CN101729206B - Conflict detection-based method for separating the threshold selection and cooperation conflict of detector - Google Patents

Conflict detection-based method for separating the threshold selection and cooperation conflict of detector Download PDF

Info

Publication number
CN101729206B
CN101729206B CN200910234619A CN200910234619A CN101729206B CN 101729206 B CN101729206 B CN 101729206B CN 200910234619 A CN200910234619 A CN 200910234619A CN 200910234619 A CN200910234619 A CN 200910234619A CN 101729206 B CN101729206 B CN 101729206B
Authority
CN
China
Prior art keywords
sigma
conflict
probability
snr
formula
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN200910234619A
Other languages
Chinese (zh)
Other versions
CN101729206A (en
Inventor
季薇
郑宝玉
杨震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN200910234619A priority Critical patent/CN101729206B/en
Publication of CN101729206A publication Critical patent/CN101729206A/en
Application granted granted Critical
Publication of CN101729206B publication Critical patent/CN101729206B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a conflict detection-based method for separating the threshold selection and cooperation conflict of a detector, which is characterized in that in a small-sized time slot multiple access network transmitted by relay aid, firstly, forecasting the substantial output of a network according to the number of network users, packet sending probability of users, detection probability and false-alarm probability, obtaining the reciprocal relationship between the detection probability and the false-alarm probability by extremum operation to further obtain the optimal detector threshold; secondly, detecting conflict orders and active users according to time slots by a destination end, and notifying a judgment result to all network users by a control channel; and finally, determining the length of transmission time interval of data packets by the system according to the judgment result, and selecting corresponding trunk node aiding information source to transmit data packets, thereby realizing the separation of conflict data packets at the destination end by a sub-optimal linear solution.

