CHANNEL SELECTION IN AN AD HOC WIRELESS NETWORK

Information

  • Patent Application
  • 20110007702
  • Publication Number
    20110007702
  • Date Filed
    March 11, 2009
    15 years ago
  • Date Published
    January 13, 2011
    14 years ago
Abstract
An improved method of selecting a channel in an ad hoc wireless network in which each node using a given channel periodically evaluates the transmission power against a power threshold to ensure that the signal to interference and noise ratio at each node is acceptable.
Description

The present invention relates to a method of selecting a channel in a wireless network, and in particular to a method of selecting a channel in an ad hoc wireless network.


Ad hoc networks are generally defined as a collection of mobile nodes which communicate with each other over a wireless channel with no fixed infrastructure. The nodes may, for example, form a Bluetooth or WiFi network, although many other applicable network architectures and signal transmission protocols are known. The nodes may comprise personal mobile telecommunications devices, personal digital assistants, remote sensors and many other devices. Central to the idea of ad hoc networks is the concept of multi-hop, where each node can act as a router and forward packets on behalf of other nodes towards their destination.


This is in contrast to conventional cellular systems where each mobile device communicates directly to a base station, which controls all transmission and routing functions. An essential feature of ad-hoc networks, which has no parallel in wired networks, is the relationship between power control, call admission control, network topology and routing algorithms.


Ad hoc wireless networks are well known, in which nodes join and leave the network over time. When nodes communicate with one another signals from one pair of nodes may interfere with the signals being sent by a second pair of nodes. Thus, the signal to interference ratio plus noise ratio (SINR) at each node needs to be maintained at a satisfactory level, typically by controlling the operating power of the nodes and the directive patterns of their antennas. The SINR for each node can fluctuate essentially randomly as nodes enter and leave the ad hoc network and so an effective way of estimating the SINR and controlling the nodes is needed.


There are a number of parameters that can be used to control the performance of the physical layer of ad hoc wireless networks, for example, modulation, transmit power, spreading code and antenna beams. By controlling these transceiver parameters adaptively and in an intelligent manner, the capacity of the system can be increased significantly.


In early works on power control (J. M. Aein, Power balancing in systems reemploying frequency reuse, COMSAT Tech. Rev., pp. 277-299, 1973), balancing the SINRs of all radio links was first proposed via a centralized operation system. However, there has been a subsequent shift to a system of distributed SINR-balancing algorithms (see G. J. Foschini et al, A simple distributed autonomous power control algorithm and its convergence, IEEE Transactions on Vehicular Technology, Vol. 42, No. 4, November 1993 and S. A. Grandhi et al, Centralized power control in cellular radio systems, IEEE Transactions on Vehicular Technology, 42(4), pp. 466-468, 1993). Although distributed power control schemes are more practical than centralized ones, in a dynamic network environment such an approach would require the removal of some existing calls in order to balance the overall quality of service (QoS) requirements for the rest of the existing calls (see M. Andersin et al, Gradual removals in cellular radio networks, Wireless Networks, vol. 2, no. 1, pp. 27-43, (1996)).


The concept of active link protection (N. Bambos et al, Channel access algorithms with active link protection for wireless communications networks with power control, IEEE/ACM Transactions on Networking 8(5), pp. 583-597, (2000)), was introduced as a means to minimize the degradation of SINR of current active links as new links are accessing the channel. Such methods have a number of disadvantages: for example for new links that are being rejected by the system, the amount of time spent waiting before exiting from the system would constitute a waste of power resources and therefore generates undue interference to other active link users.


An admission-centric power control has been proposed in which each incoming call first monitors pilot tones from all the active base stations in order to measure the base-to-mobile power gains. Having global information, all uplinks can then compute the required power levels to satisfy the SINR threshold or until the maximum power constraint of an uplink is violated, in which case the new call is rejected. Here the method assumes that only one new call is trying to be admitted at a time and that global information of an existing feasible system can be obtained.


Further studies (S. A. Grandhi et al “Centralized power control in cellular radio systems”, IEEE Transactions on Vehicular Technology, 42(4), pp. 466-468, 1993 and J. Zander, Distributed Co-channel Interference Control in Cellular Radio Systems, IEEE Transactions on Vehicular Technology, Vol. 41, No. 3, pp. 305-311, August 1992) show that when the information of the global link gain matrix is available, and by neglecting the white noise factor the maximum achievable signal-to-interference (SIR) can be determined, and provided it is greater than the threshold requirement, then there exists a feasible solution for all power constraints. Thus, one of the challenges of call admission control in a wireless system with power control is the prediction of the maximum achievable SIR when the global link gain information is not available.


