Next Article in Journal
Emotion Recognition Based on Multichannel Physiological Signals with Comprehensive Nonlinear Processing
Next Article in Special Issue
M2M Communication Assessment in Energy-Harvesting and Wake-Up Radio Assisted Scenarios Using Practical Components
Previous Article in Journal
Ultrasonic Sensing and Actuation in Laminate Structures Using Bondline-Embedded d35 Piezoelectric Sensors
Previous Article in Special Issue
Machine Learning Aided Scheme for Load Balancing in Dense IoT Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Optimized Gateway Placement for Interference Cancellation in Transmit-Only LPWA Networks

1
School of Electronic and Information Engineering Beijing Jiaotong University, Beijing 100044, China
2
School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta 30332-0250, GA, USA
3
Department of Electrical Engineering Stanford University, Stanford 94305-2004, CA, USA
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(11), 3884; https://doi.org/10.3390/s18113884
Submission received: 17 September 2018 / Revised: 29 October 2018 / Accepted: 3 November 2018 / Published: 11 November 2018

Abstract

:
We study the placement of gateways in a low-power wide-area sensor network, when the gateways perform interference cancellation and when the model of the residual error of interference cancellation is proportional to the power of the packet being canceled. For the case of two sensor nodes sending packets that collide, by which we mean overlap in time, we deduce a symmetric two-crescent region wherein a gateway can decode both collided packets. For a large network of many sensors and multiple gateways, we propose two greedy algorithms to optimize the locations of the gateways. Simulation results show that the gateway placements by our algorithms achieve lower average contention, which means higher packet delivery ratio in the same conditions, than when gateways are naively placed, for several area distributions of sensors.

1. Introduction

The sensor nodes (SNs) in a low-power wide area network (LPWAN) are often required to be low cost and low energy, while the LPWAN should provide reliable communication and wide area coverage. LPWANs are an important technology for the Internet of Things (IoT) [1]. Several existing LPWAN solutions, such as the non-cellular systems of the SigFox [2], LoRa [3] and cellular narrow band IoT (NB-IoT) system of 3GPP [4], are being promoted. LPWAN application areas include smart cities, precision agriculture, wearables, transport, utilities and environmental monitoring [5]. In this paper, we study the sensor network, in which the sensors have one-hop to the gateways (GWs), which is known as star network topology (Figure 1), and in particular, the preferred placements of the GWs, when the GWs are capable of interference cancellation (IC).
Two of the main objectives in LPWAN design are to minimize power consumption on the sensors and minimize total system cost, including deployment, operation, maintenance, etc. Currently, most LPWANs are equipped with transceiver sensor radios. However, the receiver module of a transceiver often consumes more energy and is more costly than the transmitter [6,7,8]. Furthermore, many LPWAN applications contain hundreds or thousands of SNs, and have as their function to simply report sensed data to the server or cloud periodically and/or when an event is detected. Keeping the receiver turned off or removing it entirely not only saves the energy of receiver operation but also eliminates the energy overhead of medium access control (MAC) packets. Therefore, exploiting transmit only (TO) SNs in LPWAN can provide significant reduction in complexity, cost, and energy consumption [6,7,8].
The lack of receiver function in TO SNs has certain implications with regards to MAC. The TO SNs cannot perform carrier-sensing, as in the carrier sense multiple access (CSMA) systems, and data transmissions by these nodes are completely uncoordinated. This characteristic rules out the use of most existing MAC protocols such as IEEE 802.11 [9], B-Mac [10], S-Mac [11], and TSMP [12]. While ALOHA-based protocols are attractive for LPWANs because of their simplicity, lack of receiver rules out those protocols also, because acknowledgements cannot be received. Network time synchronization, which is the synchronization of the clocks on all the SNs in a network, is not possible for TO SNs, implying that time-division multiple access protocols cannot be supported. As in ALOHA-based protocols, collisions will be unavoidable in TO networks. Packet repetition provides reliability to TO SNs [13].
Advanced signal processing at the GWs allows most of the burden of TO channel conflict resolution to be shifted to the GWs, which simplifies the hardware and functionality of the SNs and drastically reduces the energy consumption in the SNs. To resolve the collisions, the GWs can perform capture and IC. Capture is the decoding of a packet despite interference. IC is the well-known process of subtracting the effects of a decoded packet from the stored soft samples of the received waveform, so that an underlying weaker packet may be decoded. Practical IC does not achieve perfect subtraction and the residual error power causes interference on the weaker packet. Many authors model the residual power from imperfect IC as a simple fraction of the power of the packet being canceled (e.g., [14]). This paper shows that this model of IC residual error implies quite particular preferred locations for the GWs.
The TO LPWA networks referred to in this paper, as illustrated in Figure 1, adopt a multi-gateway architecture, i.e., data packets are sent over wireless links from SNs to GWs, where the packets are decoded. Then, the GWs forward the packets to a server or the cloud via the Internet. We assume the GWs will coordinate data reception to reduce packet losses and maximize channel efficiency by providing diversity against fading and IC to mitigate packet collisions. Every SN is within a single hop of one or more GWs. Furthermore, we assume there are many more SNs than GWs, which makes packet collisions likely. For example, the topology of Figure 1 can represent quasi-stationary sensors used for monitoring and detection. The sensors may turn on receivers only to use GPS to determine their location, but turn off their receivers to save energy while they are stationary. If the device does not need to know its own location, the power consuming GPS chip can even be replaced by LPWAN localization algorithms based on signal strengths to base stations, such as fingerprinting and ranging. While stationary, the sensors can still make periodic reports of the monitored quantities or detected events. For example, the sensors could be on cars in a large dealership lot and report disturbances to the car. The locations of GWs are required to be strategically designed to maximize the chance of successful packet decoding, even if the packet suffers from a two-way collision. The direct motivation of this paper is coming from the Ph.D dissertation [8] of Firner, who aimed to maximize packet deliver ratio (PDR) of TO transmitters by optimizing the GW locations based on the capture effect in two-way collisions only. However, Firner [8] disregarded the IC function, i.e., only one packet can be captured and decoded when two packets are in collision following the algorithm of F-Embed in [8]. In contrast, with capture and IC, both collision packets can be decoded. This paper provides two algorithms to optimize GW locations for the TO LPWA network to minimize the average contention number, which is inversely proportional to PDR, when other factors are the same [8].
Network planning and optimization is a very active research area with a considerable amount of published work in many types of wireless communication systems. In [15], the optimal base station placement is obtained based on minimizing the sum of the ratio of the interference power to the signal power for all interesting points in the downlink for planning of a cellular network. To optimize average capacities of collaborated MIMO and distributed MIMO, the authors of  [16] employed the waveguide-multimode model and particle-swarm-optimization method. It obtained that distributed MIMO systems show desirable performance while significantly outperforming collaborated MIMO configurations. The authors of [17] proposed an algorithm specifically for LTE mixed-cell MIMO wireless systems, following a combinatorial approach and the optimization analysis based on the triplet of coverage, capacity and cost. In the research on the construction of WiMAX network, the authors of [18] transformed the relay station (RS) placement problem into a 0–1 binary programming problem in a two-hop IEEE802.16j network to maximize throughput. In the problem with huge input size, to find the sub-optimal solution, this paper proposes an efficient near-optimal placement solution for IEEE 802.16j WiMAX networks. Extending the work in [18,19] combining the condition of whether a subscriber station needs the relays, a model of three-hop IEEE802.16j network about station placement is proposed by limiting the placement location of RS.
In common wireless sensor networks (WSN), the designing and optimizing network structure is mainly focused on the cluster topology control and cluster head selection (e.g., [20,21,22]). Besides that, the authors of [23] focused on the topology control process for application nodes (ANs) and base stations (BSs), which constitutes the upper tier of two-tiered WSN. By proposing algorithmic approaches to place BSs optimally, the topological network lifetime of WSNs can be maximized deterministically, even when the initial energy provisioning for ANs is no longer always proportional to their average bit-stream rate. The obtained optimal BS locations are under different lifetime definitions according to the mission criticality of WSN. Aimed at providing the longest network lifetime, the authors of [24] proposed a modified integrated greedy method and a heuristic and greedy combinational method to find the base station location. In [25], location of BSs and distributed clustering by cluster heads are jointly optimized by the LEACH-C protocol to improve the energy consumption.
The rest of the paper is organized as follows. Section 2 introduces the system model and the main notation. In Section 3, we derive the optimized region of GW locations which meet the requirements on capture and IC for both pairs of SNs in conflict. In Section 4, two algorithms, the weight bipartite graph (WBG) algorithm and the pixels with gray levels (PGL) algorithm, are presented. The simulations of average contention for different GW placements are illustrated in Section 5 for different network topologies. Finally, Section 6 concludes the paper.