Description

Select and cooperation conflict separation method based on the detector thresholding of collision detection
Technical field
The present invention relates to the small-sized time slot multi-access network of the auxiliary transmission of relaying; And the reception of carrying out the colliding data bag simultaneously with separate; Particularly a kind of detector thresholding based on collision detection is selected and cooperation conflict separation method, belongs to network service and signal processing technology field.
Background technology
In wireless network; A large amount of uncertain channel variation; Uneven traffic carrying capacity, radio node move that caused network configuration changes and to the requirement of broadband high-speed rate communication etc., communication system optimization and network design under the existence conditions have been constituted significant challenge.This challenge require we examine closely again existing network each assembly (insert from physical layer design to the MAC layer and the routing of route layer, from information source be compressed to chnnel coding and modulation, from the circuit stages resource allocation to the network level resource allocation) design philosophy and method.In the face of above-mentioned challenge, cause people's great interest thereby in recent years signal processing technology is introduced the performance that network effectively improves wireless network.Many bags based on conflict resolution receive (Multiple Packet Reception; MPR) the technology multiple access of examining closely the access network at random from a new angle inserts problem; Be converted into the Signal Separation problem to the conflict resolution in the network and solve, utilize signal processing technology and Internet resources to solve the collision problem in the network jointly.Its basic thought is exactly to make network node have the function that receives a plurality of user data package simultaneously and they are effectively separated, rather than simply a plurality of packets that arrive simultaneously is used as conflict and all abandons.Node wraps the introducing of receiving ability more, will bring new opportunities and challenges to the design of procotol, improves the throughput and the transmission wait time delay that reduces packet of whole network effectively, for realizing that the new generation of wireless wide-band communication system has great importance.
It is a kind of new method of using signal processing technology to solve data packet collisions problem in the wireless slotted random access network that the network assistance that people such as Tsatsanis propose divides the collection multiple access to insert (NDMA, Network-assisted DiversityMultiple Access) mechanism.This method utilizes Internet resources to obtain diversity performance, and adopts the method for Signal Separation to recover the colliding data bag, and this is at first signal processing to be combined with the network organizing technology, to improve the method for network performance.Yet NDMA mechanism causes its performance to receive the very big restriction of radio channel state for the dependence that retransmits.
Collaboration diversity is as a kind of new model of space diversity, gets more and more people's extensive concerning once occurring.Its basic thought is the formal construction " virtual multi-antenna array " through shared antenna and other Internet resources between the multi-user, and produces the certain space diversity gain of cooperation acquisition through distributed treatment.Lin Rui and A.P.Petropulu etc. combine collaboration diversity with NDMA mechanism, proposed a kind of MAC agreement of high-throughput---ALLIANCES mechanism, and for the many bags receptions that solve under the WLAN decline state provide new way.
In above-mentioned two mechanism; In case conflict takes place; Destination needs collisions exponent number and active user collection (user that promptly conflicts set) to adjudicate, and this moment, the thresholding selection of detector was most important, and the general further exerts an influence with separating to the conflict bag re-transmission of system.All based on the correct hypothesis that detects of conflict exponent number total energy quilt, in fact, the mistaken verdict of destination very likely takes place the conclusion of NDMA and ALLIANCES mechanism.Be the performance of accurate assessment, must consider nonideal collision detection and, but do not see relevant report at present as yet the influence of systematic function based on many packet receivers of cooperation system of NDMA.
Summary of the invention
The objective of the invention is deficiency to existing many bag method of reseptances in the small-sized time slot multi-access network of supporting the auxiliary transmission of relaying; Propose a kind of method of separating, thereby improve many bags receptivity of wireless communication system effectively based on the selection of detector thresholding and the cooperation conflict of collision detection.Its advantage is: on the one hand, utilize many bags receiving ability of node to solve unavoidable data packet collisions problem in traditional random access protocol; On the other hand, utilize the transfer capability of relaying to reduce the re-transmission failure that causes because of the intrinsic fading characteristic of wireless channel and further solve the detector thresholding selection problem that relates to when the collisions exponent number detects and adjudicates with the active user collection.
