for Ethernet-Like Interface Types,” IETF RFC 2665,
works,” 16th IEEE International Symposium on Personal, Chipcom Corporation, August 1999.
Indoor and Mobile Wireless Communications, 2005, pp. [24] Mani Subramanian, “Network Management,” Pearson
1446-1452. Education.
[9] K. Pahlvan and P. Krishanamurthy, “Principles of Wire- [25] “Ethereal Protocol Analyzer”. http://www.ethrereal.com
less Networks—A Unified Approach,” Prentice-Hall, Inc.,
2002. [26] “Kismet Wireless Sniffing Software”. http://www.Kis-
metwireless.net
[10] R. Prasad, “OFDM for Wireless Communication Sys-
tems,” Artech House Inc., Norwood, 2004. [27] Tcpdump Packets Capture Software. http://www.tcpdump.
org
[11] D. Tang and M. Barker, “Analysis of a Metropolitan-Area
Wireless Network,” Wireless Networks, Vol. 8, 2002, pp. [28] R. Shenoy, A. L. Ananda, M. C. Chan and W. T. Ooi,
107-120. “Mobile, Wireless and Sensor Networks: Technology,
Application and Future Directions,” John Wiley & Sons,
[12] M. Claypool, R. Kinicki, W. Lee, M. Li and G. Ratner, Hoboken, 2006
“Characterization by Measurement of a CDMA 1xEVDO
Network,” 2nd International Workshop on Wireless In- [29] T. Kuang and C. Williamson, “Real Media Streaming
ternet, 2006, pp. 2-es Performance on an IEEE 802.11b Wireless LAN,” Pro-
ceedings of IASTED Wireless and Optical Communica-
[13] F. Chinchilla, M. Lindsey and M. Papadopouli, “Analysis tions (WOC), July 2002, pp. 306-311.
of Wireless Information Locality and Association Patterns
in a Campus,” Proceedings of INFOCOM ’04, Hong [30] G. W. Bai and C. Williamson, “The Effects of Mobility
Kong, March 2004, pp. 906-917. on Wireless Media Streaming Performance,” Proceedings
of Wireless Networks and Emerging Technologies
[14] D. Kotz and K. Essien, “Analysis of a Campus-wide (WNET), July 2004, pp. 596-601.
Wireless Network,” Proceedings of MOBICOM’ 02, At-
lanta, September 2002, pp. 107-118. [31] A. P. Jardosh, K. N. Ramachandran, K. C. Almeroth and
E. M. Belding-Royer, “Understanding Congestion in
[15] C. Lonvik, “The BSD Syslog Protocol,” IETF RFC 3164, IEEE 802.11b Wireless Networks,” Proceedings of the
August 2001, pp. 1-27. Internet Measurement Conference (IMC), Berkeley, Oc-
[16] T. Henderson, D. Kotz and I. Abyzov, “The Changing tober 2005, pp. 279-292.
Usage of Mature Campus-Wide Wireless Network,” 10th [32] J. Yeo, M. Youssef and A. Agrawala, “A Framework for
ACM International Conference on Mobile Computing and Wireless LAN Monitoring and its Applications,” ACM
Networking, 2004, pp. 187-201. Workshop on Wireless Security (WiSe 2004) in Conjunc-
[17] D. Kotz and K. Essien, “Analysis of a Campus-wide tion with ACM MobiCom 2004, Philadelphia, October
Wireless Network,” Wireless Networks, Vol. 11, No. 1-2, 2004, pp. 70-79.
2005, pp. 115-133 [33] M. Claypool, “On the 802.11 Turbulence of Nintendo Ds
[18] K. McCloghire, D. Perkins and J. Schoenwaelder, “Struc- and Sony PSP Hand-Held Network Games,” Proceedings
ture of Management Information Version 2 (SMIv2)”, of the 4th ACM Network and System Support for Games
IETF RFC 2578, April 1999. (Net Games), Hawthorne, October 2005, pp. 1-9.
[19] Balachandran, G. M. Voelker, P. Bahl and V. Rangan [34] J. Yeo, S. Banarjee and A. Agarwaala, “Measuring Traf-
“Characterizing User Behavior and Network Performance fic on the Wireless Medium: Experience and pitfalls,”
in a Public Wireless LAN,” Proceedings of ACM SIG- Technical Reports, CS-TR-4421, Department of Com-
METRICS ’02, Marina Del Rey, June 2002, pp. 195-205. puter Science, University of Maryland, December 2002.
Received May 15th, 2010; revised June 20th, 2010; accepted July 7th, 2010.
ABSTRACT
This paper presents simulation of WiMAX based system under jamming. The performance of the system was found out
to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system devel-
opment should be focused on. In addition, from the basic theory point of view, rather surprising results were also found.
This work should give a clear picture of how the studied WiMAX system performs under jamming as well as without
jamming. The results show that some forms of interference degrade the performance of the system rapidly, thus the form
of incoming jamming should be known and considered before deploying the system. Single carrier jamming and mul-
ti–carrier jamming are discussed here. The issues related to jamming and jamming reduction techniques are also cov-
ered. Jamming can destroy communication in the targeted area. Multi–carrier jamming is challenge in WiMAX because
WiMAX is having OFDM based physical layer. Simulation is the main approach in this paper. OPNET MODELER 14.5
is the software used for the simulation purpose.
the system under investigation in this paper. Denial of tion, which is the basic resource unit, fixed and therefore
service is very similar to jamming but it is MAC layer makes scaling have minimal impact on higher layers. A
threat [5]. scalable design also keeps the costs low. The subcarrier
At the transmitter side, the information data first un- spacing of 10.94 kHz was chosen as a good balance be-
dergoes channel coding composed of randomization, for- tween satisfying the delay spread and Doppler spread
ward error correction (FEC), and interleaving. Random- requirements for operating in fixed and mobile environ-
izer uses a Linear Feedback Shift Register (LFSR) to ments. This subcarrier spacing can support delay–spread
scatter long data strings of zeros or ones. FEC concaten- values up to 20 micro seconds and vehicular mobility up
ates an outer Reed–Solomon encoder with an inner rate to 125 km per hour when operating in 3.5 GHz. A sub-
compatible convolutional encoder. FEC helps to correct carrier spacing of 10.94 kHz implies that 128, 512, 1,024,
the errors in subcarriers to a certain limit. The interleaver and 2,048 FFT are used when the channel bandwidth is
takes two permutations to rearrange the subcarriers so 1.25 MHz, 5 MHz, 10 MHz, and 20 MHz, respectively.
