Next Article in Journal
Real-Valued Covariance Vector Sparsity-Inducing DOA Estimation for Monostatic MIMO Radar
Previous Article in Journal
A Graphene-Based Biosensing Platform Based on Regulated Release of an Aptameric DNA Biosensor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Mine Locomotive Wireless Network Strategy Based on Successive Interference Cancellation

School of Computer and Information, Hefei University of Technology, Hefei 230009, China
*
Author to whom correspondence should be addressed.
Sensors 2015, 15(11), 28257-28270; https://doi.org/10.3390/s151128257
Submission received: 8 September 2015 / Revised: 24 October 2015 / Accepted: 4 November 2015 / Published: 9 November 2015
(This article belongs to the Section Sensor Networks)

Abstract

:
We consider a wireless network strategy based on successive interference cancellation (SIC) for mine locomotives. We firstly build the original mathematical model for the strategy which is a non-convex model. Then, we examine this model intensively, and figure out that there are certain regulations embedded in it. Based on these findings, we are able to reformulate the model into a new form and design a simple algorithm which can assign each locomotive with a proper transmitting scheme during the whole schedule procedure. Simulation results show that the outcomes obtained through this algorithm are improved by around 50% compared with those that do not apply the SIC technique.

1. Introduction

In the coal mining industry, the mine locomotive plays a very important role in the underground tunnel. When mine locomotives travel along tunnels, we may hope to acquire the real-time information about the underground environment and locomotives’ working data. For example, many researchers focus their attentions on monitoring systems of mine locomotives [1,2]. The goal of using this information to make locomotives work in a more safe and sound situation is, to a great extent, based on the communication quality between locomotives and the control center.
Since the underground tunnels are often in a severe environment, which makes the quality of communication fluctuate all the time, the current monitoring system of mine locomotive is still using the national railway signal concentrated blocking system [3]. However, the locomotives are traveling continuously in tunnels, which means if we want to use the collected data to achieve a better monitoring, we can only use the wireless communication between locomotives and access points (APs) equipped along the tunnels. Moreover, the data packets transferred may have image or video information encapsulated in them, which makes the data volume extremely large. Therefore, designing specific and efficient communication schemes for underground mine locomotives is greatly needed.
The mine locomotive wireless networks are definitely mobile, and the IEEE 802.11 are often applied as the communication protocol. For example, to the vehicular ad hoc networks (VANETs), the commercial communicating protocol is 802.11p [4]. However, the IEEE 802.11 standard is based on carrier-sense multiple access (CSMA) with collision avoidance (CA) [5], which may not be efficient in wireless networks. That is why some researchers focus on wireless mobile network schemes based on time-triggered architecture (TTA) [6]. For example, Sahoo et al. proposed a time-slot-based medium access protocol which they named CCC-MAC protocol [7]. The protocol can be used in VANETs, and simulations show it can be used well in different vehicular density scenarios. Yu and Biswas proposed a novel MAC protocol, which can self-configure TDMA protocol, self-organize the MAC layer, and can enhance vehicle safety for vehicle-to-vehicle communication [8].
In underground tunnels with a severe environment, it is more difficult for locomotives communicating with APs. The requirements of achieving a better communication quality and transmitting data fast present challenges to researchers. It is obvious that the network capacity will be improved if we use some powerful wireless communicating techniques, such as OFDM [9,10], CDMA [11,12], and so on. These techniques all share one common property, that is, they try to divide the intact channel into several orthogonal sub channels through which transmissions can be conducted simultaneously. Therefore, the total throughput of the channel can be improved, which has been proved by previous research [13,14,15]. Nevertheless, if several transmissions need to be done in the same sub channel at once, none of them may succeed due to the network congestion. Hence, corresponding solutions to this problem, known as interference avoidance techniques, came into reality. Moreover, in recent years, certain interference cancellation techniques are also well studied. Compared with interference avoidance techniques, interference cancellation techniques allow several transmitters transmit data through the same sub channel at the same time by canceling out the interference rather than scheduling them to complete their tasks according to certain measures. Among all interference cancellation techniques, the successive interference cancellation(SIC) [16,17] is widely used since it is easy to implement while being able to achieve good performance. For example,
Jiang et al. proposed an optimal cross-layer algorithm with SIC and showed it can increase the throughput of the whole network by 47% [18], Shi et al. proposed an optimal base station placement algorithm based on SIC and showed the algorithm can achieve about 25% improvement [19].
The realization of SIC is not simple but based on some conditions. When a receiver receives a mixed signal from several transmitters, it should be able to decode every transmitter’s signals from the mixed signal, and the signals should be decoded one by one, that is, the receiver firstly tries to decode the strongest signal from the mixed signal and remove it, then tries to decode the second strongest signal from the remaining mixed signal. This process will be repeated until all signals are decoded or the mixed signal can not be decoded any more. Because of the complexity of the process, using SIC in a wireless network will result in a high computational complexity, especially in the mobile wireless network where the transmitting nodes keep moving. Until very recently, seldom work has been done to design SIC-based optimal algorithm for mobile wireless networks.
In this paper, we design the mine locomotive wireless communicating scheme using SIC and which is based on TTA. We first give the problem model in Section 2. From the problem model we can see it is a non-convex problem and can not be solved directly. In Section 3 we introduce our strategy based on SIC. In this section, we also prove some theorems. According to these theorems, we are able to reshape our model into a new form. Simulations in Section 4 shows our strategy can make the network throughput improve by about 50%.