A centralized power control (CPC) scheme has been proposed (Grandhi et al, op cit) to compute transmitter power levels so as to obtain a maximum achievable SIR for all the receiving links. Following such a proposed CPC scheme, a predictor for the maximum achievable SIR of a new link or node trying to obtain admission into a wireless system was presented (Chin et al. “Predictive call admission control algorithm for power-controlled wireless systems,” Ad-Hoc Now 2006, Lecture Notes in Computer Science, Vol. 4104, pp. 414-427, (2006)). This assumed that the new incoming pair of nodes do not have any global information concerning all other link gains in the feasible system. Instead, it predicts the actual maximum achievable SIR of the network system should it be admitted.


For the case of extending power control (M. M.-L. Cheng et al, “Performance evaluation of distributed measurement-based dynamic channel assignment in local wireless communications”, IEEE Journal on Selected Areas in Communications, Vol 14, No. 4, pp. 698-710, May 1996), channel allocation in wireless networks is proposed based on the least interference criterion, that is selecting the channel with the least interference would require the least transmission power to maintain the SINR threshold. Later this problem was addressed (G. Kulkarni et al, “Channel Allocation for OFDMA based Wireless Ad-hoc Networks”, SPIE International Conference on Advanced Signal Processing Algorithms, Architectures, and Implementations, Seattle, Wash., July 2002.)) by the spatial reuse frequency channels in FDMA based ad hoc networks using adaptive modulation techniques. Power control is then used to maintain the minimum QoS requirement caused by frequency reuse. Extension of this work for OFDM based ad hoc networks is given in Kulkarni et al.


Another approach to mitigate co-channel interference effects and increase the network capacity is to avoid strong interferers by dynamically assigning the channels to the users (D J Goodman et al, “Distributed dynamic channel assignment schemes”, Proc. IEEE Vehicular Technology Conference, pp. 532-535, 1993). Of late there has been much research on integrating distributed dynamic channel and power allocation (DCPA) schemes (see, amongst others J. C.-I. Chuang and N. R. Sollenberger, “Performance of autonomous dynamic channel assignment and power control for TDMA/FDMA wireless access”, IEEE J. Select. Areas Commun., Vol 12, pp. 1314-1324, October 1994): However these DCPA schemes do not integrate power control and channel assignment as one entity but rather are done separately. It has been suggested (A. H. M. Rad and V. W. S. Wong, Joint optimal channel assignment and congestion control for multi-channel wireless mesh networks, Proc. of IEEE International Conference on Communications, Istanbul, June 2006) that the a joint optimal channel assignment and congestion control (JOCAC) be used, giving a decentralized utility maximization problem with constraints arising from interference of neighbouring transmissions.


The main drawback to these approaches is the assumption that the network structure is quasi-static. It may be assumed that the time taken to assess the channel properties is less than the relative timescale of mobility of other co-channel users, and hence do not accurately capture the dynamics of stochastic time channels. In the paper by Holliday et al. (T. Holliday et al, “Distributed power and admission control for time varying wireless networks”, Technical Report, Stanford University, 2004), the authors relaxed this assumption and permitted the links between network nodes to be time-varying stochastic processes. A new criteria for power optimality in wireless ad-hoc networks was proposed and it was shown that a power allocation that satisfies the new optimality criteria can be extended to call admission control in a time-varying wireless networks. However their method focuses on converging to the optimal power allocation for an ad-hoc network in a time-varying channel environment which is unrealistic to attain.


According to a first aspect of the present invention, there is provided a method of selecting a channel in an ad hoc wireless method for use by a sending node and a receiving node, the method comprising the steps of: (a) choosing a channel for potential use; (b) determining the number and the position of other nodes using the channel chosen in step (a); (c) for each of a plurality of iterations, (1) determining a plurality of transmission parameters; (2) determining an admission probability value in accordance with the plurality of transmission parameters determined in step (1); (d) determining a mean admission probability value in accordance with each of the determined admission probability values; and (e) comparing the mean admission probability with a predetermined threshold; and (f) allowing the sending node and the receiving node to used the channel selected in step (a) if the mean admission probability is equal to or greater than the predetermined threshold.


