Integrated Project - EUWB Contract No 215669 Deliverable D4.2.1 Initial development of dissemination methods and evaluation Contractual data: M12 Actual data: M12 Authors: Golaleh Rahmatollahi (LUH), Carlos Héracles Morais de Lima (CWC), Giuseppe Thadeu Freitas de Abreu (CWC), Juan Chóliz (UZ), Ángela Hernández (UZ), Christian Kocks (UDE), Ernest Scheiber (UDE), Alexander Vießmann (UDE), Shangbo Wang (UDE), Dong Xu (UDE) , Guido Bruck (UDE), Peter Jung (UDE) Participants: UDE (Editor), CWC, LUH, UZ Work package: WP4 Security: PU Nature: Report Version: 1.1 Total number of pages: 97 Abstract This report will introduce new methods for the dissemination and acquisition of information in a Location Aware fashion. Routing, relaying and data fusion are the keywords to be addressed in light of the knowledge of the location of the transceivers in the system. Keywords UWB, localization, location tracking, reliability, data communication EUWB Initial development of dissemination methods and evaluation D4.2.1 Table of Contents 1 Executive Summary ........................................................................................................................... 11 2 Dissemination and Acquisition of Information .................................................................................. 12 2.1.1 Position-centric solutions in autonomous large-scale multi-hop scenarios .......................... 12 2.1.2 Contention-based Geographic Forwarding Strategies in Multi-hop Scenarios .................... 12 2.1.2.1 Network Model.......................................................................................................... 13 2.1.2.2 Contention-based Geographic Forwarding Strategies ............................................... 13 2.1.2.3 PDF of the distance of the n -th nearest neighbour ................................................... 19 2.1.2.4 Preliminary Results ................................................................................................... 20 2.1.2.5 Final Remarks and Perspectives ................................................................................ 24 2.1.3 Routing Discovery and Maintenance Strategies in Autonomous Multi-hop Networks ....... 24 2.1.3.1 Target Scenarios ........................................................................................................ 25 2.1.3.2 Performance metrics .................................................................................................. 25 2.1.3.3 Routing Protocols for Infrastructureless Networks ................................................... 26 2.1.3.4 Hierarchical beaconless routing using contention-based RSAs ................................ 27 2.1.3.5 Conclusions and Future Directions ........................................................................... 33 3 Co-Ordination Schemes and Information Exchange Protocols .......................................................... 34 3.1 Mechanisms for Information Exchange, Dissemination and Acquisition in distributed, uncoordinated wireless sensor networks ........................................................................................... 34 3.1.1 Node architecture and fundamental models ......................................................................... 34 3.1.1.1 Packet Error Modeling .............................................................................................. 35 3.1.2 Ranging Information Acquisition ......................................................................................... 36 3.1.3 Recource allocation strategy................................................................................................. 37 3.1.3.1 DLC Layer Description ............................................................................................. 38 3.1.3.2 Game theoretical formulation of the pulse rate adaptation........................................ 40 3.1.3.3 Utility function .......................................................................................................... 40 3.1.3.4 Existence of Nash Equilibrium .................................................................................. 42 3.1.3.5 LPC Algorithm .......................................................................................................... 42 3.1.4 Simulation Scenarios and Evaluation of DLC-MAC Performance ...................................... 44 3.1.4.1 Near-Far Scenario...................................................................................................... 45 3.1.4.2 Performance Comparison with Adaptive Channel Coding (ACC)............................ 48 3.1.4.3 Random Scenario ...................................................................................................... 49 3.1.4.4 Performance Comparison with Adaptive Channel Coding (ACC)............................ 52 3.1.4.5 Conclusion ................................................................................................................. 53 Page 2 EUWB Initial development of dissemination methods and evaluation D4.2.1 4 Evaluation of architectures and acquisition & distribution schemes for tracking .............................. 54 4.1 System model .............................................................................................................................. 54 4.1.1 System environment ............................................................................................................. 54 4.1.2 MAC layer description ......................................................................................................... 55 4.1.3 LT application ...................................................................................................................... 57 4.2 Analysis and evaluation............................................................................................................... 59 4.2.1 Simulator description ........................................................................................................... 59 4.2.2 Impact of the tracking architecture ....................................................................................... 60 4.2.3 Impact of acquisition & distribution strategies .................................................................... 64 4.2.4 Impact of number of anchors used for location .................................................................... 69 4.2.5 Impact of the distance between anchors ............................................................................... 72 4.2.6 Effect of target mobility and position update rate ................................................................ 76 5 Network Impact for Localization ....................................................................................................... 79 5.1 Quantity of Information............................................................................................................... 79 5.1.1 System Environment ............................................................................................................ 79 5.1.2 Network Architecture ........................................................................................................... 80 5.1.3 LT MAC Function [39] ........................................................................................................ 82 5.1.4 LT Application ..................................................................................................................... 83 5.1.4.1 Introduction ............................................................................................................... 83 5.1.4.2 Step I: Synchronization of the Fixed Mounted Infrastructure ................................... 84 5.1.4.3 Step II: Localization of a Mobile Device .................................................................. 86 5.1.4.4 Step III: Triangulation and Mapping ......................................................................... 87 5.1.4.5 Quantity of Information Without Packet Loss .......................................................... 87 5.1.4.6 Quantity of Information with Packet Loss ................................................................ 88 5.1.4.7 Simulation results ...................................................................................................... 88 6 Conclusions ........................................................................................................................................ 93 References ............................................................................................................................................. 95 Acknowledgement ................................................................................................................................. 97 Page 3 EUWB Initial development of dissemination methods and evaluation D4.2.1 List of Figures Figure 1: Illustration of the sectoral decision region. ............................................................................ 15 Figure 2: Illustration of the convex lens decision region. ..................................................................... 16 Figure 3: PMF of the CRI for the STA-based RSA. ............................................................................. 20 Figure 4: PMF of the CRI for the auction-based RSA. ......................................................................... 21 Figure 5: Expected distance of the n-th nearest neighbour (radio range of 10m). ................................ 22 Figure 6: Expected distance of the n-th nearest neighbour relative to the expected value of the CRI. . 23 Figure 7: Expected distance of the n-th nearest neighbour relative to the expected value of the CRI. . 23 Figure 8: Illustrative output of the clasterization algorithm. ................................................................. 28 Figure 9: Packet delivery success ration with duty cycle of 10% ......................................................... 32 Figure 10: Excess-hop distribution with duty cycle of 10%. ................................................................ 32 Figure 11: UWB Node architecture and application subsystem............................................................ 34 Figure 12: Packet level collision ........................................................................................................... 35 Figure 13: Air interface frame structure ................................................................................................ 36 Figure 14: Positioning principle using two-way ranging ...................................................................... 37 Figure 15: Positioning estimation using N successive beacon frames .................................................. 37 Figure 16: PRA game utility function for different cost terms.............................................................. 41 Figure 17: Air Frame Format ................................................................................................................ 43 Figure 18: LPC flow-diagram ............................................................................................................... 44 Figure 19: Near-Far Scenario ................................................................................................................ 45 Figure 20: NE for the 2 links near far network ..................................................................................... 46 Figure 21: NE for 4 links in near far network ....................................................................................... 47 Figure 22: NE for 4 links near far network ........................................................................................... 48 Figure 23: Total logarithm utility ∑ |N| log(ri ( prf )) ............................................................................. 49 i =1 Figure 24: Average BER per link .......................................................................................................... 49 Figure 25: Random Scenario ................................................................................................................. 49 Figure 26: Example of a random network realization ........................................................................... 50 Figure 27: NE in 8 links random example network .............................................................................. 51 Figure 28: NE in 8 links random example network .............................................................................. 52 Figure 29: Total logarithm utility ∑ |N| log(ri ( prf )) ............................................................................. 53 i =1 Figure 30:Average BER per link ........................................................................................................... 53 Figure 31: UWB tracking of mobile devices in a shopping mall .......................................................... 54 Page 5 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 32: EUWB MAC superframe structure [30] .............................................................................. 56 Figure 33: Mesh centralized topology [30] ........................................................................................... 57 Figure 34: Example of meshed scheduling tree [30] ............................................................................. 57 Figure 35: UWB location simulator scenario ........................................................................................ 60 Figure 36: Resources needed for location for a centralized in the network architecture with 1 location controller....................................................................................................................................... 62 Figure 37: Resources needed for location for a centralized in the network architecture with 4 location controllers ..................................................................................................................................... 62 Figure 38: Resources needed for location for a distributed architecture ............................................... 63 Figure 39: Resources needed for location for a centralized in the mobile architecture ........................ 63 Figure 40: Resources needed for location for the different system architectures.................................. 64 Figure 41: Resources needed for location when data aggregation is applied ........................................ 65 Figure 42: Resources needed for location when multicast ranging request is applied .......................... 66 Figure 43: Resources needed for location when broadcast ranging request is applied ......................... 66 Figure 44: Resources needed for location for different acquisition and distribution enhancements ..... 67 Figure 45: Resources needed for location when the ranging procedure is initiated by the anchors ...... 67 Figure 46: Resources needed for location when the ranging procedure is initiated by the anchors and broadcast ranging response is applied .......................................................................................... 68 Figure 47: Resources needed for location depending on the initiator of the ranging procedure and the enhancements applied ................................................................................................................... 68 Figure 48: Resources needed for location for different system architectures when data aggregation and multicast ranging request are applied ........................................................................................... 69 Figure 49: Resources needed for location depending on the number of anchors used for location when Na=25 anchors .............................................................................................................................. 70 Figure 50: Position estimation error depending on the number of anchors used for location when Na=25 anchors .............................................................................................................................. 71 Figure 51: Position estimation error variance depending on the number of anchors used for location when Na=25 anchors .................................................................................................................... 71 Figure 52: Position estimation error for different total number of anchors with trilateration and σn=0.7m ........................................................................................................................................ 72 Figure 53: Position estimation error for different total number of anchors with trilateration and σn=0.3m ........................................................................................................................................ 72 Figure 54: Position estimation error for different total number of anchors with Kalman filter and σn=0.7m ........................................................................................................................................ 73 Figure 55: Position estimation error for different total number of anchors with Kalman filter and σn=0.3m ........................................................................................................................................ 73 Page 6 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 56: Position estimation error variance for different total number of anchors with trilateration and σn=0.7m.................................................................................................................................. 74 Figure 57: Position estimation error variance for different total number of anchors with trilateration and σn=0.3m.................................................................................................................................. 75 Figure 58: Resources needed for location for different total number of anchors .................................. 75 Figure 59: Position estimation error and tracking error depending on the target speed ........................ 76 Figure 60: Position estimation error and tracking error depending on the time between direction changes ......................................................................................................................................... 77 Figure 61: Position estimation error and tracking error depending on the time between updates ........ 77 Figure 62: Resources needed for location depending on the time between updates ............................. 78 Figure 63: Localization and tracking (LT) of a tag inside the car [38] ................................................. 79 Figure 64: LT in a centralized network architecture [39]...................................................................... 81 Figure 65: Hierarchy in a centralized network architecture .................................................................. 81 Figure 66: Typical super frame structure with three time slots in the ranging period [39] ................... 82 Figure 67: Data format of a ranging frame [39] .................................................................................... 82 Figure 68: Time slot allocation for the synchronization of the fixed mounted infrastructure ............... 83 Figure 69: Generic localization tracking set-up [38] ............................................................................. 84 Figure 70: Synchronization of the fixed mounted infrastructure [38] ................................................... 85 Figure 71: Estimated position of tag with the process delay 10−9 ⋅ a .................................................... 89 Figure 72: Cumulative Density Function (CDF) of the estimation error with the process Delay: 10−9 ⋅ a ...................................................................................................................................................... 89 Figure 73: Estimated position of tag with the process delay 2.5 ⋅10−9 ⋅ a ............................................. 90 Figure 74: Cumulative Density Function (CDF) of the estimation error with the process Delay: 2.5 ⋅10−9 ⋅ a .................................................................................................................................... 91 Figure 75: Estimated position of tag with the process delay 5 ⋅10−9 ⋅ a ................................................. 91 Figure 76: Cumulative Density Function (CDF) of the estimation error with the process Delay: 5 ⋅10−9 ⋅ a ....................................................................................................................................... 92 List of Tables Table 1: Parameters involved in the LPC initialization phase............................................................... 42 Page 7 EUWB Initial development of dissemination methods and evaluation D4.2.1 Abbreviations ABL Anchor based localization AFL Anchor-free localization A/C Aircraft ALBA-R Adaptive Load-Balanced Algorithm Rainbow AODV Ad hoc On-Demand Distance Vector AP Access point APDL Average Packet Delivery Latency BPP Binary Point Process CAP Contention Access Period CDF Cumulative Distribution Function CFP Contention Free Period CGF Contention-based Geographic Forwarding CGSR Cluster head Gateway Switch Routing protocol CMS Cabin management system CR Contention Resolution CRA Contention Resolution Algorithm CRI Contention Resolution Interval CTS Clear To Send CVMS Cabin video monitoring system DAL Design assurance level DSDV Destination-Sequenced Distance Vector DSR Dynamic Source Routing E2E End to End EADS European Aeronatic Defense and Space Company EKF Extended Kalman Filter EUWB CoExisting Short Range Radio by Advanced Ultra-WideBand Radio Technology FAP Flight attendant panel FSB Fasten seatbelt (sign) GF Geographic Forwarding GTS Guaranteed Time Slot HDR High rata rate HDTV Hight definition television Page 8 EUWB Initial development of dissemination methods and evaluation IEEE Institute of Electrical and Electronics Engineers IFE In-flight entertainment IP Inactive period LBS Location based services LDR Low data rate LOS Line-of-sight LT Localization and tracking MAC Medium access control (layer) MD Mobile device MDS Multi-Dimensional Scaling MIMO Multiple input multiple output NLOS Non-line-of-sight NS Non smoking (sign) OOP Object Oriented Programming PA Passenger address PAX Passenger PDSR Packet Delivery Success Ratio PGF Probability Generating Function PHY Physical layer PID Passenger information display PMF Probability Mass Function PMR Professional Mobile Radio PPP Poisson Point Process PSU Passenger service unit QoS Quality of service RCA Random Channel Access RIBF Regularized Incomplete Beta Function R/L Reading light RMA Random Multiple Access RS Relay Selection RSA Relay Selection Algorithm RTS Request To Send SPP Spatial Point Process D4.2.1 Page 9 EUWB Initial development of dissemination methods and evaluation STA Standard Tree Algorithm TCP/IP Transmission Control Protocol/Internet Protocol TDOA Time difference of arrival TOA Time of arrival TORA Temporally-Ordered Routing Algorithm routing protocol UDP Unity Disk Graph UMTS Universal Mobile Telecommunications System UWB Ultra wideband UWB-RT UWB radio technology VHDR Very high data rate WiMAX Worldwide Interoperability for Microwave Access WLAN Wireless local area network WP Work package WRP Wireless Routing Protocol WSN Wireless Sensor Network D4.2.1 Page 10 EUWB Initial development of dissemination methods and evaluation D4.2.1 1 Executive Summary In this deliverable, a location aware information dissemination and acquisition method in UWB communication system is introduced, where novel routing, relaying mechanism are considered. We introduce the system in networks level, node level and application level independently in the following chapters. In chapter 2, an abstract networks model and routing strategy are discussed. Contention-based geographic forwarding strategies in multi-hop scenarios and routing discovery and maintenance strategies in Autonomous Multi-hop Networks are focused. The routing solution combines ideas of network tessellation with simple greedy forwarding, without suffering from the problems afflicting typical landmark-based alternatives [15]. A clusterized network based on graph-spectral properties capturing the connectivity among nodes is built. The underlying concept is to exploit the availability of cooperative communications in relaying networks so as to benefit from spatial diversity gains. In chapter 3, a distributed mechanism makes use of the framework of game theory to develop a novel interference management strategy based on the joint combination of adaptive error coding and pulse rate control is introduced. The system architecture of a communication node that is divided into three subsystems namely the UWB part, the communication part and the positioning/ranging subsystem is also introduced. A game has been formulated and a distributed, asynchronous algorithm (LPC) is proposed to discover the optimal PRF/PL network allocation under several channel and interference conditions. It has been observed that due to the strong coupling concerning interference management between PL and PRF adaptation, the game has several feasible steady-state allocations (Nash equilibria). In general, the different equilibria provide similar aggregated network throughput. Results suggest that, in order to maximize the cumulative network throughput, it is better that each link starts with the lowest PL. Chapter 4 and 5 presents an application of UWB networks for tracking mobile users in indoors environments, such as a shopping centre. In chapter 4 different system architectures and strategies for the acquisition and dissemination of location information are discussed and evaluated, as well as other important parameters in the system design, such as the distance between anchors and the position update rate. The system performance is analyzed and simulated, with a special focus on the impact of localization on network traffic, as the limitation of resources is one of the main constraints in this scenario. Chapter 5 focuses on the network impact for localization and the localization protocol. Page 11 EUWB Initial development of dissemination methods and evaluation D4.2.1 2 Dissemination and Acquisition of Information 2.1.1 Position-centric solutions in autonomous large-scale multi-hop scenarios When addressable nodes that are separated by distances farther than their own transmission range need to communicate, multi-hop connections are inevitably established between them. However, the establishment of such multi-hop interconnections is a key issue in large-scale ad hoc networks. Owing to the mobility of nodes, network dynamics, and channel impairments among other characteristics, the wireless links undergo great fluctuation on their availability. Indeed, a major challenge in such networks is to continuously maintain up-to-date the control information required to properly route traffic. Infrastructureless (mobile) networks have no fixed routers, in principle; any node should be capable of relaying packets to any other node in the network. Since the propagation of both controlling and payload information shares the same pool of available resources, it is greatly advisable to construct routes inflicting the minimum overhead on the network. And yet satisfying users' Quality-of-Service (QoS) requirements, while optimizing the utilization of the meager network resources should be an underlying assumption. Because of its crucial task, routing procedures for ad hoc networks received great attention during the last years. Several routing protocols have been defined, while it is possible to classify them in two main groups (see section 2.1.3 for further details): (1) pro-active solutions, also known as table-driven routing protocols; and (ii) reactive alternatives corresponding to source-initiated on-demand routing protocols. Succinctly, table-driven routing protocols pro-actively endeavour to keep reliable and up-to-date routing information among all nodes in the network. On the other hand, reactive approaches, which are initiated by the source node on-demand, and are often implemented relying on distributed and autonomous procedures are seem as promising alternatives for the dynamic scenarios under investigation. The transactions related to the selection of adequate relays and that are based on local knowledge of network topology are addressed in section 2.1.2. Afterwards, the routing discovery and maintenance protocols are introduced in section 2.1.3. The cost of propagating information in these deleterious scenarios is evaluated as well. Indeed, a substantial amount of resources is consumed during the MAC handshake in order to elect suitable relays at each hop along the multi-hop connections. Independent of the adopted routing strategy - long-hops or short-hops, a negotiation period is inevitably spent to select the next-hop relay. A considerable amount of resource is also consumed to keep the consistency of already established multi-hop links. Solutions exploiting the local knowledge of network topology to ponder operation of network functionalities are particularly interesting. Therefore, solutions that provide reasonable advancements towards the final destination at each hop, while demanding tolerable overhead (does not significantly add to packet delivery latency and does not severely compromise network capacity) are introduced and evaluated on the sequel. 