2. The Problem Model

A typical mine locomotive wireless network environment is shown in Figure 1. The access points (APs) will be equipped on the side of tunnels. They will collect information from locomotives and send them to the ground monitoring station by wire networks. Locomotives will travel in these tunnels and pass through these APs one by one. When a locomotive pass through a AP, it will transmit its data to the AP directly through wireless network. In this paper, we will only consider how the locomotive transmits its data to one AP. Since under the underground environment the security demand is high, we only consider the one-hop wireless network environment.
Figure 1. A typical mine locomotive wireless network environment.
Figure 1. A typical mine locomotive wireless network environment.
Sensors 15 28257 g001
Consider a mine locomotive wireless network environment with n locomotives and one AP in a straight tunnel as shown in Figure 2a. Denote N as the set of locomotives. Denote s i ( s i N ) as the i-th locomotive. Denote t ( t T ) as a time point in the whole scheduling time T. Denote d i ( t ) as the distance between s i and the AP at time t. Denote x i ( t ) as the coordinate of s i on the tunnel at time t. Denote d v as the vertical distance between AP and the tunnel. Denote R T the receiving radius of the AP. R T can also be considered as the maximum transmission power of each locomotive. In the next section, we will give the calculation method for it. Since in the real underground tunnel environment we have d v R T , we will suppose d v 0 and x i ( t ) = d i ( t ) . That is, we consider one-dimensional area and let the coordinate AP x A P = 0 , as shown in Figure 2b. Denote t s i and t s i as the start time and the end time when the s i enters the AP’s range and when it leaves. Then, we have | x i ( t s i ) | = x i ( t s i ) = R T . Denote v i ( t ) ( t s i t t s i ) as the speed of s i at time t. We have Equations (1) and (2).
x i ( k ) = R T + t s i k v i ( t ) d t ( s i N )
2 R T = t i t s i v i ( t ) d t ( s i N )
Figure 2. The straight underground tunnel model. (a) Original underground tunnel model; (b) One-dimensional underground tunnel model.
Figure 2. The straight underground tunnel model. (a) Original underground tunnel model; (b) One-dimensional underground tunnel model.
Sensors 15 28257 g002
We will use the SIC technique to optimize the whole network. By using SIC, the AP can receive several locomotives’ data simultaneously. However, to use SIC technique correctly, the AP should decode its receiving data sequentially. That is, it should decode these data from the strongest signal to the weakest signal one by one until all signals are decoded or one signal can not be decoded. So even using SIC, the AP may not receive from all locomotives at the same time. Define a one-zero variable
θ i ( t ) = 1 : if s i transmits data to the AP at time t 0 : otherwise
Denote g i ( t ) as the channel gain from s i to the AP at time t. Denote λ as the path loss index. We have
g i ( t ) = min { | x i ( t ) | λ , 1 } ( s i N , t s i t t s i )
Denote P i ( t ) as the transmission power of s i at time t. Denote P m a x and P m i n as the maximum and the minimum power the locomotive can have. We have P m i n P i ( t ) P m a x . Denote N 0 as the noise ratio. Denote σ i ( t ) as the signal-to-interference-plus-noise-ratio (SINR) of s i at time t under SIC. Then, it can be calculated as
σ i ( t ) = θ i ( t ) g i ( t ) P i ( t ) N 0 + g j ( t ) g i ( t ) θ j ( t ) g j ( t ) P j ( t ) ( s i , s j N )
Suppose all locomotives have the same minimum data transmission rate requirement and denote it as r. For each s i , the average data rate over all scheduling time should be no more than ( t s i t s i θ i ( t ) W log 2 ( 1 + σ i ( t ) ) d ( t ) ) / ( t s i t s i ) , where W is the channel bandwidth. We will maximize scaling factors K i such that each locomotive s i can transmit data to the AP with rate K i r . Among the whole scheduling time, the AP can receive data from locomotives as much as possible. Then, we have the following problem.
max s i N K i r s . t . g i ( t ) = min { | x i ( t ) | λ , 1 } ( s i N , t s i t t s i ) σ i ( t ) = θ i ( t ) g i ( t ) P i ( t ) N 0 + g j ( t ) g i ( t ) θ j ( t ) g j ( t ) P j ( t ) β ( s i , s j N , t T ) K i r i t s i t s i θ i ( t ) W log 2 ( 1 + σ i ( t ) ) d ( t ) t s i t s i ( s i , s j N , t T ) g i ( t ) , σ i ( t ) , K i 0 , θ i ( t ) { 0 , 1 } ( s i N , t T )
where x i ( t ) , g i ( t ) , θ i ( t ) , σ i ( t ) , t and K i are all variables. This formulated problem is a non-convex problem, which cannot be solved directly.