The method preferably comprises the further steps of: (g) adjusting the transmission power of all of the nodes using the channel selected in step (a) to control the interference caused by other nodes; and (h) preventing the sending node and the receiving node from using the channel selected in step (a) if the transmission power of any of the nodes using the channel selected in step (a) is greater than a predetermined threshold. Each node using the channel selected in step (a) preferably repeats steps (g) and (h) periodically. Each node may repeat steps (g) and (h) substantially every 100 ms.


According to a second aspect of the present invention, there is provided a computer program product, comprising computer executable code for performing a method as described above.





Embodiments of the present invention will now be described, by way of example only, with reference to the accompanying drawings in which:



FIG. 1 shows a schematic depiction of ad hoc wireless network; and



FIG. 2 shows a flowchart that describes the operation of an algorithm in accordance with a method according to the present invention






FIG. 1 shows a schematic depiction of ad hoc wireless network 100 in which a plurality of network nodes 20 are in wireless communication with one or more of the other nodes. For example, node 20b has a communication link with three other nodes (nodes 20a, 20c & 20d) whereas node 20e only has a link to one other node (node 20d). The ad hoc wireless network may be entirely self-contained or one or more of the nodes may have a connection to a further network, such as a DSL connection to the Internet, to enable onward connectivity.


As the network is an ad hoc network, new nodes may wish to make a connection to one of the existing nodes or an existing node may wish to make a connection to a node that it is not currently connected to. The present invention provides an improved method for determining how such a connection can be made.


In the present invention the quasi-static assumption in the network structure of wireless ad-hoc networks will be overlooked. Rather than proposing a new criterion for power optimality, the present invention will model the stochastic time aspect of the link gains between communicative nodes within the call admission control framework. Owing to the log-normal properties of the gain of each communicative pairs, the link gains can be modelled as a stochastic process which follows a geometric Brownian motion (GBM). But in the context of CAC where communicative nodes can either enter or leave the network, the simple diffusion model of GBM does not capture the features of CAC in its entirety. Therefore it is proposed to incorporate jumps in the dynamics of the network structure where the sum total interference experienced by a communicative pair can either suddenly drop, reducing drastically the need for a high power to attain the required SINR, or there could be a surge of interference unexpectedly causing the entire co-channel network structure to increase their power levels to maintain the SINR requirement.


Based on the stability conditions and using the jump-diffusion process, it is possible to formulate the probability for a new communicative pair whether it can attain the SINR requirements or not in the network system. Hence, not only is it possible to optimise the number of co-channel links that the system can accommodate, and to include mobility patterns and traffic conditions using a prediction mechanism, the algorithm is sufficiently dynamic to update its prediction of the channel quality. Furthermore in tandem with the CAC prediction mechanism this invention also embodies a channel selection strategy as a means to intelligently assign the least interfering channel to the new pair-wise user nodes so as to optimize the maximum number of communicative pairs within a given system.


Consider an ad hoc network system with M active pairs of co-channel communications, where M>1. Each communication link consists of a receiver node and a sender node such that there exists a subset of sender nodes S={s1,s2, . . . ,sM} transmitting packets of data to another subset of receiving nodes R={r1,r2, . . . ,rM}. The transmission ti:si→ri, i=1,2, . . . ,M is from a sender node to a receiver node, or to a relay node in multi-hop case. For the following analysis, the downlink case is of interest, where a sender node s, transmits to the receiver node ri.


The objective of power control in such a dynamic environment is to ensure that all communication pairs achieve an SINR above a required threshold. Under fixed channel gain assumption the implementation of power control could be in either of the following two forms: centralised or distributed. For the case when the channel gains vary with time t, Grisi(t) represents the gain of the communication link between the rith receiver node and the sith sender node, such that











G


r
i



s
i





(
t
)


=




(


z


r
i



s
i





(
t
)


)

2

·


S


r
i



s
i





(
t
)






d


r
i



s
i





(
t
)


v






[
1
]







where at time t, (zrisi(t))2 models the multi-path fading where zrisi(t) follows a Rayleigh distribution, Srisi(t) is the attenuation factor at time t, drisi(t)denotes the distance at time t between communicative pairs, and the subscripts ri and si denote the receiver and sender nodes respectively. The parameter v is a constant that models the propagation path loss. It is assumed that 10 log10 Srisi(t)˜N(0, σ2), 1≦i≦M, are independent, log normal, identically distributed, random variables with 0 dB expectation and σ2 log variance. The value of σ in the range of 4-10 dB and the propagation constant v in the range of 3-5 usually provide good models for urban propagation non-line-of-sight (Lee (1989)).