For realizing above-mentioned purpose; The invention provides a kind of selection of detector thresholding and cooperation conflict separation method based on collision detection; This method has been broken the ideal hypothesis that conflict exponent number total energy is correctly detected in traditional NDMA mechanism and the ALLIANCES mechanism; In cooperation conflict separation mechanism; The detector thresholding selects to take into account desirable collision detection and two kinds of situation of imperfect collision detection; According to network user's number; User's the probability of giving out a contract for a project; Detection probability and false-alarm probability are predicted the potential handling capacity of network; By asking the extreme value computing to obtain the optimum derivative relation between detection probability and false-alarm probability, and then try to achieve optimum detector thresholding; Then, destination detects at conflict time slot collisions exponent number and active user collection according to this optimum thresholding, and by control channel court verdict is notified to the all-network user; System selects the auxiliary information source of corresponding relay node to carry out the transmission of packet, and then realizes the separation of colliding data bag at destination according to this specified data bag when transmission segment length as a result.
Technical scheme of the present invention is following: select and cooperation conflict separation method based on the detector thresholding of collision detection, it is characterized in that:
(1) at first; The probability of giving out a contract for a project, detection probability and false alarm probability according to network user's number, user are predicted the potential throughput of network; Potential throughput is defined as in the potential unit time slot can successful data recovered bag; Through asking the extreme value computing to obtain the derivative relation between detection probability and false alarm probability, and then try to achieve the detector thresholding, step is following:
To be user buffer be empty probability zero hour period in transmission to definition Pe, when K user when conflicting time slot collision, its binary expression is following:
P ( K ) = J K ( 1 - Pe ) K Pe J - K , K = 0,1 , · · · , J - - - ( 1 )
Wireless channel is modeled as the Rayleigh flat fading channel
Figure G2009102346198D00022
Wherein, phase place
Figure G2009102346198D00023
[0,2 π) go up and obey evenly distribution; Amplitude A Ij(n) Rayleigh distributed, variance are 2 σ A 2A Ij(n) and
Figure G2009102346198D00024
Separate, channel is obeyed independent same distribution, noise w between all users r(n) be modeled as the white gaussian variable of incoherent return-to-zero average, variance is σ v 2
False alarm probability P FBe expressed as:
P F = ∫ T ∞ x σ v 2 exp ( - x 2 2 σ v 2 ) dx = exp ( - T 2 2 σ v 2 ) - - - ( 3 )
Detection probability P DBe expressed as:
P D = ∫ T ∞ x σ v 2 + σ A 2 exp ( - x 2 2 ( σ v 2 + σ A 2 ) ) dx = exp ( - T 2 2 ( σ v 2 + σ A 2 ) ) - - - ( 4 )
Making m represent can be by the quantity of correct detected information source node; N representes by false-alarm to be the idle node quantity of active node; Correspondingly, the conflict exponent number that is detected
Figure G2009102346198D00031
equals m+n.When K-m information source omission, n free subscriber by the probability of false-alarm is:
P det ect ( m , n ) = K m ( P D ) m ( 1 - P D ) K - m J - K n ( P F ) n ( 1 - P F ) J - K - n - - - ( 5 )
Wherein, 0≤m≤K, 0≤n≤J-K.Therefore, all correct probability that detects promptly correctly detects all active users (m=K), and no free subscriber is shown by the probability tables of false-alarm (n=0):
P detect(K,0)=P D K(1-P F) J-K (6)
Correspondingly, the lengths table of transmission period is shown:
L ( K , m , n ) = m + n , 0 ≤ m ≤ K , 0 ≤ n ≤ J - K , m + n ≠ 0 1 , m = 0 and n = 0 - - - ( 7 )
When K information source conflict, the average length of transmission period is expressed as:
L ‾ ( K ) = Σ m = 0 K Σ n = 0 J - K P det ect ( m , n ) L ( K , m , n ) = KP D + ( J - K ) P F + ( 1 - P D ) K ( 1 - P F ) J - K - - - ( 8 )
The average length of transmission period is expressed as:
L ‾ = Σ K = 0 J P ( K ) L ‾ ( K ) = JP F + J ( 1 - Pe ) ( P D - P F ) + [ ( 1 - Pe ) ( 1 - P D ) + Pe ( 1 - P F ) ] J - - - ( 9 )
The assessment of potential throughput has two kinds of situation:
A) situation 1: when potential throughput is assessed; Each mistaken verdict of hypothesis goal end all will cause transmitting losing of last all packets of period; Therefore, only when destination was made right-on judgement, the transmission period was only useful; On the useful transmission period, K packet can be by correct recovery at most.At this moment, average potential recoverable bag is expressed as:
N ‾ 1 = Σ K = 0 J KP ( K ) P det ect ( K , 0 ) = J ( 1 - Pe ) P D [ ( 1 - Pe ) P D + Pe ( 1 - P F ) ] J - 1 - - - ( 10 )
Potential throughput under the situation 1 is expressed as
PTP 1 = N ‾ 1 L ‾ - - - ( 11 )
B) situation 2: under this hypothesis, under the situation of destination mistake in judgment, still have some conflicting data bag fortunately to be detected.When K-m information source omission, there be m information source correctly to recover at the most.At this moment, average potential recoverable bag is expressed as
N ‾ 2 = Σ K = 0 J P ( K ) Σ m = 0 K Σ n = 0 J - K m P det ect ( m , n ) = J ( 1 - Pe ) P D - - - ( 12 )
Potential throughput under the situation 2 is expressed as
PTP 2 = N ‾ 2 L ‾ - - - ( 13 )
Take into account above-mentioned two kinds of situation, potential throughput is expressed as
PTP=δ·PTP 1+(1-δ)·PTP 2 (14)
Wherein, δ is a constant, 0≤δ≤1;
Selecting initial value δ, is objective function optimization detector thresholding with potential throughput, order
dPTP d P F = 0 - - - ( 15 )
Can get
d P D d P F = δ ( J - 1 ) Pe P D I 2 J - 2 ( J - J I 1 + I 1 J ) + JPe P D ( 1 - I 1 J - 1 ) [ δ I 2 J - 1 + ( 1 - δ ) ] [ δ I 2 J - 2 I 3 + ( 1 - δ ) ] ( J - J I 1 + I 1 J ) - J ( 1 - Pe ) P D ( 1 - I 1 J - 1 ) [ δ I 2 J - 1 + ( 1 - δ ) ] - - - ( 16 )
Wherein, I 1=(1-Pe) (1-P D)+Pe (1-P F), I 2=(1-Pe) P D+ Pe (1-P F), I 3=Pe (1-P F)+JP D(1-Pe).
Under the high s/n ratio situation, P D≈ 1, P F≈ 0, (1-P F)/P D≈ 1, and formula (16) is reduced to:
d P D d P F = δ ( J - 1 ) Pe ( J - JPe + Pe J ) + JPe ( 1 - Pe J - 1 ) { δ [ Pe + J ( 1 - Pe ) ] + ( 1 - δ ) } ( J - JPe + Pe J ) - J ( 1 - Pe ) ( 1 - Pe J - 1 ) = β - - - ( 17 )
From formula (3) and formula (4), can get:
P D=P F 1/1+SNR SNR = σ A 2 σ v 2 - - - ( 18 )
d P D d P F = 1 1 + SNR P F - SNR / ( 1 + SNR ) - - - ( 19 )
From formula (18) and formula (19), can get:
P F,opt=[(1+SNR)β] -(1+SNR)/SNR (20)
Can get the detector thresholding according to formula (3) and formula (20) is:
T opt = - 2 σ v 2 log [ P F , opt ] = 2 σ v 2 1 + SNR SNR log [ ( 1 + SNR ) β ] - - - ( 21 ) ;
(2) after information source is sent packet; Destination carries out collision detection according to the detector thresholding of trying to achieve to receiving packet; In case conflict is detected, destination is adjudicated collisions exponent number and active user collection, by control channel court verdict is notified to the all-network user then;
(3) be the linearity that obtains collision signal duplicate independently; System gets into the auxiliary retransmission time period of relaying; The conflict exponent number that the length of retransmission time period equals to be detected subtracts 1; A node is elected to be relaying randomly and is retransmitted the signal that it receives at the conflict time slot; The auxiliary retransmission time period one of relaying finishes; The broadcast channel control bit of just resetting is ended current re-transmission and transmission that all are relevant;
(4) destination all colliding data bags of utilizing the linear solution butt joint of suboptimum to receive are united and are unpacked, and realize that many bags separate.When conflict exponent number K and active user collection S (n) are correctly detected, K ^ = K And S ^ ( n ) = S ( n ) . Make the transmission signal indication of source node do X = [ x i 1 T ( n ) , x i 2 T ( n ) , · · · , x i K T ( n ) ] T , Make the reception signal indication of destination do Z = [ z d T ( n ) , z d T ( n + 1 ) , · · · , z d T ( n + K - 1 ) ] T , Z wherein d(n)=y d(n), the matrix form that then receives signal is expressed as Z=HX+W, and wherein, H representes channel coefficients between source node and destination, can detect through active user to obtain estimating that W representes noise matrix.When many bags separated, when the channel matrix full rank, the linear solution of suboptimum capable of using realized the separation of colliding data bag, promptly X ^ = H - 1 Z , And obtain and initial value δ corresponding real-time network goodput ATP;
(5) result of above-mentioned steps (4) is exported to the renewal of coefficient δ; Its process is the iteration to coefficient δ different values in the scope of 0≤δ≤1 in the formula (14); Repeating step (1)-(4) finally obtain formula (21) result and are the goodput ATP of optimum detector thresholding with the network of correspondence.
In the above-mentioned steps (3): make arbitrary node i in the network that (1≤i≤J) packet in conflict time slot n transmission is expressed as x i(n)=[x I, 0(n) ... X I, M-1(n)], each packet comprises M symbol, and the transmitted power of each symbol is σ x 2Destination receives signal
y r ( n ) = Σ i ∈ S ( n ) a ir ( n ) x i ( n ) + w r ( n ) , r∈{d}∪L(n), r ∉ S ( n ) - - - ( 22 )
Time slot n+k, 1 ≤ k ≤ K ^ - 1 , A node is chosen as relaying at random, and retransmits it at the signal y (n) of time slot that conflicts.At this moment, reception signal indication in destination place does
z d(n+k)=a rd(n+k)c(n+k)y(n)+w d(n+k),r∈R(n) (23)
Wherein R ( n ) = { r 1 , · · · , r K ^ - 1 } Be the via node set; a Rd(n) be channel coefficients between r via node and destination; w d(n+k) be noise vector; C (n+k) is a normalization coefficient.If r ∉ S ( n ) , Be that relaying itself is not a source node, y (n)=y then r(n), c ( n + k ) = σ x 2 / ( K ^ σ x 2 σ a 2 + σ v 2 ) , Wherein σ a 2 = σ A 2 ; If r ∈ S (n), promptly relaying itself is exactly a source node, then y (n)=x r(n), c (n+k)=1.
When above-mentioned optimum detector thresholding obtained, the iteration selection course of coefficient δ was following in the formula (14):
(1) initial value of coefficient δ is made as 0, at this moment PTP=PTP 2
(2) try to achieve corresponding thresholding and realization conflict separation, more real-time goodput ATP and potential throughput, calculate | PTP-ATP| 2
(3) update coefficients δ makes δ=δ+Δ δ, and wherein above-mentioned steps (2) is repeated in Δ δ=1/J and 0≤δ≤1;
(4) repeat above-mentioned steps (2), (3); Find and make real-time goodput and the most approaching coefficient δ of potential throughput; When promptly satisfying
Figure G2009102346198D000511
, formula (21) result is the optimum detector thresholding.
Advantage of the present invention and remarkable result: the present invention introduces collision detection in the auxiliary many packet receivers system of relaying, has broken the correct hypothesis that detects of conflict exponent number total energy quilt in existing NDMA and the ALLIANCES mechanism.Desirable collision detection and imperfect conflict check system Effect on Performance have been taken all factors into consideration in the mathematical analysis of systematic function-potential throughput; And worst case and best-case when having taken into account potential throughput evaluation; Thereby be that a kind of systematic function that more meets the practical communication situation is estimated; Can obtain more accurate optimum detector thresholding in view of the above, and then obtain than NDMA mechanism and the better throughput performance of time slot A LOHA mechanism.
Description of drawings:
Fig. 1 is the flow chart of the inventive method;
Fig. 2 is that three users' colliding data bag retransmits sketch map.
Embodiment
Below in conjunction with accompanying drawing and embodiment the present invention is described further.
Referring to Fig. 1,2; The detector thresholding confirm to comprise two steps: the 1. mathematical analysis of potential throughput: utilize potential throughput on the conflict time slot to substitute throughput and predict the throughput performance on the whole transmission period, defining potential throughput and be can successful data recovered bag in the potential unit time slot.Number of users Network Based, user's the probability of giving out a contract for a project, detection probability and false-alarm probability predicted the potential handling capacity of network, specifically divides two kinds of situation to predict, and the handling capacity of predicting under two kinds of situation is carried out linear combination.2. the selection of detector thresholding: obtain the derivative relation between detection probability and false alarm probability through asking the extreme value computing, and then try to achieve the detector thresholding according to the functional relation between detection probability and the false alarm probability.
The transmission of colliding data bag: K of supposition wraps in time slot n and clashes; The court verdict of the expression conflict exponent number K that makes
Figure G2009102346198D00061
,
Figure G2009102346198D00062
expression active user collection user that promptly conflicts collects the court verdict of S (n).Under destination court verdict
Figure G2009102346198D00063
and
Figure G2009102346198D00064
; For recovering individual colliding data bag, the auxiliary retransmission time period length of relaying is fixed as individual time slot.At time slot n+k, 1 ≤ k ≤ K ^ - 1 , A node is selected as relaying, if this node is non-information source relaying, then retransmits the collision signal that it receives at the conflict time slot; If this node is the information source relaying, then retransmit the packet that it produces at the conflict time slot.
The separation of colliding data bag: the packet that on receiving terminal will conflict packet that time slot receives and the auxiliary retransmission time period of relaying, will receive carries out combined decoding.Channel coefficient matrix can detect through active user and obtain estimating.When the channel matrix full rank, the linear solution of suboptimum capable of using realizes the separation of colliding data bag.
Iteration according to coefficient δ in the formula (14) is selected; In the scope of 0≤δ≤1, find and make real-time goodput and the most approaching coefficient δ of potential throughput; When promptly satisfying
Figure G2009102346198D00068
; Be the optimum detector thresholding; With the detector thresholding of the square frame 1 among optimum detector thresholding replacement Fig. 1, proceed follow-up square frame step by Fig. 1 then, realize best many bags separating effect at last.