that the burst errors are distributed more uniformly at the 2–11 GHz is used for Fixed NLOS and 2–6 GHz is used
demodulation input. After channel coding, data bits are for mobile NLOS. It should, however, be noted that mo-
mapped and modulated onto the allocated subcarriers by bile WiMAX may also include additional bandwidth pro-
QPSK, 16–QAM and 64–QAM modulation. Subse- files. For example, a profile compatible with WiBro will
quently, data are transmitted by OFDM method. In the use an 8.75 MHz channel bandwidth and 1,024 FFT.
receiver side, all the procedures carried out in the trans- This obviously will require different subcarrier spacing
mitter side are implemented again but in a reverse direc- and hence will not have the same scalability properties.
tion. One OFDM symbol can be divided into two parts in The number of subcarriers may be 512, 1024 and 2048.
time domain: the cyclic prefix (CP) time and the useful Data subcarriers, Null subcarriers and Pilot subcarriers
symbol time [6,7]. The CP locates in the beginning of the are also given in next section for 512, 1024 and 2048
symbol and is a duplication of the tail of the useful sym- subcarriers.
bol, which is introduced to mitigate the effect of multi-
path. In frequency domain, an OFDM symbol is compo-
3. Jamming in Detail
sed of a series of subcarriers. In Wireless MAN–OFDM There are two types of jamming: single carrier jamming
PHY, the number of subcarriers is 256. As per Figure 1, and multicarrier jamming.
three types of subcarriers can be categorized: 192 data
subcarriers carrying payload, 8 pilot subcarriers mainly 3.1 Single Carrier Jamming
for channel estimation, and 56 null subcarriers for guard- The goal of single carrier jamming is to insert an interfe-
ing purpose. The pilot subcarriers distribute evenly am- rence signal into the enemy communication system so
ong the data subcarriers. This is standard symbol in fre- that the wanted signal is completely submerged by the
quency domain. interference. This form of jamming is also known as de-
Channel estimation is mandatory for the OFDM syst- nial of service attack or obscuration jamming. The opti-
ems employing coherent detection. Comb type pilot cha- mal jamming waveform is intuitively white Gaussian
nnel estimation is capable of collecting instant informat- noise (WGN), since from the information theory point of
ion of the channel and therefore used in this research. view, it has maximum entropy. This conclusion can also
The channel estimation for the payload subcarriers is ac- be drawn from the fact that the receiver can not distin-
hieved by interpolation, using the channel information guish between jammer injected noise and its own [8-9].
obtained at the 8 pilot subcarriers. In this paper IEEE Based on the relationship between jammer bandwidth
802.16e–2005 is simulated under jamming. In Mobile and that of the equipment, single carrier jamming can be
WiMAX, the FFT size is scalable from 128 to 2,048. categorized into narrow– (spot) and wideband (barrage)
Here, when the available bandwidth increases, the FFT jamming. The relationship is conveniently expressed as
size is also increased such that the subcarrier spacing is
BJ Jammer_bandwidth
always 10.94 kHz. This keeps the OFDM symbol dura- = (1)
BVS Victim_system_bandwidth
Data subcarriers DC subcarrier Pilot subcarriers Typically, if the ratio BJ/BVS is less than 0.2 jamming
is considered to be spot jamming and if greater than 1,
barrage jamming. The main advantage of single carrier
jamming is that, very little information about the en-
emy’s equipment is required. However, there are great
many factors, which make the performance of a noise
Guard band Channel Guard band
jammer to drop below its theoretical capability. The fact
Figure 1. OFDM symbol frequency domain representation that a noise jammer has to function on victim systems
[7] using arbitrary polarizations, generally leads to usage of
either 45 degrees slant polarized or circularly polarized OFDMA the symbol duration and subcarrier spacing is
jammer radiations. This causes a rather modest effective
Ts Tb Tg (2)
radiated power (ERP) drop of typically 3 dB, but more
serious losses in the order of tens of dB occur as a result 1
of bad noise quality and e.g. orthogonal polarization be- Tb (3)
delta _ f
tween jammer and victim antennas. The easiest way of
creating an effective noise jammer is to pass bandwidth
band–limited noise through an RF–amplifier and to the delta _ f n (4)
subcarriers
transmitting antenna. This method is also known as direct
noise amplification (DINA). Tb
Tg (5)
8
3.2 Multicarrier Jamming
where, n = sampling factor
Multicarrier jamming differs from single carrier jamming delta_ f = tone spacing
by being suitable only for jamming the system it is desi- TS = symbol duration
gned for. The general idea is to determine the most criti-
Tg = guard time
cal vulnerability of the victim system in terms of the car-
Tb = useful symbol duration
riers used and then inject a very narrowband signal, e.g.
fixed. Number of sub-carriers and bandwidth is changed
zero bandwidth sine signal, onto the those carriers. If da-
to keep symbol duration and subcarrier spacing fixed.
ta subcarriers are destroyed by jamming then information
Equation (4) shows number of subcarriers is proportional
is lost so throughput is reduced so bit error rate (BER) is
to bandwidth of channel for scalable OFDMA. It is mul-
increased. If pilot subcarriers are destroyed by jamming
then channel estimation is very difficult. More informa- ticarrier scheme. Multicarrier jamming scenario is shown
tion about the enemy’s equipment is required in multic- in Figure 4.
arrier jamming, because only some subcarriers are targ-
eted. In simulation only fixed NLOS is considered. In
OFDMA there are data subcarriers, pilot subcarriers, gu-
ard subcarriers. The simulation parameters required for
multicarrier jamming are described in next section.
4. Simulation Setup
4.1 Simulation Parameters for Single Carrier
Jamming
In this paper fixed NLOS WiMAX system is simulated
under jamming. Single carrier jamming scenario is sho-
wn in Figure 2.
The node model of jammer is given in Figure 3.
Source parameters for the jammer are packet inter–arr-
ival time, packet size, jammer start time, stop time and
transmitter power. According to target system these pa-
rameter are chosen.
Radio parameters are data rate, packet formats, freque-
ncy and bandwidth. Frequency is chosen according to ca-
rrier frequency of target system.
Antenna can be isotropic, WiMAX Omni and WiMAX
sector antenna. Polarization is also much important in pr- Figure 2. Scenario used for single carrier jamming
actical case of jamming. If polarization of jamming sys-
tem antenna is not proper then it results in wastage of
power.
4.2 Simulation Parameters for Multicarrier
Jamming
Multi carrier jamming is difficult to simulate. In this pa-
per multi carrier jamming effect is modeled. Symbol du-
ration is calculated by the following equation. In scalable Figure 3. Node model of jammer
Table 1. PUSC permutation scheme for uplink [11] Table 2. PUSC permutation scheme for downlink [1]
Figure 5. BER vs. simulation time Figure 7. Throughput vs. simulation time
Figure 9. Throughput vs. simulation time for uplink Figure 10. Delay vs. simulation time for uplink
Figure 11. Throughput vs. simulation time for downlink Figure 12. Delay vs. simulation time for downlink
WiMAX Mesh Network,” Communications Laboratory, World Network Service Provider Deployments,” 2007.