In general, given that there are M pair-wise interfering nodes in the system, the SINR of the rith receiver node can be denoted by












γ

r
i




(
t
)


=




G


r
i



s
i





(
t
)





P

s
i




(
t
)








j

i






G


r
i



s
j





(
t
)





P

s
j




(
t
)




+


η

r
i




(
t
)





,

1

i

,

j

M





[
2
]







where at time t, Psi(t)is the transmit power of sender node si and ηri(t)>0 is the white noise of detected by node ri. For each receiver node ri there is some SINR threshold requirement denoted by γri>0, representing the receiver node ri minimal quality of service (QoS) it must support in order to operate successfully. Following the above arguments then it can be seen that





γri(t)≧γri, 1≦i≦M.   [3]


In matrix format, the relationships [2] and [3] can be expressed as





(I−F(t))P(t)≧Θ(t), P(t)>0   [4]


where








Θ


(
t
)


=


[




γ

r
1






η

r
1




(
t
)





G


r
1



s
1





(
t
)



,



γ

r
2






η

r
2




(
t
)





G


r
2



s
2





(
t
)



,





,



γ

r
M






η

r
M




(
t
)





G


r

M
1




s
M





(
t
)




]

T


,




P(t)=ØPs1(t), Ps2(t), . . . , PsM(t)┘T and F(t)=(Fij(t)) is a matrix having the entries Fij(t)=0 for i=j and








F
ij



(
t
)


=



γ

r
i






G


r
i



s
j





(
t
)





G


r
i



s
i





(
t
)







for i≠j, 1≦j≦M. Note that F(t) has non-negative elements and it can be shown that F(t) is also irreducible, that is each row of F(t) has no more than one zero element.


It can be shown that for a fixed channel gain (see N Bambos, et al, “Channel access algorithms with active link protection for wireless communications networks with power control”, IEEE/ACM Transactions on Networking 8(5), pp. 583-597, (2000)).)) ))that the following statements, which comprise Theorem 1, are equivalent:


Theorem 1:


1. There exists a power vector P>0 such that (I−F)P≧Θ


2. The spectral radius of F, ρF<1


3. The matrix (I−F)−1 exists and has positive entries


where







Θ
=


[




γ

r
1





η

r
1




G


r
1



s
1




,



γ

r
2





η

r
2




G


r
2



s
2




,





,



γ

r
M





η

r
M




G


r

M
1




s
M





]

T


,




F=(Fij) such that Fij=0 for i=j and







F
ij

=




γ

r
i





G


r
i



s
j





G


r
i



s
i




.





Based on this, it can be deduced that if ρF<1 then (I−F) is non-singular with M independent rows and its inverse has positive entries. Because (I−F) is invertible hence there exists a unique solution






P*=(I−F)−1Θ>0   [5]


which lies at a vertex of all the linear constraints.


It has been proposed (Foschini and Miljanic (1993)) to use an iterative method of the following form






P
(k+1)
=FP
(k)+Θ  [6]


where k=1,2, . . . to find P*=(I−F)−1Θ>0.


If (I−F) is a non-singular matrix then the rate of convergence of the iterates is a geometric one such that ∥P(k)−P*∥=O(αk), 0<α<1.


However for the case when the channel gains Grisi(t) are allowed to vary in time then for a small time interval └t, t+Δt┘, the following iterative procedure






P(t+Δt)=F(t)P(t)+Θ(t)   [7]


will not converge to a deterministic saturated point. Furthermore, as the power levels of all the sender nodes are also time-varying, the original QoS requirement that requires [3] to hold at all times might not be possible.


In an alternative approach (Holliday et al. (2004)), it was proposed that since F(t) is a time-varying matrix, the spectral radius of F(t) no longer holds in the convergence condition of Theorem 1, but rather it is replaced by the Lyapunov exponent, λF defined as










λ
F

=


lim

t







1
t


log








k
=
0

t







F


(
k
)





.