3. The Optimal Locomotive Communication Strategy Based on SIC

In Section 2, we propose the problem and give the original mathematical model. However, it is a non-convex problem and cannot be solved directly. In this section, we will transform the original model into a model which can be solved directly. We first introduce some theorems.

3.1. Some Theorems

Theorem 1. 
Denote α m a x as the maximum number of the locomotives that the AP can communicate simultaneously by using SIC, then we have α m a x = 1 + log 1 + β P m a x β N 0 .
Proof. 
Suppose at time t there are α locomotives transmitting their data simultaneously to the AP. Suppose the power of the received signals satisfies g 1 ( t ) P 1 ( t ) < g 2 ( t ) P 2 ( t ) < < g α ( t ) P α ( t ) , based on the SIC technique, we must have,
g 1 ( t ) P 1 ( t ) = β N 0 , g 2 ( t ) P 2 ( t ) = β ( N 0 + g 1 ( t ) P 1 ( t ) ) = β ( N 0 + β N 0 ) = β ( 1 + β ) N 0 , g 3 ( t ) P 3 ( t ) = β ( N 0 + g 2 ( t ) P 2 ( t ) + g 1 ( t ) P 1 ( t ) ) = β ( N 0 + β N 0 ( 1 + β ) + β N 0 ) = β ( 1 + β ) 2 N 0 , g α ( t ) P α ( t ) = β ( 1 + β ) ( β 1 ) N 0 .
Then, we have α = 1 + log 1 + β ( P α ( t ) g α ( t ) β N 0 ) . Since P α ( t ) P m a x and g α ( t ) = min { x α ( t ) λ , 1 } 1 , so we have α α m a x = 1 + log 1 + β ( P m a x β N 0 ) .
From theorem 1, we can see that, based on the SIC technique, the number of the locomotives that the AP can communicate with simultaneously has some relationship with the power that the locomotives use. The higher the power is, the larger the number is. However, from theorem 2, we will see that we can not let the power be arbitrarily large.
Theorem 2. 
To an AP we have R T = ( β ( 1 + β ) ( α m a x 1 ) N 0 P m a x ) 1 λ .
Proof. 
Similar to the proof of theorem 1, we have g α m a x ( t ) P α m a x ( t ) = β ( 1 + β ) ( α m a x 1 ) N 0 . That is,
x α m a x ( t ) = ( β ( 1 + β ) ( α m a x 1 ) N 0 P α m a x ( t ) ) 1 λ ( β ( 1 + β ) ( α m a x 1 ) N 0 P m a x ) 1 λ = R T .
From theorem 2, we can see the receiving radius R T has some relationship with the maximum number of the locomotives transmitting simultaneously. The larger the number is, the smaller R T is. Based on theorems 1 and 2, we should select a suitable P m a x for the whole network, so that the AP can communicate with enough locomotives simultaneously with a suitable receiving radius.
The following theorems will help us to translate the original continuous problem into a discrete problem. We first introduce theorem 3.
Theorem 3. 
Suppose in time t a new locomotive s j enters the receiving radius of AP, and can transmit with an old locomotive s i together. Then, during the whole scheduling period, we can always find suitable transmitting powers P i ( t ) and P j ( t ) so that the two locomotives can transmit together.
Proof. 
We consider three different conditions, as shown in Figure 3.
In Figure 3a, the two locomotives are coming closer to the AP. Suppose, in time t, we have σ j ( t ) = g j ( t ) P j ( t ) N 0 + g i ( t ) P i ( t ) β and σ i ( t ) = g i ( t ) P i ( t ) N 0 β , where P i ( t ) , P j ( t ) P m a x . In time ( t + Δ t ) , since we have g i ( t + Δ t ) > g i ( t ) and g j ( t + Δ t ) > g j ( t ) , we can find suitable P i ( t + Δ t ) and P j ( t + Δ t ) , so that σ i ( t + Δ t ) , σ j ( t + Δ t ) β .