2.1.2 Contention-based Geographic Forwarding Strategies in Multi-hop Scenarios The applicability of distributed approaches exploiting location awareness to effectively forward and disseminate information throughput the network are addressed. The effectiveness of such methods are measured in terms of the achievable progress at each hop towards the final destination and the corresponding resolution time necessary to find relays. Stochastic geometry and non-parametric order statistics are conveniently exploited so as to construct suitable network models and appropriately Page 12 EUWB Initial development of dissemination methods and evaluation D4.2.1 characterize the expected progress at each hop. The distributions of the order statistics of the expected progress - considering specific forwarding decision regions, as described in section 2.1.2.2 - towards the final destination is further used to characterize the benefits of using more elaborated decision regions to split candidate relays during the contention resolution procedure. Whenever nodes get entangled into conflict, several mechanisms are available to deal with the contention resolution phase. In [6], an auction-based contention resolution algorithm using location as side-information is introduced. When considering distributed geographic forwarding strategies, the typical approach is to select the next-hop relay solely based on the progress it may provide towards the final destination [3]. Based on the single-hop progress, several contention-based geographic forwarding designs are available in order to select a well-qualified relay [4]. Additionally, a plethora of different optimality criteria reflecting network dynamics may also be exploited to further augment the priority mapping functions and increase the effectiveness of the selection procedure, e.g., residual energy, perceived interference levels, and buffer occupancy among others [5]. Depending on the consequential priority function used to order potential relays, collisions among packets of candidates may still occur and a procedure to appropriately resolve the contention is also necessary [6]. The Contention-based Geographic Forwarding (CGF) strategies are characterize by the underlying geographic forwarding areas: sectoral and convex lens decision regions (see Figure 1 and Figure 2, respectively) [4]. The influence of the CGF procedures and intrinsic forwarding decision regions on the effectiveness of the relay selection strategies and, consequently, on the overall performance of the network is addressed. Two distinct geographic forwarding designs are considered, namely, sectoral and convex lens decision regions (see Figure 1 and Figure 2, respectively) [7]. Stochastic geometry is used to model the network deployment as a Spatial Point Process (SPP) - actually, a general twodimensional isotropic Binomial Point Process (BPP) [8]. The distributions of the distance of the n -th nearest neighbour for each geographic forwarding decision regions are then generated [9]. It is worthy emphasizing that multiple simultaneous connections are possible in such multi-hop scenarios. 2.1.2.1 Network Model Nodes are uniformly and randomly deployed over the network area. The distribution of the distance of the n -th nearest neighbour is derived for the homogeneous Poisson Point Process (PPP) with the rate parameter λ . A simplified two-state (busy, idle) channel model based on the Unit Disk Graph (UDG) is employed, i.e., awake neighbours dwelling in source's fixed radio range are considered eligible relays. Consequently, neighbours located at longer distances than sources' transmission range cannot operate as relay nodes. The network routing and the Contention Resolution (CR) mechanisms exploit local knowledge of network topology aiming at improving effectiveness of the proposed solutions. The next hop relay is selected so as to achieve the maximum expected advancement towards the final destination. Every node knows its own location (real or virtual position) and the location of the destination that is propagated in the header of packets. 2.1.2.2 Contention-based Geographic Forwarding Strategies The sectoral and convex lens Geographic Forwarding (GF) designs are utilized so as to map the location of eligible relays to the replying priority. In [6], the Convex lens Decision Region (CDR) is effectively employed to select adequate relays and lead the contention avoidance and resolution stages of the Medium Access Control (MAC) RMA scheme. Therein, neighbour nodes dwelling in source's transmission range independently split themselves based solely on their locations and reply in accordance with the resultant priority ordering. Whether collision occurs, nodes recursively consider Page 13 EUWB Initial development of dissemination methods and evaluation D4.2.1 sub slices of the original decision regions in order to resolve the contention by autonomously readjusting their priorities of replying. Two distinct CGF schemes, which properly combine GF designs and RSAs, are introduced and evaluated in the following sections: (i) SDR combined with Standard Tree Algorithm (STA)-based RSA; (ii) CDR used in conjunction with the auction-based RSA. 2.1.2.2.1 SDR Combined with the STA-based RSA The STA is based on the splitting tree algorithm and tailored to RMA communications [10]. The Contention Resolution Algorithms (CRA) is implemented considering the obvious Blocked Access Protocol (BAP), which means that no contending relay is allowed in the transactions once the contention has been already initiated. The performance of the STA-based RSA is addressed by means of computational simulations in [6]. The source node always initiates the relay selection transactions by issuing a Request To Send (RTS) packet. Afterwards, neighbour nodes that had listened to the source's requisition split themselves randomly and independently based solely on the common probability that dictates the likelihood of accessing the shared channel – totally random approach. During the contention resolution interval, a neighbour may awake but it is not allowed to take part in the ongoing transactions [12]. Eventually, if no suitable relay is found in a given Relay Selection (RS) interaction, the source node goes to sleep and after a predefined interval restarts the connection addressing probably new players. Whether eligible relays collide, nodes that have transmitted in the previous slot decide to retransmit or to refrain tossing a Q -sided coin with fair probabilities. Herein, only binary trees are actually used in the investigations, though the observations are equally applicable to higher number of splitting groups. And yet the source node should receive the replies from all the candidate relays so as to select the next relay greedily - to select the closest node to the destination whether there is one available. Figure 1 illustrates the sectoral forwarding design and can be interpreted as a snapshot of the network routing procedure while finding a suitable relay to forward a data packet. As an illustration, after source node had broadcast the RTS message, candidate relays {21, 55, 87} promptly reply in the same time slot and a collision unavoidably occurs. Notice that dashed lines defined the forwarding region, while filled circles identify candidate relays. Page 14 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 1: Illustration of the sectoral decision region. The area of the sectoral forwarding decision region represented in Figure 1 is given by equation (2.1). θ Asec tor = r 2 . 2 (2.1) where r corresponds to the source's transmission range and θ spans the forwarding sector. 2.1.2.2.2 CDR Combined with the Auction-based RSA In this CGF approach, the auction-based RSA deals with the collision avoidance/resolution stages by employing economic game-theoretical concepts. Typically, when a source node has a packet pending for transmission, an RTS/CTS handshake is triggered to prevent simultaneous transmissions [2]. However, each suitable relay dwelling in the source's transmission range, which has received a RTS packet, will reply with a CTS packet and collisions may occur. Thus, an appropriate mechanism has to be employed in order to cope with the imminent contention. In [6] Dutch auctions are proposed as an effective alternative to address the RS process in conjunction with a Random Channel Access (RCA) solution. In such transactions, source node plays the role of an “auctioneer” and potential relays are the “bidders”. Indeed, Dutch auctions are extremely convenient to sell goods - assignment of network resources -- quickly. The reasons are two-fold, the auction ends with the very first bid and the auctioneer may set accordingly the decreasing rate of the artefact value (depreciation rate) aiming at quickening the auction [13]. The driving idea to use Dutch auctions is that players interacting in a non-cooperative game will follow the global strategy (Auction-based RSA) in order to maximize its own pay-off function in such a way that social welfare is obtained (optimal strategy). The price is derived from the separation distances between source, relays and sink (similar to the greedy forwarding procedure). If there is more than one potential relay in a certain forwarding region, a collision will certainly occur. To deal with this situation two approaches may be employed effectively: either any simple splitting tree collision resolution algorithm is used [10], [14] (see section 2.1.2.2.1) or, preferably, a recursive and iterative auction-based strategy is utilized. When the recursive auction-based strategy is employed, the source node recomputes the forwarding regions whether a collision is detected. However, since the source node uses the location information Page 15 EUWB Initial development of dissemination methods and evaluation D4.2.1 in a sequentially increased manner, only the colliding region is readdressed. Addressing the time slot in which the collision occurred (and corresponding forwarding region) indirectly identifies the colliding nodes. Equally important, potential relays that have not replied in the previous slot but detected the collision just drop out of the ongoing transaction, since nodes with higher priority have already replied. After recomputing the new forwarding regions, the source propagates an RTS packet and a new auction round starts. Figure 2 illustrates the computation of the forwarding regions. For the first auction round, the relay candidates are divided into three groups, {[21, 87] , 55, 11} . Since nodes {[21, 87]} reply at the same time slot, a collision occurs. The source detects the collision in the first slot and recomputes the forwarding regions accordingly. Whenever the BAP is considered, the contending nodes can also recompute the forwarding regions independently. Nodes {55, 11} also detect the collision and, as nodes of higher priority have already replied, drop out. Afterwards, relays in the first colliding area are reordered in the sequence {[ ], 87, 21} . Finally, after the first idle slot, node 87 replies and the auction stops. The dashed lines define the forwarding region and the filled circles identify candidate relays. Figure 2: Illustration of the convex lens decision region. Equation (2.2) gives the area of the convex lens decision region. Alens = 4r 2 (π − θ ) cos2 (π − θ ) + ⎡⎣ 2φ + sin( 2φ ) − π ⎤⎦ . (2.2) Equation (2.3) yields the intersection area of a circle and a half-plane, while the intersection area of two circles is given by equation (2.4). Equations (2.3) and (2.4) are used to recursively compute the area of the CDR and the corresponding order statistics of the distance the n -th nearest neighbour. 1 ⎛d ⎞ A ( d , r ) = π r 2 − d r 2 − d 2 − r 2 arcsin ⎜ ⎟ . 2 ⎝r⎠ (2.3) where d is the distance of the center of the circle centered at the source node to the edge of the halfplane, which is defined by the chord in the intersection points of the source's radio range and the dashed arc defining the forwarding region (see Figure 1). Page 16 EUWB Initial development of dissemination methods and evaluation ⎧ π r12 ⎪ 0 ⎪ AI = ⎨ 2 ⎪π r1 − A ( s , r1 ) + A( s + d , r2 ) ⎪⎩ A ( d1 , r1 ) + A ( d 2 , r2 ) , D ≤ r2 − r1 , , D ≥ r2 + r1 , , D 2 < r22 − r12 , , D ≥ r22 − r12 . D4.2.1 (2.4) where D is separation distance between the circles centers. 2.1.2.2.3 Contention-Based RSAs The analysis is driven considering two distinct contention-based Relay Selection (RS) mechanisms: (i) a purely random solution based solely on the splitting tree algorithm for performing RMA communications [4]; and (ii) a game-theoretical approach exploiting location information to avoid collisions and, whether necessary, to improve the contention resolution period [3]. The Contention Resolution Algorithms (CRAs) are characterized in terms of the corresponding CRIs necessary to select the most suitable relay – in terms of geographic advancement towards the final destination – among the eligible neighbours. In order to characterize the incurred delay of such solutions so as to forward packets towards destinations, the PGF is initially used to represent the PMF of the CRI by means of power series, and therewith the entire distribution is recovered by numerically inverting the corresponding PGF using the Fourier series method introduced in [5]. 2.1.2.2.3.1 Delay analysis of the STA-based RSA In this section we derive the Probability Generating Function (PGF) of LN – the conditional CRI length when N nodes initially collide. Equation (2.5) generalizes the conditional CRI length considering a Q -sided fair coin. 1 ⎧ ⎪ Q LN = ⎨ ⎪1 + ∑ LI j ⎩ j =1 , N = 1, (2.5) , N ≥ 2. where I j is the discrete random number of candidate relays that tossed the j value on the Q -side coin. The PGF of the LN (CRI length) is defined as follows, Δ ∞ GN ( z ) = ∑ P {LN = k } z k = E {z LN }. (2.6) k =0 where LN is a discrete Random Variable (RV) assuming non-negative integer values, and E {•} is the expectation value. And so taking the conditional expectation on the right-hand side of (2.6) leads to { } E {z LN } = E E {z L | I1 , …, I Q }| N , GN ( z ) = z ⎛ N ⎞ Q ij ⎜ i , …, i ⎟ ∏ GLI j ( z ) Pj . ∑ Q ⎠ j =1 i1 , …, iQ ⎝ 1 (2.7) N (2.8) where PjiJ is the probability of i j nodes flip the j side of the Q -sided fair coin. The summation iterates over all possible combinations of the splitting groups i1 , …, iQ . Page 17 EUWB Initial development of dissemination methods and evaluation D4.2.1 Hereafter we restrict our analysis to the binary case ( Q = 2 ). Whenever a collision occurs, i.e., N ≥ 2 , the candidate relays split themselves into two subsets. Each sub-CRI is statically indistinguishable from a CRI initiated by the same number of contenders. I 1 = i , I 2 = N − i. (2.9) Equation (2.10) yields the probability of exactly i nodes toss 0 (first splitting group), and then transmit in the very next frame, ⎛N⎞ N −i BN ,i = ⎜ ⎟ p i (1 − p ) . ⎝i ⎠ (2.10) where p corresponds to the probability of tossing 0 when using the fair binary coin. Finally, the PGF of the STA-based strategy is then given by equation (2.11), N GN ( z ) = z ∑ BN ,i Gi ( z ) GN −i ( z ). (2.11) i =0 where Gi ( z ) addresses the collision among i nodes that flipped 0 (first subset), and GN −i ( z ) corresponds to the additional slots to resolve the collision among N − i nodes that flipped 1 (second subset). 2.1.2.2.3.2 Delay analysis of the Auction-based RSA In accordance with the auction-based RSA, potential relays that have not replied in the previous slot but detected a collision just drop out of the ongoing transaction. Indeed, the “tree pruning” means that whenever the first subset visited after a collision leads to another collision, the second subset is dropped. Therefore, for i > 1 , instead of the CRI having length BN ,i Gi ( z ) GN −1 ( z ) , the tree pruning procedure leads to a shorter length BN ,i Gi ( z ) . Equation (2.12) yields the PGF of the auction-based RSA [10]. N GN ( z ) = z 2 BN ,0GN ( z ) + z 2 BN ,1 + z ∑ BN ,i Gi ( z ). (2.12) i =2 where the first term accounts for case when no reply is issued in the first slot, and the second term addresses the cases when there is only one eligible neighbour in the first decision region. 2.1.2.2.3.3 Numerical Inversion of PGFs The PMF of the CRI length is recovered from the corresponding PGF by means of a numerical inversion technique introduced in [11] that relays on the Fourier series method. The CRI distribution is approximated by equation (2.13), P {LN = k } = 1 2kr k 2k ⎡ ⎛ πkji ⎞ ⎤ ⎟ ⎥, N ⎜ re ⎠⎦ ⎣ ⎝ ∑ ( −1) Re ⎢G j =1 j (2.13) Additionally, a predetermined error bound is derived for 0 < r < 1 and k ≥ 1 as follows, P {LN = k } − P {LN = k } = r 2k . 1 − r 2k (2.14) Page 18 EUWB 2.1.2.3 Initial development of dissemination methods and evaluation D4.2.1 PDF of the distance of the n -th nearest neighbour A Spatial Poisson Process (SPP) in the two dimensional space is used to derive the distribution of the Euclidean distance of the n -th nearest neighbour regarding the two distinct forwarding decision regions. In fact, the distribution on the n -th nearest point from an arbitrary origin (location of the source node) is given by a two-dimensional isotropic BPP. In other words, given that N (W ) = n , the conditional distribution of N (W ) for B ⊆ W is binomial [8]. ⎛N⎞ N −k P {N ( B ) = k | N (W ) = n} = ⎜ ⎟ p k (1 − p ) . ⎝k⎠ where p = (2.15) λ2 ( B ) . W and B are bounded closed sets in R 2 , such that, B ⊆ W and 0 < λ2 (W ) < ∞ . λ2 (W ) λ2 ( • ) corresponds to the Lebesgue measure in the plane [8]. Notice that the random position of each neighbour is uniformly distributed within source's transmission range, therefore the probability of finding a random point in any bounded set B in R 2 is given by [8], P { X i ∈ B} = ∫ f X ( x ) dx , B (2.16) λ ( B ∩W ) P { X i ∈ B} = 2 . λ2 (W ) where X i are i.i.d (independent and identically distributed) random points which are uniformly distributed in W and f X ( x ) is the probability density function of each X i . Therefore, the probability of existing less than n points in the decision region corresponds to the Complementary Cumulative Distribution Function (CCDF) of the n -th nearest neighbor F Rn ( r ) and is given as follows [9], n −1 N ⎛ ⎞ N −k F Rn ( r ) = ∑ ⎜ ⎟ p k (1 − p ) . 0 ⎝ k ⎠ (2.17) Whenever a and b are integer values, the Regularized Incomplete Beta Function (RIBF) can be expressed as in equation (2.18), I x ( a ,b ) = ( a + b − 1)! ∑ k !( a + b − 1 − k )! x (1 − x ) a + b −1 k a + b −1− k (2.18) k =a And yet the CCDF can be rewritten in terms of the RIBF as follows, F Rn ( r ) = I1− p ( N − n + 1, n ) (2.19) The Probability Distribution Function (PDF) of the n -th nearest eligible relay is then derived as, f Rn ( r ) = d I p ( n , N − n + 1) dr (2.20) where I x ( a ,b ) = 1 − I1− x ( b, a ) . Page 19 EUWB 2.1.2.4 Initial development of dissemination methods and evaluation D4.2.1 Preliminary Results In this section the CGF strategies are analyzed in context of autonomous multi-hop scenarios. Regarding the CGF schemes, the achievable advancements at each hop are evaluated together with the corresponding resolution intervals incurred by the conflict resolution algorithms. The network simulator introduced in [15] is used to perform simulation campaigns and estimate the distributions of the Contention Resolution Intervals (CRI). Figure 3 presents the PMF of the CRIs that is achieved when the STA-based Contention Resolution (CR) mechanism is employed. The distribution of the CRI is generated for increasing values of contending relays. Computational simulations are also provided so as to corroborate the theoretical analysis using the PGFs. The network simulator introduced in [15] is used to perform the simulation campaign. When using the totally random CR approach the CRI significantly lengthens by considering increasing number of contending relays. In fact, the resolution of the conflict may linger too much time before the contention is resolved and the next-hop relay is elected. The Number of relays identifies the number of candidate nodes that initially collide. Figure 3: PMF of the CRI for the STA-based RSA. For the Auction-based RSA, the PMF of the CRIs is presented in Figure 4. The impact of the initial number of colliding nodes on the duration of the contention resolution period is still observed, though in much lesser extent. As can be seen from the figure, by autonomously using the location information eligible nodes can independently split themselves into priority groups and effectively quicken the RS transactions. It is clear that location awareness significantly improve the CR capability of the gametheoretical RS process. By comparing Figure 3 and Figure 4 and considering two eligible relays only, the probability of resolving the contention in seven slots is nearly 12% for the STA-based procedure, whereas the same CRI has probability of approximately 7% for the auction-based RS strategy. Page 20 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 4: PMF of the CRI for the auction-based RSA. Figure 5 shows the expected value of the distance of the n -th nearest neighbour for the CGF schemes defined in section 2.1.2.2 (using the sectoral and convex lens decision regions). As can be seen from this figure, the higher the number of neighbour nodes within source's transmission range, the further is the expected distance of the furthest eligible relay independent of the forwarding region design. However, for the evaluated number of relays (from 2 up to 11 nodes), the distance of the furthest nodes do not increase substantially by considering higher number of relay candidates. Page 21 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 5: Expected distance of the n-th nearest neighbour (radio range of 10m). Concerning the expected advancement provided by the furthest neighbour node within source's radio range, the SDR and CDR schemes are equivalent. Conversely, the expected distance of the nearest node not only experience higher variance in hop length, but also the expected advancement become even smaller since the nearest node is found closer to the source when the number of candidate relays increases. Figure 6 and Figure 7 relate the expected distance of the n -th nearest eligible relay to the corresponding CRI, when using the STA-based and auction-based RSA, respectively. Page 22 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 6: Expected distance of the n-th nearest neighbour relative to the expected value of the CRI. Figure 7: Expected distance of the n-th nearest neighbour relative to the expected value of the CRI. Page 23 EUWB Initial development of dissemination methods and evaluation D4.2.1 As can be seen from Figure 6 and Figure 7, the CRI militates against the benefit of having higher number on eligible relays within radio range, since depending on the initial number of colliding nodes the contention resolution interactions may linger too long and then compromises the overall network performance. While the two forwarding decision regions provide comparable advancements towards the final destination at each hop, except for the nearest neighbour case, the CRI undergone by both RSA is a determinant factor for system performance. Therefore, it is advantageous to keep small the number of relays that entangle into the election process, since the relay selection procedure adds substantially to the packet propagation delay in a hop-basis. Note that the eagerness of candidate relays to take part in the RS transactions can be effectively controlled based on meaningful figures of the network dynamics, such as, perceived interference and residual energy, so as to appropriately limit number of contending nodes. 