[
8
]







Accordingly, a new theorem, Theorem 2, can be posited.


Theorem 2:


Within the time interval [t, t+Δt] if the sender nodes power are updated according to the iterative procedure P(t+Δt)=F(t)P(t)+Θ(t) and λF<0 then








lim

t






E




log







γ

r
i




(
t
)







=

log






γ

r
i








for all i=1, 2, . . . , M where












γ

r
i




(
t
)


=




G


r
i



s
i





(
t
)





P

s
i




(
t
)








j

i






G


r
i



s
j





(
t
)





P

s
j




(
t
)




+


η

r
i




(
t
)





,

1

i

,

j

M





[
9
]







As a consequence of Theorem 2, instead of aiming for







γ

r
i


=




G


r
i



s
i





P

s
i








j

i





G


r
i



s
j






P

s
j




(
t
)




+

η

r
i






γ

r
i








for i, j=1, 2, . . . , M in a static-time environment, in a time-varying condition, the power update formula aims for











lim

t






E





γ

r
i




(
t
)








γ

r
i







[
10
]







since from the Jensen's inequality the identity log E└γri(t)┘≧E└ log γri(t)┘ is known.


The power control in a time-varying wireless network aims for








lim

t






E





γ

r
i




(
t
)








γ

r
i







so as to determine whether a new communicative pair is able to make an admissible transmission. In a time-varying wireless network environment where nodes enter and leave in a dynamic manner such a pre-condition imposed on the expected value of [3] is hard to achieve.


In order for the power levels to converge according to the results of Theorem 2, the power updating algorithm as proposed by Holliday et al. (2004) becomes






P(t+Δt)=F(t)P(t)+ Θ(t)









F
_

ij

=



γ

r
i




E





G


r
i



s
j





(
t
)






E


[


G


r
i



s
i





(
t
)


]




,




where F(t)=( Fij(t)) such that Fij=0 for i=j, and








Θ
_



(
t
)


=



[




γ

r
1





E


[


η

r
1




(
t
)


]




E


[


G


r
1



s
1





(
t
)


]



,



γ

r
2





E


[


η

r
2




(
t
)


]




E


[


G


r
2



s
2





(
t
)


]



,





,



γ

r
M





E


[


η

r
M




(
t
)


]




E


[


G


r

M
1




s
M





(
t
)


]




]

T

.





To design an algorithm following the above criteria is impractical unless it is possible to know in advance the probability distribution and hence the expected value of the matrix process F(t)=(Fij(t)).


Therefore it is proposed to abandon the methodology embodied in Theorem 2 and instead model the SINR as a continuous time stochastic process in the form of jump-diffusion process. This can be justified for the following reasons:

    • the jump-diffusion process provides a good approximation in tracking the evolution of small and sudden changes for quantities greater than zero such as defined in [3]
    • an analytical solution for such a model exists and can easily be implemented on the wireless card.
    • it is possible to interpret the jump part of the model as the network response to new incoming calls or some existing calls exiting the system. More precisely, in the absence of incoming or calls leaving, the links simply follows a geometric Brownian motion. If there are new call arrivals or call leavings, they can be modeled as a Poisson process, and the link gains changes in response to the jump size distribution.


Assuming that the channel gain is fixed, then the following conditions (Olafsson (2006)) will cause the communications links to have a feasible power vector.


Theorem 3—non-singularity condition:


If the matrix (I−F) is row diagonally dominant such that for all i=1,2, . . . , M











G


r
i



s
i




γ

r
i









j

i




G


r
i



s
j








[
11
]







then (I−F)−1 exists and all the real parts of the eigenvalues of (I−F) are positive.


Theorem 4—stability condition:


If (I—F) is row diagonally dominant for all i=1,2, . . . , M then the power constraints (I−F)P≧Θ, P>0 has a unique solution P*=(I−F)−1Θ>0.


Based on the concept of the matrix (I−F) being row diagonally dominant, the inequality [11] reveals two important factors on the stability of the power control constraints.

    • The lower the SINR threshold, γri for the transmission between si and ri, the easier it is to achieve and maintain the stability condition.
    • By reducing the channel link gains from interfering senders sj, j≠i, the interference measured by the transmission pair (ri, si) can then be reduced. The right-hand-side of [11] can be reduced by using smart or beamforming antennas and hence (ri,si) can achieve the stability condition and therefore increases the spatial and channel reuse within the system.


In a method according to the present invention it is intended to exploit in real time the sufficient condition property for each of the transmission pairs in order to maximize the number of co-channel links the system is able to accommodate. In the context of time-varying wireless networks, for each new communication pair (ri,si) entering into the system, it is not possible to measure at a localised level that the following expression











G


r
i



s
i





(
t
)





γ

r
i








j

i





G


r
i



s
j





(
t
)








[
12
]







can hold true in all cases so that (ri,si) is able to transmit using the same channel as other users.


Therefore, to exploit the time-dimension aspect of CAC, for a small time interval Δt=t/N the sufficient condition can be revised to give the following probability requirement










p
_

=



1
N






k
=
0

N



Prob


(



G


r
i



s
i





(


k
·
Δ






t

)





γ

r
i








j

i





G


r
i



s
j





(


k
·
Δ






t

)





)






1
-
α






[
13
]







where α∈ (0, 1) for the pair (ri,si) to be successfully admitted into the system at time t.


In order to obtain a closed-form solution for equation [13], the evolution of the link gains as a jump-diffusion model is modelled so as to capture the dynamics of time-varying channel environment. It should be noted that the model under consideration here is that of an ad-hoc wireless network with purely distributed control where new users are to make local decisions regarding the stability of the network.


Let






V
=



V


r
i



s
i





(
t
)


=



G


r
i



s
i





(
t
)






j

i





G


r
i



s
j





(
t
)









denote the ratio of the link gains between the communication pair (ri,si) and the sum of received interfering link gains with respect to receiver ri. Owing to the log-normal properties of the link gains and coupled with call drops and departures within the system, the dynamics of V can be modelled as a jump-diffusion process










dV
V

=



(

μ
-

λ





v


)


dt

+

σ





d





W

+


(

J
-
1

)


dN






[
14
]







where μ, λ, v, σ ∈ +, W is a standard Brownian motion, dN is a Poisson process with intensity parameter (net arrival rate of new calls) λ such that









dN
=

{



1



with





probability





λ





dt





0




with





probability





1

-

λ





dt










[
15
]







The random variable J>0 is the jump amplitude with expected value equal to v+1 and it corresponds to the rate of calls entering or leaving the system. The parameter μ represents the expected instantaneous rate of change of the ratio of link gains. Furthermore it is assumed that log(J)˜N(μJJ2) such that v:=exp(μJJ2/2)−1 and that dW, dN, and J are mutually independent.


It can be seen that:










d


(

log





V

)


=





1
V


dV

-


1

2


V
2





(

dV
2

)


+


1

3


V
3





(

dX
3

)


-


1

4


V
4





(

dV
4

)


+








=





(

μ
-

λ





v

-


1
2



σ
2



)


dt

+

σ





dW

+


(




i
=
1







(

-
1

)

i




(

J
-
1

)

i



)


dN








=





(

μ
-

λ





v

-


1
2



σ
2



)


dt

+

σ





dW

+


log


(
J
)




dN
.










Letting NΔt be the total number of jumps from time t to time t+Δt and taking note that log(J)˜N(μJ, σJ2), and assuming dW, dN, and J are mutually independent then







log






V


(

t
+

Δ





t


)



|



(


X
t

,


N

T
-
t


=
k


)

~

N


[





log





V


(
t
)


+








(

μ
-

λ





v

-


1
2



σ
2



)


Δ





t

+







k






μ
J


,



σ
2


Δ





t

+

k






σ
J
2







]



.





Hence










P


(



V


(

t
+

Δ





t


)




γ

r
i




|

V


(
t
)



)


=



P


(



log






X

t
+

Δ





t






log






γ

r
i





|

V


(
t
)



)








=






k
=
0






P


(


N

T
-
t


=
k

)


×

P


(




log






V


(

t
+

Δ





t


)





log






γ

r
i





|

V


(
t
)



,


N

T
-
t


=
k


)










=






k
=
0











-
λ






Δ





t




(

λΔ





t

)


k


k
!












P
(

Z




log






γ

r
i




-

log






V


(
t
)



-


(

μ
-

λ





v

-


1
2



σ
2



)


Δ





t

-

k






μ
J







σ
2


Δ





t

+

k






σ
J
2






)







=






k
=
0











-
λ






Δ





t




(

λΔ





t

)


k


k
!












