CN101729206A - Conflict detection-based method for separating the threshold selection and cooperation conflict of detector - Google Patents

Conflict detection-based method for separating the threshold selection and cooperation conflict of detector Download PDF

Info

Publication number
CN101729206A
CN101729206A CN200910234619A CN200910234619A CN101729206A CN 101729206 A CN101729206 A CN 101729206A CN 200910234619 A CN200910234619 A CN 200910234619A CN 200910234619 A CN200910234619 A CN 200910234619A CN 101729206 A CN101729206 A CN 101729206A
Authority
CN
China
Prior art keywords
sigma
conflict
probability
snr
expressed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200910234619A
Other languages
Chinese (zh)
Other versions
CN101729206B (en
Inventor
季薇
郑宝玉
杨震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN200910234619A priority Critical patent/CN101729206B/en
Publication of CN101729206A publication Critical patent/CN101729206A/en
Application granted granted Critical
Publication of CN101729206B publication Critical patent/CN101729206B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a conflict detection-based method for separating the threshold selection and cooperation conflict of a detector, which is characterized in that in a small-sized time slot multiple access network transmitted by relay aid, firstly, forecasting the substantial output of a network according to the number of network users, packet sending probability of users, detection probability and false-alarm probability, obtaining the reciprocal relationship between the detection probability and the false-alarm probability by extremum operation to further obtain the optimal detector threshold; secondly, detecting conflict orders and active users according to time slots by a destination end, and notifying a judgment result to all network users by a control channel; and finally, determining the length of transmission time interval of data packets by the system according to the judgment result, and selecting corresponding trunk node aiding information source to transmit data packets, thereby realizing the separation of conflict data packets at the destination end by a sub-optimal linear solution.

