Performance evaluation of variable bandwidth channel allocation scheme in multiple subcarrier multiple access

Nitish Rajoria, Hiromu Kamei, Jin Mitsugi, Yuusuke Kawakita, Haruhisa Ichikawa

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

Multiple Subcarrier Multiple Access (MSMA) enables concurrent sensor data streamings from multiple wireless and batteryless sensors using the principle of subcarrier backscatter used extensively in passive RFID. Since the interference cancellation performance of MSMA depends on the Signal to Interference plus Noise Ratio of each subcarrier, the choice of channel allocation scheme is essential. Since the channel allocation is a combinatorial problem, obtaining the true optimal allocation requires a vast amount of examinations which is impracticable in a system where we have tens of sensor RF tags. It is particularly true when we have variable distance and variable bandwidth sensor RF tags. This paper proposes a channel allocation scheme in the variable distance and variable bandwidth MSMA system based on a newly introduced performance index, total contamination power, to prioritize indecision cases. The performance of the proposal is evaluated with existing methods in terms of average communication capacity and system fairness using MATLAB Monte Carlo simulation to reveal its advantage. The accuracy of the simulation is also verified with the result obtained from the brute force method.

Original languageEnglish
Pages (from-to)564-572
Number of pages9
JournalIEICE Transactions on Communications
VolumeE101B
Issue number2
DOIs
Publication statusPublished - 2018 Feb

Keywords

  • Multiple access
  • Passive communications
  • Subcarrier allocation
  • Wireless sensing

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Performance evaluation of variable bandwidth channel allocation scheme in multiple subcarrier multiple access'. Together they form a unique fingerprint.

Cite this