In Figure 3b, the two locomotives are leaving with the AP. Since we have supposed that during the first condition (that is, the two locomotives are coming closer to the AP), we can always find suitable P i ( t ) and P j ( t ) . Then, in the second condition, we can always find an corresponding condition in the first period, so that s i and s j can transmit together.
In Figure 3c, one locomotive is coming closer to the AP while the other is leaving. The most special situation is that ,in time t, where the distances between the two locomotives to the AP are equal. To prove that, we can let the two locomotives go back to time t . We have proved that in time t the two locomotives can transmit together (the first condition). Since g j ( t ) < g j ( t ) and g i ( t ) = g i ( t ) , then we can find suitable P i ( t ) and P j ( t ) , so that σ i ( t ) , σ j ( t ) β .
Figure 3. The three conditions for theorem 3. (a) The two locomotives are coming closer to the AP; (b) The two locomotives are moving away from the AP; (c) One locomotive is coming closer to the AP while the other is leaving.
Figure 3. The three conditions for theorem 3. (a) The two locomotives are coming closer to the AP; (b) The two locomotives are moving away from the AP; (c) One locomotive is coming closer to the AP while the other is leaving.
Sensors 15 28257 g003
In the proof of theorem 3, we consider the situation with two locomotives. However, this theorem can also be applied to the situation of more than two locomotives.
Theorem 3 indicates that we can divide the whole scheduling time T into several segments. In each segment, some locomotives will be in the radius of the AP and travel along the tunnel, but no locomotive will enter or leave the range of AP. That is, the number of the locomotives will not change during one segment. Denote m as the number of segments for the whole scheduling time T. Denote τ i ( i = 1 m ) as the i-th segment. The length of segment i can be expressed as | τ i | , then we have i = 1 m | τ i | = T .
Based on the SIC technique, the locomotives can divide τ i into several time slots, and the locomotives which can transmit together will be arranged into one time slot. Based on theorem 3, during one segment, the arranged time slots do not need to be changed. The only thing we need to change is the sending power of each locomotive. In the start of τ i , new locomotives will enter or old locomotives will leave the radius of the AP. Thus, we only need to arrange time slots in the beginning of each segment.
Theorem 4. 
If we set suitable power for each locomotive during the whole scheduling time, then the optimal result will be the same no matter the speed is changing or not.
Proof. 
The optimal result is decided by SINR. The channel gain and the power play important roles in SINR. Different speed will make the locomotive s i in different position in time t, and then make the channel gain g i ( t ) different. Since in theorem 3 we have proved that we can always find suitable power during the whole scheduling time. Then we can also find suitable power so that no matter the channel gain changes, the SINR is the same, which will prove theorem 4.
Theorem 4 can help us largely to simplify the original problem. In fact, theorem 4 also satisfies the real environment, where all locomotives may have the same speed. In the real environment, though the speed may change a little sometime, we can ignore these changes. Based on these theorems, we can propose our algorithm.