Description

Select and cooperation conflict separation method based on the detector thresholding of collision detection
Technical field
The present invention relates to the small-sized time slot multi-access network of the auxiliary transmission of relaying, and the reception of carrying out the colliding data bag simultaneously with separate, particularly a kind of detector thresholding based on collision detection is selected and cooperation conflict separation method, belongs to network service and signal processing technology field.
Background technology
In wireless network, a large amount of uncertain channel variation, uneven traffic carrying capacity, radio node move that caused network configuration changes and to the requirement of broadband high-speed rate communication etc., communication system optimization and network design under the existence conditions have been constituted significant challenge.This challenge require we examine closely again existing network each assembly (insert from physical layer design to the MAC layer and the routing of route layer, from information source be compressed to chnnel coding and modulation, from the circuit stages resource allocation to the network level resource allocation) design philosophy and method.In the face of above-mentioned challenge, cause people's great interest thereby in recent years signal processing technology is introduced the performance that network effectively improves wireless network.Many bags based on conflict resolution receive (Multiple Packet Reception, MPR) the technology multiple access of examining closely the access network at random from a new angle inserts problem, conflict resolution in the network is converted into the Signal Separation problem solves, utilize signal processing technology and Internet resources to solve collision problem in the network jointly.Its basic thought is exactly to make network node have the function that receives a plurality of user data package simultaneously and they are effectively separated, rather than simply a plurality of packets that arrive simultaneously is used as conflict and all abandons.Node wraps the introducing of receiving ability more, will bring new opportunities and challenges to the design of procotol, improves the throughput of whole network and the transmission of minimizing packet effectively and waits for time delay, for realizing that the new generation of wireless wide-band communication system has great importance.
It is a kind of new method of using signal processing technology to solve data packet collisions problem in the wireless slotted random access network that the network assistance diversity multiple access that people such as Tsatsanis propose inserts (NDMA, Network-assisted DiversityMultiple Access) mechanism.This method utilizes Internet resources to obtain diversity performance, and adopts the method for Signal Separation to recover the colliding data bag, and this is at first signal processing to be combined with the network organizing technology, to improve the method for network performance.Yet NDMA mechanism causes its performance to be subjected to the very big restriction of radio channel state for the dependence that retransmits.
Collaboration diversity is as a kind of new model of space diversity, gets more and more people's extensive concerning once occurring.Its basic thought is the formal construction " virtual multi-antenna array " by shared antenna and other Internet resources between the multi-user, and produces the certain space diversity gain of cooperation acquisition by distributed treatment.Lin Rui and A.P.Petropulu etc. combine collaboration diversity with NDMA mechanism, proposed a kind of MAC agreement of high-throughput---ALLIANCES mechanism, for the many bags receptions that solve under the WLAN (wireless local area network) decline state provide new way.
In above-mentioned two mechanism, in case conflict takes place, destination need be adjudicated conflict exponent number and active user collection (user that promptly conflicts set), and this moment, the thresholding of detector was selected most importantly, and will be further the conflict bag re-transmission of system be exerted an influence with separating.The hypothesis that the conclusion of NDMA and ALLIANCES mechanism all can correctly be detected based on the conflict exponent number, in fact, the mistaken verdict of destination very likely takes place.Be the performance of accurate assessment, must consider nonideal collision detection and, but have not yet to see relevant report the influence of systematic function based on many packet receivers of cooperation system of NDMA.
Summary of the invention
The objective of the invention is deficiency at existing many bag method of reseptances in the small-sized time slot multi-access network of supporting the auxiliary transmission of relaying, propose a kind of method of separating, thereby improve many bags receptivity of wireless communication system effectively based on the selection of detector thresholding and the cooperation conflict of collision detection.Its advantage is: on the one hand, utilize many bags receiving ability of node to solve unavoidable data packet collisions problem in traditional random access protocol; On the other hand, utilize the transfer capability of relaying to reduce the re-transmission failure that causes because of the intrinsic fading characteristic of wireless channel and further solve the detector thresholding that relates to when conflict exponent number and active user collection detected and adjudicate and select problem.
For achieving the above object, the invention provides a kind of selection of detector thresholding and cooperation conflict separation method based on collision detection, this method has been broken the ideal hypothesis that the conflict exponent number can correctly be detected in traditional NDMA mechanism and the ALLIANCES mechanism, in cooperation conflict separation mechanism, the detector thresholding selects to take into account desirable collision detection and two kinds of situations of imperfect collision detection, according to network user's number, user's the probability of giving out a contract for a project, detection probability and false alarm probability are predicted the potential throughput of network, by asking the extreme value computing to obtain optimum derivative relation between detection probability and false alarm probability, and then try to achieve optimum detector thresholding; Then, destination detects conflict exponent number and active user collection at the conflict time slot according to this optimum thresholding, and by control channel court verdict is notified to the all-network user; System selects the auxiliary information source of corresponding relay node to carry out the transmission of packet, and then realizes the separation of colliding data bag at destination according to this specified data bag when transmission segment length as a result.