Helsinki University of Technology, Helsinki, June 2006. [10] IEEE 802.16 Working Group, “IEEE 802.16–2004 Local
[7] J. Li and S.-G. Häggman, “Performance of IEEE 802.16 and Metropolitan Area Networks – Part 16: Air Interface
Based System in Jamming Enviornment and its Im- for Fixed Broadband Wireless Access Systems IEEE
provement with Link Adaption,” The 17th Annual IEEE Standard for Local and Metropolitan Area Networks,”
International Symposium on Personal, Indoor and Mobile IEEE Computer Society Press, 2004.
Radio Communications (PIMRC’06), 2006, Helsinki, pp. [11] IEEE 802.16 Working Group, “IEEE 802.16e–2005 IEEE
1-5. Standard for Local and Metropolitan Area Networks Part
[8] M. Nasreldin, H. Aslan, M. El-Hennawy and A. El-Hen- 16: Air Interface for Fixed and Mobile Broadband Wire-
nawy, “WiMAX Security,” 22nd International Confer- less Access Systems Amendment for Physical and Me-
ence on Advanced Information Networking and applica- dium Access Control Layers for Combined Fixed and
tions, Ginowan, 2008, pp. 1335-1340. Mobile Operation in Licensed Bands,” IEEE Computer
[9] White Paper by Motorola, “WiMAX Security for Real– Society Press, 2005.
Received May 13th 2010; revised June 20th 2010; accepted July 9th 2010.
ABSTRACT
This paper designs an underwater acoustic communication system based on tamed spread spectrum and Frequency
Hopping Multiple Access (FHMA) for multiple underwater vehicles. In this system, multiple underwater vehicles can
communicate with the console on the water surface simultaneously successfully. The communication system is com-
posed of tamed spread spectrum modulation and demodulation, frequency hopping modulation and demodulation with
synchronization function, 4FSK modulation and demodulation and Rake Receiver. In order to make the system more
feasible, underwater channel and the effect of user number on Bit Error Ratio (BER) are also taken into account. The
simulation results indicate that it is feasible to use this system to accomplish underwater communication reliably for
multiple users due to the low BER.
Keywords: Underwater Acoustic Communication, Tamed Spread Spectrum, FHMA, Multiple Underwater Vehicles
the system. The simulation results are shown in Section 4. Figure 1 [15].
Finally, the conclusions are made and the future research When the input signal is s(t), the output signal is
in this field is presented. L
r (t ) = ∑ ak (t )s (t − τ k (t )) + n(t ) (1)
2. Underwater Acoustic Channel k =1
2.1 Characteristics of Underwater Acoustic where L is the number of multipath; ak(t) is the time-
Channel varying attenuation factor in the kth transmission path; τk(t)
is the delay; n(t) is additive white noise.
Underwater acoustic channel is the most complex comm-
unication channel that we have known about. It brings 3. Communication Approaches
many difficulties to underwater communication. The cha- Because the underwater environment is rather complex,
racteristics of underwater acoustic channel are limitation it is very important to decide the structure and the meth-
of frequency bandwidth, varying multipath, fast fading od of communication to ensure the reliability. In this
and high noise. section, the working principle and the structure of the
The absorption and the diffusion of acoustic energy re-
system will be expounded in detail.
late to transmission distance and frequency. That is to say
transmission loss increases as transmission distance and 3.1 Tamed Spread Spectrum Communication
frequency increase. This characteristic results in great at-
tenuation of high frequency signal in long distance trans- Developing from Direct Sequence Spread Spectrum (DS-
mission. Reference [13] points out that the bandwidth can SS), tamed spread spectrum technique is widely used in
be lager than 100 kHz in near distance (< 1 km); in middle communication field in recent years with the characteris-
distance (1-20 km), the bandwidth is limited in the magni- tics of resisting interference, great security and large ca-
tude of ten kilohertz; the bandwidth is only about several pacity. Different with DSSS, tamed spread spectrum ac-
kilohertz in long distance (20-2000 km). complishes spread spectrum by way of encoding (N, k).
There are many noise sources in the ocean. Some ty- A binary data of k bits is expressed by a sequence of N
pical noise sources are listed as the frequency rises [14]. bits Pseudo Noise (PN) code. The spreading gain of G =
The effect of hydrostatic pressure caused by tide and N/k is smaller than that of DSSS, and may not be integer,
wave; disturbance of earthquake; onflow; sailing ship; which is very suitable to the limitation of the frequency
surface wave; thermal noise. For the frequency in the bandwidth in underwater acoustic communication. There
magnitude of ten kilohertz, a main noise source is surface are 2k states in a binary data of k bits; accordingly, 2k
wave. The high noise will cause the original signal diffi- sequences of PN code are necessary. This means that
cult to recover. these sequences need to have good characteristics of
Because of the reflection of the surface and the floor autocorrelation and cross correlation. In other words, 2k
of ocean as well as the existent of reflectors and scatter- sequences of PN code should be orthogonal.
ers caused by the organisms, acoustic wave will reach the Figure 2 is the model of tamed spread spectrum com-
receiving part along several different paths after it is sent. munication system. The signal after encoded can be ex-
This phenomenon is called multipath transmission. It’s a pressed as
most important factor that affects the performance of a1 (t )
underwater acoustic communication. Multipath transmis- τ 1 (t ) n(t )
sion results in signal distortion (fast fading) and selective
a2 (t )
fading. The amplitude and the phase of the signal will s (t ) τ 2 (t ) r (t )
change along with time and frequency which brings on
gg gg ∑ +
errors in the receiving part. In order to solve the problem,
equalization technique, diversity technique, spread spec-
g g a (t )
L
τ L (t )
trum technique and array technique can be adopted.
