Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019:99:10.1109/TCOMM.2019.2903097.
doi: 10.1109/TCOMM.2019.2903097.

Slot Jamming Effect and Mitigation Between LTE-LAA and WLAN Systems With Heterogenous Slot Durations

Affiliations

Slot Jamming Effect and Mitigation Between LTE-LAA and WLAN Systems With Heterogenous Slot Durations

Yao Ma et al. IEEE Trans Commun. 2019.

Abstract

To improve spectrum sharing between long-term evolution (LTE) license assisted access (LAA) and incumbent systems such as wireless local area networks (WLANs) in unlicensed spectrum, listen before talk (LBT) has been proposed as a candidate for LAA channel access. To allow for a robust spectrum sensing performance, LBT may use a backoff-slot duration that is substantially larger than its WLAN counterpart. There is potential for an unknown backoff slot-jamming (SJ) effect, which may significantly decrease channel access probability (CAP) and throughput of LAA-LBT links. In this paper, we study the SJ effect and propose an effective anti-SJ (ASJ) LBT scheme. To gain theoretical insight, we develop a new performance analysis approach on coexisting systems with different slot durations. We model the LAA backoff process with super-counters, provide an in-depth analysis of the backoff process, and derive key performance indicator (KPI) statistics. These KPIs include backoff hold time, successful transmission probability, CAP, and throughput. Simulation results thoroughly validate our analytical results, and show that the ASJ-LBT scheme is effective in mitigating the SJ effect. These results fill a major technical gap in spectrum sharing research and may be extended to support system optimization and coexistence analysis of other heterogeneous systems.

Keywords: CSMA/CA; LTE-LAA; MAC-layer Performance Analysis; WLAN; Wireless Spectrum Sharing.

PubMed Disclaimer

Figures

Fig. 1:
Fig. 1:
Flow diagram of LTE downlink LAA LBT Category-4 procedure (aka, an original LBT), adopted from [4], [5] with minor revisions. We mark the backoff SJ effect assuming that the LTE-LAA system has a backoff-slot duration larger than that of the WLAN system.
Fig. 2:
Fig. 2:
Backoff counter reduction and transmission process of one LAA link (with original-LBT) and one WLAN link, when the LAA has backoff-slot duration three times as large as that of the WLAN system (Ns = 3).
Fig. 3:
Fig. 3:
Backoff counter reduction and transmission process of one LAA link (with the proposed ASJ-LBT) and one WLAN link, when Ns = 3.
Fig. 4:
Fig. 4:
Markov model for the LTE-LAA category-4 LBT procedure in coexistence with WLAN, when overall state transition has K + 1 stages, and backoff stage k (state Rk) is illustrated (with Ns > 1).
Fig. 5:
Fig. 5:
Proposed super-counter model for the original LTE-LAA LBT procedure in coexistence with WLAN (when Ns > 1).
Fig. 6:
Fig. 6:
Proposed backoff model on probability paths for the LAA with ASJ-LBT.
Fig. 7:
Fig. 7:
Throughput of two CSMA/CA links, when Ns = 1 ~ 5. CW = 16 for both links, without retransmission.
Fig. 8:
Fig. 8:
Average successful transmission probability per link of the LAA and WLAN systems vs. nW, when Ns = 2, K = 1, M = 3, Z0 = W0 = 16, nL = nW, and with RTS/CTS schemes. (a) Original LBT and (b) ASJ-LBT.
Fig. 9:
Fig. 9:
Backoff counter hold time per reduction of LAA and WLAN systems vs. nW, when Ns = 3, K = 1, M = 3, Z0 = W0 = 16, nL = nW, and with RTS/CTS schemes.
Fig. 10:
Fig. 10:
System throughput of LAA and WLAN vs. PER (PE P,L = PE P,W), when Ns = 2, K = M = 3, W0 = Z0 = 16, nL = nW = 10, and with basic access schemes.
Fig. 11:
Fig. 11:
System throughput of LAA and WLAN systems vs. PER (PE P,L = PE P,W), when Ns = 2, K = M = 3, W0 = Z0 = 16, nL = nW = 10, and with RTS/CTS access schemes.
Fig. 12:
Fig. 12:
System throughput of LAA and WLAN vs. nW, when Ns = 3, K = 1, M = 3, Z0 = W0 = 16, nL = 4, and with RTS/CTS schemes.
Fig. 13:
Fig. 13:
Throughput per link in the LAA and WLAN systems vs. nL, when Ns = 2, K = M = 3, W0 = Z0 = 16, and nW + nL = 20. (a) WLAN basic access and LAA RTS/CTS access; (b) Both WLAN and LAA use RTS/CTS.
Fig. 14:
Fig. 14:
System throughput of LAA and WLAN vs. Z0, when Ns = 2, K = M = 3, W0 = 16, nL = nW = 10, and with RTS/CTS access schemes.
Fig. 15:
Fig. 15:
Illustration of Markov model for the LAA CR when Ns = 1.

References

    1. Zhang R, Wang M, Cai LX, Zheng Z, and Shen X, “LTE-unlicensed: the future of spectrum aggregation for cellular networks,” IEEE Wireless Commun, vol. 22, no. 3, pp. 150–159, June 2015.
    1. Abinader FM, et al. “Enabling the coexistence of LTE and Wi-Fi in unlicensed bands,” IEEE Commun. Mag,. vol. 52, no. 11, pp. 54–61, November 2014.
    1. Mukherjee A et al. , “Licensed-assisted access LTE: coexistence with IEEE 802.11 and the evolution toward 5G,” IEEE Commun. Mag., vol. 54, no. 6, pp. 50–57, June 2016.
    1. 3GPP TSG RAN, “Study On Licensed-Assisted Access To Unlicensed Spectrum”, 3GPP TR 36.889 V13.0.0, June 2015.
    1. Ericsson, “Discussion on LBT protocols,” 3GPP Tech. Rep. R1-151996, April 2015.

LinkOut - more resources