2.1.2.5 Final Remarks and Perspectives The distribution of the distance of the n -th nearest eligible relay is characterized employing the different CGF strategies. Two distinct geographic decision regions are considered so as to derive the corresponding distributions of the expected advancements towards the final destination, namely sectoral and convex lens decision regions. The CGF strategies are characterized by geographic forwarding areas, which are used in conjunction with RSAs - a totally random approach and a game theoretical alternative. The expected advancements each CGF strategy is characterized for increasing number of contending nodes. The CGF scheme utilizing the convex lens decision region and the auction-based RSA outperforms the STA approach for both the long- and short-hop localized routing strategies. Additionally, PGFs are utilized to recover the distribution of the CRI incurred by the assessed conflict resolution procedures. It is worth emphasizing that different optimality criteria reflecting network dynamics may also be exploited to further augment the priority mapping functions and increase the effectiveness of the selection procedure, e.g., residual energy, perceived interference levels, and buffer occupancy and so forth. Up to now, such intrinsic heterogeneity of nodes taking part into the network transactions has not been explicitly addressed, though it is a major issue to be addressed in the forthcoming investigations. Indeed, the diversity of characteristics and capabilities among network nodes can be advantageously exploited [16]. Regarding the position-centric routing strategies, the long-hop approach is less sensitive to the number of contending relays, therefore an favourable trade-off between the expected advancement and the corresponding CRI is easier to achieve. During this first period of Task 4.2, theoretical knowledge has been acquired and a suitable evaluation framework is established resorting to both mathematical tools and computational simulations. Therefore, the applicability of the solutions is initially appraised throughout computer simulations to gain insightful comprehension of the topics under investigation; thereafter a theoretical analysis may be employed to establish pragmatic limits. The investigations were carried out relying on the simple UDG model, although it is well known that the channel variations severely impact the proper operation of network functionalities. For that reason, the utilization of more realistic channel models considering large-scale and small-scale fading manifestations is of great relevance to achieve more accurate results. 2.1.3 Routing Discovery and Maintenance Strategies in Autonomous Multi-hop Networks In ad hoc communication systems, both the infrastructureless characteristic and the operational dynamics impose extra cost on the transmission of information. Typically, information is transferred Page 24 EUWB Initial development of dissemination methods and evaluation D4.2.1 through multi-hop links, which present variable characteristic - propagation gain, reliability, packet reception probability and so on (see section 2.1.2). The establishment of such multi-hop links is critical inasmuch as the pool of available resource is rather limited. This section particularly introduces the problem of routing discovery and maintenance in ad hoc networks. In order words, different mechanisms and protocols for creating and conserving multi-hop routes up-to-date are examined in this section. An underlying concept is to exploit the availability of cooperative communications in relaying networks so as to benefit from spatial diversity gains. The reminder of this section is organized as follows. Section 2.1.3.1 characterizes the target scenarios for evaluating the applicability of the investigated solutions. The envisaged performance metrics are succinctly shown in section 2.1.3.2. Section 2.1.3.3 summarizes widely known solutions to deal with the network routing, which are broadly divided into proactive and reactive solutions. Following, an original solution based on hierarchical beaconless routing is presented in section 2.1.3.4. Final remarks and observations are provided in section 2.1.3.5. Additionally, directions to extend the initial studies introduced herein are provided along with the next steps. 2.1.3.1 Target Scenarios The investigations are driven in the context of heterogeneous scenarios following guideline s provided in [16], where distinct radio access technologies may be advantageously exploited. Indeed, the initial studies that had hitherto been developed focusing on homogeneous network configuration will be diversified in forthcoming stages of the work. Large-scale wireless networks deploying hundreds or even thousand of nodes where information exchange is primarily achieved through multi-hop interconnections are under investigation. Actually, the initial accomplishments regarding the formation of links in multi-hop relay networks for transmission of signalling and payload information are presented in these introductory investigations. In large-scale networks presenting rapidly varying environments owing to nodes mobility, heterogeneity of traffic and channel impairments, purely centralized coordination strategies may inflict significant signalling overhead and undesirable consumption of the already limited resources on the network overall. Therefore, distributed approaches to control routing operation are implicitly preferred. Not only flat organization of the network, where all nodes indistinctly undergoes the very same role in the routing procedure, but also hierarchical organizations with specialized nodes constructively cooperating are plausible scenarios. The preliminary set of investigations provided here considered the Unit Disk Graph (UDG) model, consequently only nodes dwelling source’s transmission range are able to communicate. All nodes have the same transmission power. A fixed packet length is assumed as well. A simple two-state channel model (idle, busy) is utilized. 2.1.3.2 Performance metrics The suitability of existing performance metrics depends on intrinsic characteristics of network under consideration. Commonly used metrics, which are relevant for the studies, are summarized in the following list [20]. 1. Hop count: Regarding a certain routing strategy (long- or short-hops), it simply accounts for the number of hops between source and final destination. 2. Expected Hop Count (EHC): When considering more realistic channels models, the EHC is more appropriate once it incorporate the expected number of retransmissions due to packet reception probability and the corresponding expected number of acknowledgements [18]. Page 25 EUWB Initial development of dissemination methods and evaluation D4.2.1 3. Energy consumption: in the nodes there is a limited availability of power supply that may lead network to path failure due to energy depletion. Then, it is also desirable to address the impact of routing strategies on the residual energy of network nodes (power consumption). 4. Path reliability: Captures the percentage of time routes are available (node mobility effects can be incorporated by this metric). 2.1.3.3 Routing Protocols for Infrastructureless Networks Routing protocols are usually categorized as proactive and reactive. Proactive routing approaches, also known as table-driven routing protocols, strive to create and maintain routes by acting in advance rather than responding to meaningful circumstances, such as changes in network topology. Additionally, each node should acquire and keep routing information regarding every other node in the network. Of course, there are scenarios where table-driven solutions are fairly applicable and desirable. However, when considering larger-scale deployments (in number of associated nodes) and highly dynamic scenarios, the operation of such protocols becomes more demanding and costly, and their feasibility is definitely compromised. Conversely, on-demand routing protocols only react to relevant events that are conveniently initiated by the source node. Certainly, hybrid approaches are possible as well. Furthermore, in order to construct routes each node restlessly assesses the cumulative cost of incoming multi-hop links from source to itself so as to decide optimally (given the constraints) the proper routes to participate [19]. The solutions considered herein exploit location awareness to enhance the operation of network routing procedures. Notice that routing protocols may or may not take advantage of the knowledge of the network topology (nodes positions or relative distances), either utilizing localized or global information. All in all, it is evident that the utilization of a specific routing solution is highly dependent of the network inherent characteristics, namely, network size, mobility profiles of nodes and traffic patterns. It is worth emphasizing that control overhead is a key aspect for the derivation of adequate solutions at the risk of compromising overall performance by wasting the scarce radio resources (see section 2.1.2). Hereafter, a non-exhaustive list of the most common protocols to attain network routing is presented. The solutions are enumerated based on their favourable characteristics and applicability in the scenarios under investigations. Solutions requiring global and up-to-date knowledge of the network topology and demanding frequent updates are seemed to have limited applicability [20]. Destination-Sequenced Distance-Vector Routing (DSDV) is a table-driven routing protocol based on the Bellman-Ford protocol, while resolving the problem of routing loops. Routing information is disseminated throughout the network issuing infrequent full dumps and more frequent incremental updates aiming at reducing signaling overhead. Every node in the network maintains a routing table recording all possible destinations in the network and the necessary number of hops to reach them. Cluster head Gateway Switch Routing protocol (CGSR) is a table-driven hierarchical strategy where cluster heads are nodes with specialized functionalities in the network. There is the obvious disadvantage of recurrent election of cluster heads adversely affecting the routing performance. The CGSR protocol makes use of the DSDV solution as routing strategy. Wireless Routing Protocol (WRP) is another proactive routing strategy for infrastructureless networks. This solution also utilizes the Bellman-Ford algorithm to compute paths, whereas being free of routing loops and precluding the “count-to-infinity” problem. Despite the WRP presents faster convergence and demands fewer updates than DSDV, a larger memory and greater processing is necessary to keep Page 26 EUWB Initial development of dissemination methods and evaluation D4.2.1 the consistence of multiple tables (distance table, routing table, link-cost table and message retransmission list table). Ad hoc On-Demand Distance Vector (AODV) Routing is an active approach to perform unicast and multicast routing. The primary benefit of using this protocol resides on the fact that routes are only created when necessary or demanded by a source node. However, periodic beaconing equally leads to unnecessary bandwidth consumption. Dynamic Source Routing (DSR) establishes routes on-demand only. This approach is truly sourceinitiated routing, which eliminates the need to flood the network periodically aiming at updating route tables. The DSR protocol performs well in static and low mobility environments; however, in rapid varying scenarios this solution presents inadequate performance. Temporally Ordered Routing Algorithm routing protocol (TORA) is a non-hierarchical routing approach and tailored to highly dynamic mobile networking environments providing a high degree of scalability. It is also source-initiated and provides multiple paths between any pair of interconnected nodes. Different than the aforementioned typical approaches, where entire routes are established prior to the actual data transmission, by using the clusterized beaconless solution proposed herein, the routes are established on-demand and autonomously resorting to a kind of store-and-forward approach. Notice that such store-and-forward solutions are more applicable to delay-tolerant networks and to deal with best effort and background services. Localised position-centric routing protocols aiming at minimizing, for example, the expected hop count or equivalently the expected E2E packet delivery latency are preferred approaches (see section 2.1.3.2). Hierarchical routing protocols providing hybrid solutions for network routing are also promising solutions in the heterogeneous radio access technologies that are considered in [16]. Equally important, power aware routing protocols constitute another interesting research strand. 2.1.3.4 Hierarchical beaconless routing using contention-based RSAs In Wireless Sensor Networks (WSNs), especially those of larger scale employing hundreds or thousands of sensors (nodes), information exchange between sensors separated by distances exceeding radio range requires packets to be routed towards their destinations through sequences of relays [19]. Unlike other large-scale systems such as cellular and computer networks, where routing can be aided by tables maintained in certain nodes (routers), WSNs often require reactive routing protocols that can cope with the constant topological changes resulting, e.g., from nodal duty-cycles and variations in the radio range due to environmental conditions [20]. When nodes have knowledge of their location relative to one another, even if not exact [21], greedy geographic routing may be an effective technique to autonomously and efficiently route packets through the network [22]. Unfortunately, a well-know problem of simple greedy geographic routing is that packets may be lost if anywhere along the multi-hop chain a relay in the forwarding direction cannot be found. This dead-end problem has prompted the proposal of several clever mitigation techniques, with approaches ranging from purely autonomous, to centralized1 methods such as graph planarization [14]. The robustness associated with purely autonomous dead-end bypassing techniques may, however, come at the expense of efficiency, since the discovery of alternative routes in the presence of a dead-end often require excessive back-and-forth signalling. Indeed, although an autonomous method is a sensible choice in networks with volatile topologies, in many cases global topological features of networks are stable enough to be exploited by routing protocols. Page 27 EUWB Initial development of dissemination methods and evaluation D4.2.1 In this contribution, an alternative to landmark-based geographic routing for infrastructureless networks is proposed. These two principles: that tiles are made up of strongly interconnected nodes; and that nodes at the boundaries of adjacent tiles are also interconnected, are what improve the probability of success of autonomous packet-relaying within tiles, while ensuring global reach via a succession of “tile-to-tile hops”. 2.1.3.4.1 Solution Description This section provides a detailed description of the cluster-based geographic routing protocol that is mainly targeted on large-scale infrestructureless networks. The proposed position-centric routing protocol is composed of two operational parts: global routing among clusters and localized relayselection inside clusters. The former, which corresponds to the main contribution of this work, exploits network graph spectral analysis to divide network into clusters composed of sufficiently connected nodes; while the latter deals with localized relay-selection inside clusters using (not necessarily, but for the time being) simple greedy forwarding. 2.1.3.4.1.1 Hierarchical Clusterization Procedure In this subsection we briefly review the clusterization method first introduced in [23]. This clusterization procedure is a graph-spectrum mathematical tool employed to divide the network into sub-groups, named clusters, whose constituent nodes are sufficiently connected to one another. Figure 8: Illustrative output of the clasterization algorithm. The clusterization method relies on the graph-theoretical spectra analysis of the network graph. Specifically, clusters are identified by evaluating the eigenvalues and eigenvector components of the Laplacian matrix associated to the meshed network graph [24]. The method progressively decomposes Page 28 EUWB Initial development of dissemination methods and evaluation D4.2.1 the overall network into sub-clusters using as stop criteria either the minimum completeness or the compound number of nodes. For details please refer to [23]. Figure 8 exemplifies the output of the hierarchical clusterization procedure. Hierarchical Clusterization Procedure: iteration of Simon’s Spectral Bisection 1: Get the Connectivity matrix C1(,k2) of G1,2 ; 2: Compute Fiedler vector b2( k ) ; 3: Sort the vector components and split by the median γ ( k ) ; 4: Identify G1 and G2 from C1( k +1) and C2( k +1) , {b( ) } = {b( ) |b( ) ≤ γ ( ) } {b( ) } = b( ) \ {b( ) } k 2i k 2r k 2j k 2r k 2 k k 2i C1( k +1) = C ( k ) ({i},{i}) , C2( k +1) = C ( k ) ({ j},{ j}). (2.21) 5: Repeat recursively (divide and conquer approach). 2.1.3.4.1.2 Cluster-based Routing Protocol The cluster-based routing protocol to be described shortly is designed under the following assumptions. During a discovery procedure (which is not addressed in this contribution, though it resides in the mainstream of upcoming investigations), each node discovers its neighbors and forwards the connectivity information to a central processing unit, based on which the connectivity matrix of the network is built. The central unit then clusterizes the network, as described in section 2.1.3.4.1.1, and assigns an identification (ID) number to each cluster and computes their geographical location. For short, the location of the geographical center of a cluster will hereafter be referred to as the cluster location. Notice that a real coordinate system is not strictly necessary. In fact, methods that do not relay on actual location to route packets may be exploited to build a virtual coordinate system that can be used as input to the cluster-based routing [21], [25]. Each node is then informed of which cluster it belongs to and the IDs and geographical locations of adjacent clusters (this is a reasonable assumption since the central unit has acquired knowledge on the shortest path to all nodes after network discovery). The routing protocol can be separated into two functional parts, which are described subsequently. Inter-cluster Routing Procedure In addition to the cluster adjacency list (cluster IDs and virtual center locations) mentioned above, it is assumed that each node knows its own position and the position of the sinks (the location of the final destination is present inside packets header). Actual or virtual positions can be derived distributively during the discovery procedure [26] or computed by the central unit and passed onto the nodes [27]. When a packet is generated and has to be forwarded to a given final destination (sink), the source node initially chooses, among the adjacent clusters, an intermediate destination (cluster location), which is the closest to the final destination. In other words, an adjacent cluster is selected applying a greedy principle [22] based on real or virtual coordinates (more elaborated strategies are equally applicable as shown in section 2.1.2.2). Each packet conveys, besides payload data, the source position, the sink position (final destination), the location of the next cluster (intermediate destination) and a list of the last visited clusters (the exact Page 29 EUWB Initial development of dissemination methods and evaluation D4.2.1 number of clusters that should be stored in order to avoid loops has not been optimally determined yet). Consequently, routes are established on demand, but using the clusterization information stored at the nodes, such that a packet may circumvent a hole (dead-end). The procedure described above is referred to as inter-cluster routing. Intra-cluster Routing Procedure The routing procedure inside each cluster (intra-cluster routing) is largely independent of the intercluster procedure. In this article we considered a simple greedy forwarding mechanism for intracluster routing [22]. In other words, the greedy principle applied in the intra-cluster mechanism is essentially the same as the one employed in the inter-cluster routing (with the exception that the latter includes a logic to avoid looping). The use of (essentially) the same mechanism at inter- and intra-cluster routing is rooted on the notion that nodes can “re-use” algorithmic resources (and associated hardware/software). Furthermore, the choice of a simple greedy mechanism does not preclude the use of more sophisticated techniques, since the overall structure of the solution is essentially modular. For instance, Adaptive LoadBalanced Algorithm Rainbow (ALBA-R), which integrates Medium Access Control (MAC) and routing in its design, guarantees packet delivery to the sink in the presence of holes (albeit at the expense of a long “transient” period) [14]. It is evident that the latter technique can be integrated into the clusterized framework discussed here as well. The objective, however, is not to establish that clusterized greedy forwarding is superior to any particular alternative, but rather to show that clusterization can substantially improve the performance of routing mechanisms, even when such mechanism is as simple as greedy forwarding. Pseudo-code for the Cluster-based Routing Require: Cluster adjacency list (descending order), source node, destination node, traveled routing path, neighbor nodes list (descending order). 1: Inter-cluster routing: 2: for all Adjacent clusters do 3: if Cluster is NOT in traveled routing path then 4: Select cluster as intermediate destination; 5: end if 6: end for 7: Intra-cluster routing: 8: for all Awake Neighbors do 9: Select the closest relay to intermediate destination. 10: end for 11: if NO suitable Relay then 12: Select another intermediate destination. 