Figure 1. The model of time-varying multipath channel with
2.2 The Model of Underwater Acoustic Channel additive white noise
Because underwater acoustic channel is very complex, it
can’t be represented by a precise simulation model. Gen- {ak }
erally speaking, underwater acoustic channel is a kind of
a0 a1 ggg ak −1
slow time-varying coherent multipath channel. In the le-
ngth of coherent time, it can be simplified as a coherent {bN }
multipath channel, which only has multipath effect. In
this paper, a typical model of acoustic ray is adopted to Figure 2. The model of tamed spread spectrum communica-
implement the simulation. The model is expressed as tion system
∞
b(t ) = ∑ c j (t − iT ) ∫ (g) dt
T
(2) 0
i =0
{rN } ∫
T
(g) dt { yk }
where c(t) is the PN code, and j is decided by the weight 0
k −1 k −1 g g g g g g g g g
of ak(t): j = ∑ an 2n , ak (t ) = ∑ am g a (t − mTa ) , g a (t )
∫ (g) dt
T
n=0 m =0 2k 0
g g g g g g
g g g
This equation indicates that the more the times of fail- system. In the transmitting part, the original data (digital
ure are, the more the probability density of the synchro- binary sequence) is tamed spread firstly and then it is
nization is. 4FSK modulated. Next, the signal is mixed by a series of
For synchronization tracking, a representative tracking other frequencies produced by a frequency synthesizer
technique of FHSS signal is feasible, which is shown in which is controlled by the PN code. Finally, the digital
Figure 7 [15]. signal is turned into acoustic signal and emitted to the
channel through the underwater acoustic transducer. Ac-
3.5 Structure and Model of the Communication cordingly, the receiving part is composed of four parts: 1)
System Rake Receiver; 2) FH de-spread (with synchronization
function); 3) 4FSK demodulate; 4) tamed de-spread.
The framework of the communication system is shown in Based on the characteristics of underwater acoustic chan-
Figure 8. It is composed of several underwater vehicles nel combined with FH system, 4FSK noncoherent detec-
and a console on the surface of water. All the underwater tion is adopted as demodulation method in this paper.
vehicles can communicate with the console simultane- This section will give the simulation results. The ori-
ously. ginal data and the received data, the frequency spectro-
Figure 9 is the principle model of the communication gram and the BER curve are included.
Console Surface
UV1 UV4
UV2 UV3
Floor
f1 f2 f3 f4
4FSK
FH
10 11.95 13.9 15.85
′
f 1 10.4 20.4 22.35 24.3 26.25
′
f 2 18.2 28.2 30.15 32.1 34.05
4 ∆f
′
f 3 26 36 37.95 39.9 41.85 Tf t
′
f 4 33.8 43.8 45.75 47.7 49.65 Figure 10. The FH pattern of the communication system
Amplitude
0 0
-0.5 -0.5
-1 -1
-1.5 -1.5
0 0.01 0.02 0.03 0.04 0.05 0.06 0 0.01 0.02 0.03 0.04 0.05 0.06
Time(s) Time(s)
Amplitude
Amplitude
0 0
-0.5 -0.5
-1 -1
-1.5 -1.5
0 0.01 0.02 0.03 0.04 0.05 0.06 0 0.01 0.02 0.03 0.04 0.05 0.06
Time(s) Time(s)
Figure 13, Figure 14, Figure 15, Figure 16 show the ree according to the requirement so that they can’t affect
transforming process of the signal frequency spectrogram the basic communication. Generally speaking, in the in-
(User 1 and User 2) in the transmitting part and the chan- struction communication system, the requirement of BER
nel. From Figure 13 and Figure 14 we can see that after is very strict (< 10–6). Correspondingly, in the voice and
tamed spread, the frequency spectrogram is spread. Six- image communication system, the requirement of BER is
teen FH points are shown clearly in Figure 15. Figure lower (10–3-10–5). The relationship between BER and
16 indicates that the original signal is submerged in the SNR of the communication system designed in this paper
noise when it is transmitting in the channel. However, is shown in Figure 17. From the figure we notice that the
due to the adoption of techniques such as spread spec- BER is less than 10–4 when the SNR is –14dB. The origi-
trum, channel coding and Rake receiver, the energy of
nal bit rate is 650 b/s, it can carry out some data and sim-
the noise is reduced in the receiving part and the original
ple voice communication and the BER level is acceptable
signal is recovered.
in practice.
4.3 Discussion of BER Figure 18 shows the effect of user number on BER. It
indicates that BER grows as user number grows on av-
BER is a most important index to estimate the perform-
erage because of the interference between each other. But
ance of a communication system. In fact, because of the
existence of the channel and the noise caused by hard- on the whole, the interference is very low due to the good
ware itself, there are always errors in the communication. correlation of PN code.
What we could do is to reduce the errors to a certain deg-
2000
400
1500
Amplitude
300
1000
Amplitude
200
500
100
0
0 0.5 1 1.5 2
0 Hz ×104
0 0.5 1 1.5 2
4
Hz x 10 Figure 15. The frequency spectrogram of the signal after
FHMA
Figure 13. The frequency spectrogram of the original signal
300 400
300
Amplitude
200
Amplitude
200
100
100
0 0
0 0.5 1 1.5 2 0 0.5 1 1.5 2
4
Hz x 10
4 Hz x 10
Figure 14. The frequency spectrogram of the signal after Figure 16. The frequency spectrogram of the signal after
tamed spread adding AWGN
0.015
ing for Quality Improvement,” Proceedings of IEEE
0.01 Military Communications Conference MILCOM, Orlando,
2007, pp. 1-7.
0.005
[5] T. C. Yang and W.-B. Yang, “Low Signal-to-Noise-Ratio
0 Underwater Acoustic Communications Using Direct-
-20 -15 -10 -5 0
Sequence Spread-Spectrum Signals,” OCEANS 2007—
SNR
Europe, Aberdeen, 2007, pp. 1-6.
Figure 18. The effect of user number on BER [6] C. B. He and J. G. Huang, “Underwater Acoustic Spread
Spectrum Communication Based on M Family N group
Parallel Transmission,” OCEANS 2006—Asia Pacific,
5. Conclusions Singapore, 2007, pp. 1-4.
This paper designs a kind of underwater acoustic comm- [7] X.-Y. Wang, Z.-F. Zhu and S.-L. Fang, “Noncooperative
unication system based on tamed spread spectrum and Detection and Parameter Estimation of Underwater
FHMA for multiple underwater vehicles. Aiming at the Acoustic DSSS-BPSK Signal,” 14th International Con-
characteristics of limitation of frequency bandwidth and ference on Mechatronics and Machine Vision in Practice,
high noise in underwater acoustic channel, two key tech- Xiamen, 2007, pp. 52-56.
niques of tamed spread spectrum and FHMA are adopted [8] S. X. Guo and Z. X. Zhao, “A CDMA Acoustic Commu-
in order to ensure the communication reliability. Besides, nication System for Multiple Underwater Robots,” Pro-
Rake Receiver is also an important part in the system to ceedings of the 2008 IEEE, International Conference on
Robotics and Biomimetics, Bangkok, 2008, pp. 1522-
reduce the influence caused by multipath effect. Mean-
1526.
while, the synchronization of FH part and underwater
channel are also discussed. The simulation results indi- [9] Z. X. Zhao and S. X. Guo, “A QPSK-CDMA Based Ac-
oustic Communication System for Multiple Underwater
cate that this system could enable multiple vehicles to
Vehicles,” Proceedings of the 5th International Confer-
communicate simultaneously successfully. The system ence on Information, Kitakyushu, 2009, pp.124-127.
could realize some data and simple voice communication,
[10] S.-J. Hwang and P. Schniter, “Efficient Multicarrier
which is acceptable in practice. The theory and the re-
Communication for Highly Spread Underwater Acoustic
sults in this paper have referenced value in the research Channels,” IEEE Journal on Selected Areas in Commun-
of underwater acoustic communication. ications, Vol. 26, No. 9, 2008, pp. 1674-1683.