Technical scheme of the present invention is as follows: select and cooperation conflict separation method based on the detector thresholding of collision detection, it is characterized in that:
(1) at first, the probability of giving out a contract for a project, detection probability and false alarm probability according to network user's number, user are predicted the potential throughput of network, potential throughput is defined as in the potential unit time slot can successful data recovered bag, by asking the derivative relation between extreme value computing acquisition detection probability and false alarm probability, and then try to achieve the detector thresholding, step is as follows:
To be user buffer be empty probability zero hour period in transmission to definition Pe, when K user when conflicting time slot collision, its binary expression is as follows:
P ( K ) = J K ( 1 - Pe ) K Pe J - K , K = 0,1 , . . . , J - - - ( 1 )
Wireless channel is modeled as the Rayleigh flat fading channel
Figure G2009102346198D0000022
Wherein, phase place
Figure G2009102346198D0000023
(n) [0,2 π) go up to obey evenly and distribute; Amplitude A Ij(n) Rayleigh distributed, variance are 2 σ A 2A Ij(n) and
Figure G2009102346198D0000024
(n) separate, channel is obeyed independent same distribution, noise w between all users r(n) be modeled as the white gaussian variable of incoherent return-to-zero average, variance is σ v 2
False alarm probability P FBe expressed as:
P F = ∫ T ∞ x σ v 2 exp ( - x 2 2 σ v 2 ) dx = exp ( - T 2 2 σ v 2 ) - - - ( 3 )
Detection probability P DBe expressed as:
P D = ∫ T ∞ x σ v 2 + σ A 2 exp ( - x 2 2 ( σ v 2 + σ A 2 ) ) dx = exp ( - T 2 2 ( σ v 2 + σ A 2 ) ) - - - ( 4 )
Making m represent can be by the quantity of correct detected information source node, and n represents by false-alarm to be the idle node quantity of active node, correspondingly, and the conflict exponent number that is detected
Figure G2009102346198D0000031
Equal m+n.When K-m information source omission, n free subscriber by the probability of false-alarm is:
P det ect ( m , n ) = K m ( P D ) m ( 1 - P D ) K - m J - K n ( P F ) n ( 1 - P F ) J - K - n - - - ( 5 )
Wherein, 0≤m≤K, 0≤n≤J-K.Therefore, all correct probability that detects promptly correctly detects all active users (m=K), and no free subscriber is shown by the probability tables of false-alarm (n=0):
P detect(K,0)=P D K(1-P F) J-K
Correspondingly, the lengths table of transmission period is shown:
L ( K , m , n ) = m + n , 0 ≤ m ≤ K , 0 ≤ n ≤ J - K , m + n ≠ 0 1 , m = 0 andn = 0 - - - ( 7 )
When K information source conflict, the average length of transmission period is expressed as:
L ‾ ( K ) = Σ m = 0 K Σ n = 0 J - K P det ect ( m , n ) L ( K , m , n ) = KP D + ( J - K ) P F + ( 1 - P D ) K ( 1 - P F ) J - K - - - ( 8 )
The average length of transmission period is expressed as:
L ‾ = Σ K = 0 J P ( K ) L ‾ ( K ) = JP F + J ( 1 - Pe ) ( P D - P F ) + [ ( 1 - Pe ) ( 1 - P D ) + Pe ( 1 - P F ) ] J - - - ( 9 )
The assessment of potential throughput has two kinds of situations:
A) situation 1: when potential throughput is assessed, each mistaken verdict of hypothesis goal end all will cause transmitting losing of last all packets of period, therefore, only when destination is made right-on judgement, the transmission period is only useful, on the useful transmission period, K packet can correctly be recovered at most.At this moment, average potential recoverable bag is expressed as:
N ‾ 1 = Σ K = 0 J KP ( K ) P det ect ( K , 0 ) = J ( 1 - Pe ) P D [ ( 1 - Pe ) P D + Pe ( 1 - P F ) ] J - 1 - - - ( 10 )
Potential throughput under the situation 1 is expressed as
PTP 1 = N ‾ 1 L ‾ - - - ( 11 )
B) situation 2: under this hypothesis, under the situation of destination mistake in judgment, still have some conflicting data bag fortunately to be detected.When K-m information source omission, there be m information source correctly to recover at the most.At this moment, average potential recoverable bag is expressed as
N ‾ 2 = Σ K = 0 J P ( K ) Σ m = 0 K Σ n = 0 J - K mP det ect ( m , n ) = J ( 1 - Pe ) P D - - - ( 12 )
Potential throughput under the situation 2 is expressed as
PTP 2 = N ‾ 2 L ‾ - - - ( 13 )
Take into account above-mentioned two kinds of situations, potential throughput is expressed as
PTP=δ·PTP 1+(1-δ)·PTP 2(14)
Wherein, δ is a constant, 0≤δ≤1;
Selecting initial value δ, is objective function optimization detector thresholding with potential throughput, order
dPTP dP F = 0 - - - ( 15 )
Can get
dP D dP F = δ ( J - 1 ) Pe P D I 2 J - 2 ( J - JI 1 + I 1 J ) + JPe P D ( 1 - I 1 J - 1 ) [ δI 2 J - 1 + ( 1 - δ ) ] [ δ I 2 J - 2 I 3 + ( 1 - δ ) ] ( J - JI 1 + I 1 J ) - J ( 1 - Pe ) P D ( 1 - I 1 J - 1 ) [ δI 2 J - 1 + ( 1 - δ ) ] - - - ( 16 )
Wherein, I 1=(1-Pe) (1-P D)+Pe (1-P F), I 2=(1-Pe) P D+ Pe (1-P F), I 3=Pe (1-P F)+JP D(1-Pe).
Under the high s/n ratio situation, P D≈ 1, P F≈ 0, (1-P F)/P D≈ 1, and formula (16) is reduced to:
dP D dP F = δ ( J - 1 ) Pe ( J - JPe + Pe J ) + JPe ( 1 - Pe J - 1 ) { δ [ Pe + J ( 1 - Pe ) ] + ( 1 - δ ) } ( J - JPe + Pe J ) - J ( 1 - Pe ) ( 1 - Pe J - 1 ) = β - - - ( 17 )
From formula (3) and formula (4), can get:
P D = P F 1 / 1 + SNR , SNR = σ A 2 σ v 2 - - - ( 18 )
dP D dP F = 1 1 + SNR P F - SNR / ( 1 + SNR ) - - - ( 19 )
From formula (18) and formula (19), can get:
P F,opt=[(1+SNR)β] -(1+SNR)/SNR (20)
Can get the detector thresholding according to formula (3) and formula (20) is:
T opt = - 2 σ v 2 log [ P F , opt ] = 2 σ v 2 1 + SNR SNR log [ ( 1 + SNR ) β ] - - - ( 21 ) ;
(2) after information source sends packet, destination carries out collision detection according to the detector thresholding of trying to achieve to receiving packet, in case conflict is detected, destination will be adjudicated conflict exponent number and active user collection, by control channel court verdict will be notified to the all-network user then;
(3) be the linearity that obtains collision signal duplicate independently, system enters the auxiliary retransmission time period of relaying, the conflict exponent number that the length of retransmission time period equals to be detected subtracts 1, a node is elected to be relaying randomly and is retransmitted the signal that it receives at the conflict time slot, the auxiliary retransmission time period one of relaying finishes, the broadcast channel control bit of just resetting is ended current re-transmission and transmission that all are relevant;
(4) destination all colliding data bags of utilizing the linear solution butt joint of suboptimum to receive are united and are unpacked, and realize that many bags separate.When conflict exponent number K and active user collection When correctly being detected,
Figure G2009102346198D0000048
And
Figure G2009102346198D0000049
Make the transmission signal indication of source node be