3.2. New Model and the Algorithm

To design the algorithm, we suppose that we know all starting times for each locomotive entering the radius of the AP. Since we also suppose that all locomotives have the same speed v during the scheduling time, then each locomotive’s position x i ( t ) can be calculated. The main idea of our algorithm is based on three basic steps as follows:
  • Divide the whole scheduling time into several segments.
  • Divide each segment into several time slots, arrange these time slots for locomotives. If a locomotive is in a time slot, it means the locomotive can transmit in this time slot. Otherwise, it means the locomotive can not transmit.
  • To each locomotive, give the transmitting power scheme when it transmits.
This algorithm can be implemented on the AP. Each time when some locomotive is entering or leaving the range of the AP, it will try to communicate with it and then the AP will perform the calculation. After that, the AP will tell all locomotives how the transmitting power scheme they will use during the whole scheduling period. If there is no new locomotive entering or leaving, there is no need to do new calculation. The following will discuss these steps in detail.
To the first step, based on theorem 3, we know that if some locomotives can transmit together, then they can always transmit together during the whole period by adjusting their transmitting power so the key time to divide the scheduling time into segments is the time when a locomotive enters the radius of the AP or leaves. That is, we will divide the scheduling time into segments based on each locomotive’s entering time t s i and leaving time t s i .
To the second step, suppose s i is one of the locomotives in the radius of the AP and there are k locomotives during the segment τ i . We will use the following pseudo-code as shown in Figure 4 to calculate each time slot for s i .
There are two problems contained in the second step. The first one is how to decide whether s i can be added in the set A l ? This can be calculated by Equation (4). We have sorted the locomotives based on the distance. The received power on AP can also be sorted based on the distance. That is, the smaller the distance between a locomotive and the AP, the larger the received power on AP would be. When we calculate s i and try to add it in the set A l , the power of s j ( s j A l ) received by AP must be smaller than s i ’s. Thus, we can calculate the s i ’s SINR directly by Equation (4), and decide whether it can be added in the set. The second one is how to allocate time slots for each set after we arranged all locomotives in sets for the segment τ i ? We believe that if we allocate longer time length for the set with larger number, the received data will then be larger. Thus, we decide it by | γ i | = | τ i | | A i | k .
Figure 4. The arranging time slots algorithm for each segment.
Figure 4. The arranging time slots algorithm for each segment.
Sensors 15 28257 g004
In the third step, since the locomotives are traveling in the tunnel, their distances to the AP are always changing, which indicates that their transmitting powers vary over time accordingly. We will calculate them at the start of each segment, first let the locomotive with the maximum distance to the AP transmitting with the maximum power in a set, then the others can be calculated by Equation (4). Suppose s i is the i-th locomotive in a set after sorted, when traveling, the transmitting power can be calculated by Equation (7).
P i ( t ) = N 0 β ( 1 + β ) ( i 1 ) min { | v ( t t s i ) R T | λ , 1 }
Now we give a brief analysis to show the time complexity of our algorithm. First of all, the number of time slots is based on the entering and leaving time of each locomotive, so the time complexity would be O ( N ) . Secondly, we should first sort locomotives based on their distances. Many sorting algorithms can be used to do this, and we just suppose we use the bubble sort algorithm with the complexity O ( N 2 ) . Then, we create and arrange the sets A l , which needs a double loop, so the complexity is again O ( N 2 ) . Meanwhile, the complexity for calculating γ i is O ( N ) . Thirdly, we can calculate the transmitting power scheme for each locomotive directly by using Equation (7), so the time complexity is O ( N ) . Since the first step is used to divide the whole scheduling time into time segments, and in each time segment, we should go through the second and the third steps, therefore, the time complexity for the whole algorithm is O ( N ) · ( O ( N 2 ) + O ( N 2 ) + O ( N ) + O ( N ) ) = O ( N 3 ) . Notice that in reality the complexity could be much less in that any two locomotives must keep a minimum security distance, which makes the AP can only provide service to certain amount of locomotives within a time slot. Therefore, the number N in O ( N 3 ) may be a much smaller number.

