1. Field of the Invention
The present invention relates to a system and method for assigning protocols for reuse of frequencies and codes in a wireless communication system utilizing spread spectrum technology. More particularly, the present invention relates to a system and method for maximizing channel utilization by efficiently allocating codes and frequencies based on estimated relative interference between subscriber units in a wireless communications network, such as an ad-hoc wireless communications network.
2. Description of the Related Art
Wireless communications networks, such as mobile wireless telephone networks, have become increasingly prevalent over the past decade. These wireless communications networks are commonly referred to as “cellular networks”, because the network infrastructure is arranged to divide the service area into a plurality of regions called “cells”.
Specifically, a terrestrial cellular network includes a plurality of interconnected base stations that are distributed geographically at designated locations throughout the service area. Each base station includes one or more transceivers that are capable of transmitting and receiving electromagnetic signals, such as radio frequency (RF) communications signals, to and from user terminals, such as wireless telephones, located in its coverage area. The communications signals include, for example, voice data that has been modulated according to a desired modulation technique and transmitted as data packets or frames. As can be appreciated by one skilled in the art, the transceiver and user terminals transmit and receive the data frames in multiplexed format, such as time-division multiple access (TDMA) format, code-division multiple access (CDMA) format, or frequency-division multiple access (FDMA) format, which enables a single transceiver at the base station to communicate simultaneously with several user terminals in its coverage area.
In addition, in a cellular wireless system, the base stations typically communicate with the user terminals over channels. The channel resources are assigned in order to limit interference between units and thus, minimize collisions between signals. The word “collision” will hereafter refer to the presence of two code/frequency combinations in the same geographical area that renders communication between units using such combinations ineffective, thus indicating that a better code/frequency combination should have been selected instead. In a Global System for Mobile Communications (GSM) network, for instance, frequencies are assigned to specific cell towers, allowing for a large-scale reuse pattern to take place. In CDMA/IS-95, spreading codes are dynamically assigned by the cell tower to neighboring units.
In general, in networks employing handheld multimedia terminals (HMT) as discussed below, conventional practice in performing collision avoidance was to simply verify whether a channel was used or not, which is also referred to as “carrier sensed/collision avoidance”. To overcome problems when collision could not be avoided, a different spreading code was chosen using the address of the desired receiving unit. Unfortunately, this code-planning technique only mitigated interference from other units, without taking advantage of the intrinsic properties of spreading codes.
In a traditional carrier sense multiple access/collision avoidance (CSMA/CA) system, each unit is able to determine if a frequency channel is available. A “frequency collision threshold” method is designed to prevent units from reusing the same frequency channel at the same time when the amount of interference created would prevent successful communication from occurring. The threshold used in such a method would be selected in such a way that interference can still be mitigated by the use of different spreading codes. The advantage over a standard CSMA/CA system therefore resides in a greater channel utilization, since frequency channel resources are used more frequently as the frequency collision threshold is lowered.
As can be appreciated by one skilled in the art, common pathologies for the “frequency collision threshold” technique include code/frequency-reuse collisions. That is, as indicated in the circled area C1, there are four scheduled transmission using the “32” code/frequency pair. Also, another pathology is extensive frequency collisions, as indicated in the circled area C2, where code/frequency pairs “23”, “22” and “26” are inadequately located one next to another. To prevent such undesirable situations from occurring, one could increase the threshold. However, the outcome would be a dramatic reduction in network capacity as more units become unable to transmit for lack of available frequency channels.
The code/frequency collision threshold technique is similar to the “frequency collision threshold” technique demonstrated in
However, other pathologies remain unresolved. For example, frequency reuse is far from optimized as indicated in circled area C3 in
Other known techniques are also available for allocating channels. For example, one technique is described in a document by Arvind R. Raghavan entitled “An Unslotted Multichannel Channel-Access Protocol For Distributed Direct Sequence Networks”, Mobile Networks and Applications, Vol. 5, pp. 49–56 (2000), the contents of which is herein incorporated by reference. Specifically, this document describes a fully-connected system in which transceivers can transmit or receive on one frequency channel at a time. Transceivers monitor each frequency channel to ensure that they are appropriately used. Since each transceiver is given only one code, there is no possibility of “code-collision”. However, the question arises in a non-fully connected system as to what criterion may be used to prioritize the use of specific code/frequency pairs.