Figure G2009102346198D0000051
Make the received signal of destination be expressed as
Figure G2009102346198D0000052
, wherein Then the matrix form of received signal is expressed as Z=HX+W, and wherein, H represents channel coefficients between source node and destination, can detect by active user to obtain estimating that W represents noise matrix.When many bags separate, when the channel matrix full rank, can utilize the separation of the linear solution realization of suboptimum colliding data bag, promptly
Figure G2009102346198D0000054
And obtain the real-time network goodput ATP corresponding with initial value δ;
(5) result of above-mentioned steps (4) is exported to the renewal of coefficient δ, its process is the iteration to coefficient δ different values in the scope of 0≤δ≤1 in the formula (14), repeating step (1)-(4) finally obtain the goodput ATP of formula (21) result for the network of optimum detector thresholding and correspondence.
In the above-mentioned steps (3): make arbitrary node i in the network that (1≤i≤J) packet in conflict time slot n transmission is expressed as x i(n)=[x I, 0(n) ... x I, M-1(n)], each packet comprises M symbol, and the transmitted power of each symbol is σ x 2The signal indication that destination received signal and all idle node (user that the conflict time slot is not given out a contract for a project) receive is
Figure G2009102346198D0000055
Time slot n+k, A node is chosen as relaying at random, and retransmits it at the signal y (n) of time slot that conflicts.At this moment, destination place received signal is expressed as
Figure G2009102346198D0000057
Figure G2009102346198D0000058
(23)
Wherein Be the via node set; a Rd(n) be channel coefficients between r via node and destination; w d(n+k) be noise vector; C (n+k) is a normalization coefficient.If
Figure G2009102346198D00000510
Be that relaying itself is not a source node, y (n)=y then r(n),
Figure G2009102346198D00000511
Wherein
Figure G2009102346198D00000512
If
Figure G2009102346198D00000513
Be that relaying itself is exactly a source node, y (n)=x then r(n), c (n+k)=1.
When above-mentioned optimum detector thresholding obtained, the iteration selection course of coefficient δ was as follows in the formula (14):
(1) initial value of coefficient δ is made as 0, at this moment PTP=PTP 2
(2) try to achieve corresponding thresholding and realization conflict separation, more real-time goodput ATP and potential throughput, calculate | PTP-ATP| 2
(3) update coefficients δ makes δ=δ+Δ δ, and wherein above-mentioned steps (2) is repeated in Δ δ=1/J and 0≤δ≤1;
(4) repeat above-mentioned steps (2), (3), find to make real-time goodput and the most approaching coefficient δ of potential throughput, promptly satisfy
Figure G2009102346198D00000514
The time, formula (21) result is the optimum detector thresholding.
Advantage of the present invention and remarkable result: the present invention introduces collision detection in the auxiliary many packet receivers system of relaying, has broken the hypothesis that the conflict exponent number can correctly be detected in existing NDMA and the ALLIANCES mechanism.Desirable collision detection and imperfect conflict check system Effect on Performance have been taken all factors into consideration in the mathematical analysis of systematic function-potential throughput, and worst case and best-case when having taken into account potential throughput evaluation, thereby be a kind of systematic function estimation of more realistic signal intelligence, can obtain more accurate optimum detector thresholding in view of the above, and then obtain than NDMA mechanism and the better throughput performance of time slot A LOHA mechanism.
Description of drawings:
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is that three users' colliding data bag retransmits schematic diagram.
Embodiment
The invention will be further described below in conjunction with drawings and Examples.
Referring to Fig. 1,2, the detector thresholding determine to comprise two steps: the 1. mathematical analysis of potential throughput: utilize potential throughput on the conflict time slot to substitute throughput and predict throughput performance on the whole transmission period, defining potential throughput and be can successful data recovered bag in the potential unit time slot.The probability of giving out a contract for a project, detection probability and false alarm probability according to network user's number, user are predicted the potential throughput of network, specifically predict in two kinds of situation, and the throughput of predicting under two kinds of situations is carried out linear combination.2. the selection of detector thresholding: obtain derivative relation between detection probability and false alarm probability by asking the extreme value computing, and then try to achieve the detector thresholding according to the functional relation between detection probability and the false alarm probability.
The transmission of colliding data bag: K of supposition wraps in time slot n and clashes, order
Figure G2009102346198D0000061
The court verdict of expression conflict exponent number K,
Figure G2009102346198D0000062
The expression active user collection user's collection that promptly conflicts
Figure G2009102346198D0000063
Court verdict.At the destination court verdict
Figure G2009102346198D0000064
With
Figure G2009102346198D0000065
Down, for recovering
Figure G2009102346198D0000066
Individual colliding data bag, the auxiliary retransmission time period length of relaying is fixed as
Figure G2009102346198D0000067
Individual time slot.At time slot n+k,
Figure G2009102346198D0000068
A node is selected as relaying, if this node is non-information source relaying, then retransmits the collision signal that it receives at the conflict time slot; If this node is the information source relaying, then retransmit the packet that it produces at the conflict time slot.
The separation of colliding data bag: the packet that will receive on receiving terminal will conflict packet that time slot receives and the auxiliary retransmission time period of relaying carries out combined decoding.Channel coefficient matrix can detect by active user and obtain estimating.When the channel matrix full rank, can utilize the linear solution of suboptimum to realize the separation of colliding data bag.
Iteration according to coefficient δ in the formula (14) is selected, and finds to make real-time goodput and the most approaching coefficient δ of potential throughput in the scope of 0≤δ≤1, promptly satisfies
Figure G2009102346198D0000069
The time, be the optimum detector thresholding, with the detector thresholding of the square frame 1 among optimum detector thresholding replacement Fig. 1, proceed follow-up square frame step by Fig. 1 then, realize best many bags separating effect at last.