Next work is to set up duplex communication links
[11] S. Roy, T. M. Duman, V. McDonald and J. G. Proakis,
between multiple users and the console in order to ensure “High-Rate Communication for Underwater Acoustic Ch-
the equipments can transmit and receive simultaneously annels Using Multiple Transmitters and Space-Time Co-
at any time, which is a very important problem in the un- ding: Receiver Structures and Experimental Results,”
derwater acoustic networks. IEEE Journal of Oceanic Engineering, Vol. 32, No. 3,
2007, pp. 663-688.
6. Acknowledgements
[12] M. Stojanovic and L. Freitag, “Multichannel Detection
This research is supported by Kagawa University Cha- for Wideband Underwater Acoustic CDMA Communica-
tions,” IEEE Journal of Oceanic Engineering, Vol. 31, [15] J. G. Proakis, “Digital Communications,” 4th Edition
No. 3, 2006, pp. 685-695. MeGraw-Hill Science, New York, 2000.
[13] R. J. Vaccaro, “The Past, Present, and Future of Under- [16] S. X. Guo and Z. X. Zhao, “Design of a QPSK-CDMA
water Acoustic Processing,” IEEE Signal Processing Acoustic Communication System for Multiple Underwa-
Magazine, Vol. 15, No. 4, July 1998, pp. 21-51. ter Vehicles,” IEEE International Conference on Mecha-
[14] R. J. Urick, “Principles of Underwater Sound,” 3rd Edi- tronics and Automation, Changchun, 2009, pp. 3568-
tion, New York, McGraw-Hill, 1983. 3572.
Received May 18th 2010; revised June 15th 2010; accepted July 6th 2010.
ABSTRACT
Vast segments of the frequency spectrum are reserved for primary (licensed ) users. These legacy users often un-
der-utilize their reserved spectrum thus causing bandwidth waste. The unlicensed (secondary) users can take advantage
of this fact and exploit the spectral holes (vacant spectrum segments). Since spectrum occupancy is transient in nature it
is imperative that the spectral holes are identified as fast as possible. To accomplish this, we propose a novel adaptive
spectrum sensing procedure. This procedure scans a wideband spectrum using Hilbert Huang Transform and detects
the spectral holes present in the spectrum.
Keywords: Empirical Mode Decomposition (EMD), Ensemble Empirical Mode Decomposition (EEMD), Intrinsic Mode
Function (IMF), Noise Assisted Data Analysis (NADA), Cognitive Radio, Guard Band, Spectrum Sensing
1. Introduction les, it has to decide on the best spectrum band to meet the
Quality of Service requirements over all available spectr-
Wireless networks, till date, are regulated by fixed spect- um bands
rum allocation policies to operate in a particular time Spectrum Mobility: As the objective is to use the spec-
frame, certain frequency bands and are also constrained trum in a dynamic manner they should enable transition
to geographical regions. Recent trends show that certain to better spectrum by secondary users.
radio bands are overcrowded while some are moderately Spectrum Sharing: Involves spectrum scheduling for
or sparsely used. In order to utilize the spectrum opti- efficient spectrum usage.
mally and efficiently, cognitive radio technology has In this paper transmitter detection method is used. So-
been proposed as a potential communication paradigm me authors used wideband spectrum joint detection for
[1]. Cognitive radios are defined by the Federal Commu- the presence of a primary user [4]. Some have used spa-
nications Commission (FCC) [2] as radio systems that tial diversity to find the presence of a primary user by
continuously perform spectrum sensing, dynamically sharing the information over a network [5].Cognitive Ra-
identify unused spectrum, and then operate in those dio is essential locally reuse unused spectrum by primary
spectral holes where the licensed (primary) radio systems users (spectral holes) in order to increase the total chan-
are idle. In CR networks secondary users are allowed to nel capacity. Efficient spectrum utilization can be achi-
utilize unoccupied bandwidths provided they do not eved by making a secondary user to access a spectrum
cause interference to primary users. Many have worked hole created by the primary user at any location and time.
on the sensing of a wideband spectrum. The main func- The greatest task in sensing spectrum is in developing
tions of cognitive radios are [3]: techniques which are able to detect even very weak pri-
Spectrum Sensing: refers to detect the unused spectrum mary user signals at the same time reasonably fast and
and sharing it without any interference with other users, low computational cost. This can be encountered by util-
by sensing spectrum holes. Spectrum sensing techniques izing a novel technique called Hilbert Huang Transform
can be classified into three categories, namely 1) Trans- [6].
mitter detection by inspecting the spectrum generated, 2)
Cooperative detection, which pools information from 2. System Model
multiple cognitive radio users and, 3) Interference based
2.1 Hilbert Huang Transform
detection, by using an interference temperature model.
Spectrum Management: Having known the spectral ho- Traditional data analysis methods are based on assump-
tions that the data is linear and stationary. In recent years 3) The mean of the envelopes is designated as m1.
new methods in the field of data analysis have been in- 4) The difference between the data and mean is the
troduced. For example, wavelet analysis [7] and Wagner- first component h1.