4. Simulation Results

In this section, we give simulation results to show the performance of our algorithm. We also compare results with and without SIC to show the advantage of SIC.
We consider wireless networks with 20 to 50 mine locomotives and one AP in a straight tunnel. The position of the AP is zero, and the receiving radius is R T = 120 m. The transmission powers of the locomotives are between 0 W and 1 W, and the noise power is N 0 = 10 10 W. The SINR threshold is β = 3 . The pass lost index is λ = 4 . The Channel bandwidth is W = 22 MHz. The minimum data transmission rate requirement r i = 500 Kbps. The traveling speed is v = 5 m/s. The distance between two successive locomotives should be kept at least 30 m all the time for safety reasons. Suppose we know all start times t s i , which are created randomly in our simulations and satisfy the minimum security distance.
We first present detailed results of a wireless network with 20 locomotives in Section 4.1. Then, we provide complete results for all network instances with different number of locomotives.

4.1. Results for a Wireless Network with 20 Locomotives

Consider a wireless network with 20 locomotives. The start times of each locomotive are given in Table 1. Based on the algorithm proposed in Section 3, we can calculate all the locomotive average data rates with and without SIC during the whole scheduling time as shown in Figure 5. From this, we can see, by using SIC, the average data rates are improved significantly. For example, for the first locomotive, the average data rates are 4 . 13 Mbps by using SIC and 2 . 30 Mbps when not using SIC. So the scaling factor K 1 = 8 . 26 when using SIC and K 1 = 4 . 6 when not using SIC. The detail data is listed in Table 2. The improvement throughput is ( K i K i ) K i = 79 . 6 % .
Table 1. Start times of the 20 locomotives.
Table 1. Start times of the 20 locomotives.
nStart Time (s)nStart Time (s)nStart Time (s)nStart Time (s)
106561110216146
2137671210817155
3238761311918168
4379881412719181
55010961513820193
Figure 5. The comparison of average data rate with and without SIC for 20 locomotives.
Figure 5. The comparison of average data rate with and without SIC for 20 locomotives.
Sensors 15 28257 g005
Table 2. Average data rates and scaling factors with and without successive interference cancellation (SIC) for the 20 locomotives.
Table 2. Average data rates and scaling factors with and without successive interference cancellation (SIC) for the 20 locomotives.
nAverage Data RateScaling Factor K i Average Data RateScaling Factor K i
with SIC (Mbps)with SICwithout SIC (Mbps)without SIC
14.138.262.304.60
23.787.561.402.80
33.496.981.162.32
42.505.001.012.02
52.464.920.951.90
62.314.620.911.82
72.154.300.871.74
82.074.140.831.66
92.174.340.791.58
102.204.400.771.54
112.184.360.761.52
122.214.420.771.54
132.324.640.791.58
142.394.780.811.62
152.494.980.811.62
162.464.920.911.82
172.555.100.961.92
182.905.801.132.26
193.366.721.452.90
203.607.202.204.40
To show the transmission regularity, we show the time slots division from second 150 to second 159 and draw it in Figure 6. We can see during these ten seconds, seven locomotives are moving along the tunnel. For example, locomotive 11 travels along the tunnel at second 150 and 151, and leaves at second 152. Locomotive 17 enters into the radius of the AP at second 156. In second 155, there are five locomotives moving along the tunnel. Locomotives 12, 13 and 14 are scheduled in a longer time slot, while locomotives 15 and 16, a shorter time slot.
Figure 6. The time slots division from second 150 to second 159.
Figure 6. The time slots division from second 150 to second 159.
Sensors 15 28257 g006
In order to show the time efficiency, we also give some results relating to the time issue here. Since the whole scheduling distance is 2 R T = 240 m, while the minimum security distance is 30 m, the number of locomotives that can be it the scheduling time slot at the same time is no greater than 8. The computer used to run our algorithm has an Inter Core i5 CPU with 3.1 GHz and 4 GB memory. We find the whole algorithm can be finished only in several milliseconds for this case, while the whole scheduling time is t s 20 t s 1 = 241 s.