2. System Model

We consider a scenario with N SNs with the same transmit power and modulation scheme. The SNs are randomly located in a monitoring region with M deployed GWs that collect the data from the SNs.
In this paper, we model the channel with only path loss. Let the power received by GW g from the SN m be expressed as,
P r ( d m ) = P o ( d 0 d m ) n ,
where d m is the distance between the SN m and the GW g, n is the path loss exponent, and P o is the received power at a reference distance d 0 from the GW.
Packet collisions are unavoidable in a high density TO LPWAN. When L SNs transmit packets that collide at one GW, the overall signal at the GW will hence be the superposition of the L overlapping radio signals transmitted by the SNs, plus noise power N 0 , with total power
Λ = m = 1 L P r ( d m ) + N 0 .

2.1. Capture Effect

When the superimposed packets are received with significantly different powers, the so-called capture effect may take place, i.e., the strongest packet may be decoded by the GW despite a collision [26]. The signal-to-interference-plus-noise ratio (SINR) for the jth signal is defined as
γ j = P r ( d j ) m j P r ( d m ) + N 0 .
We assume that a signal j may be “captured” by the GW and survive the collision if and only if γ j τ , with τ > 0 representing the so-called capture threshold of the system [26]. The capture threshold τ is a system parameter, whose value depends upon the sensitivity of the radio receiver. For instance, Firner e al. [27] showed a SINR of 6 dB was required for a Chipcon radio to capture packets, while Lee et al. [28] found that just 1 dB was enough for packet capture when the captured packet arrived before the interfering packet with an Atheros WiFi card.

2.2. Interference Cancellation

An effective approach to enhance the system capacity in the presence of signal interference is successive interference cancellation (SIC). Broadly speaking, SIC is an iterative reception scheme where signals are decoded one at a time, starting from the strongest, i.e., the one with the largest SINR. After the signal is decoded, its waveform is regenerated and subtracted from the aggregate received signal; then, the next strongest signal is decoded, regenerated, and subtracted; and so on [29].
Given error-free decoding, good regeneration of reconstruction requires accurate synchronization and a high quality estimation of the channel impulse response, which implies when these operations are imperfect, the signal cancellation leaves some residual power that increases the noise level experienced at the successive decoding stages. Furthermore, the finite precision of the analog to digital converter (ADC) at the receiver also reduces the effectiveness of each cancellation cycle. Following [30], we model all these idiosyncrasies of the interference cancellation process by assuming that the cancellation of a signal with received power P leaves a residual interference power of z P , where 0 < z < 1 is called the residual power factor. This model is clearly approximate, since the residual interference in practical SIC systems depends strongly on the SINR value of the canceled signal [26].
Considering that the decoded signal j is canceled from the overall received signal, leaving a fraction z of its power as residual interference, the SINR of next strongest signal k can be expressed as
γ k = P r ( d k ) h j , k L P r ( d h ) + z P r ( d j ) + N 0 .

3. Single GW Placement for Two SNs

We first consider the simplest scenario, where only two SNs are deployed. When the packets transmitted by the two SNs collide, one GW in the optimum location should decode both of the packets successfully. In this section, the theoretical model where the GW should be optimally placed is deduced by IC after capturing.

3.1. Capture Circle

The contents of this section are summarized from [8], for the convenience of the reader and to establish notation. Considering two SNs located at s 1 , s 2 2 and one GW located at g 2 , we use s 1 , s 2 and g as both their locations and identities for the sake of simplicity. A packet from s 1 will be captured and successfully decoded by the GW g if
P r ( d 1 ) P r ( d 2 ) + N 0 τ ,
where d i is the distance from GW g to SN s i , and τ is the capture threshold, as discussed in the previous section. We omit noise term N 0 from the inequality in Equation (5) since it is expected to be negligible with respect to the other terms [26]. Then, we obtain that
P r ( d 1 ) P r ( d 2 ) τ 1 / ( d 1 ) n 1 / ( d 2 ) n τ ,
d 1 β d 2 ,
where β = τ 1 / n . With τ > 1 , then 0 < β < 1 . We may write d i = g s i , where · is the Euclidian norm of a vector in 2 . Substituting into Equation (6) yields
g s 1 β g s 2 .
Squaring both sides of Equation (7) gives
g s 1 2 β 2 g s 2 2
( 1 β 2 ) g 2 2 g · ( s 1 β 2 s 2 ) s 1 2 + β 2 s 2 2 ,
where · means the inner product of two vectors. With 0 < β < 1 , it follows that
g s 1 β 2 s 2 1 β 2 β 1 β 2 s 1 s 2 .
An interpretation of Equation (8) is that s 1 can be captured by g when s 1 and s 2 interfere, if g is inside a circle called the capture circle, with center s 1 β 2 s 2 1 β 2 and radius β 1 β 2 s 1 s 2 [8], as shown in Figure 2.

3.2. IC and the Decoding Circle

Suppose one packet in a colliding pair of packets is captured and canceled. Then, for the second packet to be decoded, the signal-to-interference ratio (SIR) of the second packet must satisfy
p r ( d 2 ) z p r ( d 1 ) τ ,
where z p r ( d 1 ) is the residual interference power after IC. Then, substituting Equation (1) yields
1 / ( d 2 ) n 1 / ( d 1 ) n z τ d 1 ( z τ ) 1 n d 2 .
Setting β = ( z τ ) 1 n , we see that Equation (10) will convert to,
d 2 β d 1 .
Equation (11) shows the same expression as Equation (6) except that d 1 and d 2 have exchanged positions, and β is replaced by β . Then, following Equations (7) and (8), we have the following two cases.
(1)
if z 1 τ , then β 1 ,
g s 2 β 2 s 1 1 β 2 β β 2 1 s 2 s 1 .
In this case, g will be outside a circle with center s 2 β 2 s 1 1 β 2 and radius β β 2 1 s 1 s 2 , as shown in Figure 3. This is the condition for s 2 to be decoded following IC of s 1 , when β 1 . We refer to this circle as the IC and decoding (ICD) circle.
(2)
if z > 1 τ , then β < 1 ,
g s 2 β 2 s 1 1 β 2 < β 1 β 2 s 2 s 1 .
In this case, g is inside a circle whose center is s 2 β 2 s 1 1 β 2 and radius is β 1 β 2 s 2 s 1 . This area for g is illustrated as in Figure 2, with β replaced by β and s 1 , s 2 exchanged with each other, for s 2 to be decoded after IC of s 1 .