13: end if Page 30 EUWB 2.1.3.4.2 Initial development of dissemination methods and evaluation D4.2.1 Preliminary Results The performance of the proposed cluster-based routing protocol is assessed by means of an eventdriven system-level simulator implemented using C++ Object Oriented Programming (OOP) language. The main results are presented in terms of the Cumulative Distribution Function (CDF) of the Packet Delivery Success Ratio (PDSR) as a function of the corresponding Average Packet Delivery Latency (APDL), and in terms of the distribution of route path length (in number of hops) [15], [6]. Figure 9 shows the PDSR as a function of the APDL, for different levels of network clusterization with a duty cycle of 10% . Notice that the network topology is not static, since nodes alternate between awake and asleep states following their own duty cycle (even though there is no mobility, the network topology varies with time). It is found that the simple greedy forwarding is severely affected by the dead-end and fails to route packets originated from the concave cone region towards the sink. This explains why the PDSR of the greedy algorithm is around 50% , i.e., only the traffic generated on the convex side of the hole is successfully routed. Conversely, the proposed clusterized routing solution is capable of delivering a substantially larger fraction of the traffic to the sink. It is also found that the cluster size has an impact on the effectiveness of the method. For instance, when the clusterization is such that clusters have at least ( N = 25 ) nodes, the PDSR is higher. Such a higher delivery ratio, however, comes at the expense of extra latency, since packets tend to circulate inside the concave region of the hole for longer, before finally being routed around it. Notice that very small clusters may also degrade PDSR, because this may decrease the probability of a node to find a relay in a selected adjacent cluster (intermediate destination). The proposed routing technique proves to be resilient enough to absorb the variable network topology and to continue delivering a much higher PDSR. Finally, Figure 10 shows the distributions of the number of hops - in excess of what would take if packets were to be forwarded in a straight-line, with zero awaiting time (perfect relaying) - required by the routing protocols under the simulated conditions. The second mode of the distribution corresponding to the proposed technique with N = 25 shown in Figure 10 illustrates how the proposed routing algorithm allows more nodes - namely, those at the concave portion of the hole - a path to the sink. Page 31 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 9: Packet delivery success ration with duty cycle of 10% Figure 10: Excess-hop distribution with duty cycle of 10%. Page 32 EUWB 2.1.3.5 Initial development of dissemination methods and evaluation D4.2.1 Conclusions and Future Directions a cross-layer algorithm for geographic routing in infrastructureless networks in introduced. This solution is robust to topological holes and is resilient to topological variations due to network dynamics (node duty cycle). The solution combines ideas of network tessellation with simple greedy forwarding, without suffering from the problems afflicting typical landmark-based alternatives [15]. We first tessellate the network based on connectivity information and then define virtual landmarks to identify them. The algorithm employed to clusterize the network is based on a recently discovered graph-spectral property that captures the connectivity among nodes [23]. In addition to not requiring landmarks to be known a priori, a major advantage of the proposed tessellation approach is that the clusters are (by construction, as a result of the aforementioned clusterization technique) composed by groups of nodes that are highly interconnected. It was shown that cluster sizes may affect the resulting PDSR to APDL. In other words, cluster sizes can be varied so as to allow for different trade-offs between PDSR to APDL to be reached. It was also found, however, via extensive simulations, that the dependence of the overall technique on the cluster sizes is not as strong as the dependence of landmark-based routing mechanisms on the location of selected landmarks. Alternatively, we may say that while there is room for further improvement via cluster size optimization, the proposed technique is less sensitive to a bad choice of cluster size than landmark methods are on the location of landmarks. All in all, the simulations campaign have confirmed that the technique can substantially improve the PDSR in networks with large concave holes, with no or little impact on APDL, even if the simple greedy forwarding mechanisms is employed. There is, however, no reason not to employ more sophisticated mechanisms combined with the clusterization idea. It has been assumed that network discovery had been already performed and that the network is in a steady-state regime of operation, when the routing protocol itself starts to operate. The network discovery has not been explicitly addressed in the research activities, though it is still an open issue and it is considered to further investigations. The concept of clusters may be further augmented to cleverly aggregate information among nearby nodes, and consequently preserve network resources. The driving idea to perform such data fusion is that inference resorting to gathered information from multiple sources (for example, co-cluster nodes) is probably more effective and more accurate than if; alternatively, it is based solely on a unique source. Techniques to combine and forward data collected from multiple sources are an interesting topic for the following studies. Besides, the comparative investigations between routing discovery and maintenance protocols optimizing meaningful network performance metrics are in progress. Page 33 EUWB Initial development of dissemination methods and evaluation D4.2.1 3 Co-Ordination Schemes and Information Exchange Protocols 3.1 Mechanisms for Information Exchange, Dissemination and Acquisition in distributed, uncoordinated wireless sensor networks 3.1.1 Node architecture and fundamental models The functional system architecture of a UWB node is depicted in Figure 11 and is divided into three subsystems namely the UWB, the communication and the positioning/ranging subsystem communicating via data and control interfaces with each other. Figure 11: UWB Node architecture and application subsystem The communication subsystem comprises DLL, networking and transport functionalities and can configure the UWB subsystem for joint communication and positioning. Whereas the positioning/ranging subsystem enables the UWB subsystem to obtain ranging measurement data and in return receive range-related raw measurement data and quality metrics for position calculation. The positioning subsystem generally consists of three main modules. First, the range management module which is responsible for gathering of all data which are needed to process ranges/positions. This implies the management of the own position as well as the neighbour positions and the treatment of system clock values by forwarding the ranging clock values and their reliability to the range calculation unit. Besides, it initiates ranging measurements and assists the route management of the networking. The second module is the range calculation which has the task to calculate ranges and range reliability from the system clock information. All range information together with the fix anchor node positions are sent to the position calculation module which consists of a positioning algorithm based on Page 34 EUWB Initial development of dissemination methods and evaluation D4.2.1 multilateration to calculate the mobile nodes position. The calculated position can be send to other UWB nodes or to the application subsystem running on a conventional PC for monitoring purposes. 3.1.1.1 Packet Error Modeling On its way from the transmitter to the receiver the signal does not only suffer from path loss, but also from noise and interference. The PER calculation in the simulator consideres the cumulative interference created during the whole duration of the packet transmission. The cumulative interference is the weighted sum of the interferences created by simultaneousl transmissions of interfering packets, that might occur on th other subchannels. Note that the overlap of the wanted packet with interfering packets generates intervals with equal intereference conditions. The weights correspond with the duration of these intervals. Figure 12shows this principle. Figure 12: Packet level collision A given packet is received in subchannel i and 3 concurrent transmissions of packets on subchannels k, j and m are shwon in Figure 12. The overlap among the packets generates five different equal interference intervals. Given the reception of a wanted packet, in order to keep track of the intervals equal interference and interference list at the PHY layer has been implemented. For each interval of equal interference the list saves following information: • The interval duration • Signal parameters of each interfering packet, o THC (subchannel) on which the interfering packet is transmitted o PRF of the interfering transmitter o Power at which the interfering packet is received For each interval of equal interference the number of channel bit errors is calculated. We consider a probabilistic model to determine the number of channel bit errors per interval N CHBERi = ∑ N CHBERi (t x ) (3.1) x Page 35 EUWB Initial development of dissemination methods and evaluation D4.2.1 where t x represents the duration of the x -th interval. The packet duration can be calculated as the sum of the duration of all involved intervals, that is Tpacket = ∑ t x . The resulting channel BER is given by x the ratio between the total number of channel bit errors in the packet and the packet payload length. P ch e ,i = N CHBERi Lp (3.2) where Lp is the packet payload length. Finally the PER can be expressed by: PERi = 1 − (1 − Pe ,i ) Lp (3.3) For a detailed derivation of the packet error modelling we refer to [42]. Air Interface Format In order to serve both services namely communication and positioning in parallel, a common air interface format is needed. Hence, common and private communication channels are provided by the system. The common channel will be transmitted in so-called beacon slots using a default set of PHY parameters like TH codes, modulation and FEC allowing low data rate transmission but highly robust communication. It usually carries broadcasting and handshaking messages but also short information such as sensor data. The communication on the common channel is always unidirectional implying that any data transmitted on the common channel will not be acknowledged. On so-called TH channels large volume information is transmitted on private communication channels which are always bi-directional as each packet has to be acknowledged by the destination node. The PHY parameters of the TH frames are dynamically set as the destination node can inform the transmitter on the link quality. This kind of medium access control has the goal to maximize the cumulative communication performance and was first introduced in [43] and enhanced in [44]. For the ranging and positioning purpose we constrain on the beacon frames sent on the common channel. Figure 13 shows the air interface frame structure with its beacon and TH frames. Figure 13: Air interface frame structure 3.1.2 Ranging Information Acquisition Each beacon frame splits into three beacon slots and are used for synchronization, protocol handshake elements, very low data broadcast and especially for ranging requests and ranging answers. Ranging is initiated by a UWB node sending a ranging request (RR) to a selected destination node which usually is an anchor node answering with a ranging answer (RA) back to the initiating node. As the ranging operation needs as strict timing between the request (RR) and the answer (RA), the third beacon slot is always reserved for the ranging answer after a ranging request occurred. Thus, three Page 36 EUWB Initial development of dissemination methods and evaluation D4.2.1 beacon slots are gathered in one beacon frame. The second beacon slot can be alternatively used by any other node to send control information or to broadcast common data channel information. The duration of a whole superframe structure is 3.5 ms where the beacon frame has a duration of 3*50µs. This implies that one range measurement for one mobile can be done within one superframe transmission in order to fulfill the requirements of range update time of 10 ms. In order to carry out position calculation multiple ranging procedures to different anchor nodes are needed. Figure 14 shows the principle of positioning with two-way ranging where the initiating mobile node successively addresses three neigbour anchor nodes as an example. Figure 14: Positioning principle using two-way ranging Since a single range can be done within one beacon frame, the mobile node reserves the first slots of N successive beacon frames in order to minimize the latency, see Figure 15. For each two-way ranging measurement the time in between the transmission of RR and RA has to be corrected by the internal delay to obtain the round trip time which can be directly translated into a distance between mobile and anchor node. Figure 15: Positioning estimation using N successive beacon frames For detailed simulation results of the ranging performance we refer to [45]. 3.1.3 Recource allocation strategy We implement a novel resource allocation strategy for distributed IR-UWB networks that arise from the fact that, in contrast to what happen in narrowband networks, bandwidth is no longer the limiting resource but the number of pulses per second, i.e. the cumulative pulse load. The DLC enables concurrent transmissions at full power, while allows each source to independently adapt its error coding rate, and its pulse rate (the number of transmitted pulses per second) to the current channel and interference conditions. Thus, our strategy combines adaptive channel coding (ACC) with pulse rate Page 37 EUWB Initial development of dissemination methods and evaluation D4.2.1 control (PRC) in a joint link adaptation function, which is denoted hereafter as the Link Parameter Control (LPC) function. 3.1.3.1 DLC Layer Description The DLC layer implements two main functional blocks: a medium-sharing block and the LPC block. Furthermore, each DLC packet is acknowledged by the peer DLC entity so that a stop&wait ARQ scheme is set up on top of the physical layer. Regarding medium sharing, THMA has been considered. Besides, to solve collisions between sources sending to the same destination, a RTS-CTS handshaking combined with a MAC address-based code assignment protocol has been implemented. The RTS message is sent using a common TH code in the second BS of a BF, while the CTS and the following data and ACK messages are sent using a private TH code, which is generated using a random generator with seed the addition of the source and destination MAC addresses. Concerning the LPC function, it can be seen as a resource management problem that searches for the network’s pulse rate and channel coding rate allocation which maximises the aggregated network throughput while satisfies certain per-link BER constraints ( BERi ). LPC configures the signal structure of scheduled transmissions at the individual link by optimizing the error protection level (PL) to the current channel quality and by possibly switching the average pulse repetition frequency (PRF) in order to relax the channel pulse load. The PL is an adaptable link parameter representing the ordered pair channel coding rate and modulation order. For the purpose of our analysis, m-ary pulse position modulation (PPM) is considered. Since it is well-known that in a multipath environment intrasymbol interference degrades the benefits of m larger than 4, only m = 2 or m = 4 are considered next. Concerning channel coding, it is required that the coding rate is chosen from a finite set. In order to adapt these parameters, the link’s transmitter must have an estimate of the level of interference at its intended receiver. In autonomous networks, most approaches make use of feedback information from the receiver to the transmitter, for example within ACK packets. This information can take various forms; conventionally it is a function of the SNIR. However, with IR-UWB physical layer, measuring the SINR is difficult in practice due to the very low transmit power of UWB signals. Our approach relies on information provided by the channel decoder, i.e. on BER measurements. It is assumed that the system has fixed chip duration Tc , so that all changes at the PHY layer transmission parameters are induced by instructions coming from the MAC/DLC layer (cross-layer character). The selected set of PHY parameters, i.e. modulation, channel coding rate and pulse rate, remains constant for one DLC packet transmission, but can be changed from packet to packet according to the time variant channel and interference conditions. The LPC algorithm runs in a MAC frame basis, over uni-directional or bidirectional links. For bi-directional links where forward and return link data are transmitted in a serial manner, the same TH code can be used. Nevertheless, the PHY parameters might be different due to different bit rates and different interference situations. Note that PL adaptation is a decision local to a sender-receiver pair, so that it does not need coordination among neighbours not involved in the transmission. In contrast, PRC involves an interaction among different links since the probability of pulse collision at the i-th receiver Pcoll ,i , does not depend on its own link's pulse rate, but on the pulse rates of transmitters in its vicinity and their asynchronism [46]; where low pulse rates imply low probability of collision. Since the collision probability is an indirect measurement of the BER, we can expect that the BER at the i-th receiver Pe ,i Page 38 EUWB Initial development of dissemination methods and evaluation D4.2.1 does not directly depend on its link's pulse rate, but on the pulse rate of the neighbouring links. Thus, PRC enforces cooperation among otherwise selfish nodes. The question is here, how can this cooperation be achieved? Game theory (GT) has been leveraged in the recent past to model complex interactions among radio terminals [47]. Indeed, GT is a broad accepted tool for modelling and analyzing resource allocation problems. Furthermore, GT allows solving such problems in a distributed way. This subsection describes the physical link parameter control (LPC) functionality of our distributed MAC mechanism. LPC constitutes a novel MAC strategy which flexibly configures the error coding rate and the average pulse period per link to control the shared medium utilization. It is based on a low complexity algorithm, which exploits generally applicable results of game theory. Generally, an increase in the channel BER points at an increase in the local interference level seen by the receiver node or/and at degrading channel conditions, e.g. due to node movement or the presence of obstacles in the line of sight. In order to compensate the degrading link performance, conventional rate adaptation algorithms just order the PHY layer to decrease the error coding rate (ECR). However, under uncoordinated access the system load can become so high that pulse collisions may not be longer tractable with binary error coding schemes. Under such conditions additional mechanisms may be required to maintain an adequate system throughput. Note that, with constant average pulse rate a decrease in the error coding rate would induce a decrease in the link throughput. In order to avoid this throughput degradation, the LPC algorithm may try to compensate the ECR decrease with an increase in the link’s average pulse repetition frequency (PRF). LPC combines channel BER estimation with a MUI noise level indicator in its decision, whereas, the decision on the average PRF adaptation is strongly influenced by the MUI noise level indicator and regulated as a “game”. LPC doesn’t directly controls the ECR but an abstract parameter called protection level (PL), which at the PHY layer maps a certain error coding rate or even a pair error coding rate and modulation order. LPC acts according following rules: • If the increase in channel BER is accompanied by a constant or even decreasing MUI noise level, LPC tries to compensate the link throughput decrease with a higher link’s average pulse repetition frequency (PRF). Since a higher PRF increases the local system pulse load, neighbouring receivers may experience an increase in their channel BER and perform in the same previous elucidated way, thus originating a feedback loop among the adaptation decisions of neighbouring nodes, which may lead in a breakdown of the local resource (pulses per second). Such a feedback loop can be regulated by making use of game theory results. • If the increase in channel BER is accompanied by an increasing MUI noise level, the LPC function doesn’t changes the PL, but it orders the PHY layer to decrease its PRF in a factor proportional to the MUI noise level increase. Thus, a temporal loss in link throughput has to be accepted. By reducing its PRF, the reference link contributes to reduce the local system pulse load; this will translate in a reduction of the channel BER in neighbouring links, which will then consequently reduce their PRF (as we will see next) and the interference they cause in the reference link’s receiver. In this way, the feedback loop among adapting links shows a beneficial effect. • Otherwise, if a decrease in channel BER is reported, the LPC function orders the PHY layer to decrease its PL and to reduce its PRF accordingly so as to maximize the link’s utility leaving Page 39 EUWB Initial development of dissemination methods and evaluation D4.2.1 minimal intervals between packet transmissions, while contributing to keep the local system pulse load minimal. 3.1.3.2 Game theoretical formulation of the pulse rate adaptation The pulse rate adaptation within the LPC function can be formulated as a cognitive algorithm using the framework of game theory. By defining the pulse rate adaptation as a game, we believe it is possible to motivate each link to reduce its pulse rate fairly and hence avoid resource overload. The pulse rate adaptation (PRA) game can be modelled as an asynchronous myopic repeated game, which can be mathematically defined as, Γ PRA = M , A,{U k } k∈M ,{d k }k∈M ,T (3.4) where M is the finite set of players, A is the strategy space formed as A = × Ak , k ∈ M , with Ak = ( a1k , a2k ,..., a Nk ) being the set of actions (or strategies) associated with player k, U k : A → ℜ is the set of utility functions that represent players strategy preferences, d k : A → Ak is the decision process that guide player k’s action choices, and T represents the decision timings at which player k takes its action choices. A player’s action choice ak corresponds with an average pulse repetition frequency choice. The set of available average pulse repetition frequencies is convex and bounded, on the one hand due to regulation and technological constraints and on the other hand due to the application requirements. In general it holds, ak ∈ PRF = ⎡⎣ prf min , prf max ⎤⎦ (3.5) As well, the set of possible protection level strategies, S = ×S , k ∈ M , is limited, i.e. it contains a k limited number of modulation schemes and error coding rate pairs. For every player, the utility function uk characterizes the satisfaction level of player k for each particular action profile a = ( ak , a− k ) ; i.e. uk, is a function of the action selected by player k, ak, and of the action profile of the rest of players, which is represented as a-k. Thus, players make decisions independently, but influenced by other players’ decisions. When analyzing the outcome of the game it is important to determine if, given certain interference and channel conditions, there exists a convergence point for the pulse rate adaptation, from which no player would deviate anymore, i.e. a Nash equilibrium (NE). An action profile a , is a NE if and only if uk ( a ) ≥ uk ( ak* ,a− k ) , ∀k ∈ M ,ak* ∈ Ak , (3.6) The convergence of the adaptation algorithm depends significantly on the choice of the utility function; concretely on its mathematical properties. Moreover, the utility function must have physical meaning for the particular application. 3.1.3.3 Utility function The utility function consists of two terms, a gain and a cost term. The gain term is associated to the goal of keeping the link throughput as close to the application requirements as possible. The cost term Page 40 EUWB Initial development of dissemination methods and evaluation D4.2.1 is related to the node’s estimated local system pulse load and accounts for the interference that a particular PRF choice will create to neighbouring nodes. Mathematically the utility function can be defined as: ( ) − uk ( prf k , prf − k ;t ) = − ⎡ ΔPRFt arg et + prf kt − prf kt ⋅ (1 + α k )⎤ ⎣ ⎦ 2 (3.7) where ΔPRFt arg et represents the variation in pulse repetition frequency which the PHY layer should accomplish in order to compensate the link throughput degradation associated to a certain PL increase, and α k is the cost term. 0 alpha=0 alpha=0.09 alpha=0.9 -0.01 -0.02 -0.03 Utility -0.04 -0.05 -0.06 -0.07 -0.08 -0.09 -0.1 1.2 1.3 1.4 1.5 1.6 PRF 1.7 1.8 1.9 2 5 x 10 Figure 16: PRA game utility function for different cost terms. Each node evaluates its cost term based on local knowledge; no cooperation between nodes is foreseen. The cost term consists in a weighted average of the node own MUI noise level estimations. α k ( t ) = (1 − twin ) MUI kt + − 1 twin κ MUI kt (3.8) A low value of α k points at a locally low system pulse load and represents for the reference transmitter none or little drawback when trying to increase its PRF to the target value. In contrast, a high value of is related to a locally high system pulse load and leads the PRF adaptation to a lower value than the target one; i.e. the reference link accepts the decrease in its own throughput helping to keep the local system pulse load low instead. Figure 16 depicts three realizations of the utility function for different values of the cost term and the equal ΔPRFt arg et . It can be seen that higher values of the cost term, i.e. higher local system pulse load conditions, move the maximum of the utility function to lower values of prf, thus helping to keep the low system pulse load. Page 41 EUWB 3.1.3.4 Initial development of dissemination methods and evaluation D4.2.1 Existence of Nash Equilibrium In order to have good convergence properties for the adaptation algorithm, the mathematical properties of the utility function are of huge significance. This subsection shows that with the utility function defined in (3.7) converges to a Nash equilibrium by using a best response decision rule. Theorem 1: Γ PRA has a unique pure strategy Nash equilibrium. Proof: First of all from [48] we know that given an asynchronous myopic game modelling a cognitive radio network, M , A,{U },{d },T , where all players are autonomously rational, if the normal form k stage game M , A,{U k } k has a NE a*, then a* is a NE for the cognitive radio network. Thus, in order to proof the NE existence for Γ PRA we can concentrate on the properties of the normal form stage game. From [49], we know that given a normal form game M , A,{U } , where Ai are nonempty compact k convex subsets of ℜ ∀k ∈ M . If ∀k ∈ M uk is continuous in m and quasi-concave in then Г has a pure strategy NE. If besides, is strictly concave in , then the NE is unique. In Γ LPC the set of possible strategies is compact and convex, and the utility function uk ( prf ) is strictly concave in prf, thus we can conclude that Γ PRA has a unique NE in the strategy PRF. 3.1.3.5 LPC Algorithm LPC can run in a MAC frame basis, over uni-directional or bi-directional links. The link’s transmitter node acts as the decision maker configuring the signal structure in response to changes in the interference environment, which are feed back within ACK messages from the link’s receiver node. The transmitter is then able to adapt the PHY parameters to the actual interference situation and to send the next data packet with the new parameter set, which is reported in the packet header. For bidirectional links where forward and return link data are transmitted in a serial manner, the same TH code can be used. Nevertheless, the PHY parameters might be different due to different bit rates and different interference situations. The algorithm begins with an initialization phase at which each user chooses some initial protection level. The