Claims (3)

1. select based on the detector thresholding of collision detection and cooperation conflict separation method, it is characterized in that:
(1) at first, count J, user's the probability of giving out a contract for a project, detection probability and false alarm probability predicts the potential throughput of network according to the network user, by asking the extreme value computing to obtain derivative relation between detection probability and false alarm probability, and then try to achieve the detector thresholding, step is as follows:
To be user buffer be empty probability zero hour period in transmission to definition Pe, when K user when conflicting time slot collision, its binary expression is as follows:
P ( K ) = J K ( 1 - Pe ) K Pe J - K K = 0,1 , . . . , J - - - ( 1 )
Wireless channel is modeled as the Rayleigh flat fading channel
Figure F2009102346198C0000012
Wherein, phase place
Figure F2009102346198C0000013
[0,2 π) go up and obey evenly distribution; Amplitude A Ij(n) Rayleigh distributed, variance are 2 σ A 2A Ij(n) and
Figure F2009102346198C0000014
Separate, channel is obeyed independent same distribution, noise w between all users r(n) be modeled as the white gaussian variable of incoherent return-to-zero average, variance is σ v 2
False alarm probability P FBe expressed as:
P F = ∫ T ∞ x σ v 2 exp ( - x 2 2 σ v 2 ) dx = exp ( - T 2 2 σ v 2 ) - - - ( 3 )
Detection probability P DBe expressed as:
P D = ∫ T ∞ x σ v 2 + σ A 2 exp ( - x 2 2 ( σ v 2 + σ A 2 ) ) dx = exp ( - T 2 2 ( σ v 2 + σ A 2 ) ) - - - ( 4 )
Making m represent can be by the quantity of correct detected information source node, and n represents by false-alarm to be the idle node quantity of active node, correspondingly, and the conflict exponent number that is detected
Figure F2009102346198C0000017
Equal m+n.When K-m information source omission, n free subscriber by the probability of false-alarm is:
P det ect ( m , n ) = K m ( P D ) m ( 1 - P D ) K - m J - K n ( P F ) n ( 1 - P F ) J - K - n - - - ( 5 )
Wherein, 0≤m≤K, 0≤n≤J-K.Therefore, all correct probability that detects promptly correctly detects all active users (m=K), and no free subscriber is shown by the probability tables of false-alarm (n=0):
P detect(K,0)=P D K(1-P F) J-K (6)
Correspondingly, the lengths table of transmission period is shown:
L ( K , m , n ) = m + n , 0 ≤ m ≤ K , 0 ≤ n ≤ J - K , m + n ≠ 0 1 , m = 0 andn = 0 - - - ( 7 )
When K information source conflict, the average length of transmission period is expressed as:
L ‾ ( K ) = Σ m = 0 K Σ n = 0 J - K P det ect ( m , n ) L ( K , m , n ) = K P D + ( J - K ) P F + ( 1 - P D ) K ( 1 - P F ) J - K - - - ( 8 )
The average length of transmission period is expressed as:
L ‾ = Σ K = 0 J P ( K ) L ‾ ( K ) = J P F + J ( 1 - Pe ) ( P D - P F ) + [ ( 1 - Pe ) ( 1 - P D ) + Pe ( 1 - P F ) ] J - - - ( 9 )
The assessment of potential throughput has two kinds of situations:
A) situation 1: when potential throughput is assessed, each mistaken verdict of hypothesis goal end all will cause transmitting losing of last all packets of period, therefore, only when destination is made right-on judgement, the transmission period is only useful, on the useful transmission period, K packet can correctly be recovered at most.At this moment, average potential recoverable bag is expressed as:
N ‾ 1 = Σ K = 0 J KP ( K ) P det ect ( K , 0 ) = J ( 1 - Pe ) P D [ ( 1 - Pe ) P D + Pe ( 1 - P F ) ] J - 1 - - - ( 10 )
Potential throughput under the situation 1 is expressed as
PTP 1 = N ‾ 1 L ‾ - - - ( 11 )
B) situation 2: under this hypothesis, under the situation of destination mistake in judgment, still have some conflicting data bag fortunately to be detected.When K-m information source omission, there be m information source correctly to recover at the most.At this moment, average potential recoverable bag is expressed as
N ‾ 2 = Σ K = 0 J P ( K ) Σ m = 0 K Σ n = 0 J - K m P det ect ( m , n ) = J ( 1 - Pe ) P D - - - ( 12 )
Potential throughput under the situation 2 is expressed as
PTP 2 = N ‾ 2 L ‾ - - - ( 13 )
Take into account above-mentioned two kinds of situations, potential throughput is expressed as
PTP=δ·PTPd 1(1-δ)·PTP 2 (14)
Wherein, δ is a constant, 0≤δ≤1;
Selecting initial value δ, is objective function optimization detector thresholding with potential throughput, order
dPTP d P F = 0 - - - ( 15 )
Can get
dP D dP F = δ ( J - 1 ) PeP D I 2 J - 2 ( J - J I 1 + I 1 J ) + JPe P D ( 1 - I 1 J - 1 ) [ δ I 2 J - 1 + ( 1 - δ ) ] [ δ I 2 J - 2 I 3 + ( 1 - δ ) ] ( J - J I 1 + I 1 J ) - J ( 1 - Pe ) P D ( 1 - I 1 J - 1 ) [ δ I 2 J - 1 + ( 1 - δ ) ] - - - ( 16 )
Wherein, I 1=(1-Pe) (1-I D)+Pe (1-P F), I 2=(1-Pe) P D+ Pe (1-P F), I 3=Pe (1-P F)+JP D(1-Pe).
Under the high s/n ratio situation, P D≈ 1, P F≈ 0, (1-P F)/P D≈ 1, and formula (16) is reduced to:
d P D d P F = δ ( J - 1 ) Pe ( J - JPe + Pe J ) + JPe ( 1 - Pe J - 1 ) { δ [ Pe + J ( 1 - Pe ) ] + ( 1 - δ ) } ( J - JPe + Pe J ) - J ( 1 - Pe ) ( 1 - Pe J - 1 ) = β - - - ( 17 )
From formula (3) and formula (4), can get:
P D=P F 1/1+SNR SNR = σ A 2 σ v 2 - - - ( 18 )
d P D d P F = 1 1 + SNR P F - SNR / ( 1 + SNR ) - - - ( 19 )
From formula (18) and formula (19), can get:
P F,opt=[(1+SNR)β] -(1+SNR)/SNR (20)
Can get the detector thresholding according to formula (3) and formula (20) is:
T opt = - 2 σ v 2 log [ P F , opt ] = 2 σ v 2 1 + SNR SNR log [ ( 1 + SNR ) β ] - - - ( 21 ) ;
(2) after information source sends packet, destination carries out collision detection according to the detector thresholding of trying to achieve to receiving packet, in case conflict is detected, destination will be adjudicated conflict exponent number and active user collection, by control channel court verdict will be notified to the all-network user then;
(3) be the linearity that obtains collision signal duplicate independently, system enters the auxiliary retransmission time period of relaying, the conflict exponent number that the length of retransmission time period equals to be detected subtracts 1, a node is elected to be relaying randomly and is retransmitted the signal that it receives at the conflict time slot, the auxiliary retransmission time period one of relaying finishes, the broadcast channel control bit of just resetting is ended current re-transmission and transmission that all are relevant;
(4) when the channel matrix H full rank, all colliding data bags that destination can utilize the linear solution butt joint of suboptimum to receive are united and are unpacked,
Figure F2009102346198C0000035
Realize that many bags separate, and obtain the real-time network goodput ATP corresponding with initial value δ;
(5) result of above-mentioned steps (4) is exported to the renewal of coefficient δ, its process is the iteration to coefficient δ different values in the scope of 0≤δ≤1 in the formula (14), repeating step (1)-(4) finally obtain the goodput ATP of formula (21) result for the network of optimum detector thresholding and correspondence.
2. the detector thresholding based on collision detection according to claim 1 is selected and cooperation conflict separation method, it is characterized in that: (1≤i≤J) packet in conflict time slot n transmission is expressed as x for the arbitrary node i in the network i(n)=[x I, 0(n) ... x I, M-1(n)], each packet comprises M symbol, and the transmitted power of each symbol is σ x 2The signal indication that destination received signal and all idle node (user that the conflict time slot is not given out a contract for a project) receive is
y r ( n ) = Σ i ∈ S ( n ) a ir ( n ) x i ( n ) + w r ( n ) ,
Figure F2009102346198C0000037
Time slot n+k,
Figure F2009102346198C0000039
A node is chosen as relaying at random, and retransmits it at the signal y (n) of time slot that conflicts.At this moment, destination place received signal is expressed as
z d ( n + k ) = a rd ( n + k ) c ( n + k ) y ( n ) + w d ( n + k ) ,
Figure F2009102346198C0000042
Wherein
Figure F2009102346198C0000043
Be the via node set; a Rd(n) be channel coefficients between r via node and destination; w d(n+k) be noise vector; C (n+k) is a normalization coefficient.If
Figure F2009102346198C0000044
Be that relaying itself is not a source node, y (n)=y then r(n),
Figure F2009102346198C0000045
Wherein
Figure F2009102346198C0000046
If
Figure F2009102346198C0000047
Be that relaying itself is exactly a source node, y (n)=x then r(n), c (n+k)=1.
3. select and cooperation conflict separation method according to claim 1 and 2 described detector thresholdings based on collision detection, when it is characterized in that the optimum detector thresholding obtains, the iterative process of coefficient δ is as follows in the formula (14):
(1) initial value of coefficient δ is made as 0, at this moment PTP=PTP 2
(2) try to achieve corresponding thresholding and realization conflict separation, more real-time goodput ATP and potential throughput, calculate | PTP-ATP| 2
(3) update coefficients δ makes δ=δ+Δ δ, and wherein above-mentioned steps (2) is repeated in Δ δ=1/J and 0≤δ≤1;
(4) repeat above-mentioned steps (2), (3), find to make real-time goodput and the most approaching coefficient δ of potential throughput, promptly satisfy
Figure F2009102346198C0000048
The time, formula (21) result is the optimum detector thresholding.
CN200910234619A 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector Expired - Fee Related CN101729206B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910234619A CN101729206B (en) 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910234619A CN101729206B (en) 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector

Publications (2)

Publication Number Publication Date
CN101729206A true CN101729206A (en) 2010-06-09
CN101729206B CN101729206B (en) 2012-10-24

Family

ID=42449503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910234619A Expired - Fee Related CN101729206B (en) 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector

Country Status (1)

Country Link
CN (1) CN101729206B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843225A (en) * 2011-03-30 2012-12-26 英特尔公司 Device, system and method of wireless communication between circuits
CN108521290A (en) * 2018-02-06 2018-09-11 南京航空航天大学 Power distribution method in a kind of wireless relay collaborative network based on spatial modulation
CN108650690A (en) * 2018-04-12 2018-10-12 华中科技大学 A kind of packet error detection method and error detector element based on generation domain
CN108988969A (en) * 2018-08-27 2018-12-11 北京邮电大学 A kind of frequency spectrum sensing method and device based on energy measuring
CN110383783A (en) * 2017-03-07 2019-10-25 华为技术有限公司 The system and method that conflict is detected and slowed down using wake-up packet
CN110690913A (en) * 2018-07-06 2020-01-14 南京航空航天大学 Power distribution method in cooperative space modulation system based on incomplete channel information
CN112601283A (en) * 2020-11-03 2021-04-02 浙江华云信息科技有限公司 Data transmission method and system applied to power Internet of things