3.3. IC and the Decoding Crescent

Considering interfering packets from SNs s 1 and s 2 , assuming s 1 is the stronger packet, the optimized GW location should satisfy both the conditions for capture of s 1 and ICD of s 2 . Therefore, combining Equations (6) and (11), we can get
1 β d 2 d 1 β
τ 1 n d 2 d 1 ( z τ ) 1 n ,
if and only if
τ 1 n ( z τ ) 1 n ,
i.e.,
z 1 τ 2 .
The inequality in Equation (16) has some interesting practical implications. z and τ are controlled by separate physical mechanisms and separate parts of a packet. The minimum required SIR τ depends mainly on the choice of modulation and coding of the data. For example, a bandwidth efficient high-order quadratic amplitude modulation (QAM) with no error correction code can necessitate a high value for τ , whereas a power efficient high-order frequency shift keying modulation coupled with an error correction code can enable a low value for τ [31]. On the other hand, z is mainly controlled by the quality of the cancellation, which in turn, depends on the quality of synchronization and channel estimation, which is usually performed based on the packet ’s preamble and training sequence or pilot symbols [32,33]. For example, a long preamble and a long training sequence (and a low-Doppler channel, i.e., long coherence time) can enable a low value of z, whereas short versions of these will cause poor cancellation and a high value of z.
We next consider three cases involving z and τ 1 , especially: (1) z 1 τ 2 ; (2) 1 τ 2 < z 1 τ ; and (3)  z > 1 τ . Three corresponding lemmas will prove that only the first case yields a non-empty set of GW locations, such that capture and ICD are possible. Define the ordered pair ( s 1 , s 2 ) to indicate that the packet from s 1 is to be captured, in the presence of interference from the packet from only s 2 .
Lemma 1.
For any ordered pair of SNs ( s 1 , s 2 ) , if z 1 τ 2 a n d τ 1 , the ICD circle will be inside the capture circle and there exists a region which satisfies both capture and IC requirements for GWs.
Proof. 
According to definition of capture circle and ICD circle separately in Equations (8) and (12), we can get the center and radius of them as follows.
Capture circle: center C c c = s 1 β 2 s 2 1 β 2 and radius R c c = β 1 β 2 s 1 s 2 and ICD circle: center C i c = s 2 β 2 s 1 1 β 2 and radius R i c = β β 2 1 s 2 s 1 with β = τ 1 / n and β = ( z τ ) 1 n .
The distance between the two circle centers is
D c 1 , c 2 = s 1 τ 2 / n s 2 1 τ 2 / n s 2 ( z τ ) 2 / n s 1 1 ( z τ ) 2 / n .
Set α = τ 2 / n , γ = z 2 / n , then Equation (17) can be expressed
D c 1 , c 2 = α s 1 s 2 α 1 s 2 α γ s 1 α γ 1 .
Then, after some algebra operations, we have
D c 1 , c 2 = α 2 γ 1 ( α 1 ) ( α γ 1 ) s 1 s 2 .
On the other hand, the difference between the radii of the two circles is
D r 1 , r 2 = ( τ 1 / n 1 τ 2 / n z 1 / n τ 1 / n z 2 / n τ 2 / n 1 ) s 1 s 2 .
After substituting z and τ , and more algebra, we have
D r 1 , r 2 = α 1 / 2 ( α γ 1 ) + α 1 / 2 γ 1 / 2 ( α 1 ) ( α 1 ) ( α γ 1 ) s 1 s 2 .
If we can prove that D r 1 , r 2 D c 1 , c 2 and R c c R i c , we can prove that the ICD circle will be inside of the capture circle. Define
F ( α , γ ) = D r 1 , r 2 2 D c 1 , c 2 2 s 1 s 2 2 .
F ( α , γ ) = ( α 1 ) ( 1 α γ ) ( 1 α γ 1 / 2 ) 2 [ ( α 1 ) ( α γ 1 ) ] 2 .
For τ 1 , it is obvious that α = τ 2 / n 1 . We know that z 1 τ 2 ; then, ( τ z ) 1 / τ 1 , and  α γ = ( z τ ) 2 / n 1 . Therefore, F ( α , γ ) 0 .
Similarly, set α = τ 2 / n , γ = z 2 / n and define
G ( α , γ ) = R c c 2 R c i 2 s 1 s 2 2 .
Then,
G ( α , γ ) = α 1 / 2 α 1 2 ( α γ ) 1 / 2 1 α γ 2 .
G ( α , γ ) = α ( 1 γ ) ( 1 α 2 γ ) [ ( α 1 ) ( 1 α γ ) ] 2 ,
where γ = z 2 / n and 0 z 1 ; then ( 1 γ ) 0 . Because z 1 τ 2 and ( 1 α 2 γ ) 0 , then, G ( α , γ ) 0 . Therefore, it is proven that the ICD circle will be inside of the capture circle.
Furthermore, z 1 τ 2 1 τ , for τ 1 , there exists a region which satisfies capture and IC requirements for GW according to Equations (8) and (12). Finally, Lemma 1 is proven as shown in Figure 4a. There are two symmetric shaded regions. A GW located in the shadowed region on the left will decode s i first and s j second. A GW located in the shadowed region on the right will decode s j first and s i second. We refer to each shaded crescent-shaped region in Figure 4a as a capture and ICD crescent or just a decoding crescents. □
Lemma 2.
For any pair of SNs ( S i , S j ) , ( i j ) , such that 1 τ 2 < z 1 τ , the capture circle will be inside of the ICD circle and there are no locations that satisfy both capture and ICD requirements for GW, given τ 1 .
Proof. 
According to Equation (22), for τ 1 , it is obvious that α = τ 2 / n 1 . Furthermore, because 1 τ 2 < z 1 τ , then, ( τ z ) 1 , and α γ = ( z τ ) 2 / n 1 . Therefore, F ( α , γ ) 0 and this means one circle will be inside of another circle.
Furthermore, from Equation (24), when γ = z 2 / n and 0 z 1 , then ( 1 γ ) 0 . Because 1 τ 2 < z 1 τ , then ( 1 α 2 γ ) 0 and G ( α , γ ) 0 . Now, it is proven that the capture circle will be inside of the ICD circle.
Finally, because 1 τ 2 < z 1 τ , for τ 1 , there is no region that satisfies both capture and ICD requirements for GW according to Equations (8) and (12), and Lemma 2 is proven, as shown in Figure 4b. The symmetric shaded region shows that capture region is inside of the capture circle and the ICD region is outside of the ICD circle. There are no overlap regions because the capture circle is inside of ICD circle. □
Lemma 3.
For any pair of SNs ( S i , S j ) , ( i j ) , such that if z > 1 τ , there will be no overlap of the capture circle and the ICD circle, given τ 1 .
Proof. 
Based on the same idea from Equation (22), for τ 1 , then α = τ 2 / n 1 . Because z > 1 τ , then, ( τ z ) > 1 , and α γ = ( z τ ) 2 / n > 1 . Therefore, F ( α , γ ) < 0 and there is no intersection between the capture circle and the ICD circle, as shown in Figure 4c,d for different capture order by s i and  s j .
Both packets transmitted by s i and s j in two-way collision will be decoded successfully by a GW inside of either one of the decoding crescents. Furthermore, it has to be noticed that, when z = 1 τ 2 , the ICD circle and capture circle for ( s i , s j ) will be the same circle. □

3.4. Margins

In this section, we consider some SINR margins to improve the likelihood of correct decoding in the presence of variations in power levels, e.g., due to shadowing. In particular, these margins imply slightly larger or smaller circles; a capture margin and location margin will be suggested.
1. Capture Margin   
The capture margin is a small amount, ϵ added to the capture threshold τ , then, the SINR of a received packet in a GW, γ is shown in Equation (25).
γ = P r ( d m ) i m P r ( d i ) + N 0 ( τ + ϵ ) .
As shown in Figure 5, when z is held fixed while γ grows, that is, while the capture margin grows, it is clear that the radius of the capture circle will diminish. On the other hand, the radius of ICD circle will grow as the capture margin increases and both circles will become the same circle when z = 1 τ 2 .
2. Location Margin   
As shown in Figure 4a and Figure 6a, when the GW is inside the shaded region, i.e., it is inside of the capture circle and outside of the ICD circle, then any of the packets transmitted by s i and s j in collision could be decoded successfully by this GW. The shape of the shaded region is similar to a crescent. However, considering the uncertainties in power level, we should give some location margin between capture circle and ICD circle for optimized GW location, as shown in Figure 6b.
Suppose that we give the same value δ of location margin to decrease the radii of capture circle and increase the radii of ICD circle, then, if the minimum width of the ICD region is less than 2 δ as in Figure 6a, we will get a real crescent region for optimized GW locations.