Other techniques for allocating channels in a communications network are also described in U.S. Pat. No. 6,229,796 to Dent, and in U.S. Pat. No. 6,128,500 to Rhaghavan et al., the entire contents of both being incorporated herein by reference. The Dent patent describes a method to allocate code, frequency and time slots in an optimal way for cellular systems. However, this method is entirely static and therefore makes assumptions about the geometry of the infrastructure which is not compatible with a self-forming ad hoc network. The Rhaghavan et al. patent provides an adaptive method to increase capacity in a cellular system, but it only modifies cell boundaries based on a measure of interference. It is not implementable in a self-forming network where there are no fixed base stations.
That is, in recent years, a type of mobile communications network known as an “ad-hoc” network has been developed for use by the military. In this type of network, each user terminal (hereinafter “mobile node”) is capable of operating as a base station or router for the other mobile nodes, thus eliminating the need for a fixed infrastructure of base stations. Accordingly, data packets being sent from a source mobile node to a destination mobile node are typically routed through a number of intermediate mobile nodes before reaching the destination mobile node. Details of an ad-hoc network are set forth in U.S. Pat. No. 5,943,322 to Mayor, the entire content of which is incorporated herein by reference.
More sophisticated ad-hoc networks are also being developed which, in addition to enabling mobile nodes to communicate with each other as in a conventional ad-hoc network, further enable the mobile nodes to access a fixed network and thus communicate with other types of user terminals, such as those on the public switched telephone network (PSTN) and on other networks such as the Internet. Details of these types of ad-hoc networks are described in U.S. patent application Ser. No. 09/897,790 entitled “Ad Hoc Peer-to-Peer Mobile Radio Access System Interfaced to the PSTN and Cellular Networks”, filed on Jun. 29, 2001, in U.S. patent application Ser. No. 09/815,157 entitled “Time Division Protocol for an Ad-Hoc, Peer-to-Peer Radio Network Having Coordinating Channel Access to Shared Parallel Data Channels with Separate Reservation Channel”, filed on Mar. 22, 2001, and in U.S. patent application Ser. No. 09/815,164 entitled “Prioritized-Routing for an Ad-Hoc, Peer-to-Peer, Mobile Radio Access System”, filed on Mar. 22, 2001, the entire content of each of said patent applications being incorporated herein by reference.
As with conventional wireless networks discussed above, it can be necessary to allocate frequency and code channels to the nodes via which the nodes communicate with each other. It is also therefore necessary for these channels to be allocated in such a manner as to limit interference between neighboring nodes while also avoiding collision between signals transmitted by the nodes. Thus, a need exists to provide an improved systematic methodology for allocating channels in a communications network, in particular, a wireless ad-hoc communications network, which selects a code/frequency pair for communication between two nodes in the network in such a way that multiple access interference is minimized.
An object of the present invention is to provide a system and method for assigning protocols for reuse of frequencies and codes in a wireless communication system utilizing spread spectrum technology.
Another object of the present invention is to provide a system and method for maximizing channel utilization by efficiently allocating codes and frequencies based on estimated relative interference between subscriber units in a wireless communications network, such as an ad-hoc wireless communications network.
A further object of the present invention is to provide a system and method that uses a systematic methodology to select code and frequency pairs for use for communication between nodes in an ad-hoc communications network in such a way to minimize multiple access interference.
These and other objects are substantially achieved by providing an improved system and method for allocating communication channel configurations including code/frequency pairs in an ad-hoc network using spread spectrum modulation. The system and method perform the operations of collecting existing and proposed transmission information between nodes in the network, and calculating a respective interference factor for each existing transmission between certain nodes and each proposed transmission by a transmitting node. The interference factors can be calculated based on, for example, respective distances between the certain nodes. The system and method then assign the communication channel configuration, including a frequency channel and a code channel, to the transmitting node for communications to other nodes as designated by a minimum of the calculated respective interference factors.