Ville distribution [8,9] were designed for linear but non- h1 is treated as a proto-IMF. In the next step h1 is tre-
stationary data. Additionally, various nonlinear time ser- ated as the input data and this procedure continues until
ies analysis methods [10-12] were designed for nonlinear the new component satisfies the IMF definition. The in-
but stationary and deterministic systems. Unfortunately, put data is then sifted and decomposed and the procedure
in most real systems, natural or man-made, the data is continues until we obtain a monotonic residue.
most likely nonlinear and non-stationary. Analyzing the
data of such a system is very difficult because the most 2.3 Ensemble Empirical Mode Decomposition
sophisticated basis function cannot be relied as a basis To overcome some of the shortcomings of EMD, noise
function. Thus an adaptive basis function should be data assisted data analysis method (NADA) EEMD was incor-
defined. The Hilbert Huang Transform [6,13-15] seems porated [6]. EMD cannot deal with signals contaminated
to meet few of the above faced challenges. with white noise efficiently. Due to the presence of noise a
The Hilbert Huang Transform is an empirically based consequence of signal intermittency occurs which is
data analysis method. Its basis of expansion is adaptive termed as Mode mixing. This consequence causes serious
so that physical meaning can be derived from the nonli- aliasing in time-frequency distribution and also makes the
near and non-stationary processes. The Hilbert Huang physical meaning of IMF unclear. The critical concept
Transform consists of two parts: empirical mode decom- advanced here is based on the following observations:
position (EMD) and Hilbert spectral analysis (HSA). We 1) A collection of white noise cancels each other out in
have incorporated a variant of the EMD called Empirical a time-space ensemble mean; therefore, only the signal
Ensemble Mode Decomposition (EEMD) to deal with can survive and persist in the final noise-added signal
input signals that are contaminated with noise. ensemble mean.
2) Finite, not infinitesimal, amplitude white noise is
2.2 Empirical Mode Decomposition necessary to force the ensemble to exhaust all possible
The empirical mode decomposition method is vital to solutions; the finite magnitude noise makes the different
deal with data from non-stationary and nonlinear process. scale signals reside in the corresponding IMF, dictated by
The decomposition is based on the assumption that any the dyadic filter banks, and render the resulting ensemble
data consists of different simple intrinsic modes of oscil- mean more meaningful.
lations. Each intrinsic mode, linear or nonlinear, represe- 2.4 Hilbert Spectral Analysis
nts a simple oscillation, which will have the same num-
ber of extrema and zero-crossings. Furthermore, the os- After obtaining the IMF (Figure 2) components, Hilbert
cillation will also be symmetric with respect to the “local Transform is applied to each IMF component. This tran-
mean.” At any given time, the data may have many diffe- sform gives the amplitude and the frequency of the IMF
rent coexisting modes of oscillation, one superimposing components as functions of time. The frequency-time dis-
on the others. The result is the final complicated data. Ea- tribution of the amplitude is termed as “Hilbert amplitude
ch of these oscillatory modes is represented by an intrin- spectrum” or simply “Hilbert spectrum” (Figure 3). Squ-
sic mode function (IMF) with the following definition: aring the amplitude gives the energy spectrum (Figure 4)
1) In the whole dataset, the number of extrema and the which is quite useful in determining the dominant signal
number of zero-crossings must either equal or differ at among a series of signals.
most by one, and
2) At any point, the mean value of the envelope de- 4
using a cubic spline to give an upper envelope Figure 1. The data (blue) and the envelopes (green) defined
2) Repeat the above procedure for local minima’s to by the local maxima and minima respectively. The mean
give lower envelope. (Figure 1) (red) of then upper and lower envelope
REFERENCES
[1] J. Mitola and G. Q. Maguire, “Cognitive Radio: Making
Software Radios More Personal,” IEEE Personal Com-
munications Magazine, Vol. 6, No. 4, 1999, pp. 13-18.
[2] Federal Communications Commission, Et docket no.
03-322, Dec.
[3] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran and S. Mohanty,
“Next Generation/Dynamic Spectrum Access/Cognitive
Radio Wireless Networks: A Survey,” Computer Net-
works, Vol. 50, No. 13, 2006, pp 2127-2159.
[4] Z. Quan, S. Cui, A. H. Sayed and H. V. Poor, “Wideband
Spectrum Sensing in Cognitive Radio Networks,” Pro-
ceedings of IEEE Conference Communication, Beijing,
Figure 6. The guard (red) band and the primary user bands May 2008, pp. 901-906.
(blue) [5] Z. Quan, S. Cui, A. H. Sayed and H. V. Poor, “Spa-
tial-Spectral Joint Detection for Wideband Spectrum [12] C. Diks, “Nonlinear Time Series Analysis: Methods and
Sensing in Cognitive Radio Networks,” Proceedings Applications,” World Scientific Press, Singapore, 1999.
IEEE International Conference Acoustic, Speech, Signal [13] N. E. Huang, S. R. Long and Z. Shen, “The Mechanism
Processing (ICASSP), Las Vegas, April 2008, pp. 2793- for Frequency Downshifts in Nonlinear Wave Evolution,”
2796. Advances in Applied Mechanics, Vol. 32, 1996, pp.
[6] N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, E. H. Shih, 59-111.
Q. Zheng, C. C. Tung and H. H. Liu, “The Empirical [14] N. E. Huang, Z. Shen and S. R. Long, “A New View of
Mode Decomposition Method and the Hilbert Spectrum Water Waves—The Hilbert Spectrum,” Annual Review of
for Non-Stationary Time Series Analysis,” Proceedings Fluid Mechanics, Vol. 31, No. 3, 1999, pp. 417-457.
of the Royal Society London, Vol. 454, No. 1971, 1998,
pp. 903-995. [15] N. E. Huang, M. C. Wu, S. R. Long, S. S. P. Shen, W. Qu,
P. Gloersen and K. L. Fan, “A Confidence Limit for Em-
[7] L. Cohen, “Time-Frequency Analysis,” Prentice Hall, pirical Mode Decomposition and Hilbert Spectral Analy-
New York, 1995. sis,” Proceedings of the Royal Society London A, Vol.
[8] P. Flandrin, “Time-Frequency/Time-Scale Analysis,” 459, No. 2037, 2003, pp. 2317-2345.
Academic Press, San Diego, 1999. [16] Z. H. Wu and N. E. Huang, “Ensemble Empirical Mode
[9] K. Gröchenig, “Foundations of Time-Frequency Analy- Decomposition: A Noise Assisted Data Analysis Me-
sis,” Birkhauser, Boston, 2001. thod,” Advanced in Adaptive Data Analysis, Vol. 1, No. 1,
[10] H. Tong, “Nonlinear Time Series Analysis,” Oxford Uni- 2009, pp. 1-41.
versity Press, Oxford, 1990. [17] J. Gimenez and L. Marquez, “SVMTool Technical Man-
[11] H. Kantz and T. Schreiber, “Nonlinear Time Series Analy- ual v1.3,” 2006.
sis,” Cambridge University Press, Cambridge, 1990.
Received March 20th, 2010; revised July 12th, 2010; accepted July 19th, 2010.
ABSTRACT
In this paper, a method for sensor placement to improve the placement quality based on angle of arrival of signal in a
specific area is proposed. The installation place of sensors may be constrained with specified boundaries. In this
method, the criterion of maximum quality of placement is the Cramer-Rao bound. The generalized pattern search as an
effective method is used to maximize error bound of the placement problem by angle of arrival. Better results are ob-
tained in comparison with results of genetic algorithm. The derived results are compared from two aspects of run time
and result quality.