4. Algorithms for Multiple GWs Placement

We assume there are N SNs { s 1 , s 2 , , s N } with known locations, and there are number of M GWs { g 1 , g 2 , , g M } to be installed in this scenario to maximize PDR. We also assume z 1 τ 2 , as explained in Section 3.3, which implies that decoding crescents exist. Finally, without loss of generality, we set the location margin δ = 0 .
Our general approach is to superimpose the decoding crescents for all possible pairs of sensors, and place the GWs so that jointly, they serve the maximum number of sensor pairs. We propose two greedy algorithms that differ in the way they discretize the set of possible locations. The weight bipartite graph (WBG) approach uses intersection points of decoding crescents and the PGL approach limits potential GW locations to points or “pixels” in a rectangular grid.

4.1. Algorithm of Weight Bipartite Graph (WBG)

Inspired by [8], two sets of vertices are defined. The first set is composed of all possible optional points (OPs), where an OP is defined as point of intersection of the boundaries of a pair of decoding crescents. The second set of vertices contains all possible ordered pairs of SNs, such as v ( s i s j ) , ( i j ) . Since every pair of SNs generates two crescents, the ordering of pairs is necessary to distinguish between the two crescents. The first sensor in the ordered pair is the one that is captured. Weighted edges of the two subsets of vertices are applied according to the following rules.
  • If an OP is strictly inside of the capture region and outside of ICD region (inside of the ICD circle) decided by an ordered pair of SNs ( s i , s j ) , ( i j ) , an edge with a weight of α exists between the vertices OP and v ( s i s j ) . In other words, an edge is weighted by α if the OP is inside a capture circle but outside the decoding crescent.
  • If an OP is inside or on the boundary of the capture region and inside or on the boundary of ICD region (outside of the ICD circle) decided by an ordered pair of SNs ( S i , s j ) , ( i j ) , which means in or touching a crescent, the edge between the OP and v ( s i , s j ) has a weight of β .
  • Otherwise, there is no edge between the OP and v ( s i , s j ) .
We now walk through the WBG algorithm (Algorithm 1) for an example of three SNs and two GWs, when z 1 τ 2 , as illustrated in Figure 7. The capture circle and ICD circle for any ordered pair of SNs are calculated and we get the crescent region where the GW can decode both collided packets sent by the pair of SNs with capture effect and IC method, as shown in Figure 7a. In Figure 7b–d, the OPs are generated by the crescents corresponding to groups of sensor pairs { s 1 and s 2 , s 2 and s 3 } , { s 1 and s 2 , s 1 and s 3 } and { s 1 and s 3 , s 2 and s 3 } , respectively, such as { p 1 , p 2 , , p 12 } in Figure 7b. Because there are too many OPs in the example, some of them are omitted here. As an example of weight calculation, P 11 in Figure 7b is on the boundary of two decoding crescents, which gives two edges each with weight β . P 11 can also be located (it is not labeled) in Figure 7a, where it can be seen that P 11 is strictly inside the ICD circle of ( s 1 , s 3 ) and also inside the capture circle of ( s 1 , s 3 ) . Therefore, P 11 gains an additional weight of α , for total weight of 2 β + α .
Algorithm 1 Algorithm of WBG
  • Require:
    N SNs locations, { s 1 , s 2 , , s N } 2 ;
    M the number of GWs;  
  • Ensure:
     The locations of number of M GWs, { g 1 , g 2 , , g M } 2 .  
    1:
    Compute capture circle and ICD circle for each ordered pair of SNs ( s 1 , s 2 ) , ( s 1 , s 3 ) , , ( s n , s n 2 ) , ( s n , s n 1 ) according to Equations (8) and (12) separately, and get the crescent region;  
    2:
    Compute the intersection points between any two ICD crescents decided by any two different pairs of SNs, and get the set P = { p 1 , p 2 , . . . , p i } , which is the set of all of OPs  
    3:
    Construct a weight bipartite graph G = (P, S, E) conforming to the follows:
    5-1.
    P = { p 1 , p 2 , . . . , p i } is the set of vertices composed of OPs;
    5-2.
    S = { v ( s 1 , s 2 ) , v ( s 1 , s 3 ) , , v ( s 1 , s n ) , , v ( s n , s n 1 ) } is another set of vertices decided by ordered SNs pairs;
    5-3.
    E = { e 1 , e 2 , . . . , e i } is the set of weighted edges connecting each p i and v ( s i , s j ) . If an OP, p i P , is inside of the capture circle and inside of an ICD circle, set an edge with weight value of α for e i ; If an OP, p i P is inside of the capture region and outside of ICD circle, i.e., p i P is in the crescent, the edge e i is set by weight value of β ; Otherwise, there is no edge between the p i and v ( s i , s j ) ;
    4:
    for k = 1 to M do
    5:
     Compute the sum of weight values of the edges that connect to each p i P ;  
    6:
     Get the OP, p j , which has the maximum sum of weight values of edges;  
    7:
     Set the location of k t h GW to be location of the p j with the maximum sum of weight values of edges;  
    8:
     For each of the e j connected to p j , if the weight value of the e j is β , remove the edge e j , vertices of p j , and all of the connected vertices v ( s i , s j ) and v ( s j , s i ) even if they are not connected; if the weight value of edge e j is α , remove the edge e j , vertices of p j and all of the connected vertices v ( s i , s j ) only;  
    9:
     Get the new sets of P, S and E;  
    10:
    end for
Figure 8a shows the complete bipartite graph, where α = 1 and β = 2 . The weights of the edges joining P 11 and V s 1 , s 3 and joining P 17 and V s 1 , s 3 are 1 and 2, respectively, as shown in Figure 8b. The OP with maximum sum of weight values is selected as the first optimized location of GW, such as P 5 in Figure 8a, which has a sum of 5. In Step 8, assuming P 5 was selected, V s 2 , s 1 and V s 3 , s 2 are removed, because they are each connected to P 5 with an edge of weight 2. However, the reverse order vertices V s 1 , s 2 and V s 2 , s 3 must also be removed, because this first-placed GW will be able to decode all two-way collisions from s 1 and s 2 and all two-way collisions from s 2 and s 3 , regardless of order. All edges connected to V s 2 , s 1 , V s 1 , s 2 V s 3 , s 2 and V s 2 , s 3 are removed, leaving what is shown in Figure 8b. Next, based on Figure 8b, the second optimized location of GW could be selected, such as P 17 , because only one pair of SNs is left and P 17 connects to it.