4.2. Results for All Network Instances

We change the number of locomotives n from 20 to 50, and generate 20 different network instances randomly for each n. Then, we calculate the average data rate value for each locomotive under the scheme with and without SIC, and show the results for each n in Figure 7. From this, we can see the average data rate for each locomotive under SIC scheme is improved significantly compared with the scheme without SIC. The average improvement throughput is 144 . 3 % with 20 locomotives, 151 . 6 % with 30 locomotives, 152 . 9 % with 40 locomotives and 154 . 0 % with 50 locomotives separately.
Figure 7. Results for all network instances. (a) The number of locomotives is 20; (b) The number of locomotives is 30; (c) The number of locomotives is 40; (d) The number of locomotives is 50.
Figure 7. Results for all network instances. (a) The number of locomotives is 20; (b) The number of locomotives is 30; (c) The number of locomotives is 40; (d) The number of locomotives is 50.
Sensors 15 28257 g007

5. Conclusions

In our previous work, we have applied the SIC technique for interference management and proposed algorithms of link scheduling and data routing schemes for different models [19,20], but these are all based on fixed transmitting nodes. In this paper, we consider that the transmitting nodes keep moving, propose an optimal algorithm and use it in the mine locomotive wireless network successfully. We will further design mine locomotive wireless network strategies with multiple APs and with complicated underground tunnels.

Acknowledgments

This paper is supported by National Natural Science Foundation of China (No. 61370088, No. 61501161) and International Science & Technology Cooperation Program of China (No. 2014DFB10060).