2. The Placement Problem reach to Cramer-Rao lower bound. So, this bound is ap-
propriate approximation for showing positioning error in
In this paper, for investigation of proposed sensor place- practical systems.
ment method, the positioning problem with angle of sig-
nal is considered. This type of positioning is efficient in 3. Effects of Sensor Placement
applications in which the sent signal of desired source is
To investigate the effect and importance of sensor plac-
a pulse signal.
ement in positioning, a supposed scenario is considered.
AOA equations for a source in place of x ( x, y )
Figure 1 shows the lower bound of Cramer-Rao error for
and N sensors at locations of ( xi , yi ) i 1, , N are as the specified area in upper half-plane with symmetrical
follows sensor placement in lower half-plane. Standard deviation
ai i ni of error in angle of arrival recognition of signal in each
x x (1) sensor is supposed to be 50 meter. In Figure 1, the right
arctan( i ) ni , i 2,..., N bar, shows the amount of error in each point proportional
yi y to the color of that point on the screen.
where, xi , yi denotes place of ith sensor and ni s are For optimization in this case, the maximum of posi-
tioning error in each area which is the positioning quality
uncorrelated Gaussian noise with covariance matrix of index, will be calculated. In Figure 2 this index is mini-
1 0 0 mized and the sensors are replaced to minimize the ma-
0 1 0 ximum of positioning error in the considered area. In this
n 2 (2) case, also it is assumed that the sensors are constrained to
0 place in lower half-plane.
0 0 1 N N
Cramer-Rao lower bound is obtained for positioning 6 1.2
using AOA as follows [3]
4 1
1
CLRB(x) trace( J T ( x) n J 1 ( x) ) (3) 2
Y axis [Km]
0.8
1
where, operations of () , trace() , () and () T 0 4
3
1
0.6
are square root, summation of main diagonal of matrix, -2
2
0.4
transpose of matrix and matrix inverse operation. Furth-
-4
ermore J ( x) is Jacobean matrix of noiseless angle with 0.2
respect to target position, which is defined as -6
y y1 x x1
r2
Figure 1. Crammer-Rao error for highlighted region with
r12 symmetric positioning of sensors on a rectangular
1
y y2 x x2
(4)
r2 2 r2 2 , 6 1.2
4 1
y yN x xN
2
rN 2
2
Y axis [Km]
0.8
rN
0 2 3
where, i 1, , N and ri is distance between target to 0.6
For the first case, in which the best symmetrical arra- the search stages are repeated. It is not easy to prove that
ngement is chosen, the maximum error is 815.3 meters, there is no local minimum for a numerical problem such
while with optimal placement of sensors this error de- as our positioning problem, but respect to the simulation
creases to 766.1 meters which is an improvement of results, with a high certainty, there is no local minimum
6.05%. In practical applications, the requirements of fed- in this problem.
eral communication commission considers a standard for Although it is not necessary, to certify that the initial
the error which says that in the 65% of considered area point is not too improper and the convergence happens
the positioning error must be lower than 100 meters or in with acceptable rate, we can use the best member of a
95% of mentioned area the error must be lower than 300 random small population as the initial point. Table 1 sh-
meters. Considering maximum error index in an area ows the parameters used in the generalized pattern search.
means that in 100% of that area, the positioning error is Respect to Table 1, the condensation factor of search
lower than determined limit. Note that this design and radius is 1/4, while the expansion factor of search radius
calculation of maximum positioning error index using the is 2. The default values are generally 1/2 and 2, but in
approximation of Cramer-Rao bound is a theoretical this problem, for an accelerated convergence and con-
process, thus, if in an area, the positioning error in 100% verges to a precise solution in lower number of iterations.
of the points is lower than a determined amount, this will
guarantee a certainty margin of 5% to satisfy the standard 5. Method Based on Genetic Algorithm
index of 95%. To optimize the defined cost function, genetic algorithm,
The numerical method to calculate the cost function or as a strong numerical optimization method, can be em-
the maximum positioning error in an area is using a grid ployed. However, using genetic algorithm considerably
of points inside the supposed area. In this method, for all increases the possibility to escape the local minimums [7,
points of this grid, the positioning error bound is calcu- 8]. But for this certainty, a heavier calculation load is
lated, and then these values in all points are compared imposed compared with the proposed method. Note that,
and their maximums are chosen as the numerical amount in genetic algorithm the selected values for parameters of
of criterian. The numerical method of optimization, wh- algorithm must be proper. In this paper, due to the lack of
ich will be considered in Section 4, minimizes this index references for the use of genetic algorithm in sensor
by replacing the position of sensors. In this paper, to ac- placement, these parameters are selected via try and error
celerate the calculation of cost function a grid of 40 × 40 method in some experiments.
points is employed, but the final results are reported us- Several genetic algorithm parameters which are used
ing a grid of 200 × 200 points. in this paper are provided in Table 2.
For the fraction of next generation which is born by
4. Propose Method for Sensor Placement
crossover, the typical value is 0.8 and the values between
The proposed method to minimize the cost function is 0.4 and 0.8 are acceptable. In this problem the value of
using generalized pattern search which will be described 0.5 is selected with an aim to have more new members in
in brief. Respect to the comparison of next section, this each generation and thus a larger search area for the al-
method is less complex from two aspects of realization gorithm. Based on the performed simulations for parent
and efficiency compared with genetic algorithm; thus this selection function, competition method [7] has less final
method is a proper method for sensor placement which error respect to roulette wheel [8] and other methods and
this application of the method has not been reported in therefore is considered in simulations. Adaptive mutation
literature, since now.
Generalized pattern search is method for numerical mi- Table 1. Parameters of generalized pattern search method
nimization of functions without the need for gradient or observing no local minimum, the condensation factor acts
other derivatives of functions. In this method, with a start more rapid than the expansion factor, and thus the method
point for the position of sensor and using a series of
Parameter Selected value
specified patterns to replace the sensors and with a search
radius, the enamoring points of initial one are investi- Number of used patterns
Four times of
gated and in the case of finding a better point, the posi- number of sensors
tion of sensor is transferred to that point and the search is Expansion coefficient of search radius 2
continued with applying an expansion factor and with a Contraction coefficient of search radius 1/4
larger search radius. The number of used patterns in each Number of random search for 20 times of number
stage is four times of the number of sensors means that finding initial point of sensors
each action of increase or decrease in latitude or longi- Considering of all patterns in each step Yes
tude coordinates of each sensor is considered as a pattern.