4.2. Algorithm of PGL

With the increasing number of SNs, the WBG algorithm will become more and more time consuming, because the number of OPs grows rapidly with the number of SNs. Given of n SNs, there will be O ( n 2 ) ordered SNs pairs with one capture circle and one ICD Circle for each pair. In the worst case, every crescent composed by a single capture circle and an ICD circle intersects with each other crescent except which decided by same pair of SNs with different order, then, there will be O ( n 4 ) OPs. For every OP, we have to count how many capture circles and ICD circles it is in. Therefore, there are O ( n 6 ) circles we count for O ( n 4 ) OPs and O ( n 2 ) capture circles and ICD circles.
In the average case, every crescent does not necessarily intersect with every other, so the number of OPs will be less than that in the worst case. Even so, we still get a huge number of OPs to consider in the WBG algorithm. To decrease the number of OPs, which means to reduce the computational complexity, we may regard the whole potential area where the GWs could be deployed as a gray level image. Then, OPs are replaced by the pixels in the image and the edges with weight values are replaced by the gray level of each pixel, as shown in Figure 9. Therefore, the fast search algorithm of PGL is suggested as Algorithm 2.
It can be seen obviously in Figure 9 that different pixels located in different regions have different gray levels. The pixel with higher gray level means that the GW that location could decode more collided packets transmitted by two of the SNs in collision. Therefore, the single most optimized location of the GW will be at the pixel with the maximum gray level. After removing all of the SNs whose packets can be decoded in the collision, the algorithm begins a new computation cycle again, until the location of all of GWs are set optimally.
Algorithm 2 Algorithm of PGL
  • Require:;
    N Number of SNs with known location;
    R Number of pixels in row;
    C Number of pixels in column;
    M Number of GWs;
  • Ensure:
     The locations of number of M GWs, { g 1 , g 2 , , g M } 2 .
    1:
    Compute capture circle and the ICD circle decided by each ordered pair of SNs ( s 1 , s 2 ) , ( s 1 , s 3 ) , , ( s n , s n 2 ) , ( s n , s n 1 ) ;  
    2:
    Build the set of pixels, P = { p ( i , j ) 0 i R , 0 j C , ( i , j Z ) } according to the number of pixels in row and column, and initiate all pixel gray levels to zero;  
    3:
    Build the set of ordered pair of SNs, V = { ( s 1 , s 2 ) , ( s 1 , s 3 ) , , ( s n , s n 2 ) , ( s n , s n 1 ) } according to the number of the SNs;  
    4:
    while K M do
    5:
    for each pixel p ( i , j ) P do
    6:
      for each capture circle and ICD circle do
    7:
       If the pixel p ( i , j ) locates in the ICD circle, that is, outside of the decoding crescent but inside of the capture circle, add α to the gray level of this pixel and record the related pair of SNs ( s i , s j ) which decides the capture circle;  
    8:
       If the pixel p ( i , j ) locates in the decoding crescent, add β to the gray level of this pixel, and record the related pair of SNs ( s i , s j ) which decides the ICD circle;  
    9:
      end for 
    10:
      change to next pixel { p ( p , q ) P } ;  
    11:
    end for 
    12:
     Sort all of the pixels { p ( i , j ) P } from the maximum gray levels to minimum;  
    13:
     Set the location of K t h GW to be the location of the pixel p ( x , y ) P with the maximum gray levels;  
    14:
     Remove the pixel p ( x , y ) out of the set P and get the new set of the pixels { p ( a , b ) P : p ( a , b ) p ( x , y ) } ;  
    15:
     Remove all of the recorded pairs of SNs { ( s i , s j ) V } connected to the pixel p ( x , y ) with gray level added by α in Step 7 out of the set, then renew the set V;  
    16:
     Remove all of the recorded pairs of SNs ( s i , s j ) and ( s j , s i ) in set V, connected to the pixel p ( x , y ) with either gray level added by β in step 8 out of the set, then renew the set V again;  
    17:
    K = K + 1 ;  
    18:
    end while
The algorithm of WBG is expected to have better performance than PGL because of the precision of the OP locations, but at a cost of higher computational complexity. The PGL algorithm can significantly reduce the number of computations performed, although estimating the number of pixel points necessary for effective GW placement is not straightforward. However, the accuracy of GW locations will connect to the pixel density of the deployment area, as we show in Section 5.3.

5. Numerical and Simulation Results

In this section, to assess the performance of algorithms which we proposed, we firstly introduce an evaluation index, the “contention” of a SN. Then, we illustrate contention by comparing the contentions produced by a GW placed by the WBG and by two manual placements, for a simple scenario of three SNs and one GW. Next, we compare the performances of the WBG and PGL algorithms for different numbers of SNs and GWs.

5.1. Sensor Contention

The reason for applying TO to SNs for LPWAN is mainly to increase energy efficiency. However, the packet loss ratio (PLR) is impacted by many factors such as the duty cycle of each SN and the number of SNs in the network. Obviously, the PLR in a system with unchanged number of SNs will increase with the increased duty cycle. On the other hand, the PLR will decrease with fewer SNs for the same duty cycle. Following [8], we take SN contentions as the target metric to measure each SN and the whole TO system since it is not affected by traffic load, but only by the network topology.
In a TO network, the contention from the perspective of a SN is the number of other SNs which would prevent its packet from being decoded by any GW if the collision will happen. If there are N SNs in a network, and we say that SN A has a contention of n, it means that the packets transmitted by A can be decoded successfully (assuming two-packet collisions here), whether by capture directly or after IC, despite interference from any one of N n sensors in N 1 sensors. In other words, SN A’s packet will be lost if interfered by any one of the other n sensors. For instance, assume there are 100 SNs (including SN A) in a TO network with one GW and no capture or IC. If A loses a packet when that packet collides with a packet transmitted by any one of the other 99 SNs, then, A’s contention is 99. As another example, if we build several GWs and each of the GW can perform capture and IC during a collision, and suppose A’s packet can be decoded if interfered with a packet from any one of 50 sensors, but not for the other 49 sensors, then A’s contention is cut down to 49, halved from the original setting. In our simulations, we compute the average contention, which is the average over the contentions of the SNs.

5.2. Simple Scenario

To test the abilities of the algorithms introduced above, we start from the simple scenario of three SNs on the corner of isosceles triangle and one GW. In this and the following sections, we assume the capture threshold, τ = 3 dB, which is a system parameter, depended upon the sensitivity of the radio receiver. The path loss exponent n = 3.2 . In Section 2.2, we introduce the interference cancellation process by assuming that the cancellation of a signal with received power P, leaves a residual interference power of z P , where 0 < z < 1 , is called the residual power factor, and z = 0.1 . In WBG algorithm, if an OP is inside of the capture circle and inside of ICD circle, set an edge with weight value of α ; if an OP is inside of the capture region and outside of ICD circle, i.e., it is in the crescent, the edge is set by weight value of β . Otherwise, in PGL algorithm, if the pixel locates in the ICD circle, that is, outside of the decoding crescent but inside of the capture circle, add α to the gray level of this pixel; if the pixel locates in the decoding crescent, add β to the gray level of this pixel. In the two algorithms, we take α = 1 and β = 3 . It is obvious that these values satisfy z < 1 τ 2 , which means there exists intersection regions between the capture and ICD regions in WBG algorithm.
(1) Optimized GWs Placement
By algorithm of WBG, we can get an optimized placement of GW at the red-filled circle, labeled 1 GW in Figure 10b, which is a magnified view of the center of Figure 10a. Figure 10c shows the coordinates of all SNs and GW positions. The 1 GW is exactly in the region overlapped by the maximum number of crescents, where the average contentions for all of SNs is the least, which means it can decode the most packets in two-way collision. Figure 10d–f presents the contention of each SN by three cases of the GW placement, respectively. We can see in Figure 10d that contention of each SN is zero after capture and IC by the GW, which means that any packet transmitted by any of the three SNs could be decoded successfully in two-way collision. At the same time, it is obvious that the number of contention with capture only shown by the red line with circles in Figure 10d is more than that achieved by WBG algorithm.
(2) Placement GWs Manually
To certify the results of the WBG algorithm, we place the GW location manually in the capture region but outside of the decoding crescent, as shown by 2 GW in Figure 10a,b. In Figure 10e, 1 SN’s contention is 2, which means the packet transmitted by it will be lost in any two-way collision. However, a packet transmitted by No. 3 could be decoded in any two-way collision with contention 0. Furthermore, it has to be noticed that the lines with capture only and capture with IC coincide because the GW is outside of all IC regions, but in one capture circle.
The 3 GW in Figure 10a,b, the blue-filled circle in the very center, is outside of all capture circles. Thus, the contention of each SN is 2, as shown in Figure 10f, i.e., none of packets transmitted by any SN can be decoded successfully in a two-way collision, whether by only capture or capture with IC.