initial value of the pulse repetition frequency (PRF) is determined at each node in order to optimize the link utilization, i.e., such that the total duration of the air frame is approximately equal to the mean inter arrival time between packets at the application layer. Table 1: Parameters involved in the LPC initialization phase Initialization parameters Appl Payload 500 to 2000 bits Appl Data rate 10Kbps to 1Mbps Net HL Mac HL Phy HL 128 bits 30 bits 80us Default PL Default PRF Init PL Init PRF ECR = ½ 500 KP/sec e.g: 1,1/2,1/3,2/3,3/4 Page 42 EUWB Initial development of dissemination methods and evaluation D4.2.1 The airframe duration depends on the init protection level, the application’s target data rate and the amount of protocol overhead. Concretely, the air frame consists of three parts • PHY header, i.e. Pilot&Sync, of duration 80us • MAC header of duration 120 us, considering 30 bits, 500KP/sec and ECc=1/2 • PHYPDU , whose duration depends on the MACPDU length and on the bit rate at the air interface Pilot Sync Mark Mac Header THC Body 5 MP/s Default parameter set (500KP/s, 1/2) LPC Figure 17: Air Frame Format For optimal link utilization, the bit rate at the air interface should be, BitRatet arg et = AirFramePDULength ⎡ ⎛ Payload app ⎞ ⎤ ⎟ − ( PHYH + MACH ) ⎥ ⎢⎜ ⎣ ⎝ DataRateapp ⎠ ⎦ (3.9) And thus, the initial PRF calculated by LPC is given by, PRFInit = BitRatet arg et PLInit [bits / pulse] (3.10) Each time a node receives a new packet, the PHY layer estimates the channel BER and the MUI noise level associated to this packet transmission. The channel BER estimate is obtained by reencoding the bit stream at the output of the viterbi decoder and comparing the coded bits with the hard decision values derived from the decoder input. The MUI indicator is an estimate of the interferer collision rate and is measured during idle periods, where the node itself neither transmits nor receives pulses. N samples at the output of the energy detector are analyzed with regards to MUI interference. The noise level, which is determined based on the median, serves as a basis for the interference (IF) threshold. Samples exceeding the IF threshold are indicated as shot noise. The MUI indicator is the relationship of the number of shot noise samples divided by the total number of measurement samples. The MUI noise level is used to evaluate the node own cost term following equation (3.8). Besides, the channel BER estimation together with the MUI noise level are attached to the ACK message, which shall acknowledge the successfully reception of the data packet. Estimated values are certainly random variables including short-term as well as long-term dynamics. In order to mitigate these effects, the receiver node doesn’t feedback the current measured values but an average over certain past observation window. ACK messages are always sent with the default PHY configuration used for the MAC header. After receiving an ACK message, the link’s transmitter node extracts the attached link quality information (LQI), evaluates it and decides on the best PHY parameter for the next packet transmission. The LPC decision block implements following rules: i) if channel BER increases but Page 43 EUWB Initial development of dissemination methods and evaluation D4.2.1 MUI noise level doesn’t, the PL is increased and the game is played to decide on the PRF adaptation; ii) if channel BER increases but MUI increases as well, PRF is decreased on a factor proportional to the MUI noise level increase; iii) if channel BER decreases, the PL is reduced and the PRF is reduced accordingly to maximize the link’s utility. Within the LPC decision block, the utility function defined (3.7) is used to adapt the link’s average pulse repetition frequency according to a best response dynamic, i.e. user k selects the average pulse repetition frequency that maximizes its utility for a fixed a− k , ( ) prf k ( t ) = argmax uk ak ( t ) , a− k ( t − ) ;α k ( t − ) , ak ∈Ak (3.11) start Init PL PL0 Init PRF PRF0:= f (PL0,appDR) Rcvd Packet? yes Measure: cBER,MUI ACK Extract LQI: cBER,MUI LPC Decision Block Data ACKGeneration (LQI) To PHY: PL0,PRF0 Data, ACK αk = ∫ MUIk twin Cost To PHY: PL*,PRF* Figure 18: LPC flow-diagram 3.1.4 Simulation Scenarios and Evaluation of DLC-MAC Performance The main objective of the simulations presented in this deliverable is to investigate the performance of the MAC algorithm with its link adaptation for near-far scenarios where worst cases occur and for a random scenario where the UWB nodes are randomly distributed. Unlike other simulations a statistic channel propagation model has also been implemented where the receiving energy from the transmitting node and all interferers follows a Log-Normal Shadowing model. A method for implementing the probabilistic radio models in OMNeT++ was introduced by [50] and is used for our simulations. Page 44 EUWB 3.1.4.1 Initial development of dissemination methods and evaluation D4.2.1 Near-Far Scenario The near-.far scenario is a worst case scenario where the interferers are in a range of 1 m and the target receiver is in a distance of 20 m. The number of nodes is continuously increased so that the farthest interferer is in maximum range which corresponds to 20 m. The nodes are static and are distributed in a 50x50x2 m area. The scenario is depicted in Figure 19. Figure 19: Near-Far Scenario In this section, the sensitivity of the game behaviour to different sets of initial conditions is examined. Extensive simulations have confirmed that the LPC algorithm always converge to a solution in A , regardless of its initialization. In particular, for a 2-link network, simulation results suggest the existence of a unique NE for the game Γ LPC and that the LPC algorithm converges to it regardless of its initialisation profile ( prf i max play ,0, 4) , and provided that the pricing parameter has been appropriately chosen. Figure 20 depicts the PRF and PL steady-state allocation corresponding to the unique NE of Γ LPC in the case of 2 links with information data rate 1Mbps. It can be observed that both links select the maximum PL available. Furthermore, the PRF reached is so that in combination with the PL, and taking into account the protocol overhead, maximises the link utilisation. Since the network exhibits symmetrical conditions, a symmetric PRF allocation has been expected. The fact that this is not exactly the case is due to the discretisation of the game’s action space, which is unavoidable in a practical algorithmic implementation. In addition, it can be appreciated that the pulse rate allocation reached by the LPC algorithm is not stable, but fast short-term dynamics can be observed. These are due to the fact that the BER at the receivers, which is used for the calculation of the pricing factor at the transmitters, is a random variable. Page 45 EUWB Initial development of dissemination methods and evaluation D4.2.1 PL allocation PRF allocation BER per link Figure 20: NE for the 2 links near far network For a n-links network, results suggest the existence of several equilibria for the game Γ LPC . The LPC algorithm discover different feasible PRF/PL steady-state allocations depending on the initial conditions ( prf i max play ,0, 4) . In particular for the case of 4 links, we present next two steady-state PRF/PL allocations: the first is reached when all links start with the lowest PL (2-PPM, CR=1), the second when all links start with the highest PL (2-PPM, CR=1/3). The information data rate per link is 1Mbps, the initial price and PRF conditions do not influence the convergence. Page 46 EUWB Initial development of dissemination methods and evaluation D4.2.1 PL allocation PRF allocation BER per link Figure 21: NE for 4 links in near far network It can be observed that in both cases, the PL allocation is the same for all links and equal to the highest possible PL (2-PPM, CR=1/3). In contrast, the PRF allocation differs. This behaviour confirms the fact that, as regards to interference management, there is a strong coupling between PRF and PL adaptation. Further simulations have confirmed that the steady-state cumulative pulse load, and therefore the cumulative network throughput, attained with the different steady-state allocations (Nash equilibria) are very similar, which is desirable. However, the highest cumulative network throughput is attained if the initial PL profile considers ( prf i max play , 0, 4) . Page 47 EUWB Initial development of dissemination methods and evaluation D4.2.1 PL allocation PRF allocation BER per link Figure 22: NE for 4 links near far network 3.1.4.2 Performance Comparison with Adaptive Channel Coding (ACC) In this section, the interference compensation functionality of the LPC approach is compared to that of 3 2 1 1 a conventional adaptive channel coding (ACC) strategy with convolutional codes {1, , , , } . For 4 3 2 3 that purpose, we have considered an information data rate per link equal to 1Mbps and we have increased the number of links from N = 2 − 16 . The ACC strategy constantly adapts the channel code rate to the level of interference experienced at the receiver. Initially, the lowest code rate is used, and then ACC always selects the highest code rate that still ensures the decoding of the data packet. For the ACC strategy the PRF per link is fixed. Figure 23 show the total logarithmic utility reached with each of the two strategies: LPC and ACC. It can be observed that the LPC algorithm outperforms the ACC strategy when the number of users in the network is high, and therefore the cumulative offered pulse load. For low load conditions the LPC algorithm provides similar performance than the ACC strategy. Note that in the case of N = 2 − 8 Page 48 EUWB Initial development of dissemination methods and evaluation D4.2.1 links, the total network utility reached by ACC is higher than the one obtained with the LPC algorithm, but at the cost of violating the QoS constraint ( BER = 1e −6 ). Figure 23: Total logarithm utility ∑ Figure 24: Average BER per link |N| 3.1.4.3 log(ri ( prf )) i =1 Random Scenario 25 m The room setup is similar to that described in 4.2.4.1, but this time the room size is 25x25x2 m. Unlike the near-far scenario, the nodes are randomly distributed, see Figure 25. Again, the nodes are static of moving slower than the convergence time of the LPC algorithm. This distribution leads to a cluster formation, where some nodes are in range and others are out of range. The behavior of the MAC algorithm and the link adaptation within clusters is important and shall be investigated by these simulations. 25 m Figure 25: Random Scenario As in the near far scenario, LPC algorithm always converge to a solution in A , regardless of its initialization and results suggest that Γ LPC has more than one NE for the game. The LPC algorithm discover different feasible PRF/PL steady-state allocations depending on the initial conditions ( prf i max play ,0, 4) . Page 49 EUWB Initial development of dissemination methods and evaluation D4.2.1 We present next two steady-state PRF/PL allocations obtained in the example scenario depicted in the following figures. The first (see Figure 27) is reached when all links start with the lowest PL, the second (see Figure 28) when all links start with the highest PL (2-PPM, CR=1/3). The information data rate per link is 1Mbps, the initial price and PRF conditions do not influence the convergence. 9 1 15m 3 5 6 2 8 4 Tx Rx 15m Figure 26: Example of a random network realization Like in the near far scenario,the highest cumulative network throughput is reached when the start PL profile is . Page 50 EUWB Initial development of dissemination methods and evaluation D4.2.1 PL allocation PRF allocation BER per link Figure 27: NE in 8 links random example network Page 51 EUWB Initial development of dissemination methods and evaluation PRF allocation D4.2.1 PL allocation BER per link Figure 28: NE in 8 links random example network 3.1.4.4 Performance Comparison with Adaptive Channel Coding (ACC) In this section, the interference compensation functionality of the LPC approach is compared to that of 3 2 1 1 a conventional adaptive channel coding (ACC) strategy with convolutional codes {1, , , , } . For 4 3 2 3 that purpose, we have increased the number of links from N = 2 − 16 . The information data rate per link and the initial conditions for the LPC algorithm are chosen like in section before. Figure 29 shows the total logarithmic utility reached with each of the two strategies: LPC and ACC in a network with random distributed nodes. Similar conclusions can be extracted as in the previous section. LPC algorithm outperforms the ACC strategy when the number of users in the network, and therefore the cumulative offered pulse load, is high. For low to moderate offered pulse load the LPC algorithm provides similar performance than the ACC strategy. Note that in the case of N = 2 − 8 Page 52 EUWB Initial development of dissemination methods and evaluation D4.2.1 links, the total network utility reached by ACC is higher than the one obtained with the LPC −6 algorithm, but at the cost of violating the QoS constraint ( BER = 1e ). Figure 29: Total logarithm utility ∑ |N| 3.1.4.5 i =1 log(ri ( prf )) Figure 30:Average BER per link Conclusion Our distributed mechanism makes use of the framework of game theory to develop a novel interference management strategy based on the joint combination of adaptive error coding and pulse rate control. A game has been formulated and a distributed, asynchronous algorithm (LPC) has been proposed to discover the optimal PRF/PL network allocation under several channel and interference conditions. It has been observed that, due to the strong coupling concerning interference management between PL and PRF adaptation, the game has several feasible steady-state allocations (Nash equilibria). In general, the different equilibria provide similar aggregated network throughput. Results suggest that, in order to maximize the cumulative network throughput, it is better that each link starts with the lowest PL. It can be concluded that the joint use of PRC and ACC is an appropriate means to mitigate impulsive interference in autonomous IR-UWB. Page 53 EUWB Initial development of dissemination methods and evaluation D4.2.1 4 Evaluation of architectures and acquisition & distribution schemes for tracking 4.1 System model 4.1.1 System environment Due to its great accuracy and good performance on multipath and NLOS environments, UWB is good candidate to provide location information to mobile users in indoor environments. A particular application of LT indoor systems is to provide to wireless/cellular access networks users with location information. Location information could be used by the wireless/cellular access network to develop location based services or to improve radio resources management [28]. Some interesting scenarios for this application are relatively wide indoor environments such as shopping malls, train stations, airports, exhibition centres, sports stadiums, etc. Thanks to the simultaneous data transmission and location capabilities of UWB, a single UWB network could be used to interconnect different sensors (e.g. fire detection sensors) and to provide to mobile users with location information. This would allow the user to position himself on his device in the same way as car navigation systems and locate the place he wants to go (a shop, check-in desk, his seat...). He could also get information through the UWB network (special offers, arrival times, match statistics, etc.). But not only could the user benefit of this localization information. The user position could be sent to the cellular access network of the device (UMTS, WiMAX, PMR) which would be helpful to improve Radio Resources Management. And furthermore it could be retrieved by the operator to offer locationbased services. An example of application scenario for tracking mobile devices in a shopping mall is shown in Figure 31. Figure 31: UWB tracking of mobile devices in a shopping mall The application of the UWB technology for the development of combined data transmission and location networks in relatively wide indoor scenarios has to face important challenges due to the short range of UWB and the limited data rate of LDR-LT (Low Data Rate with Location and Tracking) UWB systems. First of all, the area of interest can be relatively large (length over hundreds of meters) in relation to UWB range (10-50 meters), which implies that the area of interest will be covered by a high number of anchor nodes and eventually different UWB piconets. Mobility of users implies that position update rate must be relatively high in order to keep the error of the estimated position under a reasonable value, which entails a higher need of resources. Moreover, the duration of the procedure of estimating Page 54 EUWB Initial development of dissemination methods and evaluation D4.2.1 the distances, transmitting the ranging information to the location controller, calculating the position and transmitting the position to the mobile must be as short as possible in order to minimize the error due to this delay. Finally, the system should be able to cope with a high number of users, which entails an increase of the resources needed for location. Positioning accuracy provided by UWB (in the order of centimeters) meets the requirements of this kind of application scenario (1-2 meters) as long as the position update rate is enough to accurately track the mobiles. The main constrain of a UWB system in this application scenario is related with the availability of resources, especially on simultaneous communication and location systems as an increase of the resources needed for location entails a reduction of the available data rate for communication. Therefore, different tracking architectures and strategies for the acquisition and dissemination of location information must be explored in order to optimize the amount of resources needed for location. The impact of different system design parameters, such as distance between the anchors, number of anchors used for location or position update rate, on the positioning error and the amount of resources needed for location should be also evaluated. 4.1.2 MAC layer description EUWB MAC layer has been designed for Low Data Rate, Location and Tracking (LDR-LT) applications. It is based on IEEE 802.15.4 standard [29], with enhancements to meet quality of service requirements and to provide efficient support for ranging and localization with an ultra-wide-band (UWB) physical layer. A detailed description of EUWB MAC layer can be found in [30]. A MAC superframe structure is defined, which is divided into timeslots where the different frames (beacon frames, hello frames, data frames, ranging frames, timeslot requests…) are sent. Superframe structure is shown in Figure 32. Two main periods are defined in the superframe, namely Control period and Data period. In the “Control period”, two parts are identified: • The Beacon period used for the beacon alignment • The Topology Management period used to send the “Hello” frames The other portion called “Data Period” is used for data frames, ranging frames, GTS request frames and other command frames. Data Frames, ranging frames and GTS request frames are sent in a Contention Free Period whereas other command frames are sent in the Contention Access Period (CAP). Ranging slots are considered as data slots and ranging frames are sent in the CFP period as other data frames. The Contention Free Period in the “Data Period” is so composed of: • Guaranteed time slots (GTS) for data frame transfer, acknowledgments and ranging. The number of GTS used for ranging can be freely defined. It depends of the number of devices which are requested to perform ranging as well as the number of ranging measurements needed for a localisation update. • A GTS request period used to send the GTS request frames. The maximum number of slots (and so sub-slots) for each part of the frame are then the following ones: • 12 Timeslots in the Beacon period • 3 Timeslots in the Topology Management Period (12 sub-slots as each slot is divided in 4 sub-slots) Page 55 EUWB Initial development of dissemination methods and evaluation D4.2.1 • 20 Timeslots in the GTS Period that are used for Data communications and for ranging as in Phase 2 the ranging slots are considered as data slots. A classical case will be to have 8 Timeslots for data communication and 12 Timeslots for ranging enabling 4 devices using 3 way ranging to perform ranging. • 6 Timeslots in the GTS request Period • 12 Timeslots in the CAP period So, the maximum number of slots in the super-frame is 53. If the maximum number of slots is not achieved in the super frame, an inactive part is defined before the beginning of the next super-frame. BP: Beacon Period TP: Topology Management Period IP: Inactive Period Beacon slot BP Topology management slot (divided into 4 sub slots) TP Control Period CFP: Contention Free Period CAP: Contention Access Perriod GTS Request slot (divided into 2 sub slots) CFP slot CFP CAP slot (divided into 4 sub slots) CAP IP Data Period Super Frame Duration (SD) Beacon Interval (BI) Figure 32: EUWB MAC superframe structure [30] The piconets are based in a mesh centralized topology, which is defined by a centralised allocation management and a centralised common timing reference synchronisation. Indeed a coordinator is elected in the network so as to transmit beacon frames and to handle the scheduling procedures. Figure 33 describes the construction of a Mesh centralised network. First a scheduling tree is built, it is used to transport beacon, association request and GTS request command frames. Then it is extended to a meshed scheduling tree by enabling the transmission out of the tree for the data. Data frames, ranging frames can so be sent out of the tree as well as hello frames that are broadcasted to the neighbours. The CFP slots for each link are allocated by the piconet coordinator for the whole route between the source and the destination. Page 56 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 33: Mesh centralized topology [30] In the scheduling tree, the Piconet Coordinator is on top of the tree. Then the different devices are defined by their scheduling tree level. The typical maximum tree level that must be taken into account for the application scenario is 4. Then a possible scheduling tree can be represented as follows. Figure 34: Example of meshed scheduling tree [30] The scheduling tree is used to transport the beacon frames to each device of the network. It allows also the transmission of the GTS request frames from the devices to the coordinator, the association request frames and the disassociation request frames. Data frames, hello frames, ack frames and ranging frames can be sent on non tree link. Hello frames are broadcasted and so no destination address is needed. Ranging frames are not relayed and can be sent only between neighbours. The neighbourhood is known locally for each node of the network thanks to the hello frames that are periodically sent. It is to be noticed also that the relaying procedure is performed at the MAC layer level. The source node requests an allocation to the coordinator for the entire route. Indeed, when a node has data to transmit, it will send a GTS request on the tree to the coordinator with its address as the source address and the destination address of the transmission. The request will correspond to the number of GTS slots needed for the data transmission on a link. The coordinator which has the knowledge of the whole network will look on its routing table if there are relays between the source and the destination. If there are relays, the coordinator will allocate the GTS for each link based on the request made by the source node. The GTS allocation will be available to the source node and relay nodes in the Beacon frame (Data descriptor in the GTS fields). 