In this method, if a better point is not found, the search 200 times of
Calculation of maximum cost function
number of sensors
radius is decreased applying a condensation factor and
Table 2. Different parameters of genetic algorithm Table 3. Simulation results of proposed method and genetic
algorithm for maximum positioning error criterion (opti-
Selected value Parameter mal value is accessible for maximum error of 766.1)
Function of primary population genera-
uniform Maximum error criterion in region
tion
Adaptive Mutation function Genetic algorithm Proposed method
competition Selection function
mean 907.2 785.5
4 Size of competition
25 Number of generation Standard division 50.3 6.7
10 times of number of division percentage
Size of population in each generation 18.42% 2.47%
sensors from optimum point
Number of elites transferred to next
5
generation directly
Percent of each generation generated Table 4. Results for mean error on the region for 100 times
50 run of methods which are being compared (optimal value is
from crossover
Scattered Crossover function accessible for mean error of 383.1)
Rank Fitness Scaling
Mean error criterion in region
Forward Migration Direction
20 Percent of Migration Genetic algorithm Proposed method
20 Interval of Migration
mean 401.2 385.1
200 times of number of Maximum calculation number of cost
sensors function Standard division 17.4 3.8
Division Percentage
4.72% 0.52%
from Optimum point
function is used due to constraint features of the problem
in order to prevent problems related to authenticity of
mutated offspring in each generation. For constrained In Table 4 mean of error for 100 times of run are rep-
optimization problems, it is possible to use uniform or orted for proposed methods in the mentioned region. Op-
Gaussian distributed mutation but the run time will in- timal value is obtained through minimizing mean of error
crease due to infeasibility of some offspring. (rather than maximum of error) on the proposed region
but results of methods under comparison are calculated
6. Comparison Results and reported with maximum error criterion.
The results of these two methods are compared with re- Table 3 and Table 4 show that the proposed method
sults of genetic algorithm to evaluate proposed method. performs better than genetic algorithm in the region from
From computational complexity view point, proposed both view points of maximum and mean of positioning
method has the same number of function evaluation as error criterion.
genetic algorithm but realization of proposed method Comparing with the optimal results, maximum error of
sounds simpler than genetic algorithm. To investigate proposed method which optimization is performed on has
from the view point of positioning quality, the same sce- 2.5% difference with optimal value while genetic algo-
nario of Section 3 shown in Figure 1 is used with the rithm has error rate of 18.42. Consequently proposed
difference that in this case 4 sensors are deployed in the method has better performance from the view point of
lower half-plane. The results of Table 3 and Table 4 are functionality. Moreover in 100 runs of both methods,
obtained by 100 runs of two methods. It is necessary to standard deviation for results of proposed method is just
note that different scenarios are considered in different 7.2; while this value equals 50.3 for genetic algorithm.
simulations in order to compare two methods which have This shows that the results from genetic algorithm have
resulted fairly similar results to proposed ones. more variations than those of proposed method.
In all simulations, the constraint of maximum function It can be concluded from Table 4 that if two methods
evaluation number is assumed 200 times of the number are compared from the view point of mean error in the
of sensors which leads to reasonable simulation time. In whole region, it will be concluded that proposed method
optimizations, cost functions are calculated with a gird of has 0.84% error respect to optimal value which has a
40 × 40 while final result is calculated and reported with good superiority respect to 4.02% percent for genetic
accuracy of 200 × 200 points in the region. algorithm. Similar to Tabel 3, standard deviation resulted
Both methods are evaluated and compared with the from 100 repetitions of both methods signifies suggested
criterion of maximum positioning error. Mean and stan- algorithm’s better (less) standard deviation respect to
dard deviation and deviation percentage from optimum genetic algorithm.
value are shown in the Table 3 for 100 times of test repe- Generally, it can be seen that the proposed method has
tition. better results respect to genetic algorithm from the view
point of error percentage, stability of results from differ- Sensor Arrays for TDOA Based Localization,” IEEE In-
ent runs for two cases of maximum error and mean error. ternational Conference on Acoustics, Speech, and Signal
Processing (ICASSP), Toulouse, Vol. 4, 2006, pp. 961-
7. Conclusions 964.
[3] S. M. Kay, “Fundamentals of Statistical Signal Process-
In this paper, a method is proposed based on mutual util-
ing: Estimation Theory,” Prentice-Hall, Upper Saddle
ization of random search and generalized pattern search River, 1993.
for placement of sensors in positioning applications. This
[4] D. J. Torrieri, “Statistical Theory of Passive Location
method has higher speed in runtime in addition to less
Systems,” IEEE Transactions on Aerospace and Elec-
realization complexity and has completely better results tronic Systems, Vol. 20, No. 2, 1984, pp. 183-198.
respect to genetic algorithm in a way that is very near to
[5] C. Mensing and S. Plass, “Positioning Based on Factor
optimum. Although this method is investigated for a spec-
Graph,” EURASIP Journal on Advances in Signal Proc-
ific positioning problem, it is possible to generalize it for essing, Vol. 2007, April 2007, pp 1-11.
other positioning applications only with some changes
such as in cost function. [6] C. Mensing, and S. Plass, “Positioning Algorithms for
Cellular Networks Using TDOA,” IEEE International
Conference on Acoustics, Speech, and Signal Processing
REFERENCES (ICASSP), Toulouse, Vol. 4, 2006, pp. 513-516.
[1] B. Yang and J. Scheuing, “Cramer-Rao Bound and Opti- [7] R. L. Haupt and S. E. Haupt, “Practical Genetic Algo-
mum Sensor Array for Source Localization from Time rithms,” 2nd Edition, John Wiley & Sons, Hoboken,
Differences of Arrival,” IEEE International Conference 2004.
on Acoustics, Speech, and Signal Processing (ICASSP), [8] S. Olariu, and A. Y. Zomaya, “Handbook of Bioinspired
Philadelphia, Vol. 4, 2005, pp. 961-964. Algorithms and Applications,” Taylor & Francis Group,
[2] B. Yang and J. Scheuing, “A Theoretical Analysis of 2D CRC Press, Boca Raton, 2006.
Editor-in-Chief
Dr. Yi Huang University of Liverpool, UK
Editorial Assistant
Amber Wang Scientific Research Publishing Email:wet@scirp.org
Subject Coverage
This journal invites original research and review papers that address the following issues. Topics of
interest include, but are not limited to:
We are also interested in short papers (letters) that clearly address a specific problem, and short
survey or position papers that sketch the results or problems on a specific topic. Authors of selected
short papers would be invited to write a regular paper on the same topic for future issues of the WET.
TABLE OF CONTENTS