5.3. Comparison of the WBG and PGL Algorithm

In this section, we compare the two algorithms in terms of average contention for different pixel densities. Assume 3–10 SNs are placed at random in a 20 × 20 m 2 network area. The average contention by two algorithms of WBG and PGL are shown in Figure 11. There are 100 × 100 pixels in Figure 11a and 1000 × 1000 pixels in Figure 11b. It is obvious that, as the pixel density is increased, the performance of the PGL algorithm approaches that of the WBG algorithm. In other words, the average contention of algorithms PGL and WBG, in the same network deployment space, will be more consistent, with more pixels at the same number of SNs and GWs. Therefore, the algorithm of PGL could have the enough accuracy for optimum location of GWs with enough pixels. We observe that PGL achieved a lower average contention for eight SNs with 100 × 100 pixels compared to 1000 × 1000 pixels. We attribute that aberration to the well-known fact that the greedy algorithm is not globally optimum and that the 100 × 100 locations may not have been a subset of the 1000 × 1000 locations.

5.4. Study of PGL for Larger and Different Network Topologies

In this and the following section, we compare the two algorithms for three network topologies, where we have specified a certain network size in terms of meters for the purpose of simulation. Because of the large number of SNs, we use only the PGL algorithm with 100 × 100 pixels for this study. Recall our assumption stated in the Introduction that each node in the network is within one hop of at least one GW and that there are many more SNs than GWs. Because of this, we have assumed that when one packet overlaps another packet, that the power of the weaker packet is so much greater than the noise that we can neglect the noise. Therefore, whether our topologies cover a large or small area, we still assume the weaker packet can be decoded on its own, because it is sufficiently stronger than the noise. In fact, the distances in the key equations, Equations (6) and (10), are in a ratio, so if the topology is scaled larger, the scaling factor cancels out and does not affect our results.
We consider a sine-shaped topology in Figure 12, a circle-shaped topology in Figure 13, and a random topology in Figure 14, each in a 10 m× 10 m area. To make the circle topology, 100 SNs are grouped into 10 groups of 10 SNs each. The centers of the groups are equally spaced on a circle of radius 4 m. First, each SN is independently perturbed in angle from the center of its group by a zero mean Gaussian random variable (RV) of standard deviation of 4.5 degrees. From that perturbed location, each SN is again perturbed in both X and Y coordinates by iid zero mean Gaussian RVs with standard deviation 0.2 m. To make the sine topology, the initial X coordinates are distributed randomly over 9 m. The initial Y coordinates are the result of mapping the initial X coordinates through a sine curve that has an amplitude of 4.5 m and period of 9 m. These initial X and Y coordinates are then perturbed by iid zero mean Gaussian RVs with standard deviation of 0.27 m. Only one random outcome of each type of topology for a given number of SNs is used. Figure 12a shows the locations of 100 SNs deployed by sine shape and three GWs are placed by PGL algorithm. Figure 12b compares the average contention, for different numbers of GWs with capture and IC and with capture only. It is obvious that the average contention decreases significantly for capture and IC, compared to capture only. Figure 12c shows the deployed locations of 100 SNs in sine shape and three GWs by naive placement. In Figure 12d, it is clear that the average contention for 20–100 SN and 1–3 GW placed by PGL is always less than that based on naive GW placement. Figure 13 and Figure 14 show the similar conclusion with the SN deployed separately by circle and random topologies. Specifically, for the circle topology in Figure 13, we note that the naive and optimal GW placements are similar for two GWs, and the corresponding average contentions are close. For the random topology, we observe a larger difference between the naive and PGL placements.

5.5. Contentions versus GWs Number

In this section, we consider the total contention reduction ratio by optimal placing of 1–5 GWs placed by PGL algorithm with capture and IC and capture only (Figure 15, which presents a comparison to Ref. [8]). The contention reduction ratio is defined ( N n ¯ 1 ) / ( N 1 ) , where N is the total number of SNs and n ¯ is the average contention. We note that N 1 is the contention of a SN when no capture is possible; in this case, any interference level is enough to prevent a packet from being decoded. The contention reduction ratio can be interpreted as the average fraction of SNs whose colliding packet will not cause a given SN’s packet to be lost. A perfect contention reduction ratio would be 1, which would mean that no SN’s packet would be lost in a two-way collision with any other SN’s packet. In this simulation, the number of SNs is increased up to 500 following a uniform random spatial distribution in a 100 m × 100 m area with the 1 m × 1 m pixel density. It is shown obviously in Figure 15a that a small number of GWs placed by optimal algorithm of PGL with capture and IC can decrease the contentions significantly. In other words, many deployed GWs is not necessary for some network layouts. For example, two GWs can reduce the contention level to above 90 % , and 3–5 GWs provide little additional benefit on reducing the contention level. Therefore, the optimal number of GWs can be decided in the network infrastructure, based on this algorithm and other requirements.

5.6. Required GWs and Minimum Contentions

Here, a desired contention level is specified for each given number of SNs. Then, the minimum required number of GWs to reach the desired contention level is determined, using the PGL algorithm, as shown in Figure 16a,b. Among the three desired average contention levels, 10, 30 and 50, the contention of 10 is a more strict requirement in 500 SNs than that of 50, which requires five GWs for 500 SNs compared to two GWs for the same number of SNs with capture and IC. On the other hand, with capture only, 15 GWs are required to get desired average contention levels of 10 with 500 SNs compared to five GWs at the same contention levels for capture and IC.

6. Conclusions

This paper provides a theoretical basis and a practical method to find the optimum location of GWs for transmit-only LPWA networks, assuming capture and interference cancellation. We follow the popular model that the residual interference from cancellation is a fraction of the power of the canceled packet. Based on this model and assuming a signal-to-interference or capture threshold for decoding, we derived the symmetric crescent shaped regions where a GW can be placed, to enable decoding of both packets in collision sent by two SNs. Based on this conclusion, to get the minimum average contentions, which means to achieve maximum PDR, we designed two greedy algorithms to find the optimized location of GWs. One algorithm is more precise but computationally complex. The other can be made to closely approximate the precise one, with much lower complexity. Based on simulation results, we showed that the lower complexity algorithm can get lower average contentions over different numbers of SNs, compared to the naive placement. Alternatively, the results show that the required number of GWs to perform the same average contention at a fixed number of SNs could be fewer with the optimal placement.
Our future work, besides optimizing the above WBG and PGL algorithms, will focus on the optimized location of GWs, adding the impacts of noise and multi-path fading. Furthermore, when more than two SNs are in collision, the approach in this paper cannot be applied. Then, a new algorithm for any number of nodes collision should be designed.
References

Author Contributions

Conceptualization, H.T. and M.A.W.; methodology, H.T., M.A.W. and G.N.; software, H.T. and G.N.; validation, H.T., M.A.W. and G.N.; writing original draft preparation, H.T.; supervision, M.A.W.; project administration, H.T.; funding acquisition, H.T. and M.A.W.