4.1.3 LT application The objective of the LT system is to track the position of mobile users in relatively wide indoor environments. With that purpose a UWB simultaneous data transmission and location network will be Page 57 EUWB Initial development of dissemination methods and evaluation D4.2.1 deployed on the scenario. The network is composed of Na anchors, fixed and regularly distributed at known positions, and Nm targets, mobile nodes to be located. In order to track the position of the target nodes, location information, basically the distances estimated between the target and anchor nodes, must be acquired and transmitted to the location controllers, which are the functional units that execute the tracking algorithm to obtain the estimated position of the targets. Location controllers can be physically implemented in one or more anchor nodes or in the mobile nodes, depending on the architecture which is defined. In the architecture centralized in the network, the tracking functionality is implemented in one or more previously defined anchor nodes. In the distributed architecture, the mobile node picks dynamically which anchor executes the location functionality. Finally, in the architecture centralized in the mobile nodes the location controller function is implemented in the mobile nodes. The acquisition of the location information is done through the ranging procedure. Three procedures are defined [31] - One way ranging: The target node transmits a ranging packet and every anchor measures the time of arrival of the ranging packet. The position of the target can be obtained from the differences between the times of arrival on each anchor. Only one time slot is needed but it requires synchronization between all the anchors. - Two way ranging: The procedure initiator (target or anchor) transmits a ranging request to another node, which estimates the time of arrival and sends a ranging response after a predefined time. The initiator measures the time of arrival of the response and can estimate the transmission delay and the distance between the nodes. Two time slots are needed, but there is no need of synchronization between the nodes. -Three way ranging: Similar to the two way ranging scheme, but in this case two ranging responses are sent in order to compensate the clock drift. The ranging procedure can be initiated by the target nodes or by the anchor nodes and the distance is estimated by the initiator. It requires three time slots, but estimated distances are much more accurate. Once the distances between the target and the anchor nodes are estimated, they must be transmitted to the location controller in a data packet (measurement report data packet). The location controller executes the tracking algorithm to calculate the position and transmits the updated position to the target node (position update data packet). With respect to the tracking technique itself, parametric and non-parametric approaches can be distinguished. Parametric approaches compute the location based on the a priori knowledge of a model, while non-parametric approaches process straightforward the data with the usage, in some cases, only of some statistic parameters (mean, variance). An example of parametric approach is based on the Extended Kalman Filter [32], while an example of non-parametric approach is based on Multidimensional Scaling (MDS) [33]Further information on tracking algorithms for UWB and proposal of parametric and non-parametric techniques can be found in [34]. In order to reduce the amount of resources needed to acquire and distribute the location information, different enhanced modes are proposed and explained in detail in [34]. These enhancements include: - Data aggregation: All the distances estimated can be aggregated and sent in a single measurement report data packet to the location controller. - Broadcast/multicast request: In order to reduce the number of slots, a single ranging request can be broadcasted to all the nodes (broadcast) or to a set of nodes (multicast) Page 58 EUWB Initial development of dissemination methods and evaluation D4.2.1 - Broadcast/multicast response: After receiving the ranging requests of different initiators, a single ranging response is broadcasted to all the initiators (broadcast) or a set of them (multicast). 4.2 Analysis and evaluation In order to evaluate different system architectures and strategies for acquisition and dissemination of location information, and the impact of the different system design parameters, a simulation tool has been developed, using C++ as programming language and Visual Studio .NET as development platform. The system performance is evaluated in terms of positioning error (average and variance) and the amount of resources used for location (number of time slots needed for acquisition and distribution of location information). With this purpose, a set of simulations has been performed for the different proposed architectures and acquisition and dissemination of location information strategies. The influence of parameters such as the number of anchors used for location, the distance between anchors, the position update rate or target mobility has also been analyzed. For these simulations, a common set of parameters has been defined. Simulation duration has been set to 10000 seconds and the number of targets to be tracked to 10. The area size has been set to 50 m. x 50 m. and the distance between anchors to 10 m., resulting in 25 anchors. Concerning the dynamics of the mobile nodes, minimum and maximum speeds have been set to 0.1 and 3 m/s respectively, and direction changes every 20 seconds. Position update rate has been set to 1 update per second and UWB nodes range to 15 m. 4.2.1 Simulator description The simulator scenario is the representation of a relatively wide indoors area of dimensions length x width. On this scenario a UWB network is deployed, as it is shown in Figure 35. The network is composed of Na anchors, fixed and regularly distributed at known positions, and Nm targets, mobile nodes to be located. For simplicity, the scenario is covered by a single UWB piconet, so data transmission between different piconets and handover are not further considered. In order to track the position of the target nodes, the distances between the target and anchor nodes are estimated. Estimated distances are sent to location controllers, which are the functional units that execute the tracking algorithm to obtain the estimated position of the targets. Location controllers can be physically implemented in one or more anchor nodes or in the mobile nodes, depending on the architecture which is defined. Finally, the estimated positions are sent to each target. Page 59 EUWB Initial development of dissemination methods and evaluation D4.2.1 Y LC X Figure 35: UWB location simulator scenario A ranging model is used to characterize the ranging error distribution. Range measurements based on round-trip Time of Flight (ToF) estimation through n-Way Ranging transactions can be modeled as: d ij = d ij + ε ij + nij = d ij' + nij (4.1) where dij is the actual distance between nodes i and j, d′ij is the biased distance (with bias εij) and nij is a residual noise term. The biased distance is modeled as a weighted sum of Gaussian and Exponential components conditioned upon the actual distance and the channel configuration (LOS/NLOS/severe NLOS). The residual noise is modeled as additive and centered, with a variance σn2 that depends on detection noise terms affecting unitary ToA estimates and involved protocol durations. Further information about the ranging models can be found in [34] and the specific model and parameters used can be found in [35][36]. Concerning the tracking technique, a simple geometric trilateration algorithm has been implemented, which calculates the position according to the distances estimated to the three closest anchors. Also, a parametric algorithm based on the Extended Kalman filter is implemented, and a non-parametric algorithm based in Multidimensional Scaling (MDS) is under development. The dynamics of the mobile nodes are modeled by random directions and speeds that are constant during a certain period of time, after which new random directions and speeds are set. The dynamic model is characterized by maximum and minimum speeds and the direction change rate. Finally, the UWB physical layer has been characterized through different models. A coverage model is used to identify the vicinity relationships between the nodes depending on the distance between them. A transmission model is used to characterize the packet error rate and the delay depending on the distance and channel model although, in a first step, an ideal approach has been taken, considering lossless and instantaneous acquisition and distribution of location data. 4.2.2 Impact of the tracking architecture As it was previously explained, the tracking functionality is executed by the location controllers, which can be physically implemented in one or more anchor nodes or in the mobile nodes, depending on the architecture which is defined. Page 60 EUWB Initial development of dissemination methods and evaluation D4.2.1 In the architecture centralized in the network, the tracking functionality is implemented in one or more previously defined anchor nodes. To update the position of a target node, the estimated distances between the target and anchor nodes must be sent to the location controller, which applies the tracking algorithm to obtain the position. Then, the location controller transmits the updated position to the target node. In the distributed architecture, the mobile node picks dynamically which anchor executes the location functionality. With an appropriate strategy, it is possible to keep the location controller in coverage of the mobile node. Therefore, the data packets with location information (estimated distances or updated position) can be transmitted using only one slot as there will be no need of relaying. As a drawback, the tracking functionality must be implemented in every anchor node. Finally, in the architecture centralized in the mobile nodes the location controller function is implemented in the mobile nodes. The mobile nodes perform ranging with their neighbor anchors and obtain their own position applying the tracking algorithm. Therefore, there is no need of transmitting the estimated distances and the updated position. Nevertheless, the implementation of the tracking functionality in the mobile nodes would increase their complexity, and this may not be desirable. The feasibility of this architecture will depend on the specific application and devices to be tracked In this section, the impact of each one of the proposed architectures (centralized in the network, distributed and centralized in the mobile nodes) on the amount of resources needed for location is evaluated. The resources are measured in terms of time slots used per second. The slots are classified according to their use in Ranging Requests (RRq), Ranging Responses (RRp), data packets with measurements reports (DP-MR) and data packets with position update (DP-PU). Also the total number of slots needed for location is shown. Figure 36 shows the results of the simulations obtained for an architecture centralized in the network with one location controller, which will be implemented in the anchor with coordinates (25, 25), depending on the number of target nodes. As it can be observed, for the ranging request, approximately 4 slots per second and per target are needed, as we have set to 4 the number of anchors to be used for location. The number of slots needed for ranging responses is twice the number of requests, as we are considering three-way ranging and two responses are sent for each request. Concerning the amount of measurement reports, there will be one per ranging procedure, but it may need more than one slot, as it has to be relayed to the location controller, which may not be in coverage of the target node. Finally, only one position update data packet is needed per update process, but due to relays almost 2 slots per second and per target are needed. This makes a total of approximately 20 slots per second and per target. Page 61 Initial development of dissemination methods and evaluation Number of slots per second EUWB 220 200 180 160 140 120 100 80 60 40 20 0 D4.2.1 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 36: Resources needed for location for a centralized in the network architecture with 1 location controller Number of slots per second In order to reduce the number of times that data packets have to be relayed, the number of location controllers in the network can be increased. Figure 37 shows the amount of timeslots needed for a centralized network architecture with 4 location controllers, implemented in the anchors with coordinates (15,15), (15,35), (35,15) and (35,35). As it can be observed, the number of measurement reports is almost similar to the number of ranging requests, as now the target will be most of the time in coverage of one of the location controllers and only few times the packets will have to be relayed. Due to the same reason, the number of slots needed for position update packets also decrease to approximately one slot per second per target. Thus, the total number of slots needed is approximately 17 slots per second and per target. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 37: Resources needed for location for a centralized in the network architecture with 4 location controllers Another possibility to decrease the amount of time slots needed for location is to use a distributed architecture. As it can be observed in Figure 38, the number of slots used for measurement reports is exactly the same as the number of ranging requests, which is expected as with the distributed Page 62 EUWB Initial development of dissemination methods and evaluation D4.2.1 Number of slots per second architecture the target is always in coverage of the location controller. Number of position update packets is exactly one slot per update. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 38: Resources needed for location for a distributed architecture Number of slots per second Finally, another possibility is an architecture centralized in the mobile. As it can be seen in Figure 39, the amount of time slots for ranging requests and responses are similar to the architecture centralized in the network, but measurement report and position update packets are not needed as the tracking algorithms are executed by the target. The total number of slots needed for location is approximately 12 slots per second per target. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 39: Resources needed for location for a centralized in the mobile architecture Figure 40 summarizes the results obtained for the different architectures in terms of total number of time slots needed for location. Compared to the architecture centralized in the network with one location manager, the architecture centralized in the mobile nodes presents a reduction of 40% in the amount of time slots needed. This architecture requires that the location function is implemented in the mobile nodes, so the feasibility of this architecture depends on the specific devices to be tracked. The distributed architecture presents a reduction of almost 20% in the amount of time slots needed Page 63 EUWB Initial development of dissemination methods and evaluation D4.2.1 Number of slots per second compared to the architecture centralized in the network with one location controller. Very similar results are obtained for the architecture centralized in the network with 4 location controllers, which only requires implementing the location functionality in 4 of the 25 anchor nodes, so this architecture will be preferred over the distributed one. 220 200 180 160 140 120 100 80 60 40 20 0 Network-1LM Network-4LM Distributed Mobile 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 40: Resources needed for location for the different system architectures 4.2.3 Impact of acquisition & distribution strategies In order to track the position of the target nodes, location information, basically the distances estimated between the target and anchor nodes, must be acquired and transmitted to the location controller. The acquisition of the location information is done through the ranging procedure. Ranging procedure can be initiated either by the target nodes or by the anchor nodes. The procedure initiator transmits a ranging request to another node, which estimates the time of arrival and sends a ranging response after a predefined time. The initiator measures the time of arrival of the response and can estimate the transmission delay and the distance between the nodes (Two Way Ranging). In order to improve the accuracy of distance estimation, two ranging responses can be sent in order to compensate the clock drift (Three Way Ranging). One way ranging will not be further considered on this study as it requires accurate synchronization between all the anchors. The distribution includes the transmission of the estimated distances to the location controller in a data packet (measurement report data packet) and the transmission of the updated position the target node (position update data packet). In order to reduce the amount of resources needed to acquire and distribute the location information, the simulator implements different enhancements [34]. - Data aggregation: All the distances estimated can be aggregated and sent in a single measurement report data packet to the location controller. - Broadcast/multicast request: In order to reduce the number of slots, a single ranging request can be broadcasted to all the nodes (broadcast) or to a set of nodes (multicast) Page 64 EUWB Initial development of dissemination methods and evaluation D4.2.1 - Broadcast/multicast response: After receiving the ranging requests of different initiators, a single ranging response is broadcasted to all the initiators (broadcast) or a set of them (multicast). If the initiator is the target node, broadcast/multicast response would require a simultaneous update of the position of all the targets in order to be able to aggregate the ranging responses in a single packet. This is not very suitable for tracking applications, as the simultaneous update of all the targets would increase the duration of the position update process, which is critical due to target mobility. Furthermore, in general each target uses different anchors, so this strategy would not be very effective. The same applies for data aggregation and broadcast/multicast request when the initiator is the anchor node. The amount of resources needed for location have been simulated for each enhancement based on an architecture centralized in the network with one location controller, so results obtained must be compared to those in Figure 36. Number of slots per second Figure 41 shows the results obtained for the data aggregation enhancement. As all the measurement reports are grouped into a single data packet, the number of slots needed for the measurement report packets is reduced. Only one packet will be sent per update, so results are equal to the amount of slots needed for position update, almost 2 slots per second per target due to relaying. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 41: Resources needed for location when data aggregation is applied Concerning the possibility of sending multicast ranging requests, this implies that only one ranging request is sent in each update, thus minimizing the amount of slots needed for ranging requests to 1 slot per second per target, as it is shown in Figure 42. Page 65 Initial development of dissemination methods and evaluation Number of slots per second EUWB 220 200 180 160 140 120 100 80 60 40 20 0 D4.2.1 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 42: Resources needed for location when multicast ranging request is applied Number of slots per second The use of broadcast ranging requests has the same impact on the number of slots needed for ranging requests, which is reduced to a minimum of 1 slot per second per target, as it is shown in Figure 43. Furthermore, it is simpler than the multicast option, as no knowledge of the anchors to use is required. Nevertheless, it also has a drawback, as all the anchors in coverage of the target node will answer, thus increasing the number of ranging responses. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 43: Resources needed for location when broadcast ranging request is applied Figure 44 summarizes the results obtained for each one of the acquisition and distribution enhancements in terms of total number of time slots needed for location. Data aggregation (DA) reduces in approximately 25% the amount of time slots needed for location. Concerning multicast (MRq) and broadcast (BRq) ranging requests, the first one is preferred as it reduces the total amount of slots needed in a 15%, while the broadcast does not reduce the total amount of slots needed, as the Page 66 EUWB Initial development of dissemination methods and evaluation D4.2.1 Number of slots per second number of ranging responses increases. Finally, combining data aggregation and multicast ranging request (DA&MRq), a reduction of 40% is reached. 220 200 180 160 140 120 100 80 60 40 20 0 Basic DA MRq BRq DA&MRq 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 44: Resources needed for location for different acquisition and distribution enhancements Number of slots per second Concerning the initiator of the ranging process, Figure 45 shows the results obtained when the ranging requests are sent by the anchor nodes instead of the target nodes. Compared to the case when the ranging requests are sent by the target nodes (Figure 36), there is a small reduction of the number of slots needed for sending the measurement reports to the location controller. This is due to the reduction in the number of relays that are needed to send these packets to the location controller. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 45: Resources needed for location when the ranging procedure is initiated by the anchors In case the ranging process is initiated by the anchors, data aggregation and multicast ranging requests are not suitable for tracking applications, as it would mean that all the position update procedures should be performed at the same time for all the target nodes. On the other hand, the multicast ranging response enhancement can be applied. As it can be observed in Figure 46, the number of slots needed Page 67 EUWB Initial development of dissemination methods and evaluation D4.2.1 Number of slots per second for ranging responses is reduced to 2 slots per second per target, as only 2 response packets are sent per update. 220 200 180 160 140 120 100 80 60 40 20 0 RRq RRp DP-MR DP-PU Total 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 46: Resources needed for location when the ranging procedure is initiated by the anchors and broadcast ranging response is applied Number of slots per second Figure 47 shows the total number of time slots needed for location depending on the initiator of the ranging procedure. When no enhancements are applied, the number of slots needed when the anchors start the ranging procedure is slightly lower than the number of slots needed when the target starts the ranging procedure. When the target is the initiator and data aggregation and multicast ranging request (DA&MRq) are applied, a reduction of 40% in the number of slots needed is reached, getting even better results than when the anchor is the initiator and multicast ranging response (MRp) is applied. 220 200 180 160 140 120 100 80 60 40 20 0 Target Anchor Target DA&MRq Anchor MRp 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 47: Resources needed for location depending on the initiator of the ranging procedure and the enhancements applied Finally, the performance of the different architectures has been evaluated when data aggregation and multicast ranging response are applied, and results are shown in Figure 48. The architecture Page 68 EUWB Initial development of dissemination methods and evaluation D4.2.1 Number of slots per second centralized in the mobile nodes shows the best results, with a reduction of 30% in the number of slots needed for location compared to the architecture centralized in the network with one location controller. The distributed architecture shows similar results to the architecture centralized in the network with 4 location controllers, with a reduction of 12% compared to the architecture centralized in the network with one location controller. 220 200 180 160 140 120 100 80 60 40 20 0 Network-1LM Network-4LM Distributed Mobile 1 2 3 4 5 6 7 8 Number of targets 9 10 Figure 48: Resources needed for location for different system architectures when data aggregation and multicast ranging request are applied As a reference, the amount of resources available for location with the MAC parameters proposed for the LDR-LT UWB platforms to be developed within EUWB project is calculated [30]. Slot size is set to 160 bytes (1280 symbols), which at a physical data rate of 347 kbps entails a slot duration of 3.6864 ms. Number of slots in a superframe is set to 53, which entails a superframe duration of 195.4 ms. As in each superframe 20 slots are assigned to ranging and data communication, this means that approximately 100 slots per second are available. Considering the architecture centralized in the network with one location controller, data aggregation and multicast ranging request, that requires 12 slots per second and per target, approximately 8 mobile nodes could be tracked at the same time in a picocell. 4.2.4 Impact of number of anchors used for location In order to reduce the amount of resources needed, a possible strategy is limiting the number of anchors to be used for location. Therefore, the ranging procedure would not be performed with all the neighbour anchors, but only with a certain number of them. This would reduce the amount of slots needed for ranging requests, ranging responses and measurement reports. Of course, this will also have an impact on the positioning error, as a higher number of anchors allows higher accuracy and reliability. Nevertheless, the ranging error depends on the distance, so the ranging error for the closest anchors is expected to be much lower than for the more distant anchors. Therefore, if only the closest anchors are used for position calculation, both positioning error and need of resources can be reduced. In order to select the closest anchors, a procedure to pick the closest anchors must be defined either in the mobile nodes or in the location controllers, taking advance of the available location information (estimated position of the mobile and known positions of the anchor nodes). Page 69 EUWB Initial development of dissemination methods and evaluation D4.2.1 In the first version of the simulator, an ideal approach has been taken and the closest anchors are always picked. But in further versions more realistic approaches, for example using the estimated position of the mobile and the known positions of the anchors to estimate the distances to the anchors and select the closest ones, will be implemented and the possible degradation will be assessed. In this section, the error in the position estimation and the amount of resources needed for location are evaluated for different number of anchors used for location. Concerning the positioning error, different tracking algorithms (trilateration and Kalman filter) and levels of ranging residual noise (σn=0.7 m and 0.3 m) are considered. A distance between anchors of 10 meters has been set, which results in 25 anchors. Number of slots per second and per target Figure 49 shows the amount of resources needed depending on the number of anchors used for location. Results are independent of the tracking algorithm and the ranging noise. As it can be observed, the amount of timeslots needed increase as a higher number of anchors are used and remains constant for more than 7 anchors, as for a distance between anchors of 10 meters it is not very likely that the target is in coverage of more than 7 anchors. Therefore, if the number of anchors used for location is limited to 4, the amount of resources needed for location would be reduced from 27 to 20 slots per second and per target for this configuration (10 meters between anchors). 