The invention, as well as other features and advantages thereof will be best understood by reference to the detailed description of the preferred embodiment which follows, when read in conjunction with the accompanying drawings, in which:
As can be appreciated by one skilled in the art, the nodes 102, 106, 107 are capable of communicating with each other directly, or via one or more other nodes 102 operating as a router or routers for data packets being sent between nodes 102, 106 or 107, as described in U.S. Pat. No. 5,943,322 to Mayor and in U.S. patent application Ser. Nos. 09/897,790, 09/815,157 and 09/815,164, referenced above. Specifically, as shown in
Each node 102, 106, 107 further includes a memory 114, such as a random access memory (RAM), that is capable of storing, among other things, routing information pertaining to itself and other nodes 102, 106, 107 in the network 100. The nodes 102, 106, 107 exchange their respective routing information, referred to as routing advertisements or routing table information, with each other via a broadcasting mechanism periodically, for example, when a new node 102 enters the network 100, or when existing nodes 102 in the network 100 move. A node 102, 106, 107 will broadcast its routing table updates, and nearby nodes 102, 106, 107 will only receive the broadcast routing table updates if within radio frequency (RF) range of the broadcasting node 102, 106, 107. Each of the nodes 102, 106, 107 that receive the routing table information from a neighboring node 102, 106, 107 can store all or a relevant portion of that routing table information in their respective memory 114. The routing advertisements that are transmitted to other nodes through regular broadcasts may contain additional information such as position, measured path loss or any criterion that may be used to estimate the amount of interference that a unit will generate in the network.
Table 1 below shows the relative interference between existing and proposed links and, in particular, indicates the effects of interference in transmission from transmitter {circle around (1)}. The “IN” column indicates the amount of incoming interference, that is, the interference that the scheduled transmissions would cause on the attempted transmission. The “OUT” column indicates the amount of outgoing interference, that is, the interference that the attempted transmission would cause on the scheduled transmissions.
On the left hand side of the table, four existing transmissions are recorded, together with the code/frequency pair they are using. It should be noted that this method can be used regardless of whether multiple transmissions can originate from or be received by the same node. For example, transmitter {circle around (1)} may or may not be able to transmit to receiver , and receiver may or may not receive messages from transmitters {circle around (6)} and {circle around (8)} simultaneously.
On the right hand side of Table 1 are potential transmissions or, in other words, those which are present in the transmit buffer of transmitter {circle around (1)}, shown as dashed lines in
There are several methods in which the deciding node can calculate estimated interference values. For example, the deciding node may use the relative distances between transceivers to calculate estimated interference values. Alternatively, the deciding node may calculate estimated interference values based on the estimated received power from transmitters, as long as power control is used and path loss is measured. In either case, the estimated interference factor at a given node is a measure of the estimated power received by this node from another node which has adjusted its output power.
In one example, for a scenario where A transmitting to B affects a transmission from C to D, the interference factor is determined to be the ratio of the square of the distance between A and B by the square of the distance between A and D. It is noted that the square of the distance accounts for propagation loss and assumes unity power received regardless of the distance or, in other words, power control is assumed to work perfectly. For example, transmission between transmitter {circle around (3)} to receiver will affect transmissions from transmitter {circle around (1)} to receiver by a factor of the square of the distance between transmitter by a factor of d({circle around (3)},)2/d({circle around (3)},)2=0.323, as indicated in Table 1 above. The formula for the OUT value is the same. “IN” corresponds to (for example) the interference caused by the transmission from {circle around (3)} to on the transmission from {circle around (1)} to . “OUT” corresponds to (for example) the interference caused by the transmission from {circle around (1)} to on the transmission from {circle around (3)} to . The interference factor would thus be d({circle around (1)},)2/d({circle around (1)},)2. Interference factor calculations (such as those presented in the current example) can be summarized using the following equations:
The estimated interference factor should also be qualified by the nature of the transmission. For example, if the same frequency or code channel is used, interference will be proportionally higher. Thus, interference coefficients can be used to account for such differences, as indicated in Table 2 below.