Funding

Hongxian Tian’s work was supported by the China National Natural Science Foundation under grant No. 61671050 and No. 51474015. Mary Ann Weitnauer was supported by the USA National Science Foundation under grant Nos. 1513884 and 1343256. This work was partly supported by Natural Science Foundation of China No. 61601018.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Vashi, S.; Ram, J.; Modi, J.; Verma, S.; Prakash, C. Internet of Things (IoT): A Vision, Architectural Elements, and Security Issues. In Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; pp. 492–496. [Google Scholar]
  2. Sigfox. Available online: http://www.sigfox.com/en/ (accessed on 15 February 2016).
  3. LoRa Alliance. Available online: https://www.lora-alliance.org/ (accessed on 20 February 2016).
  4. Standardization of NB-IOT Completed. Available online: http://www.3gpp.org/news-events/3gpp-news/1785-nb (accessed on 15 March 2016).
  5. LPWA Conference. London, UK, 23–24 May 2017. Available online: http://www.iotnetworksevent.com/welcome (accessed on 25 March 2016).
  6. Zhao, J.; Qiao, C.; Sudhaakar, R.S.; Yoon, S. Improve Efficiency and Reliability in Single-Hop WSN with Transmit-Only Nodes. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 520–534. [Google Scholar] [CrossRef]
  7. Zhao, J.; Sudhaakar, R.S.; Qiao, C. Providing Reliable Data Services in Hybrid WSNs with Transmit-only Nodes. In Proceedings of the IEEE Global Telecommunications Conference GLOBECOM, Miami, FL, USA, 6–10 December 2010; pp. 1–5. [Google Scholar]
  8. Firner, B. Transmit Only for Dense Wireless Networks. Ph.D. Dissertation of Philosophy, The State University of New Jersey, New Brunswick, NJ, USA, 2014. [Google Scholar]
  9. IEEE 802.11 wg, Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specification; IEEE Standard; IEEE: Piscataway, NJ, USA, August 1999.
  10. Polastre, J.; Hill, J.; Culler, D. Versatile Low Power Media Access for Wireless Sensor Networks. In Proceedings of the Second International Conference Embedded Networked Sensor Systems (SenSys ‘04), Memphis, TN, USA, 3–6 November 2014; pp. 95–107. [Google Scholar]
  11. Ye, W.; Heidemann, J.; Estrin, D. An Energy-Efficient MAC Protocol for Wireless Sensor Networks. In Proceedings of the IEEE INFOCOM 2002 Conference on Computer Communications, New York, NY, USA, 23–27 June 2002; Volume 3, pp. 1567–76. [Google Scholar]
  12. Pister, K.S.J.; Doherty, L. TSMP: Time Synchronized Mesh Protocol. In Proceedings of the IASTED International Symposium on Distributed Sensor Networks, Palma de Mallorca, Spain, 1–3 September 2008; pp. 391–398. [Google Scholar]
  13. Casini, E.; Gaudenzi, R.D. Contention Resolution Diversity Slotted ALOHA(CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks. IEEE Trans. Wirel. Commun. 2007, 6, 1408–1419. [Google Scholar] [CrossRef]
  14. Zanella, A.; Biral, A.; Zorzi, M. Asymptotic Throughput Analysis of Massive M2M Access. In Proceedings of the 2015 Information Theory and Applications Workshop (ITA), San Diego, CA, USA, 1–6 February 2015; pp. 64–69. [Google Scholar]
  15. Shao, S.; Liang, Q.; Deng, K.; Tang, Y. Optimal Location of the Base Station Based on Measured Interference Power. In Proceedings of the 2015 IEEE International Wireless Symposium (IWS), Shenzhen, China, 30 March–1 April 2015; pp. 1–3. [Google Scholar]
  16. Forooshani, A.E.; Lotfi-Neyestanak, A.A.; Michelson, D.G. Optimization of Antenna Placement in Distributed MIMO Systems for Underground Mines. IEEE Trans. Wirel. Commun. 2014, 13, 4685–4692. [Google Scholar] [CrossRef]
  17. Athanasiadou, G.E.; Tsoulos, G.V.; Zarbouti, D. A Combinatorial Algorithm for Base-station Location Optimization for LTE Mixed-Cell MIMO Wireless Systems. In Proceedings of the 9th European Conference on Antennas and Propagation (EuCAP), Lisbon, Portugal, 13–17 April 2015; pp. 1–5. [Google Scholar]
  18. Lu, H.-C.; Liao, W.; Lin, F.Y.-S. Relay Station Placement Strategy in IEEE 802.16j WiMAX Networks. IEEE Trans. Commun. 2011, 59, 151–158. [Google Scholar] [CrossRef]
  19. Liu, S.; Liu, L. Planning base station and relay station locations in IEEE 802.16j 3-hop relay network. In Proceedings of the 2015 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Ningbo, China, 19–22 September 2015; pp. 1–4. [Google Scholar]
  20. El Mouna Zhioua, G.; Tabbane, N.; Labiod, H.; Tabbane, S. A Fuzzy Multi-Metric QoS-Balancing Gateway Selection Algorithm in a Clustered VANET to LTE Advanced Hybrid Cellular Network. IEEE Trans. Veh. Technol. 2015, 64, 804–817. [Google Scholar] [CrossRef]
  21. Javaid, N.; Waseem, M.; Khan, Z.A. ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSN. In Proceedings of the 2013 Saudi International Electronics, Communications and Photonics Conference (SIECPC 2013), Riyadh, Saudi Arabia, 27–30 April 2013; pp. 364–367. [Google Scholar]
  22. Liao, Y.; Qi, H.; Li, W. Load-Balanced Clustering Algorithm with Distributed Self-Organization for Wireless Sensor Networks. IEEE Sers. J. 2013, 13, 1498–1506. [Google Scholar] [CrossRef]
  23. Pan, J.; Cai, L.; Hou, Y.T.; Shi, Y.; Shen, X. Optimal Base-Station Locations in Two-Tiered Wireless Sensor Networks. IEEE Trans. Mob. Comput. 2005, 4, 458–473. [Google Scholar] [CrossRef]
  24. Tuan, L.K.; Hai, N.N.; Nguyen, H.T.; Binh, H.T.T. Integrated and heuristic methods for maximizing the lifetime of wireless sensor networks with optimal base station location for disaster forecast. In Proceedings of the IEEE Region 10 Humanitarian Technology Conference, Cebu City, PA, USA, 9–12 December 2015; pp. 1–5. [Google Scholar]
  25. Hanifi, A.; Amiri, J.; Kazimov, T. Base Station Location for Energy Efficient in Wireless Sensor Network. In Proceedings of the Problems of Cybernetics and Informatics (PCI), 2012 IV International Conference, Baku, Azerbaijan, 12–14 September 2012; pp. 1–4. [Google Scholar]
  26. Lau, C.; Leung, C. Capture Models for Mobile Packet Radio Networks. IEEE Trans. Commmun. 1992, 40, 917–925. [Google Scholar] [CrossRef]
  27. Firner, B.; Xu, C.; Howard, R.; Zhang, Y. Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks. In Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’10), Chicago, IL, USA, 20–24 September 2010; pp. 211–220. [Google Scholar]
  28. Lee, J.; Kim, W.; Lee, S.J.; Jo, D.; Ryu, J.; Kwon, T.; Choi, Y. An Experimental Study on the Capture Effect in 802. In 11a Networks. In Proceedings of the Second ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WinTECH ’07), Montreal, QC, Canada, 10 September 2007; pp. 19–26. [Google Scholar]
  29. Warrier, D.; Madhow, U. On the Capacity of Cellular CDMA with Successive Decoding and Controlled Power Disparities. In Proceedings of the 48th IEEE Vehicular Technology Conference. Pathway to a Global Wireless Revolutio (VTC’98), Ottawa, ON, Canada, 18–21 May 1998; Volume 3, pp. 1873–1877. [Google Scholar]
  30. Weber, S.P.; Andrews, J.G.; Yang, X.; de Veciana, G. Transmission Capacity of Wireless Ad Hoc Networks with Successive Interference Cancellation. IEEE Trans. Inf. Theory 2007, 53, 2799–2814. [Google Scholar] [CrossRef]
  31. Proakis, J.G. Digital Communications; McGraw-Hill: New York, NY, USA, 1995. [Google Scholar]
  32. Zanella, A.; Zorzi, M. Theoretical Analysis of the Capture Probability in Wireless Systems with Multiple Packet Reception Capabilities Communications. IEEE Trans. Commun. 2012, 60, 1058–1071. [Google Scholar] [CrossRef]
  33. Weitnauer, M.A.; Lin, Q.; Zhang, H.; Tian, H.; Nowlan, S.M.; Nyengele, G.; Mohan, S.; Stratigos, J. Reliability and Longer Range for Low Power Transmitters with On Demand Network MIMO. In Proceedings of the 2016 IEEE International Conference on RFID (RFID), Orlando, FL, USA, 3–5 May 2016; pp. 1–10. [Google Scholar]
Figure 1. The network topology of the TO LPWAN.
Figure 1. The network topology of the TO LPWAN.
Sensors 18 03884 g001
Figure 2. The capture region defined by center and radius, based on SN pair ( s 1 , s 2 ).
Figure 2. The capture region defined by center and radius, based on SN pair ( s 1 , s 2 ).
Sensors 18 03884 g002