Claims (3)

1. select based on the detector thresholding of collision detection and cooperation conflict separation method, it is characterized in that:
(1) at first; Count J, user's the probability of giving out a contract for a project, detection probability and false alarm probability predicts the potential throughput of network according to the network user; Through asking the extreme value computing to obtain the derivative relation between detection probability and false alarm probability, and then try to achieve the detector thresholding, step is following:
To be user buffer be empty probability zero hour period in transmission to definition Pe, when K user when conflicting time slot collision, its binary expression is following:
P ( K ) = J K ( 1 - Pe ) K Pe J - K , K = 0.1 . . . . . J - - - ( 1 )
With the wireless channel a between i user and j user Ij(n) be modeled as the Rayleigh flat fading channel,
Figure FSB00000839451800012
Wherein, phase place [0,2 π) go up and obey evenly distribution; Amplitude A Ij(n) Rayleigh distributed, variance does
Figure FSB00000839451800014
A Ij(n) and
Figure FSB00000839451800015
Separate, channel is obeyed independent same distribution, noise w between all users r(n) be modeled as the white gaussian variable of incoherent return-to-zero average, variance does
Figure FSB00000839451800016
False alarm probability P FBe expressed as:
P F = ∫ T ∞ x σ v 2 exp ( - x 2 2 σ v 2 ) dx = exp ( - T 2 2 σ v 2 ) - - - ( 3 )
Detection probability P DBe expressed as:
P D = ∫ T ∞ x σ v 2 + σ A 2 exp ( - x 2 2 ( σ v 2 + σ A 2 ) ) dx = exp ( - T 2 2 ( σ v 2 + σ A 2 ) ) - - - ( 4 )
Making m represent can be by the quantity of correct detected information source node; N representes by false-alarm to be the idle node quantity of active node; Correspondingly, the conflict exponent number that is detected
Figure FSB00000839451800019
equals m+n.When K-m information source omission, n free subscriber by the probability of false-alarm is:
P det ect ( m , n ) = K m ( P D ) m ( 1 - P D ) K - m J - K n ( P F ) n ( 1 - P F ) J - K - n - - - ( 5 )
Wherein, 0≤m≤K, 0≤n≤J-K.Therefore, all correct probability that detects promptly correctly detects all active users (m=K), and no free subscriber is shown by the probability tables of false-alarm (n=0):
P detect(K,0)=P D K(1-P F) J-K (6)
Correspondingly, the lengths table of transmission period is shown:
L ( K , m , n ) = m + n , 0 ≤ m ≤ K , 0 ≤ n ≤ J - K , m + n ≠ 0 1 , m = 0 andn = 0 - - - ( 7 )
When K information source conflict, the average length of transmission period is expressed as:
L ‾ ( K ) = Σ m = 0 K Σ n = 0 J - K P det ect ( m , n ) L ( K , m , n ) = KP D + ( J - K ) P F + ( 1 - P D ) K ( 1 - P F ) J - K - - - ( 8 )
The average length of transmission period is expressed as:
L ‾ = Σ K = 0 J P ( K ) L ‾ ( K ) = JP F + J ( 1 - Pe ) ( P D - P F ) + [ ( 1 - Pe ) ( 1 - P D ) + Pe ( 1 - P F ) ] J - - - ( 9 )
The assessment of potential throughput has two kinds of situation:
A) situation 1: when potential throughput is assessed; Each mistaken verdict of hypothesis goal end all will cause transmitting losing of last all packets of period; Therefore, only when destination was made right-on judgement, the transmission period was only useful; On the useful transmission period, K packet can be by correct recovery at most.At this moment, average potential recoverable bag is expressed as:
N ‾ 1 = Σ K = 0 J KP ( K ) P det ect ( K , 0 ) = J ( 1 - Pe ) P D [ ( 1 - Pe ) P D + Pe ( 1 - P F ) ] J - 21 - - - ( 10 )
Potential throughput under the situation 1 is expressed as
PTP 1 = N ‾ 1 L ‾ - - - ( 11 )
B) situation 2: under this hypothesis, under the situation of destination mistake in judgment, still have some conflicting data bag fortunately to be detected.When K-m information source omission, there be m information source correctly to recover at the most.At this moment, average potential recoverable bag is expressed as
N ‾ 2 = Σ K = 0 J P ( K ) Σ m = 0 K Σ n = 0 J - K mP det ect ( m , n ) = J ( 1 - Pe ) P D - - - ( 12 )
Potential throughput under the situation 2 is expressed as
PTP 2 = N ‾ 2 L ‾ - - - ( 13 )
Take into account above-mentioned two kinds of situation, potential throughput is expressed as
PTP=δ·PTP 1+(1-δ)·PTP 2 (14)
Wherein, δ is a constant, 0≤δ≤1;
Selecting initial value δ, is objective function optimization detector thresholding with potential throughput, order
dPTP dP F = 0 - - - ( 15 )
Can get
dP D DP F = δ ( J - 1 ) PeP D I 2 J - 2 ( J - JI 1 + I 1 J ) + JPeP D ( 1 - I 1 J - 1 ) [ δI 2 J - 1 + ( 1 - δ ) ] [ δI 2 J - 2 I 3 + ( 1 - δ ) ] ( J - JI 1 + I 1 J ) - J ( 1 - Pe ) P D ( 1 - I 1 J - 1 ) [ δI 2 J - 1 + ( 1 - δ ) ] - - - ( 16 )