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1242628C (en) * 2003-05-27 2006-02-15 中国科学技术大学 Channel inserting method in spread spectrum grouped network based on multipacket receive
CN1278508C (en) * 2004-07-26 2006-10-04 南京邮电学院 Media insertion control method based on multi-packet received in self-organization mobile network
CN100345428C (en) * 2004-07-26 2007-10-24 南京邮电学院 Multi-packet separating method in radio self-organization network
CN101399833B (en) * 2008-12-09 2011-06-01 中国人民解放军理工大学 Hybrid media access control method based on collaborative collision decomposition

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843225A (en) * 2011-03-30 2012-12-26 英特尔公司 Device, system and method of wireless communication between circuits
US9154264B2 (en) 2011-03-30 2015-10-06 Intel Corporation Device, system and method of wireless communication between circuits
CN102843225B (en) * 2011-03-30 2016-06-08 英特尔公司 Device and the method for radio communication is carried out between circuit
CN110383783B (en) * 2017-03-07 2020-12-01 华为技术有限公司 System and method for detecting and mitigating conflicts using wake-up packets
CN110383783A (en) * 2017-03-07 2019-10-25 华为技术有限公司 The system and method that conflict is detected and slowed down using wake-up packet
CN108521290A (en) * 2018-02-06 2018-09-11 南京航空航天大学 Power distribution method in a kind of wireless relay collaborative network based on spatial modulation
CN108521290B (en) * 2018-02-06 2021-08-06 南京航空航天大学 Power distribution method in wireless relay cooperative network based on spatial modulation
CN108650690A (en) * 2018-04-12 2018-10-12 华中科技大学 A kind of packet error detection method and error detector element based on generation domain
CN110690913A (en) * 2018-07-06 2020-01-14 南京航空航天大学 Power distribution method in cooperative space modulation system based on incomplete channel information
CN108988969A (en) * 2018-08-27 2018-12-11 北京邮电大学 A kind of frequency spectrum sensing method and device based on energy measuring
CN108988969B (en) * 2018-08-27 2020-07-21 北京邮电大学 Spectrum sensing method and device based on energy detection
CN112601283A (en) * 2020-11-03 2021-04-02 浙江华云信息科技有限公司 Data transmission method and system applied to power Internet of things
CN112601283B (en) * 2020-11-03 2023-11-17 浙江华云信息科技有限公司 Data transmission method and system applied to electric power Internet of things

Also Published As

Publication number Publication date
CN101729206B (en) 2012-10-24

Similar Documents

Publication Publication Date Title
CN101729206B (en) Conflict detection-based method for separating the threshold selection and cooperation conflict of detector
US9814077B2 (en) Mobility in a distributed antenna system
CN101617549A (en) The access point in the selection multi-hop wireless network or the method and apparatus of via node
Kim et al. Collision-aware rate adaptation in multi-rate WLANs: design and implementation
US20160353328A1 (en) System and Method for Response Frame Type indication
Barroca et al. IEEE 802.15. 4 MAC layer performance enhancement by employing RTS/CTS combined with packet concatenation
CN114285523A (en) Large-scale MTC authorization-free multi-user detection method and system facing multi-service requirements
CN101815312A (en) Cooperative spectrum detection method based on self-adaptive data fusion
WO2016179759A1 (en) Interference offset method and device
US8050195B2 (en) Traffic performance evaluation system in wireless network and method thereof
Barroca et al. Performance enhancement of IEEE 802.15. 4 by employing RTS/CTS and frame concatenation
Barghi et al. Performance evaluation of a MIMO-assisted MPR-MAC over lossy channels
Xue et al. A multiple access scheme based on multi-dimensional compressed sensing
Huang et al. An effective discriminator for differentiating the root causes of packet transmission failures in indoor WSNs
Nagao et al. Multi-hop transmission performance of cognitive temporary bypassing for wireless ad hoc networks
Anwar Header detection for massive IoT wireless networks over Rayleigh fading channels
Zou et al. Optimal throughput for 802.11 DCF with multiple packet reception
Robles et al. Network diversity multiple access in Rayleigh fading correlated channels with imperfect channel and collision multiplicity estimation
Shi et al. SD-CSMA/CA Underwater Optical Wireless Communication Access Protocol Incorporating Spatial Location Information
Tarapiah et al. Network coding in ad hoc networks: A realistic simulation study
Phyo et al. Study of Temporally Coupled Framed Access Scheme in Slotted ALOHA
Samano-Robles et al. Adaptive detection for wireless network diversity multiple access protocols
Kan et al. Reliable transmission protocol based on network coding in delay tolerant mobile sensor network
Shin Unsaturated throughput analysis of IEEE 802.11 DCF under imperfect channel sensing
Hunchangsith et al. Slotted ALOHA with MIMO spatial multiplexing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121024

Termination date: 20151125