[

1
-

Φ
(



log






γ

r
i




-

log






V


(
t
)



-


(

μ
-

λ





v

-


1
2



σ
2



)


Δ





t

-

k






μ
J







σ
2


Δ





t

+

k






σ
J
2





)


]








where Z˜N(0, 1) and Φ is the standard normal cumulative distribution function.


For the IEEE 802.11 MAC protocol each node maintains for each destination a weighted history of the received SINR for successful transmission and the threshold at which packet loss occurs. This data can be used in the estimation of μ, σ, λ, μJ, σJ +


For a continuous time process where Δt→0, the rate of return Ri(t) can be set as











R
i



(
t
)


=

log


(



V
i



(
t
)




V

i
-
1




(
t
)



)






[
16
]







where Vi(t)=V(t+iΔt) and vi−1(t)=V(t+(i−1)Δt). For a window size of n the unbiased estimates for the parameters μ, σ, λ, μJ, σJ + are










μ
^

=


1
n






i
=
1

n




R
i



(
t
)








[
17
]








σ
^

2

=


1



(

n
-
1

)

·
Δ






t







i
=
1

n




(



R
i



(
t
)


=

μ
^


)

2







[
18
]







λ
^

=


1
n






i
=
1

n



1

{






V
i



(
t
)


-


V

i
-
1




(
t
)







δ
v


}








[
19
]








μ
^

J

=


1
n






i
=
1

n



log


(

J
i

)








[
20
]








σ
^

J
2

=


1



(

n
-
1

)

·
Δ






t







i
=
1

n




(


log


(

J
i

)


-


μ
^

J


)

2







[
21
]







where







1

{






V
i



(
t
)


-


V

i
-
1




(
t
)







δ
v


}


=

{



1








V
i



(
t
)


-


V

i
-
1




(
t
)







δ
V






0








V
i



(
t
)


-


V

i
-
1




(
t
)





<

δ
V










such that δV is a pre-set parameter, and the i-th jump amplitude is defined as Ji=|Vi(t)−Vi−1(t)|.



FIG. 2 shows a flowchart that describes the operation of an algorithm in accordance with a method according to the present invention. The method is based upon the theoretical analysis set out above and the following assumptions:

    • At an instantaneous time, each communication link consists of a sender node and a receiver node
    • All the nodes within the same network channel are self-organised and co-operative where local information is exchanged among network nodes. This can be achieved using the multi-user detection method (Verdú (1998)), which requires all the sender nodes to send a constant power pilot tone to the receiver node. This technology is currently embedded in all IEEE802.11 a/b/g wireless cards.


Furthermore, it is presumed that every network node cooperates with each other to achieve a common goal of interference mitigation. As a consequence if this, the following supplementary assumptions are made:

    • At each instantaneous time the number of co-channel links, M is known for any sender and receiver nodes in the system
    • The link gains between a receiver node ri and its sender node si, and other co-channel interfering nodes sj, j=1, 2, . . . , M, j≠i can be measured.


The method begins with the arrival of a new pair of nodes (ri,si) wishing to enter an ad hoc wireless network, such as that shown in FIG. 1. At step S100, the sending node s, will select a channel to use, either randomly or based on previous use. At step S110, the sending node will then send a beacon signal (either via smart antenna or beamforming technology) to determine the number and position of other nodes that are using that particular channel. The sending node will also determine the ratio of link gain






V
=



G


r
i



s
i





(
t
)






j

i





G


r
i



s
j





(
t
)








between the pair of nodes (ri,si) and the other nodes using that channel. The link gain ratios will be updated throughout the admission process.


At step S120 the sending node sets a timer, t, to zero and a counter, k, to zero. The sending node will contain within its internal memory a pre-set termination criteria time, (T>0, which may be set in accordance with the manufacturer's specification) to assess the quality of the channel. If at step S130 the timer t is less than or equal to T then the node will determine estimates for the values of the parameters {circumflex over (μ)}, {circumflex over (σ)}, {circumflex over (λ)}, {circumflex over (μ)}J, {circumflex over (σ)}J + of the jump-diffusion process at step S140.


At step S150, the probability of the sending node being admitted to the network using that channel can be calculated using the formula


pk=Prob(V(t+Δt)≧γri|V(t)) where pk constitutes the k-th probability of successful admission at time t+Δt.