It should be noted that γs is always equal to one as it corresponds to the case where interference is maximized. Coefficient γf is, however, a function of the code division multiple access (CDMA) spreading gain for the system considered, while coefficient γn is related to adjacent channel interference, dependent on filtering properties. Using information in Table 1, it is possible for the controller 112 of a node 102, 106 or 107 to calculate the estimated interference generated by itself that is received by other nodes 102, 106 or 107 for every code/pair possibility. Results for an initial interference factor of 0.323 in Table 1 which is multiplied by the above coefficients as appropriate are set forth in Table 3 below.
When a node 102, 106, 107 attempts transmission, its controller 112 must consider every neighboring node 102, 106, 107 when calculating the overall interference. This is shown in Table 4 below for two other simultaneous transmissions. To simplify Table 4, is it assumed that the transmissions from transmitter {circle around (6)} to receiver and from transmitter {circle around (8)} to receiver in Table 1 do not occur simultaneously with the attempted transmission from transmitter {circle around (1)} to receiver , otherwise, their associated values shown in Table 1 would need to be included in Table 4 as well.
It should be noted that the set of values in the “SUM” section are equal to the sums of the respective set of values in the above two sections. For example, the value of 8.38E-2 (which is interpreted as 8.38*10−2) in row 1, column 1, of the “IN” portion of the “SUM” section is equal to the sum of the value 8.07E-2 in row 1, column 1, of the “IN” portion showing the interference for transmission from transmitter {circle around (3)} to receiver on frequency channel 1, code channel 7, and the value 3.08E-3 in row 1, column 1, of the “IN” portion showing the interference for transmission from transmitter {circle around (4)} to receiver on frequency channel 3, code channel 7.
For each possible code/frequency pair, the system determines how much incoming and outgoing interference would be generated if this code/frequency pair was to be used concurrently with other code/frequency pairs that neighboring units are scheduled to use. The final result is used to determine the best possible code/frequency pair combinations by selecting the lowest available interference value, which corresponds to the impact of the current transmission on overall Multiple Access Interference (MAI). The values in the FINAL RESULT section are equal to the sum of the values in the rows and columns of the “IN” portion of the SUM section and the values in the corresponding rows and columns of the “OUT” portion of the SUM section. For example, the value 8.99E-2 in row 1, column 1 of the FINAL RESULT section is equal to the value of 8.38E-2 in row 1, column 1 of the “IN” portion of the SUM section plus the value of 6.11E-3 in row 1, column 1 of the “OUT” portion of the SUM section. In the present scenario, the obvious result is that frequency 2 with any code 1 through 7 should be used, because the estimated interference is 6E-3 for any code.
Although the interference calculation method presented herein only provides a measure of the impact of a tentative transmission on overall MAI by summing individual interference factors (weighted by interference coefficients), a different mathematical combination of individual interference factors may also be used. For example, packets minimizing outgoing interference (instead of both outgoing and incoming interference) may be given priority by applying a greater weight to the outgoing interference factors.
In addition, regardless of whether concurrent transmissions originating from the current unit are possible or not, this methodology is also a means of prioritizing data packets in a queue in, for example, the memory 114 of a node 102, 106, 107, with the most favorable data packets being sent first. It is also possible to group those that may be transmitted at the same time when a multicast addressing mode is considered.
As will now be discussed, a simulation was run to determine how the algorithm performs in dense geometries where frequency/code collisions are very likely to occur. It also provides a means to compare the effectiveness of this method with previous implementations.
In addition, tests were performed to compare the number of idle nodes out of a total of 144 equally spaced nodes in a 12-by-12 grid. An idle node is a unit that elects not to transmit any packet either because the estimated interference (incoming or outgoing) is above a certain threshold (for the “frequency collision threshold” and the “code/frequency collision threshold” methods) or because the minimum estimated interference (for the “minimum interference” method) is too high. Multiple access interference is defined here as the mean of the relative interference factors (as defined in equation 1) weighted by their respective interference coefficient (as defined in Table 2) at every node in the network. It can thus be calculated knowing the interference factor IF(l,k) and the interference coefficient γ(l,k) between each node pair l and k, using the following formulae:
where N is the total number of units in the network.
In this test (where the number of idle units is measured), multiple access interference is kept constant (at an arbitrary value of 0.018). Results of the testing are set forth in Table 5 below, which demonstrates that careful planning improves channel usage significantly.
An identical test was performed where the number of idle units was kept at an arbitrary value of 12 (by varying various thresholds). Table 6 below shows that multiple access interference is greatly reduced by careful frequency/code allocation, enabling higher data rates to be used.
It should be further noted that the channel allocation techniques according to the embodiments of the invention discussed above are not limited to a CDMA/FDMA/TDMA combination, but could be included in any multiple-access system. Specifically, these techniques can be adapted to any multiple-access system which has various degrees of interference levels, since they provide a simple, effective way of achieving a completely automated resource reuse protocol. However, as demonstrated above, the techniques are preferably usable in systems which require resources to be dynamically allocated, such as ad-hoc networks. Additionally, the techniques can be simplified to a “frequency selection scheme” where codes are assigned randomly, as long as there is a sufficient number of codes available. Furthermore, the techniques according to the embodiments of the invention discussed above are applicable to slotted/unslotted network protocols and to unicast/multicast addressing modes.
Although only a few exemplary embodiments of the present invention have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this invention. Accordingly, all such modifications are intended to be included within the scope of this invention as defined in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
4494192 | Lew et al. | Jan 1985 | A |
4617656 | Kobayashi et al. | Oct 1986 | A |
4736371 | Tejima et al. | Apr 1988 | A |
4742357 | Rackley | May 1988 | A |
4747130 | Ho | May 1988 | A |
4910521 | Mellon | Mar 1990 | A |
5034961 | Adams | Jul 1991 | A |
5068916 | Harrison et al. | Nov 1991 | A |
5231634 | Giles et al. | Jul 1993 | A |
5233604 | Ahmadi et al. | Aug 1993 | A |
5241542 | Natarajan et al. | Aug 1993 | A |
5317566 | Joshi | May 1994 | A |
5392450 | Nossen | Feb 1995 | A |
5412654 | Perkins | May 1995 | A |
5424747 | Chazelas | Jun 1995 | A |
5502722 | Fulghum | Mar 1996 | A |
5517491 | Nanni et al. | May 1996 | A |
5555425 | Zeller et al. | Sep 1996 | A |
5555540 | Radke | Sep 1996 | A |
5572528 | Shuen | Nov 1996 | A |
5615212 | Ruszczyk et al. | Mar 1997 | A |
5618045 | Kagan et al. | Apr 1997 | A |
5621732 | Osawa | Apr 1997 | A |
5623495 | Eng et al. | Apr 1997 | A |
5627976 | McFarland et al. | May 1997 | A |
5631897 | Pacheco et al. | May 1997 | A |
5644576 | Bauchot et al. | Jul 1997 | A |
5652751 | Sharony | Jul 1997 | A |
5680392 | Semaan | Oct 1997 | A |
5684794 | Lopez et al. | Nov 1997 | A |
5687194 | Paneth et al. | Nov 1997 | A |
5696903 | Mahany | Dec 1997 | A |
5701294 | Ward et al. | Dec 1997 | A |
5706428 | Boer et al. | Jan 1998 | A |