Figure 3. The blue regions outside of the circle are the ICD regions for s 2 , following IC of s 1 , for β 1 .
Figure 3. The blue regions outside of the circle are the ICD regions for s 2 , following IC of s 1 , for β 1 .
Sensors 18 03884 g003
Figure 4. The capture and ICD Region for a pair of SNs ( s i , s j ) , for τ > 1 and: (a) z 1 τ 2 ; (b) 1 τ 2 < z 1 τ ; and (c,d) z > 1 τ .
Figure 4. The capture and ICD Region for a pair of SNs ( s i , s j ) , for τ > 1 and: (a) z 1 τ 2 ; (b) 1 τ 2 < z 1 τ ; and (c,d) z > 1 τ .
Sensors 18 03884 g004
Figure 5. The capture margin of the τ with fixed z.
Figure 5. The capture margin of the τ with fixed z.
Sensors 18 03884 g005
Figure 6. The location margin of δ . The blue region shows the location of GW: with location margin (b); and without location margin (a).
Figure 6. The location margin of δ . The blue region shows the location of GW: with location margin (b); and without location margin (a).
Sensors 18 03884 g006
Figure 7. Crescent of each pair of SNs and location of 3 SNs and 2 GWs. The crescent region where the GW can decode both collided packets sent by the pair of SNs with capture effect and IC method, are shown in (a). In (bd), the OPs are generated by the crescents corresponding to groups of sensor pairs { s 1 and s 2 , s 2 and s 3 } , { s 1 and s 2 , s 1 and s 3 } and { s 1 and s 3 , s 2 and s 3 } , respectively, such as { p 1 , p 2 , , p 12 } in (b).
Figure 7. Crescent of each pair of SNs and location of 3 SNs and 2 GWs. The crescent region where the GW can decode both collided packets sent by the pair of SNs with capture effect and IC method, are shown in (a). In (bd), the OPs are generated by the crescents corresponding to groups of sensor pairs { s 1 and s 2 , s 2 and s 3 } , { s 1 and s 2 , s 1 and s 3 } and { s 1 and s 3 , s 2 and s 3 } , respectively, such as { p 1 , p 2 , , p 12 } in (b).
Sensors 18 03884 g007
Figure 8. Example of the suggested WBG Algorithm with 3 SNs and GWs. (a) shows the complete bipartite graph, where α = 1 and β = 2 . The weights of the edges joining P 11 and V s 1 , s 3 and joining P 17 and V s 1 , s 3 are 1 and 2, respectively, as shown in (b).
Figure 8. Example of the suggested WBG Algorithm with 3 SNs and GWs. (a) shows the complete bipartite graph, where α = 1 and β = 2 . The weights of the edges joining P 11 and V s 1 , s 3 and joining P 17 and V s 1 , s 3 are 1 and 2, respectively, as shown in (b).
Sensors 18 03884 g008
Figure 9. PGL Algorithm with 3 SN and 2 GW.
Figure 9. PGL Algorithm with 3 SN and 2 GW.
Sensors 18 03884 g009
Figure 10. Contentions of each SN when a GW is placed at different locations. 1 GW is at the location by WBG placement, 2 GW is at the location of capture circle only and 3 GW is at location of out of any crescentm as shown in (a,b) by zooming in. (c) The coordinate location of SNs and GWs in different strategy. (df) The contention of each SN with three cases of the GW placement, respectively.
Figure 10. Contentions of each SN when a GW is placed at different locations. 1 GW is at the location by WBG placement, 2 GW is at the location of capture circle only and 3 GW is at location of out of any crescentm as shown in (a,b) by zooming in. (c) The coordinate location of SNs and GWs in different strategy. (df) The contention of each SN with three cases of the GW placement, respectively.
Sensors 18 03884 g010
Figure 11. Average Contention for different number of SNs with one and two GWs, by WBG and PGL algorithms with capture only and capture with IC for different pixel densities.
Figure 11. Average Contention for different number of SNs with one and two GWs, by WBG and PGL algorithms with capture only and capture with IC for different pixel densities.
Sensors 18 03884 g011
Figure 12. Simulation visualizations for three GWs placed by PGL (a) and by naive placement (c) along a sine wave composed by 100 SNs. (b) The average contentions comparing in different number of GWs by capture and IC to capture only separately; and (d) the average contentions for capture and IC comparing in different number of GWs placed by PGL and naive.
Figure 12. Simulation visualizations for three GWs placed by PGL (a) and by naive placement (c) along a sine wave composed by 100 SNs. (b) The average contentions comparing in different number of GWs by capture and IC to capture only separately; and (d) the average contentions for capture and IC comparing in different number of GWs placed by PGL and naive.
Sensors 18 03884 g012
Figure 13. Simulation visualizations for three GWs placed by PGL (a) and by naive placement (c) in the circumference of a circle composed by 100 SNs. (b) The average contentions comparing in different number of GWs by capture and IC to capture only separately; and (d) the average contentions comparing for capture and IC in different number of GWs placed by PGL and naive.
Figure 13. Simulation visualizations for three GWs placed by PGL (a) and by naive placement (c) in the circumference of a circle composed by 100 SNs. (b) The average contentions comparing in different number of GWs by capture and IC to capture only separately; and (d) the average contentions comparing for capture and IC in different number of GWs placed by PGL and naive.
Sensors 18 03884 g013
Figure 14. Simulation visualizations for three GWs placed by PGL (a) and by naive placement (c) in the circumference composed by 100 SNs in a uniformly random distribution. (b) The average contentions comparing in different number of GWs by capture and IC to capture only separately; and (d) the average contentions for capture and IC comparing in different number of GWs placed by PGL and naive.
Figure 14. Simulation visualizations for three GWs placed by PGL (a) and by naive placement (c) in the circumference composed by 100 SNs in a uniformly random distribution. (b) The average contentions comparing in different number of GWs by capture and IC to capture only separately; and (d) the average contentions for capture and IC comparing in different number of GWs placed by PGL and naive.
Sensors 18 03884 g014
Figure 15. The results with GWs placed by the PGL algorithm with capture and IC and capture only both show that a given number of GWs can give a predictable contentions reduction even with more SNs. However, with capture and IC, the reduction of contentions has much more than that with capture only.
Figure 15. The results with GWs placed by the PGL algorithm with capture and IC and capture only both show that a given number of GWs can give a predictable contentions reduction even with more SNs. However, with capture and IC, the reduction of contentions has much more than that with capture only.
Sensors 18 03884 g015
Figure 16. To maintain a desired minimum average contention, the number of GWs placed by the PGL algorithm, both with capture and IC and capture only, will grow with the increasing number of SNs. However, the required minimum number of GWs placed by PGL with capture and IC will be less than that with capture only.
Figure 16. To maintain a desired minimum average contention, the number of GWs placed by the PGL algorithm, both with capture and IC and capture only, will grow with the increasing number of SNs. However, the required minimum number of GWs placed by PGL with capture and IC will be less than that with capture only.
Sensors 18 03884 g016

Share and Cite

MDPI and ACS Style

Tian, H.; Weitnauer, M.A.; Nyengele, G. Optimized Gateway Placement for Interference Cancellation in Transmit-Only LPWA Networks. Sensors 2018, 18, 3884. https://doi.org/10.3390/s18113884

AMA Style

Tian H, Weitnauer MA, Nyengele G. Optimized Gateway Placement for Interference Cancellation in Transmit-Only LPWA Networks. Sensors. 2018; 18(11):3884. https://doi.org/10.3390/s18113884

Chicago/Turabian Style

Tian, Hongxian, Mary Ann Weitnauer, and Gedeon Nyengele. 2018. "Optimized Gateway Placement for Interference Cancellation in Transmit-Only LPWA Networks" Sensors 18, no. 11: 3884. https://doi.org/10.3390/s18113884

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop