SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

SUCCESSIVE INTERFERENCE CANCELLATION CARVING OUT
MAC LAYER OPPORTUNITIES
ABSTRACT:

Successive interference cancellation (SIC) is a PHY capability that allows a receiver to decode
packets that arrive simultaneously. While the technique is well known in communications
literature, emerging software radio platforms are making practical experimentation feasible. This
motivates us to study the extent of throughput gains possible with SIC from a MAC layer
perspective and scenarios where such gains are worth pursuing. We find that contrary to our
initial expectation, the gains are not high when the bits of interfering signals are not known a
priori to the receiver. Moreover, we observe that the scope for SIC gets squeezed by the
advances in bitrate adaptation.

Our analysis shows that interfering one-to-one transmissions benefit less from SIC than scenarios
with many-to-one transmissions (such as when clients upload data to a common access point). In
view of this, we develop an SIC-aware scheduling algorithm that employs client pairing and
power reduction to extract the most gains from SIC. We believe that our findings will be useful
guidelines for moving forward with SIC-aware protocol research.

More Related Content

Viewers also liked

Successive interference cancellation carving out mac layer opportunities
Successive interference cancellation carving out mac layer opportunitiesSuccessive interference cancellation carving out mac layer opportunities
Successive interference cancellation carving out mac layer opportunitiesEcwayt
 
Stepper motor control based on pc commands
Stepper motor control based on pc commandsStepper motor control based on pc commands
Stepper motor control based on pc commandsEcwayt
 
งาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกง
งาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกงงาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกง
งาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกงMunin Tarkang
 
Victor Madera. Perros en adopción
Victor Madera. Perros en adopciónVictor Madera. Perros en adopción
Victor Madera. Perros en adopciónVíctor Madera
 
Disclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal PrespectiveDisclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal Prespectiveiosrjce
 
Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012
Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012
Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012Oula Tolvanen
 
Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...iosrjce
 

Viewers also liked (10)

My personal opinion
My personal opinionMy personal opinion
My personal opinion
 
Successive interference cancellation carving out mac layer opportunities
Successive interference cancellation carving out mac layer opportunitiesSuccessive interference cancellation carving out mac layer opportunities
Successive interference cancellation carving out mac layer opportunities
 
Stepper motor control based on pc commands
Stepper motor control based on pc commandsStepper motor control based on pc commands
Stepper motor control based on pc commands
 
Richard verkley
Richard verkleyRichard verkley
Richard verkley
 
งาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกง
งาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกงงาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกง
งาน แบบสำรวจและประวัติของ-นางสาว-มุนินทร์-ทาแกง
 
Victor Madera. Perros en adopción
Victor Madera. Perros en adopciónVictor Madera. Perros en adopción
Victor Madera. Perros en adopción
 
Disclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal PrespectiveDisclosure of Transfer Pricing Policies: An Internal Prespective
Disclosure of Transfer Pricing Policies: An Internal Prespective
 
Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012
Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012
Vantaanjoen yhteistarkkailu - Kalasto ja pohjaeläimet vuonna 2012
 
Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...Impact of education on innovation performance: evidence from Azerbaijan const...
Impact of education on innovation performance: evidence from Azerbaijan const...
 
INGO recommendation
INGO recommendationINGO recommendation
INGO recommendation
 

Similar to Successive interference cancellation carving out mac layer opportunities

Java successive interference cancellation carving out mac layer opportunities
Java  successive interference cancellation carving out mac layer opportunitiesJava  successive interference cancellation carving out mac layer opportunities
Java successive interference cancellation carving out mac layer opportunitiesecwayerode
 
Secure watermarking for multimedia content protection a review of its benefit...
Secure watermarking for multimedia content protection a review of its benefit...Secure watermarking for multimedia content protection a review of its benefit...
Secure watermarking for multimedia content protection a review of its benefit...Ecwayt
 
Matlab secure watermarking for multimedia content protection a review of its...
Matlab  secure watermarking for multimedia content protection a review of its...Matlab  secure watermarking for multimedia content protection a review of its...
Matlab secure watermarking for multimedia content protection a review of its...Ecwaytech
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Medium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networksMedium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networksLeMeniz Infotech
 
CSE5 ITP High Density Wireless Design REPORT
CSE5 ITP High Density Wireless Design REPORTCSE5 ITP High Density Wireless Design REPORT
CSE5 ITP High Density Wireless Design REPORTsaieshwar chellapuram
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecwayt
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksEcwayt
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksEcwayt
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecway2004
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecwaytech
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecwaytechnoz
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecwaytechnoz
 
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...Ecwayt
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecwayt
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...Ecway2004
 

Similar to Successive interference cancellation carving out mac layer opportunities (20)

Java successive interference cancellation carving out mac layer opportunities
Java  successive interference cancellation carving out mac layer opportunitiesJava  successive interference cancellation carving out mac layer opportunities
Java successive interference cancellation carving out mac layer opportunities
 
Secure watermarking for multimedia content protection a review of its benefit...
Secure watermarking for multimedia content protection a review of its benefit...Secure watermarking for multimedia content protection a review of its benefit...
Secure watermarking for multimedia content protection a review of its benefit...
 
Matlab secure watermarking for multimedia content protection a review of its...
Matlab  secure watermarking for multimedia content protection a review of its...Matlab  secure watermarking for multimedia content protection a review of its...
Matlab secure watermarking for multimedia content protection a review of its...
 
05449931
0544993105449931
05449931
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
IEEE 2014 JAVA NETWORKING PROJECTS Hop by-hop message uthenticationand source...
 
Medium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networksMedium access with adaptive relay selection in cooperative wireless networks
Medium access with adaptive relay selection in cooperative wireless networks
 
CSE5 ITP High Density Wireless Design REPORT
CSE5 ITP High Density Wireless Design REPORTCSE5 ITP High Density Wireless Design REPORT
CSE5 ITP High Density Wireless Design REPORT
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...Dotnet  discovery and verification of neighbor positions in mobile ad hoc net...
Dotnet discovery and verification of neighbor positions in mobile ad hoc net...
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 
Android discovery and verification of neighbor positions in mobile ad hoc ne...
Android  discovery and verification of neighbor positions in mobile ad hoc ne...Android  discovery and verification of neighbor positions in mobile ad hoc ne...
Android discovery and verification of neighbor positions in mobile ad hoc ne...
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Successive interference cancellation carving out mac layer opportunities

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com SUCCESSIVE INTERFERENCE CANCELLATION CARVING OUT MAC LAYER OPPORTUNITIES ABSTRACT: Successive interference cancellation (SIC) is a PHY capability that allows a receiver to decode packets that arrive simultaneously. While the technique is well known in communications literature, emerging software radio platforms are making practical experimentation feasible. This motivates us to study the extent of throughput gains possible with SIC from a MAC layer perspective and scenarios where such gains are worth pursuing. We find that contrary to our initial expectation, the gains are not high when the bits of interfering signals are not known a priori to the receiver. Moreover, we observe that the scope for SIC gets squeezed by the advances in bitrate adaptation. Our analysis shows that interfering one-to-one transmissions benefit less from SIC than scenarios with many-to-one transmissions (such as when clients upload data to a common access point). In view of this, we develop an SIC-aware scheduling algorithm that employs client pairing and power reduction to extract the most gains from SIC. We believe that our findings will be useful guidelines for moving forward with SIC-aware protocol research.