Exploiting Interference in Wireless Networks
atmire.migration.oldid | 2891 | |
dc.contributor.advisor | Higham, Lisa | |
dc.contributor.author | Mollanoori Shamsi, Mohsen | |
dc.date.accessioned | 2015-01-23T19:57:27Z | |
dc.date.available | 2015-02-23T08:00:39Z | |
dc.date.issued | 2015-01-23 | |
dc.date.submitted | 2015 | en |
dc.description.abstract | Traditionally, interference in wireless networks is considered a destructive phenomenon and treated as random noise. If multiple packets are transmitted simultaneously on the same channel, the assumption is that these packets collide and therefore all of the overlapping packets need to be retransmitted. As a consequence, to reduce interference, MAC protocols are typically designed to schedule a single transmission at a time on a channel. In contrast, modern decoding techniques such as successive interference cancellation (SIC) and physical-layer network coding (PNC) aim to extract information from overlapping signals by exploiting the additive nature of electromagnetic waves. The resulting structure at the physical layer transforms interference into a potential advantage. Higher-layer protocols, however, need to be redesigned to make optimal use of this structure. The goal of this thesis is to develop new higher-layer protocols or adapt existing protocols to optimally use the advanced decoding techniques available at the physical layer. Special focus is on the MAC layer. The main body of the thesis is about designing protocols over a SIC-capable physical layer, but in one of the chapters, it is assumed that the physical layer is also capable of doing PNC. The effect of SIC over several types of networks, namely, networks with centralized scheduling with certain goals (such as maximum throughput scheduling and proportional fair scheduling), random access (i.e., ALOHA like) networks and networks with linear coding capability are studied. | en_US |
dc.identifier.citation | Mollanoori Shamsi, M. (2015). Exploiting Interference in Wireless Networks (Doctoral thesis, University of Calgary, Calgary, Canada). Retrieved from https://prism.ucalgary.ca. doi:10.11575/PRISM/26074 | en_US |
dc.identifier.doi | http://dx.doi.org/10.11575/PRISM/26074 | |
dc.identifier.uri | http://hdl.handle.net/11023/2018 | |
dc.language.iso | eng | |
dc.publisher.faculty | Graduate Studies | |
dc.publisher.institution | University of Calgary | en |
dc.publisher.place | Calgary | en |
dc.rights | University of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission. | |
dc.subject | Computer Science | |
dc.subject.classification | Wireless Networks | en_US |
dc.subject.classification | successive interference cancellation | en_US |
dc.subject.classification | physical-layer network coding | en_US |
dc.title | Exploiting Interference in Wireless Networks | |
dc.type | doctoral thesis | |
thesis.degree.discipline | Computer Science | |
thesis.degree.grantor | University of Calgary | |
thesis.degree.name | Doctor of Philosophy (PhD) | |
ucalgary.item.requestcopy | true |