50 45 40 35 30 25 20 15 10 5 0 RRq RRp DP-MR DP-PU Total 3 4 5 6 7 8 9 10 Number of anchors for location Figure 49: Resources needed for location depending on the number of anchors used for location when Na=25 anchors Concerning the positioning error, Figure 50 shows the average error depending on the number of anchors for different tracking algorithms (trilateration and Kalman filter) and residual ranging noise levels (0.7 m. and 0.3 m.). The trilateration algorithm shows an important increase of the error when three anchors are used. This is due to the fact that, with the trilateration method, position cannot be computed when the three reference anchors are aligned, which is likely to happen when the target is near the area limits. When more than three anchors are used, the performance is independent of the number of anchors, as only the three closest anchors are used for the trilateration, unless they are aligned, then the fourth closest anchor is picked. Concerning the Kalman filter, the more anchors are used, the more information is available, which should improve the accuracy of the filter. But, as the anchors are picked according to their distance to the target, a higher number of anchors implies that more distant anchors are picked, which have a higher ranging error due to ranging bias. For high ranging residual noise, the optimal number of anchors which minimizes the error is 4, and the Page 70 EUWB Initial development of dissemination methods and evaluation D4.2.1 Average error (m) performance is slightly degraded as the number of anchors increase. This degradation is more noticeable when the ranging residual noise is low, as the importance of the ranging bias, which depends on the distance, will be higher. 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 σ=0.7 Trilateration σ=0.7 Kalman filter σ=0.3 Trilateration σ=0.3 Kalman filter 3 4 5 6 7 8 9 10 Number of anchors for location Figure 50: Position estimation error depending on the number of anchors used for location when Na=25 anchors Error variance (m2) Figure 51 shows the variance of the positioning error depending on the number of anchors used for location. As it can be observed, the variance is almost independent of the number of anchor used for location as long as 4 or more anchors are used. Furthermore, the variance is almost independent of the ranging residual noise as, for a distance between anchors of 10 m., the variance is mostly due to the ranging bias. Finally, the variance is much higher for the trilateration algorithm compared to the Kalman filter, as the Kalman filter uses the previous position to calculate the new one, thus reducing the variability. 3 2,7 2,4 2,1 1,8 1,5 1,2 0,9 0,6 0,3 0 σ=0.7 Trilateration σ=0.7 Kalman filter σ=0.3 Trilateration σ=0.3 Kalman filter 3 4 5 6 7 8 9 10 Number of anchors for location Figure 51: Position estimation error variance depending on the number of anchors used for location when Na=25 anchors Page 71 EUWB Initial development of dissemination methods and evaluation D4.2.1 4.2.5 Impact of the distance between anchors Another important parameter in the system design which has a big impact on the positioning accuracy and in the amount of resources needed for location is the distance between anchors. In order to assess this impact, three different configurations, 25 anchors (10 m between anchors), 49 anchors (7.15 m) and 100 (5 m), have been evaluated depending on the number of anchors used for location, the tracking algorithm and the ranging residual noise. Average error (m) Figure 52 and Figure 53 show the position estimation error for the trilateration algorithm depending on the number of anchors, with high and low ranging residual noise respectively. For high ranging residual noise, average error is reduced from 0.8 m for 25 anchors to 0.6 m with 49 anchors. With this configuration, the error is mostly due to ranging residual noise, as the three anchors used for trilateration will be relatively close to the target. Therefore, there is only a small reduction when the number of anchors is increased to 100. For low ranging residual noise, average error is reduced from 0.4 m for 25 anchors to 0.2 m with 49 anchors and to 0.15 m with 100 anchors. 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 σ=0.7 Na=25 σ=0.7 Na=49 σ=0.7 Na=100 3 4 5 6 7 8 9 10 Number of anchors for location Average error (m) Figure 52: Position estimation error for different total number of anchors with trilateration and σ n=0.7m 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 σ=0.3 Na=25 σ=0.3 Na=49 σ=0.3 Na=100 1 2 3 4 5 6 7 8 Number of anchors for location Figure 53: Position estimation error for different total number of anchors with trilateration and σ n=0.3m Page 72 EUWB Initial development of dissemination methods and evaluation D4.2.1 Average error (m) Figure 54 and Figure 55 show the position estimation error for the Kalman filter with high and low ranging residual noise respectively. As it was stated in the previous subsection, the more anchors are used, the more information is available, but more distant anchors are picked, which have a higher ranging error due to ranging bias. This results in an optimal number of anchors which minimizes the position estimation error. For high residual noise, minimum average error is reduced from 0.64 m for 25 anchors to 0.48 m for 49 anchors and to 0.35 m for 100 anchors. As the distance between the anchors is reduced, the optimal number of anchors used for position calculation increases, from 4 for 25 anchors to 6 for 49 anchors and 10 for 100 anchors. When the ranging residual noise is low, the estimated distances are much more accurate and the Kalman filter performance is similar to trilateration, with an average error of 0.36 m for 25 anchors, 0.19 m for 49 anchors and 0.15 m for 100 anchors. Also, as the residual noise is reduced, the ranging bias becomes more important and the optimal number of anchors is reduced to 3 for 25 anchors, 4 for 49 anchors and 6 for 100 anchors. 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 σ=0.7 Na=25 σ=0.7 Na=49 σ=0.7 Na=100 3 4 5 6 7 8 9 10 Number of anchors for location Average error (m) Figure 54: Position estimation error for different total number of anchors with Kalman filter and σ n=0.7m 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 σ=0.3 Na=25 σ=0.3 Na=49 σ=0.3 Na=100 1 2 3 4 5 6 7 8 Number of anchors for location Figure 55: Position estimation error for different total number of anchors with Kalman filter and σ n=0.3m Page 73 EUWB Initial development of dissemination methods and evaluation D4.2.1 Error variance (m2) Figure 56 and Figure 57 show the variance of the position estimation error depending on the number of anchors for the trilateration algorithm with high and low ranging residual noise respectively. In both cases, increasing the number of anchors from 25 to 49 entails an important reduction in variance, as all the anchors involved in the position calculation will be relatively close to the target, minimizing the effect of the ranging bias. Nevertheless, no further reduction is reached when the number of anchors is increased to 100, as the ranging bias for more than 49 anchors is negligible and the variance is mostly due to the ranging residual error. Concerning the ranging residual noise, results for 25 anchors are similar as the error is mostly due to ranging bias, but for 49 and 100 anchors the errors is mostly due to the ranging residual noise, so a further reduction is reached when the ranging residual noise is low. Similar results are obtained for the Kalman filter, with the difference that for 25 anchors the error variance is lower for the Kalman filter as it uses the previous position information, thus reducing the variability. 3 2,7 2,4 2,1 1,8 1,5 1,2 0,9 0,6 0,3 0 σ=0.7 Na=25 σ=0.7 Na=49 σ=0.7 Na=100 3 4 5 6 7 8 9 10 Number of anchors for location Figure 56: Position estimation error variance for different total number of anchors with trilateration and σ n=0.7m Page 74 Initial development of dissemination methods and evaluation Error variance (m2) EUWB 3 2,7 2,4 2,1 1,8 1,5 1,2 0,9 0,6 0,3 0 D4.2.1 σ=0.3 Na=25 σ=0.3 Na=49 σ=0.3 Na=100 1 2 3 4 5 6 7 8 Number of anchors for location Figure 57: Position estimation error variance for different total number of anchors with trilateration and σ n=0.3m Number of slots per second and per target Finally, Figure 58 shows the amount of resources needed depending on the number of anchors used for location for each configuration. As it can be observed, for 100 anchors the number of timeslots needed increases linearly according to the number of anchors used for location, as the target is always in coverage of more than 10 anchors. For 49 anchors, the number of timeslots increases linearly for less than 8 anchors, with a smaller increase for more than 8 anchors. For 25 anchors, the increase is not linear as the target may not be in coverage of the selected number of anchors, eventually remaining constant for more than 7 anchors. 50 45 40 35 30 25 20 15 10 5 0 25 Anchors 49 Anchors 100 Anchors 3 4 5 6 7 8 9 10 Number of anchors for location Figure 58: Resources needed for location for different total number of anchors Reducing the distance between the anchors leads to an improvement in positioning accuracy, both in terms of average error and variance, although the number of anchors needed to cover the area and therefore the cost and complexity of the network increases. As the distance between the anchors is reduced, the target is in coverage of more anchors and the need of limiting the number of anchors to be used for location becomes more important in order to avoid an excessive use of resources. Page 75 EUWB Initial development of dissemination methods and evaluation D4.2.1 4.2.6 Effect of target mobility and position update rate Finally, another important parameter related with both the positioning error and the amount of resources needed for location is the position update rate, which defines how often the positions of the mobile nodes are updated. Position update rate is closely related to target mobility, as a higher target speed requires more frequent position updates in order to accurately track the target. In order to assess the effect of target mobility and position update rate, a set of simulations has been carried out. Architecture centralized in the network with 1 location controller, no acquisition and distribution enhancements, 10 meters between anchors and 4 anchors used for location have been considered. First, the effect of target mobility on the positioning error is analyzed. Target mobility is characterized by target speed and direction change rate. Two parameters are going to be used to measure the error. Position Estimation Error (PEE) measures the error in the position estimated by the algorithm on each update. Tracking Error (TE) measures the error in the position available at the mobile at every simulation step, not only when it is updated. This error is not only due to the error in the position estimation, but also to the movement of the mobile since the last position update. Average error (m) Figure 59 shows the position estimation error and the tracking error depending on the target speed. Time between updates, which is the inverse of the position update rate, has been set to 1 second. Concerning position estimation error, it is almost independent of the target speed for the trilateration algorithm, as the position calculation is independent on each update. On the other hand, the Kalman filter takes account of the previous position and can get a better accuracy as far as the target speed is low enough. The performance of the filter degrades as the target speed increases, but even for 3 m/s the position estimation error is lower than with the trilateration algorithm. Concerning the tracking error, it increases as the target speed increase, as the distance travelled by the target between each position update will be greater. 2,4 2,2 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 PEE Trilateration PEE Kalman TE Trilateration TE Kalman 0,3 0,6 0,9 1,2 1,5 1,8 2,1 2,4 2,7 3 Target speed (m/s) Figure 59: Position estimation error and tracking error depending on the target speed Concerning the direction change rate, as it can be observed in Figure 60 the error is independent on the time between direction changes and only for 2 seconds there is a slight increase of the error for the Kalman filter. Page 76 Initial development of dissemination methods and evaluation Average error (m) EUWB 2,4 2,2 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 D4.2.1 PEE Trilateration PEE Kalman TE Trilateration TE Kalman 2 4 6 8 10 12 14 16 18 20 Time between direction changes(s) Figure 60: Position estimation error and tracking error depending on the time between direction changes Average error (m) Figure 61 shows the position estimation error and the tracking error depending on the time between updates, considering a random target speed uniformly distributed between 0.1 m/s and 3 m/s, and 20 seconds between direction changes. Concerning the positioning error, the trilateration algorithm accuracy is independent of the position update rate, as the position calculation is independent on each update. On the other hand, the position estimation with the Kalman filter is based on the previous position, resulting in a higher accuracy when time between updates is less than 1.6 seconds, but it degrades as the time between updates increases. The tracking accuracy degrades as the time between updates increase in any case, as the distance travelled by the target between each position update will be greater. This degradation is more important for the Kalman filter, as the degradation in the position estimation is added. 2,4 2,2 2 1,8 1,6 1,4 1,2 1 0,8 0,6 0,4 0,2 0 PEE Trilateration PEE Kalman TE Trilateration TE Kalman 0,2 0,4 0,6 0,8 1 1,2 1,4 1,6 1,8 2 Time between updates (s) Figure 61: Position estimation error and tracking error depending on the time between updates Finally, the impact of position update rate on the amount of resources needed for location has been measured. As it can be observed in Figure 62, the amount of time slots needed for location is inversely proportional to the time between updates. Therefore, the position update rate is limited by the availability of resources for location. Page 77 EUWB Initial development of dissemination methods and evaluation Number of slots per second and per target 110 100 90 80 70 60 50 40 30 20 10 0 D4.2.1 RRq RRp DP-MR DP-PU Total 0,2 0,4 0,6 0,8 1 1,2 1,4 1,6 1,8 2 Time between updates (s) Figure 62: Resources needed for location depending on the time between updates As it can be observed, there is no optimal value for position update rate, as there is a trade-off between tracking error and the amount of resources used for location. Position update rate must be selected according to the required tracking accuracy and the dynamic model of the targets. For tracking people at walking pace, 1 position update per second is a suitable value in order to keep the tracking error around 1 meter with a reasonable use of resources. Page 78 EUWB Initial development of dissemination methods and evaluation D4.2.1 5 Network Impact for Localization 5.1 Quantity of Information 5.1.1 System Environment An important goal of the EUWB project is the deployment of advanced localization and tracking (LT) schemes. LT solutions have become a major asset for UWB applications [1], applicable to virtually all industrial sectors, to those considered in the framework of EUWB. Owing to its vast bandwidth, UWB-RT (ultra-wideband radio technology) enables a high resolution of space surrounding UWB transceivers. This feature makes UWB-RT particularly attractive for LBS services in a small scale environment, typically found in indoor or in-cabin scenarios. For instance, LT can be used to identify whether a particular seat in an airplane has been occupied. In an automotive environment, the localization of a wireless key, inside or outside a car and its distance from the car, could be estimated. Figure 63: Localization and tracking (LT) of a tag inside the car [38] Figure 63 [38] illustrates a possible scenario for the latter case. Four fixed mounted UWB access points (APs) are deployed to receive the UWB signals transmitted by a movable UWB tag. The received UWB signals form the basis for the location estimation and the tracking of the tag. The necessary signal processing will be done by a controller which could be included in one of the fixed mounted APs. The environment in which LT schemes shall be applied can be considered an in-house scenario. In such an environment, a number of mobile devices (MDs) shall be localized and their position shall be tracked. The LT scheme is based on a fixed mounted infrastructure, which relies on a network of Page 79 EUWB Initial development of dissemination methods and evaluation D4.2.1 access points (APs). MDs and APs are nodes of the network. It shall be mentioned that because of reflections and scatterings, the radio channel is a fading multipath channel that can exhibit both LOS (line-of-sight) as well as NLOS (non-line-of-sight) conditions. The description of the in-house scenario gives a guideline to the development of LT scheme. To facilitate a convenient LT application, the required signal and data processing shall consume as little power as possible and it shall be realized with a least possible computational complexity. In addition, the LT scheme shall be applicable to already existing UWB-RT devices without modifications of their hardware. In summary, the following requirements are considered essential: • Scalability of the network up to 500 nodes. • Low mobility with MD speed below 4m/s. • Multi-hops in the network. • High localization accuracy in the order of 0.5 m or less in at least 50% of all cases. • Anchor-based localization (ABL) or anchor-free localization (AFL). • Robust against NLOS conditions and noise. • Low computational effort. In the opinion of the authors, scalability must be considered as a most important factor in the system, because it has a great impact on the accuracy and the flexibility of the LT scheme. 5.1.2 Network Architecture The applied LT scheme depends on the network architecture. Both, centralized and decentralized networks can be assumed [39]. In the case of the home environment a decentralized approach seems more attractive whereas in public and private transport, a centralized approach is preferred. In this manuscript we will hence consider a centralized network. Figure 64 [39] shows a generalized sketch of a centralized network. The network consists of a server, shown on the left hand side of Figure 64, six APs, shown at the top and at the bottom of Figure 64, and of three movable tags, i.e. three MDs, shown in the center of Figure 64. The server and the six APs are connected to each other e.g. by wire or in a wireless fashion. The tags are assumed to be wireless. The task of the LT application in the network is to localize and track the positions of the tags. In order to facilitate accurate position estimation, a tailored PHY (physical layer) and MAC (medium access control) is desirable. It has been well-known that there are various LT procedures candidates, cf. [39] and the references listed therein. We can distinguish between • iterative and non-iterative schemes, • LT in distributed architectures, and • recursive processing. With respect to a simple and low-cost variant, however, a single shot scheme for PHY processing, exploiting either the time of arrival (TOA) or the time difference of arrival (TDOA) is preferred. After thorough evaluation in the FP6 PULSERS Phase II project [39], a TOA based PHY and MAC scheme was proposed. According to [39], channel estimation and the exploitation of the channel estimation results are required. Page 80 EUWB Initial development of dissemination methods and evaluation D4.2.1 UWB devices which do not fully comply with the procedures defined in [39] are initially not capable of providing LT information. In order to alleviate this threat, a simple and low-cost LT application, which does not require modifications of the PHY and the MAC, is needed. In this manuscript, the authors will propose a novel LT application which can be implemented in the aforementioned scenarios. Figure 64: LT in a centralized network architecture [39] The centralized network can also be arranged in a hierarchical manner. This can be seen in Figure 65. The server is the network master. It controls the subservers. In the case of Figure 65, two subservers exist. Each subserver handles the traffic by a number of APs, AP1, AP2, ..., AP#n. Figure 65: Hierarchy in a centralized network architecture In general, the APs are responsible for the sensing of the tags within their ranging scope, and then the APs can evaluate the distance between themselves and tags. Finally, the measured data will be transferred to the central server, which plays a role in computing the coordinates of tags according to the data, which are collected from each AP. Because the real-time tracking function needs to be realized, the time needed to acquire the information should be reduced. It assumes that there is only ranging between anchors and tags. Page 81 EUWB Initial development of dissemination methods and evaluation D4.2.1 5.1.3 LT MAC Function [39] In this section, the MAC layer of the LT scheme shall be illustrated. We will assume that TDMA (time division multiple access) is used on the MAC layer. Hence, the server considered as the network coordinator or master has to allocate one time slot for each node. Figure 66: Typical super frame structure with three time slots in the ranging period [39] The time slot architecture is shown in Figure 66. Each super frame consists of sixteen time slots of equal duration, Tslot . The first time slot is a beacon slot. Then, there are two CAP (contention access period) time slots. The following eight time slots are CFP (contention free period) time slots. Finally, there are three ranging period time slots. Following the super frame, there can be an inactive period (IP) which completes the beacon interval. Then, the next super frame starts. The CFP is used for data frames, ranging frames, and other command frames. In such system, we consider the ranging frames as data frames. In this section, we shall concentrate on ranging frames. Each ranging frame has the data format as shown in Figure 67 [39]. It is assumed to be 64 bytes long. Figure 67: Data format of a ranging frame [39] The Frame Control field includes the “100” ranging type, no ACK request and both source and destination addresses in short format mode; FC=0x8804.The Ranging Sequence Number is generated by the initiator, and reused by the destination nodes as their response and drift answers. Address Info should include the correct source and destination address. The first timer value is the fine one, which occupies the four LSB bits of the two bytes. The second timer value is the coarse one, which occupies unsigned 32 bits. The request, response and drift ranging frame should contain the time stamp or processing delay. Page 82 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 68: Time slot allocation for the synchronization of the fixed mounted infrastructure The time slot allocation for the synchronization of the fixed mounted infrastructure is shown in Figure 68. It comprises four messages, namely, • a ranging request message, • a ranging response message, • a TX delay message and • a synchronization message. The corresponding MAC procedure will be illustrated in section 5.1.4.2. 