At step S160, the counter k is incremented by one and the timer value t is incremented by the interval before the process returns to step S130 and the comparison of t against T. This loop continues, until the value of t is greater than T, at which point the process continues from step S130 to step S170. At step S170, the mean probability of successful admission, p, is calculated, based on each of the values of pk that were determined during each of the instances of step S150. If p≧1−α then at step S180 the nodes (ri,si) are admitted into the network.


At step S185, the transmit power level for nodes (ri,si) are the adjusted using equation 7 above (S185). If at stage S190 the transmitted power level for that time interval, Pi(t+Δt) is greater than the maximum power level, Pmax then the pair of nodes (ri,si) can not remain admitted in the network. Thus, at step S200 the nodes determine whether the time spent attempting to access the channel exceeds a predetermined limit: if not then the process can return to step S100 in an attempt to access a further channel. If the predetermined time limit has been exceeded then the process is exited at stage S250. The nodes may attempt to access the same or a different channel after a given period of time.


Returning to step S170, if p<1−α then the process continues to step S210 where the no-des determine whether the time spent attempting to access the channel exceeds a predetermined limit. If not then the process can return to step S100 in an attempt to access a further channel. If the predetermined time limit has been exceeded then the process is exited at stage S220. The nodes may attempt to access the same or a different channel after a given period of time.


If at stage S190 the transmitted power level for that time interval, Pi(t+Δt) is less than or equal to the maximum power level, Pmax then at S230 the terminal waits for a pre-defined delay period ΔT. Once this time period ΔT has elapsed then the nodes (ri,si) will decide whether to exit from the process: if so they exit at step S250. If not, that is they still wish to use the ad hoc communications network, the process returns to S185, where the transmit power can be adjusted and then compared with the maximum power level. Thus, it can be seen that each of the nodes in the ad hoc network are continually adjusting their transmission power to ensure that it does not cause interference at other network nodes. This adjustment is made periodically, for example every 100 ms, although shorter or longer time periods may be used, for example between 10 and 1000 ms. If a node does exceed the maximum allowed power level then it is necessary for the node to then access a further channel.


It will be understood from the foregoing discussion that the present invention is suitable for use in any wireless communications network, regardless of the transmission protocol used, i.e. Bluetooth, WiFi, WiMax, etc. It will be understood that a suitable terminal may take the form of a personal digital assistant (PDA), laptop computer, ultra mobile PC, smart phone, mobile telephone, etc. The functionality that enables the terminal to perform the method of the present invention may be provided by altering the software of the terminal or providing an additional computer program or application. It will be understood that such software may be deployed to mobile terminals and/or servers via download, for example via the internet, or on some physical media, for example, DVD, CD-ROM, USB memory stick.

Claims
  • 1. A method of selecting a channel in an ad hoc wireless method for use by a sending node and a receiving node, the method comprising the steps of: (a) choosing a channel for potential use;(b) determining the number and the position of other nodes using the channel chosen in step (a);(c) for each of a plurality of iterations, (1) determining a plurality of transmission parameters;(2) determining an admission probability value in accordance with the plurality of transmission parameters determined in step (1);(d) determining a mean admission probability value in accordance with each of the determined admission probability values; and(e) comparing the mean admission probability with a predetermined threshold; and(f) allowing the sending node and the receiving node to used the channel selected in step (a) if the mean admission probability is equal to or greater than the predetermined threshold.
  • 2. A method according to claim 1, comprising the further steps of: (g) adjusting the transmission power of all of the nodes using the channel selected in step (a) to control the interference caused by other nodes; and(h) preventing the sending node and the receiving node from using the channel selected in step (a) if the transmission power of any of the nodes using the channel selected in step (a) is greater than a predetermined threshold.
  • 3. A method according to claim 2, wherein each node using the channel selected in step (a) repeats steps (g) and (h) periodically.
  • 4. A method according to claim 3, wherein each node repeats steps (g) and (h) substantially every 100 ms.
  • 5. A computer program product, comprising computer executable code for performing a method according to claim 1.
Priority Claims (1)
Number Date Country Kind
08250840.9 Mar 2008 EP regional
PCT Information
Filing Document Filing Date Country Kind 371c Date
PCT/GB09/00656 3/11/2009 WO 00 9/9/2010