Wherein, I 1=(1-Pe) (1-P D)+Pe (1-P F), I 2=(1-Pe) P D+ Pe (1-P F), I 3=Pe (1-P F)+JP D(1-Pe).
Under the high s/n ratio situation, P D≈ 1, P F≈ 0, (1-P F)/P D≈ 1, and formula (16) is reduced to:
dP D dP F = δ ( J - 1 ) Pe ( J - JPe + Pe J ) + JPe ( 1 - Pe J - 1 ) { δ [ Pe + J ( 1 - Pe ) ] + ( 1 - δ ) } ( J - JPe + Pe J ) - J ( 1 - Pe ) ( 1 - Pe J - 1 ) = β - - - ( 17 )
From formula (3) and formula (4), can get:
P D=P F 1/1+SNR SNR = σ A 2 σ v 2 - - - ( 18 )
dP D dP F = 1 1 + SNR P F - SNR / ( 1 + SNR ) - - - ( 19 )
From formula (18) and formula (19), can get:
P F,opt=[(1+SNR)β] -(1+SNR)/SNR (20)
Can get the detector thresholding according to formula (3) and formula (20) is:
T opt = - 2 σ v 2 log [ P F , opt ] = 2 σ v 2 1 + SNR SNR log [ ( 1 + SNR ) β ] - - - ( 21 ) ;
(2) after information source is sent packet; Destination carries out collision detection according to the detector thresholding of trying to achieve to receiving packet; In case conflict is detected, destination is adjudicated collisions exponent number and active user collection, by control channel court verdict is notified to the all-network user then;
(3) be the linearity that obtains collision signal duplicate independently; System gets into the auxiliary retransmission time period of relaying; The conflict exponent number that the length of retransmission time period equals to be detected subtracts 1; A node is elected to be relaying randomly and is retransmitted the signal that it receives at the conflict time slot; The auxiliary retransmission time period one of relaying finishes; The broadcast channel control bit of just resetting is ended current re-transmission and transmission that all are relevant;
(4) when the channel matrix H full rank; All colliding data bags that the linear solution butt joint of destination suboptimum capable of using is received are united and are unpacked;
Figure FSB00000839451800036
realizes that many bags separate, and obtains and initial value δ corresponding real-time network goodput ATP;
(5) result of above-mentioned steps (4) is exported to the renewal of coefficient δ; Its process is the iteration to coefficient δ different values in the scope of 0≤δ≤1 in the formula (14); Repeating step (1)-(4) finally obtain formula (21) result and are the goodput ATP of optimum detector thresholding with the network of correspondence.
2. the detector thresholding based on collision detection according to claim 1 is selected and cooperation conflict separation method, it is characterized in that: (1≤i≤J) packet in conflict time slot n transmission is expressed as x for the arbitrary node i in the network i(n)=[x I, 0(n) ... X I, M-1(n)], each packet comprises M symbol, and the transmitted power of each symbol does Destination receives signal
Time slot n+k;
Figure FSB00000839451800042
node is chosen as relaying at random, and retransmits it at the signal y (n) of time slot that conflicts.At this moment, reception signal indication in destination place does
Figure FSB00000839451800043
Wherein
Figure FSB00000839451800044
Be the via node set; a Rd(n) be channel coefficients between r via node and destination; w d(n+k) be noise vector; C (n+k) is a normalization coefficient.If
Figure FSB00000839451800045
Be that relaying itself is not a source node, y (n)=y then r(n),
Figure FSB00000839451800046
Wherein If
Figure FSB00000839451800048
Be that relaying itself is exactly a source node, y (n)=x then r(n), c (n+k)=1.
3. the detector thresholding based on collision detection according to claim 1 and 2 is selected and cooperation conflict separation method, and when it is characterized in that the optimum detector thresholding obtains, the iterative process of coefficient δ is following in the formula (14):
(1) initial value of coefficient δ is made as 0, at this moment PTP=PTP 2
(2) try to achieve corresponding thresholding and realization conflict separation, more real-time goodput ATP and potential throughput, calculate | PTP-ATP| 2
(3) update coefficients δ makes δ=δ+Δ δ, wherein Δ δ=1/J and 0≤δ≤1;
(4) repeat above-mentioned steps (2), (3); Find and make real-time goodput and the most approaching coefficient δ of potential throughput; When promptly satisfying
Figure FSB00000839451800049
, formula (21) result is the optimum detector thresholding.
CN200910234619A 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector Expired - Fee Related CN101729206B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910234619A CN101729206B (en) 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910234619A CN101729206B (en) 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector

Publications (2)

Publication Number Publication Date
CN101729206A CN101729206A (en) 2010-06-09
CN101729206B true CN101729206B (en) 2012-10-24

Family

ID=42449503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910234619A Expired - Fee Related CN101729206B (en) 2009-11-25 2009-11-25 Conflict detection-based method for separating the threshold selection and cooperation conflict of detector

Country Status (1)

Country Link
CN (1) CN101729206B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9154264B2 (en) * 2011-03-30 2015-10-06 Intel Corporation Device, system and method of wireless communication between circuits
US10485029B2 (en) * 2017-03-07 2019-11-19 Futurewei Technologies, Inc. System and method for collision detection and mitigation with wake-up packets
CN108521290B (en) * 2018-02-06 2021-08-06 南京航空航天大学 Power distribution method in wireless relay cooperative network based on spatial modulation
CN108650690B (en) * 2018-04-12 2019-05-21 华中科技大学 A kind of packet error detection method and error detector element based on generation domain
CN110690913B (en) * 2018-07-06 2023-04-07 南京航空航天大学 Power distribution method in cooperative space modulation system based on incomplete channel information
CN108988969B (en) * 2018-08-27 2020-07-21 北京邮电大学 Spectrum sensing method and device based on energy detection
CN112601283B (en) * 2020-11-03 2023-11-17 浙江华云信息科技有限公司 Data transmission method and system applied to electric power Internet of things

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553715A (en) * 2003-05-27 2004-12-08 中国科学技术大学 Channel inserting method in spread spectrum grouped network based on multipacket receive
CN1599307A (en) * 2004-07-26 2005-03-23 南京邮电学院 Media insertion control method based on multi-packet received in self-organization mobile network
CN1599365A (en) * 2004-07-26 2005-03-23 南京邮电学院 Multi-packet separating method in radio self-organization network
CN101399833A (en) * 2008-12-09 2009-04-01 中国人民解放军理工大学 Hybrid media access control method based on collaborative collision decomposition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1553715A (en) * 2003-05-27 2004-12-08 中国科学技术大学 Channel inserting method in spread spectrum grouped network based on multipacket receive
CN1599307A (en) * 2004-07-26 2005-03-23 南京邮电学院 Media insertion control method based on multi-packet received in self-organization mobile network
CN1599365A (en) * 2004-07-26 2005-03-23 南京邮电学院 Multi-packet separating method in radio self-organization network
CN101399833A (en) * 2008-12-09 2009-04-01 中国人民解放军理工大学 Hybrid media access control method based on collaborative collision decomposition

Also Published As

Publication number Publication date
CN101729206A (en) 2010-06-09

Similar Documents

Publication Publication Date Title
CN101729206B (en) Conflict detection-based method for separating the threshold selection and cooperation conflict of detector
US9814077B2 (en) Mobility in a distributed antenna system
Du et al. From rateless to distanceless: Enabling sparse sensor network deployment in large areas
US9955238B2 (en) Methods and systems for wireless transmission of data between network nodes
Kim et al. Collision-aware rate adaptation in multi-rate WLANs: design and implementation
US20160353328A1 (en) System and Method for Response Frame Type indication
Sun et al. CS‐PLM: compressive sensing data gathering algorithm based on packet loss matching in sensor networks
Barroca et al. IEEE 802.15. 4 MAC layer performance enhancement by employing RTS/CTS combined with packet concatenation
Pfletschinger et al. Energy-efficient data collection in WSN with network coding
US8050195B2 (en) Traffic performance evaluation system in wireless network and method thereof
Barroca et al. Performance enhancement of IEEE 802.15. 4 by employing RTS/CTS and frame concatenation
Munari et al. Grant-free access for IoT in beyond-5G systems: The potential of receiver diversity
Yang et al. ECR-MAC: An energy-efficient and receiver-based MAC protocol for Cognitive Sensor Networks in smart grid
Kadam et al. Rapid node cardinality estimation in heterogeneous machine-to-machine networks
Mehta et al. Performance analysis of link adaptation in wireless data networks
Xue et al. A multiple access scheme based on multi-dimensional compressed sensing
Nagao et al. Multi-hop transmission performance of cognitive temporary bypassing for wireless ad hoc networks
Huang et al. An effective discriminator for differentiating the root causes of packet transmission failures in indoor WSNs
Tarapiah et al. Network coding in ad hoc networks: A realistic simulation study
Anwar Header detection for massive IoT wireless networks over Rayleigh fading channels
Kaneko et al. Compressed sensing based protocol for efficient reconstruction of sparse superimposed data in a multi-hop wireless sensor network
Hammash et al. HIAM: hidden node and interference aware routing metric for multi-channel multi-radio mesh networks
Srivastava Study and Analysis of Average Throughput Based on the Performance of Broadcast Scheme in Wireless Ad-hoc Networks
Shi et al. SD-CSMA/CA Underwater Optical Wireless Communication Access Protocol Incorporating Spatial Location Information
Srinivasan et al. Relay Assisted Effective Loss Recovery Technique for Wireless Sensor Network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121024

Termination date: 20151125

CF01 Termination of patent right due to non-payment of annual fee