5.1.4 LT Application 5.1.4.1 Introduction In this section, a low-cost LT application which will be used in the UWB open technology platforms shall be presented. As already pointed out in [38], a cross-layer functionality is needed to accomplish LT. The required communications protocol, which will be illustrated in what follows, comprises three steps, namely, • the synchronization of the fixed mounted infrastructure (Step I), • the localization of a mobile device (Step II) and • the triangulation and mapping (Step III). The LT procedure will be briefly illustrated assuming the deployment of two fixed mounted access points AP1 and AP2 and a mobile device (MD). Figure 69 shows the schematic set-up. The AP1 also acts as the master also containing the aforementioned controller whereas the AP2 and potentially further APs will serve as slaves. Also, the MD is considered as a slave device. The distance between the AP1 and the AP2 is denoted by d 0 , d1 is the distance between the AP1 and the MD, whereas d 2 is the distance between the AP2 and the MD. The angle included between the segments (AP2, AP1) and (AP2, MD) is termed α , β is the angle included between the segments (AP1, AP2) and (AP1, MD), and γ is the angle included between the segments (MD, AP1) and (MD, AP2). All these six quantities shall be determined. Page 83 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 69: Generic localization tracking set-up [38] 5.1.4.2 Step I: Synchronization of the Fixed Mounted Infrastructure It has been known that synchronized cellular networks provide many benefits, e.g. an increased spectral efficiency, a dynamic traffic balancing, an easy handover procedure and a simple localization of mobile devices, all at a protocol effort lower than in non-synchronized cellular environments. A first solution to synchronization of adjacent cells in mobile radio was introduced in the C 450 network deployed e.g. in Germany [40]. This concept was however not followed in GSM (Global System for Mobile Communications) [41] but re-introduced as an option in UMTS (Universal Mobile Telecommunications System). Synchronization in small scale networks which occur in environments exploiting UWB-RT hence seems a feasibly approach. Therefore, the first step, Step I, takes care of the synchronization of the network. In what follows we will mainly concentrate on the MAC scheme. Let us assume that the MAC is time slot based, i.e. using a TDMA (time division multiple access) scheme. Each slot is considered to have the same duration, Tslot . Furthermore, we will consider AP1 as the master. We will assume that all APs have the same Tslot , however, that the start and, consequently, the end times of the time slots are not aligned at the beginning of the procedure. Figure 70 illustrates the procedure which shall be described in what follows. Page 84 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 70: Synchronization of the fixed mounted infrastructure [38] In order to synchronize the fixed mounted infrastructure, AP1 transmits a ranging request to all further APs, in our simple example to AP2. The ranging request message contains the particular time instant, t0 , at which it was initiated in the LT application. The ranging request message contains the sequence number, the source address and destination address as well as the time instant t0 . We assume that t0 is the beginning of a time slot. The transmitter of AP1 will require a given processing time prior to the ranging request can be transmitted. This signal processing delay shall be denoted by δ TX,AP1 , the actual time of transmission is hence tTX,AP1 = t0 + δ TX,AP1 . (5.1) It shall be noted that AP1 measures this delay δ TX,AP1 . The ranging request message requires the travel time d 0 c to arrive at the antenna of AP2. Hence, the time of reception is given by tRX,AP2 = t0 + δ TX,AP1 + d0 . c (5.2) AP2 then extracts the sequence number, the source address and destination address from the received ranging request message and checks them. Furthermore, it extracts the message content t0 . The AP2 initiates a ranging response message at time t1 , the beginning of a time slot following the reception of the ranging request message. In addition to the sequence number and the source and the Page 85 EUWB Initial development of dissemination methods and evaluation D4.2.1 destination addresses, the ranging response message shall contain tRX,AP2 and the time X that elapsed between tRX,AP2 and t1 . The transmitter of AP2 will also require a given processing time prior to the ranging request can be transmitted. This signal processing delay shall be denoted by δ TX,AP2 , the actual time of transmission is hence tTX,AP2 = t1 + δ TX,AP2 = t0 + d0 + X + δ TX,AP1 + δ TX,AP2 . c (5.3) It shall be noted that AP2 measures δ TX,AP2 . AP1 receives this ranging response message at tRX,AP1 = t0 + 2 d0 + X + δ TX,AP1 + δ TX,AP2 c (5.4) and decodes it. Except for δ TX,AP2 and d 0 , all terms in (5.4) are known to AP1. In the time slot following the transmission of the ranging response message, AP2 transmits a TX delay message containing the sequence number, the source and the destination addresses and δ TX,AP2 . This message is received at tRX,AP1,2 = t0 + 2 d0 + X + δ TX,AP1 + δ TX,AP2 + Tslot c (5.5) by AP1. After its decoding, AP1 computes c d 0 = ( tRX,AP1 − t0 − X − δ TX,AP1 − δ TX,AP2 ) . 2 (5.6) Next, AP1 transmits the synchronization message containing d 0 , t3 and δ TX,AP1 . After receiving this message, AP2 can completely synchronize its TDMA frame timing. It is conceivable, that AP2 acknowledges the synchronization to AP1 after completion. After the synchronization of the fixed mounted infrastructure has been established, the synchronization of the mobile device MD should be established. This can be done in the same way as described for the case of AP2. 5.1.4.3 Step II: Localization of a Mobile Device After the synchronization of the fixed mounted infrastructure and of the MD have been established, the second step, Step II, can start. In order to improve the readability, the measurement and correction of processing delays at the transmitters and the receivers shall be neglected. Step II contains six activities: 1. The AP1 transmits the message containing the time instant T0 at the time instant T0 , . 2. The MD receives this message at the time instant T1 = T0 + d1 c . (5.7) 3. The AP2 then transmits the message containing the time difference Tslot at the time instant (T0 + Tslot ) . Page 86 EUWB Initial development of dissemination methods and evaluation D4.2.1 4. The MD receives this message at the time instant T2 = T0 + Tslot + d 2 c . (5.8) 5. The MD then computes d1 = c (T1 − T0 ) , d 2 = c (T2 − T0 − Tslot ). (5.9) 6. Finally, the MD transmits a message containing the distance values d1 and d 2 to the AP1. 5.1.4.4 Step III: Triangulation and Mapping In the last step, Step III, the AP1 computes the angles α , β and γ . This is accomplished by applying the following identities 2 2 2 ⎪⎧ ( d 0 ) + ( d 2 ) − ( d1 ) ⎪⎫ α = arccos ⎨ ⎬, 2d 0 d 2 ⎩⎪ ⎭⎪ (5.10) ⎧⎪ ( d 0 )2 + ( d1 ) 2 − ( d 2 ) 2 ⎫⎪ β = arccos ⎨ ⎬ 2 d 0 d1 ⎩⎪ ⎭⎪ (5.11) γ = π −α − β . (5.12) and After completion of Step II and Step III, the location of MD can be computed by AP1 and can be conveyed to the other UWB-RT devices if required. It shall be mentioned that this illustration is given to explain the principle of the LT procedure, being well aware of the fact of the 180 degree ambiguity of the result. This ambiguity can be overcome by adding further fixed mounted APs. 5.1.4.5 Quantity of Information Without Packet Loss The quantity of information is the total amount information during the localization process. There are mainly two types of ranging frames, • ranging frames for synchronisation and • ranging frames for location tracking In an ideal world, there is no packet loss during the transmission. In such a situation, the ranging frames are transmitted only once. The synchronisation procedure for AP2 needs four slots. From Figure 67, we can find that “Ranging Sequence Number”, “Address Info”, “Time Value (fine)” and “Time Value (coarse)” should be used. Therefore, for AP2, we can get the quantity of information: I AP2,syn = 64 ⋅ 4 = 256 bytes . (5.13) Let us assume that there are M APs in our system. We can get the quantity of total information for synchronisation: I total,syn = (M − 1) ⋅ I AP2,syn . (5.14) Page 87 EUWB Initial development of dissemination methods and evaluation D4.2.1 Because the LT-tracking procedure for each MD needs 11 slots, we can get I md1,LT = 11⋅ 64 = 704 bytes . (5.15) Let us now assume that there are N MDs in our ranging area. Hence, we can get I LT,total = 704 N bytes . 5.1.4.6 (5.16) Quantity of Information with Packet Loss Retransmissions are required in the case of lost packets. The synchronization for one AP needs four time slots to realize the reliable communication. If AP1 cannot receive the response ranging frame or the drift ranging frame within the second or third time slot, the communication should be considered to be unsuccessful, then the retransmission should be done in the next super frame. AP2 should send AP1 another ranging frame to tell AP1 that it has been synchronized. It assumes that the probability of request ranging drop is Preq , the probability of response ranging drop is Presp , the probability of drift ranging drop is Pdrift , the probability of synchronisation ranging is Psyn and the probability of acknowledgement ranging is Pack . We can get the probability of retransmission Pdrop = 1 − (1 − Preq )(1 − Presp ) (1 − Pdrift ) (1 − Psyn ) (1 − Pack ) . (5.17) We assume that channel coding is used in the retransmission and the code rate is Rcode . We can get the quantity of information for synchronization: I AP2,syn,pd = 4 ⋅ 64 + 4 Pdrop P ⎞ ⎛ 64 = 256 ⎜ 1 + drop ⎟ bytes . Rcode ⎝ Rcode ⎠ (5.18) If there are M APs in our system, we can get the quantity of total information: P ⎞ ⎛ I total,syn = (M − 1)* I AP2,syn,pd = 256 ( M − 1) ⎜ 1 + drop ⎟ bytes . ⎝ Rcode ⎠ (5.19) It requires 11 time slots for LT. We can get P ⎞ ⎛ P ⎞ ⎛ P ⎞ ⎛ I LT,total = 3⎜ 3 ⋅ 64 + 3 ⋅ 64 ⋅ drop1 ⎟ + ⎜ 64 + 64 ⋅ drop2 ⎟ + ⎜ 64 + 64 ⋅ drop3 ⎟ . Rcode ⎠ ⎝ Rcode ⎠ ⎝ Rcode ⎠ ⎝ 5.1.4.7 (5.20) Simulation results We give the simulation results of the estimation. The channel uncertainty needs not to be taken into account because it does not affect the accuracy of estimation, only cause more packet retransmission. We set a random number a with the normal Gaussian distribution. Page 88 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 71: Estimated position of tag with the process delay 10−9 ⋅ a Figure 72: Cumulative Density Function (CDF) of the estimation error with the process Delay: 10−9 ⋅ a Page 89 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 71 depicts the estimation results, where AP1, AP2, AP3 and AP4 locate at the four corner with the distance of 2m to each other. We assume that the process delay is 10−9 ⋅ a . Figure 72 shows cumulative density function of the estimation error. As can be seen from Figure 72, the probability of estimation error less than 0.1m exceeds 60% and the probability of estimation error less than 0.15m exceeds 80%. Figure 73 depicts the estimation results with the process delay: 2.5 ⋅10−9 ⋅ a . Figure 74 shows cumulative density function of the estimation error. As can be seen from Figure 74, the estimation becomes more inaccurate due to the larger process delay than that in Figure 71, the probability of estimation error less than 0.2m just reaches 60% and the probability of estimation error less than 0.3m locates between 80% and 90%. Figure 73: Estimated position of tag with the process delay 2.5 ⋅10−9 ⋅ a Page 90 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 74: Cumulative Density Function (CDF) of the estimation error with the process Delay: 2.5 ⋅10−9 ⋅ a Figure 75: Estimated position of tag with the process delay 5 ⋅10−9 ⋅ a Page 91 EUWB Initial development of dissemination methods and evaluation D4.2.1 Figure 75 depicts estimation results with the process delay: 5 ⋅10−9 ⋅ a . Figure 76 shows the corresponding cumulative density function of the estimation, where the probability of estimation error less than 0.5m just exceeds 60% and the probability of estimation error less than 0.8m just reach 90%. The estimation becomes more inaccuracy than those in Figure 73 and Figure 75 due to the larger process delay. Figure 76: Cumulative Density Function (CDF) of the estimation error with the process Delay: 5 ⋅10−9 ⋅ a Page 92 EUWB Initial development of dissemination methods and evaluation D4.2.1 6 Conclusions The deliverable mainly considers location aware information dissemination and acquisition in UWB based networks, where localization and routing strategy and information exchange were mainly introduced. A cross-layer algorithm for geographic routing in infrastructureless networks is introduced. This solution is robust to topological holes and is resilient to topological variations due to network dynamics (node duty cycle). The solution combines ideas of network tessellation with simple greedy forwarding, without suffering from the problems afflicting typical landmark-based alternatives. We tessellate the network based on connectivity information and then define virtual landmarks to identify them. In addition to not requiring landmarks to be known a priori, a major advantage of the proposed tessellation approach is that the clusters are composed by groups of nodes that are highly interconnected. Problems of routing discovery and maintenance in ad hoc networks were also introduced. The underlying concept is to exploit the availability of cooperative communications in relaying networks so as to benefit from spatial diversity gains. It was shown that cluster sizes may affect the resulting PDSR to APDL. In other words, cluster sizes can be varied so as to allow for different trade-offs between PDSR to APDL to be reached. It was also found, however, via extensive simulations, that the dependence of the overall technique on the cluster sizes is not as strong as the dependence of landmark-based routing mechanisms on the location of selected landmarks. Alternatively, we may say that while there is room for further improvement via cluster size optimization, the proposed technique is less sensitive to a bad choice of cluster size than landmark methods are on the location of landmarks. The simulations campaign has confirmed that the technique can substantially improve the PDSR in networks with large concave holes, with no or little impact on APDL, even if the simple greedy forwarding mechanism is employed. There is, however, no reason not to employ more sophisticated mechanisms combined with the clusterization idea. It has been assumed that network discovery has been already performed and that the network is in a steadystate regime of operation, when the routing protocol itself starts to operate. The network discovery has not been explicitly addressed in the research activities, though it is still an open issue and it is considered to further investigations. We implement a novel resource allocation strategy for distributed IR-UWB networks that arise from the fact that, in contrast to what happen in narrowband networks, bandwidth is no longer the limiting resource but the number of pulses per second, i.e. the cumulative pulse load. The DLC enables concurrent transmissions at full power, while allows each source to independently adapt its error coding rate, and its pulse rate (the number of transmitted pulses per second) to the current channel and interference conditions. Thus, our strategy combines adaptive channel coding (ACC) with pulse rate control (PRC) in a joint link adaptation function, which is denoted hereafter as the Link Parameter Control (LPC) function. Our distributed mechanism makes use of the framework of game theory to develop a novel interference management strategy based on the joint combination of adaptive error coding and pulse rate control. A game has been formulated and a distributed, asynchronous algorithm (LPC) has been proposed to discover the optimal PRF/PL network allocation under several channel and interference conditions. It has been observed that, due to the strong coupling concerning interference management between PL and PRF adaptation, the game has several feasible steady-state allocations (Nash equilibria). In Page 93 EUWB Initial development of dissemination methods and evaluation D4.2.1 general, the different equilibria provide similar aggregated network throughput. Results suggest that, in order to maximize the cumulative network throughput, it is better that each link starts with the lowest PL. It can be concluded that the joint use of PRC and ACC is an appropriate means to mitigate impulsive interference in autonomous IR-UWB. Finally we evaluated the application of simultaneous data transmission and localization UWB networks for tracking mobile access networks users in indoors environments. Different architectures and acquisition and distribution schemes for tracking have been analysed and assessed through simulation. The impact of other parameters such as the number of anchors used for location, the distance between anchors, target mobility and position update rate have been also evaluated. Simulation results proved the feasibility of this application scenario, but also showed a limitation in the number of targets that can be tracked simultaneously in a piconet due to resources limitation. Therefore we have analysed the quantity of information and total traffic load which is consumed in localization and tracking system. The enhanced schemes for the acquisition and distribution of location information and the limitation of the number of anchors used for localization, taking advance of available location information to pick the closest anchors, are proposed solutions in order to reduce the amount of resources consumed for localization, and further research will be carried out in this direction. Analysis and simulation showed that our novel contention-based geographic forwarding strategies in multi-hop scenarios as well as routing discovery and maintenance strategies, game theory based resources allocation schemes, and location and tracking algorithm functions well. The location aware information dissemination and acquisition prototype was basically outlined. The future task is to combine all the work together and streamline the combination. Page 94 EUWB Initial development of dissemination methods and evaluation D4.2.1 References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] R. Pabst, B. Walke, D. Schultz, P. Herhold, H. Yanikomeroglu, S. Mukherjee, H. Viswanathan, M. Lott, W. Zirwas, M. Dohler, H. Aghvami, D. Falconer, and G. Fettweis, “Relay-based deployment concepts for wireless and mobile broadband radio,” IEEE Communications Magazine, vol. 42, no. 9, pp. 80–89, September 2004. J.-W. Lee, A. Tang, J. Huang, M. Chiang, and A. R. Calderbank, “Reverse-engineering MAC: A non-cooperative game model,” IEEE Journal on Selected Areas in Communications, vol. 25, no. 6, pp. 1135–1147, August 2007. P. Casari, A. Marcucci, M. Nati, C. Petrioli, and M. Zorzi, “A detailed simulation study of geographic random forwarding (GeRaF) in wireless sensor networks,” in IEEE Military Communications Conference, vol. 1, October 2005, pp. 59–68. D. Chen, J. Deng, and P. K. Varshney, “On the forwarding area of contention-based geographic forwarding for ad hoc and sensor networks,” in Second Annual IEEE Sensor and Ad Hoc Communications and Networks, 2005, September 2005, pp. 130–141. F. Davoli, S. Palazzo, and S. Zappatore, Distributed Cooperative Laboratories: Networking, Instrumentation and Measurements. Springer, 2006. C. H. M. de Lima and G. T. F. de Abreu, “Game-theoretical relay selection strategy for geographic routing in multi-hop WSNs,” in 5th Workshop on Positioning, Navigation and Communication 2008 (WPNC’08), Leibniz University of Hannover, Germany, March 27 2008. D. Chen, J. Deng, and P. K. Varshney, “Selection of a forwarding area for contention-based geographic forwarding in wireless multi-hop networks,” IEEE Transactions on Vehicular Technology, vol. 56, no. 5, pp. 3111–3122, September 2007. A. Baddeley, I. Bárány, R. Schneider, and W. Weil, Stochastic Geometry, 1st ed. Springer, November 2006. S. Srinivasa and M. Haenggi, “Distance distributions in finite uniformly random networks: theory and applications,” IEEE Transactions on Vehicular Technology, 2008, submitted. P. Mathys and P. Flajolet, “Q-ary collision resolution algorithms in random-access systems with free or blocked channel access,” IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 217–243, March 1985. J. Abate and W. Whitt, “Numerical inversion of probability generating functions,” Operations Research Letters, vol. 12, pp. 245–251, 1992. G. Fayolle, P. Flajolet, M. Hofri, and P. Jacquet, “Analysis of a stack algorithm for random multiple-access communication,” IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 244–254, March 1985. S. Biswas and Y. Narahari, “Iterative dutch combinatorial auctions,” Annals of Mathematics and Artificial Intelligence, vol. 44, no. 3, pp. 185–205, 2005. P. Casari, M. Nati, C. Petrioli, and M. Zorzi, “Efficient non-planar routing around dead ends in sparse topologies using random forwarding,” in IEEE International Conference on Communications, 2007, 24–28 June 2007, pp. 3122–3129. C. H. M. de Lima and G. T. F. de Abreu, “Clusterization for robust geographic routing in wireless sensor networks,” in Wireless Communications & Networking Conference (WCNC), Las Vegas, Nevada, USA, 31 March–3 April 2008. Bruno Selva, Ana Sierra, Amir Krause and Juan Chóliz, “Definition of application scenarios and definition of requirements”, D 6.1.1 version 1.0, July 2008, EUWB Project. Elizabeth M. Royer and Chai-Keong Toh, “A review of current routing protocols for ad hoc mobile wireless networks”, IEEE Personal Communications, April 1999. Page 95 EUWB Initial development of dissemination methods and evaluation D4.2.1 [18] Ivan Stojmenovic, Amiya Nayak and Johnson Kuruvila, “Design guidelines for routing protocols in ad hoc and sensor networks with realistic physical layer”, IEEE Communications Magazine, March 2005. [19] J. N. Al-Karaki and A. E. Kamal, “Routing techniques in wireless sensor networks: a survey,” IEEE Wireless Communications, vol. 11, no. 6, pp. 6–28, December 2004, see also IEEE Personal Communications. [20] S. Waharte, R. Boutaba, Y. Iraqi, and B. Ishibashi, “Routing protocols in wireless mesh networks: challenges and design considerations,” Multimedia Tools Appl., vol. 29, no. 3, pp. 285–303, 2006. [21] A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, and I. Stoica, “Geographic routing without location information,” in ACM MobiCom Conference, September 2003, pp. 96–108. [22] B. Karp and H. T. Kung, “Greedy perimeter stateless routing for wireless networks,” in Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000. MobiCom 2000, August 2000, pp. 243–254. [23] G. Destino, D. Macagnano, and G. Abreu, “A clusterized WLS localization algorithm for large scale WSNs,” in 4th Workshop on Positioning, Navigation and Communication - WPNC’07, March 2007, pp. 261–265. [24] O. Krishnadev, K. Brinda, and S. Vishveshwara, “A graph spectral analysis of the structural similarity network of protein chains,” PROTEINS: Structure, Function, and Bioinformatics, vol. 61, pp. 152–163, 2005. [25] A. Jadbabaie, “On geographic routing without location information,” in 43rd IEEE Conference on Decision and Control, vol. 5, December 2004, pp. 4764–4769. [26] Q. Fang, J. Gao, L. J. Guibas, V. de Silva, and L. Zhang, “GLIDER: Gradient Landmark-Based Distributed Routing for sensor networks,” in 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005. INFOCOM 2005, vol. 1, March 2005, pp. 339– 350. [27] G. Destino and G. Abreu, “Sensor localization from WLS optimization with closed-form gradient and Hessian,” in IEEE Global Conference on Telecommunications - Wireless Communications & Networking Symposium (Globecom 2006), San Francisco, USA, November 27th - December 1st 2006. [28] A. Sierra, J. Chóliz, I. Bucaille, A. Villanúa, A. Hernández, I. Alastruey, “UWB in Heterogeneous Access Networks”, IEEE ICUWB’08, Hanover, Sept. 2008. [29] IEEE 802.15.4 standard, “Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)” [30] “LDR-LT platform requirements, feasibility analysis and specification” D7.1.1a final version, September 2008, EUWB (IST FP7-215669), public deliverable. [31] D. Macagnano, G. Destino, F. Esposito, and G. T. F. de Abreu, “MAC Performances for Localization and Tracking in Wireless Sensor Networks”, In Proc. WPNC’07, Hannover. [32] F. Daum, ‘’Nonlinear filters: beyond the Kalman filter’’, IEEE Aerospace and Electronic Systems Mag., vol. 20, no. 8, pp. 57-69, Aug. 2005. [33] D. Macagnano and G. T. F. de Abreu, “Tracking Multiple Targets with Multidimensional Scaling,” in Wireless Personal Multimedia Communications, Sep. 2006 [34] “Enhanced LT system- PHY, MAC and Network layers (final)” D3a-2.3 final version, June 2008, PULSERS Phase II (IST FP6-027142), public deliverable. [35] B. Denis and N. Daniele, “NLOS Ranging Error Mitigation in a Distributed Positioning Algorithm for Indoor UWB Ad Hoc Networks”, in Proc. IEEE IWWAN’04,, pp. 356-360 Oulu, May-June 2004 Page 96 EUWB Initial development of dissemination methods and evaluation D4.2.1 [36] B. Denis, J.B. Pierrot and C. Abou-Rjeily, “Joint Distributed Time Synchronization and Positioning in UWB Ad Hoc Networks Using TOA”, IEEE Trans. on MTT, Special Issue on Ultra Wideband, Vol. 54, Is. 4, Part 2, pp. 1896-1911, April 2006. [37] S. Zeisberg, V. Schreiber: “EUWB - Coexisting short range radio by advanced ultra-wideband radiotechnology,” ICT-MobileSummit 2008 Conference Proceedings, Paul Cunningham and Miriam Cunningham (Eds), IIMC International Information Management Corporation, 2008, ISBN: 978-1-905824-08-3. [38] C. Kocks, E. Scheiber, A. Vießmann, D. Xu, S. Wang, G. H. Bruck, P. Jung: “ A low-cost protocol and application for UWB localization, exploiting cross-layer design and cognitive radio aspects,” Invited Paper at the Second International Workshop on Cognitive Radio & Advanced Spectrum Management (CogART 2009), May 18-19, 2009, Aalborg, Denmark. [39] -, “LT system – PHY, MAC and network layers,” D3a-2.1 final version, June 2006, PULSERS Phase II (IST FP6-027142), public deliverable. [40] K. Kammerlander: “Factors influencing the design of economical cellular radio networks,” Siemens Telecom Report, vol. 9 (1986), pp. 9-16. [41] M. Mouly, M. B. Pautet: “The GSM-system for mobile communications,” 1992. [42] G. Rahmatollahi, M.D. Perez Guirao, P. Nardelli, G. Abreu, “Aggregate Information Efficiency in IR-UWB ad hoc single-hop WSNs, WPNC 2009, Hannover, 2009. [43] M.D. Pérez Guirao, K. Jobmann, Cognitive resource access scheme for IR-UWB autonomous networks, , 4th Workshop on Positioning, Navigation and Communication 2007, Hannover, 2007 [44] M.D. Pérez Guirao, K. Jobmann, CA (UWB)-MAC: Cognitive Autonomous MAC for IR-UWB Networks, Second International Conference on Cognitive Radio Oriented Wireless Networks and Communications, CrownCom’07, 1-3 August 2007, Orlando, FO [45] G. Rahmatollahi, M.D. Perez Guirao, S. Galler, T. Kaiser, “Position Estimation in IR-UWB autonomous WSNs”, WPNC 2008, Hannover, 2008. [46] Weisenhorn, M. and Hirt W., “Uncoordinated rae division mutliple access scheme for pulsed UWB signals”, IEEE Trans. on Vehicular Technology, vol. 54, pp. 1646-1662, Sept. 2005 [47] Srivasta, V. et. al, “Using game theory to analyze wireless ad hoc networks”, IEEE Communications Survey & Tutorials, vol.7, no.4, pp 46-56, Fourth Quarter 2005. [48] J. Neel, "PhD Dissertation: Analysis and Design of Cognitive Radio Networks and Distributed Radio Resource Management Algorithms," in Faculty of the Virginia Polytechnic Institute and State University. Blacksburg, VA: Virginia Tech, 2006. [49] D. Fudenberg and J. Tirole, Game Theory: MIT Press, 1991. [50] PULSERS II D3b.2.1b, System Architecture. Acknowledgement The EUWB consortium would like to acknowledge the support of the European Commission partly funding the EUWB project under Grant Agreement FP7-ICT-215669. Page 97