5717689 | Ayanoglu | Feb 1998 | A |
5745483 | Nakagawa et al. | Apr 1998 | A |
5774876 | Wooley et al. | Jun 1998 | A |
5781540 | Malcolm et al. | Jul 1998 | A |
5787080 | Hulyalkar et al. | Jul 1998 | A |
5794154 | Bar-On et al. | Aug 1998 | A |
5796732 | Mazzola et al. | Aug 1998 | A |
5796741 | Saito et al. | Aug 1998 | A |
5805593 | Busche | Sep 1998 | A |
5805842 | Nagaraj et al. | Sep 1998 | A |
5805977 | Hill et al. | Sep 1998 | A |
5809518 | Lee | Sep 1998 | A |
5822309 | Ayanoglu et al. | Oct 1998 | A |
5844905 | McKay et al. | Dec 1998 | A |
5845097 | Kang et al. | Dec 1998 | A |
5857084 | Klein | Jan 1999 | A |
5870350 | Bertin et al. | Feb 1999 | A |
5877724 | Davis | Mar 1999 | A |
5881095 | Cadd | Mar 1999 | A |
5881372 | Kruys | Mar 1999 | A |
5886992 | Raatikainen et al. | Mar 1999 | A |
5896561 | Schrader et al. | Apr 1999 | A |
5903559 | Acharya et al. | May 1999 | A |
5909651 | Chander et al. | Jun 1999 | A |
5936953 | Simmons | Aug 1999 | A |
5943322 | Mayor et al. | Aug 1999 | A |
5974327 | Agrawal et al. | Oct 1999 | A |
5987011 | Toh | Nov 1999 | A |
5987033 | Boer et al. | Nov 1999 | A |
5991279 | Haugli et al. | Nov 1999 | A |
6028853 | Haartsen | Feb 2000 | A |
6029217 | Arimilli et al. | Feb 2000 | A |
6034542 | Ridgeway | Mar 2000 | A |
6044062 | Brownrigg et al. | Mar 2000 | A |
6047330 | Stracke, Jr. | Apr 2000 | A |
6052594 | Chuang et al. | Apr 2000 | A |
6052752 | Kwon | Apr 2000 | A |
6064626 | Stevens | May 2000 | A |
6067291 | Kamerman et al. | May 2000 | A |
6078566 | Kikinis | Jun 2000 | A |
6104712 | Robert et al. | Aug 2000 | A |
6108738 | Chambers et al. | Aug 2000 | A |
6115580 | Chuprun et al. | Sep 2000 | A |
6122690 | Nannetti et al. | Sep 2000 | A |
6128500 | Raghavan et al. | Oct 2000 | A |
6130881 | Stiller et al. | Oct 2000 | A |
6132306 | Trompower | Oct 2000 | A |
6147975 | Bowman-Amuah | Nov 2000 | A |
6163699 | Naor et al. | Dec 2000 | A |
6178337 | Spartz et al. | Jan 2001 | B1 |
6192053 | Angelico et al. | Feb 2001 | B1 |
6192230 | Van Bokhorst et al. | Feb 2001 | B1 |
6208870 | Lorello et al. | Mar 2001 | B1 |
6223240 | Odenwald et al. | Apr 2001 | B1 |
6229796 | Dent | May 2001 | B1 |
6240294 | Hamilton et al. | May 2001 | B1 |
6246875 | Seazholtz et al. | Jun 2001 | B1 |
6249516 | Brownrigg et al. | Jun 2001 | B1 |
6275707 | Reed et al. | Aug 2001 | B1 |
6285892 | Hulyalkar | Sep 2001 | B1 |
6304556 | Haas | Oct 2001 | B1 |
6327300 | Souissi et al. | Dec 2001 | B1 |
6349091 | Li | Feb 2002 | B1 |
6349210 | Li | Feb 2002 | B1 |
6480497 | Flammer et al. | Nov 2002 | B1 |
20010053699 | McCrady et al. | Dec 2001 | A1 |
Number | Date | Country |
---|---|---|
2132180 | Mar 1996 | CA |
0513841 | Nov 1992 | EP |
0513841 | Nov 1992 | EP |
0627827 | Dec 1994 | EP |
0924890 | Jun 1999 | EP |
2683326 | Jul 1993 | FR |
WO 9608884 | Mar 1996 | WO |
WO 9724005 | Jul 1997 | WO |
WO 9839936 | Sep 1998 | WO |
WO 9912302 | Mar 1999 | WO |
WO 0034932 | Jun 2000 | WO |
WO 0110154 | Feb 2001 | WO |
WO 0133770 | May 2001 | WO |
WO 0135567 | May 2001 | WO |
WO 0137481 | May 2001 | WO |
WO 0137482 | May 2001 | WO |
WO 0137483 | May 2001 | WO |
WO 0235253 | May 2002 | WO |