Author Contributions

J.H. raised the problem and conceived the rough idea; L.W. improved the rough idea and designed the algorithm; X.W. and Liaoyuan Wu designed the experiments; L.S. performed the experiments; X.D. analyzed the data and drew the pictures; X.W. and L.W. wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, Z.; Lv, M.; Xu, X.; Yu, F.; Jin, H. Design of distributed monitoring and diagnosis system for locomotive diesel based on GPRS-Internet. In Proceedings of the ICECE, Wuhan, China, 25–27 June 2010; pp. 2737–2740.
  2. Berglund, T.; Brodnik, A.; Jonsson, H.; Staffanson, M.; Croucamp, P.L.; Rimer, S.; Kruger, C. Planning smooth and obstacle-avoiding B-spline paths for Autonomous Mining Vehicles. IEEE Trans. Autom. Sci. Eng. 2010, 7, 167–172. [Google Scholar] [CrossRef]
  3. Yu, G.; Kou, L.; Zhang, Y. Research on real-time location-tracking of underground mine locomotive based on wireless mobile video. In Proceedings of the MEC, Changchun, China, 19–22 August 2011; pp. 625–627.
  4. Yao, Y.; Rao, L.; Liu, X. Performance and reliability analysis of IEEE 802.11p safety communication in a highway environment. IEEE Trans. Vehicul. Technol. 2013, 62, 4198–4262. [Google Scholar] [CrossRef]
  5. Standard Specification for Telecommunications and Information Exchange Roadside and Vehicle Systems-5 GHz Band Dedicated Short Range Communications (DSRC) Medium Access Control (MAC) and Physical Layer (PHY) Specifications; ASTM International: West Conshohocken, PA, USA, 2009.
  6. Kopetz, H.; Bauer, G. The time-triggered architecture. IEEE Proc. 2003, 91, 112–126. [Google Scholar] [CrossRef]
  7. Sahoo, J.; Wu, E.H.K.; Sahu, P.K.; Gerla, M. Congestion-controlled-coordinator-based MAC for safety-critical message transmission in VANETs. IEEE Trans. Intell. Transp. Syst. 2013, 14, 1423–1437. [Google Scholar] [CrossRef]
  8. Yu, F.; Biswas, S. Self-configuring TDMA protocols for enhancing vehicle safety with DSRC based vehicle-to-vehicle communications. IEEE Trans. Sel. Areas Commun. 2007, 25, 1526–1537. [Google Scholar] [CrossRef]
  9. Kaiser, S. OFDM code-division multiplexing in fading channels. IEEE Trans. Commun. 2002, 50, 1266–1273. [Google Scholar] [CrossRef]
  10. Linnartz, J.P.M.G. Performance analysis of synchronous MC-CDMA in mobile Rayleigh channel with both delay and Doppler spreads. IEEE Trans. Vehicul. Technol. 2001, 6, 1375–1387. [Google Scholar] [CrossRef]
  11. Yee, N.; Linnartz, J.P. BER of multicarrier CDMA in an indoor Rician fading channel. In Proceedings of the Twenty-Seventh Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, 1–3 November 1993.
  12. Slimane, S. Partial equalization of multicarrier CDMA in frequency-selective fading channels. In Proceedings of the IEEE ICC, New Orleans, LA, USA, 18–22 June 2000.
  13. Yang, L.; Hanzo, L. Performance of fractionally spread multicarrier CDMA in AWGN as well as slow and fast Nakagami-m fading channels. IEEE Trans. Vehicul. Technol. 2005, 54, 1817–1827. [Google Scholar] [CrossRef]
  14. Conti, A.; Masini, B.; Zabini, F.; Andrisano, O. On the downlink performance of multicarrier CDMA systems with partial equalization. IEEE Trans. Wirel. Commun. 2007, 6, 230–239. [Google Scholar] [CrossRef]
  15. Zabini, F.; Masini, B.M.; Conti, A.; Hanzo, L. Partial equalization for MC-CDMA systems in non-ideally estimated correlated fading. IEEE Trans. Vehicul. Technol. 2010, 59, 3818–3830. [Google Scholar] [CrossRef]
  16. Miridakis, N.I.; Vergados, D.D. A survey on the successive interference cancellation performance for single-antenna and multiple-antenna OFDM systems. IEEE Commun. Surveys Tutor. 2013, 15, 312–335. [Google Scholar] [CrossRef]
  17. Zhang, X.; Haenggi, M. The performance of successive interference cancellation in random wireless networks. IEEE Trans. Inf. Theory 2014, 60, 6368–6388. [Google Scholar] [CrossRef]
  18. Jiang, C.; Shi, Y.; Hou, Y.T.; Lou, W.; Kompella, S.; Midkiff, S.F. Squeezing the most out of interference: An optimization framework for joint interference exploitation and avoidance. In Proceedings of the INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2951–2955.
  19. Shi, L.; Zhang, J.; Shi, Y.; Ding, X.; Wei, Z. Optimal base station placement for wireless sensor networks with successive interference cancellation. Sensors 2015, 15, 1676–1690. [Google Scholar] [CrossRef] [PubMed]
  20. Shi, L.; Shi, Y.; Ye, Y.X.; Wei, Z.C.; Han, J.H. An efficient interference management framework for multi-hop wireless networks. In Proceedings of the WCNC, Shanghai, China, 7–10 April 2013; pp. 1129–1134.

Share and Cite

MDPI and ACS Style

Wu, L.; Han, J.; Wei, X.; Shi, L.; Ding, X. The Mine Locomotive Wireless Network Strategy Based on Successive Interference Cancellation. Sensors 2015, 15, 28257-28270. https://doi.org/10.3390/s151128257

AMA Style

Wu L, Han J, Wei X, Shi L, Ding X. The Mine Locomotive Wireless Network Strategy Based on Successive Interference Cancellation. Sensors. 2015; 15(11):28257-28270. https://doi.org/10.3390/s151128257

Chicago/Turabian Style

Wu, Liaoyuan, Jianghong Han, Xing Wei, Lei Shi, and Xu Ding. 2015. "The Mine Locomotive Wireless Network Strategy Based on Successive Interference Cancellation" Sensors 15, no. 11: 28257-28270. https://doi.org/10.3390/s151128257

Article Metrics

Back to TopTop