You are on page 1of 15

202 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO.

2, JUNE 2015

ISI Mitigation Techniques in Molecular


Communication
Burcu Tepekule, Ali E. Pusane, H. Birkan Yilmaz, Chan-Byoung Chae, Senior Member, IEEE, and Tuna Tugcu

AbstractMolecular communication via diffusion (MCvD) is a I. I NTRODUCTION


new field of communication where molecules are used to transfer
information. One of the main challenges in MCvD is the inter-
symbol interference (ISI), which inhibits communication at high
data rates. Furthermore, at nanoscale, energy efficiency becomes
N ANOTECHNOLOGY enables miniaturization and fab-
rication of devices in a scale ranging from 1 to 100
nanometers. At this scale, a nano-machine can be consid-
an essential problem. Before addressing these problems, a pre- ered as the most basic functional unit [1]. Nano-machines are
determined threshold for the received signal must be calculated to
make a decision. In this paper, an analytical technique is proposed
tiny components consisting of an arranged set of molecules,
to determine the optimum threshold, whereas in the literature, which are able to perform very simple computation, sens-
these thresholds are calculated empirically. Since the main goal ing, and/or actuation tasks [2]. They can be interconnected to
of this paper is to build an MCvD system suitable for operat- form a nanonetwork, in which they can coordinate, share, and
ing at high data rates without sacrificing quality, new modulation fuse information. At such small dimensions, electromagnetic
and filtering techniques are proposed to decrease the effects of ISI
and enhance energy efficiency. As a transmitter-based solution, a
communication is challenging because of physical implemen-
modulation technique, molecular transition shift keying (MTSK), tation constraints, such as the ratio of the antenna size to the
is proposed in order to increase the data rate by suppressing wavelength of the electromagnetic signal [1], [3]. Molecular
ISI. Furthermore, for energy efficiency, a power adjustment tech- communication is a new field of communication suitable for
nique that utilizes the residual molecules is proposed. Finally, as nanonetworks, where instead of electric currents or electromag-
a receiver-based solution, a new energy efficient decision feed-
netic waves, patterns of molecules are used to transfer infor-
back filter (DFF) is proposed as a substitute for the conventional
decoders in the literature. The error performance of DFF and mation from a source (transmitter) to a destination (receiver)
MMSE equalizers are compared in terms of bit error rates, and [4]. In the literature, various molecular communication sys-
it is concluded that DFF may be more advantageous when energy tems, such as molecular communication via diffusion (MCvD),
efficiency is concerned, due to its lower computational complexity. calcium signaling, microtubules, pheromone signaling, and
bacterium-based communication are proposed [5], [6]. In this
Index TermsCommunication via diffusion, molecular paper, methods for improving the communication quality for
communication, nanonetworks, intersymbol interference, energy an MCvD system are investigated.
efficiency, modulation techniques, decision threshold.
A generic MCvD system includes five main processes:
encoding, emission (transmission), propagation, absorption
(reception), and decoding. Encoding is the process in which
Manuscript received October 14, 2014; revised July 9, 2015; accepted
October 6, 2015. Date of publication November 18, 2015; date of current the transmitter encodes the information onto a physical prop-
version January 14, 2016. The work of B. Tepekule, A. E. Pusane, and erty (e.g., number, type, etc.) of the messenger molecules.
T. Tugcu was supported in part by the Scientific and Technical Research Emission is the process by which the transmitter releases the
Council of Turkey (TUBITAK) under Grant 112E011, in part by the Bogazici
University Research Fund (BAP7436), and in part by the State Planning
messenger molecules into the environment. In the propagation
Organization (DPT) of the Republic of Turkey under the project TAM process, these molecules propagate through the environment
(2007K120610). The work of H. B. Yilmaz and C.-B. Chae was sup- following the physical characteristics of the channel. When
ported in part by the MSIP (Ministry of Science, ICT and Future Planning), some of these molecules arrive at the receiver (i.e., hit the
Korea, under the IT Consilience Creative Program (IITP-2015-R0346-15-
1008) supervised by the IITP (Institute for Information and Communications
receiver), they are sensed and absorbed by the receptors on the
Technology Promotion), and in part by the Basic Science Research Program surface of the receiver, which is called the receiving process.
(2014R1A1A1002186) funded by the Ministry of Science, ICT and Future Properties of these received molecules constitute the received
Planning (MSIP), Korea, through the National Research Foundation of Korea. signal and the received signal is decoded according to the
B. Tepekule was with the Department of Electrical Engineering,
Bogazici University, Bebek, Istanbul 34342, Turkey. She is now with the encoding technique [4].
Institute of Integrative Biology, ETH Zurich, Zurich, Switzerland (e-mail: In the literature, several techniques are proposed for the
burcu.tepekule@env.ethz.ch). encoding process. Concentration shift keying (CSK) and
A. E. Pusane is with the Department of Electrical and Electronics molecule shift keying (MoSK) are the most commonly used
Engineering, Bogazici University, Istanbul 34342, Turkey (e-mail: ali.pusane@
boun.edu.tr). modulation techniques for nanonetworks [7][9] where com-
H. B. Yilmaz and C.-B. Chae are with the Yonsei Institute of Convergence munication is realized via diffusion. In CSK, number of
Technology, School of Integrated Technology, Yonsei University, Seoul, South received messenger molecules is used as the amplitude of the
Korea (e-mail: birkan.yilmaz@yonsei.ac.kr; cbchae@yonsei.ac.kr).
signal. In the case of binary CSK (BCSK), the receiver decodes
T. Tugcu is with the Department of Computer Engineering, Bogazici
University, Istanbul 80815, Turkey (e-mail: tugcu@boun.edu.tr). the intended symbol as a bit-1 if the number of messenger
Digital Object Identifier 10.1109/TMBMC.2015.2501745 molecules arriving at the receiver during a symbol duration
2332-7804 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 203

exceeds a pre-determined threshold, and as a bit-0, otherwise. becomes a major constraint at nano scale [11] by limiting both
Binary MoSK (BMoSK), on the other hand, utilizes the emis- the processing power of the communicating devices and their
sion of two different types of messenger molecules, where the capacity to produce messenger molecules. Therefore, two dif-
transmitter releases the appropriate type of molecule based on ferent approaches can be considered for dealing with the energy
the current symbol. The receiver then decodes the intended efficiency problem in an MCvD system. First approach is to
symbol based on the type and number of the molecules received reduce the signal power, i.e., number of released molecules, as
during a time slot [10]. much as possible. The second approach is to reduce the power
Problems that occur in an MCvD system can be grouped into expended by a nano-machine during the encoding/decoding
two categories. The first category involves the problems caused processes, which requires the design of filters or equaliz-
by the random movements of the messenger molecules, i.e., dif- ers with minimal computational complexity. Both of these
fusion. The random movement of the messenger molecules lim- approaches would decrease the power consumption, while
its the amount of deterministic information about the received increasing the bit error rate. As a result, a trade off is observed
signal, therefore aggravates the decoding process. Notice that between the data rate, energy efficiency, and communication
BCSK generally utilizes a pre-determined threshold at the quality.
receiver to make a decision for the received signal. In the litera- The main goal of this paper is to propose new techniques
ture, these threshold values are usually calculated empirically as applicable at both transmitter and receiver sides, which can
follows: after the information transmission is over, the receiver be chosen and implemented depending on the physical con-
calculates the bit error rate for various detection threshold val- straints of the nano machines. Proposed techniques are aimed to
ues and chooses the optimal threshold that minimizes this error improve the overall communication quality to achieve arbitrar-
rate [10], [11]. This procedure requires the receiver to know ily low error rates at shorter symbol durations, hence increasing
the transmitted signal, which makes the communication pro- the data rate, while considering the energy constraints. For
cess itself redundant. Another approach may be sending a long the transmitter side, we propose a new modulation technique,
sequence of pilot symbols before the information transmission molecular transition shift keying (MTSK), which is an energy
and calculate the optimal threshold empirically as described efficient modulation technique designed to reduce the effects
above. Problem with this approach arises due to the high sensi- of ISI for a single-transmitter single-receiver communication
tivity of the optimal threshold values both to the order and the system. To enhance the energy efficiency, a power adjustment
value of the transmitted symbols. In order to have a sufficient technique that utilizes the residual molecules in the channel
representation of the system, one also has to send these pilot is also proposed. At the receiver side, we propose a deci-
symbols repetitively, so that a comprehensive understanding sion feedback filter for the decoding process, which has a
of the system behavior can be obtained. Additionally, optimal lower computational complexity compared to a minimum mean
threshold values are also sensitive to system parameters, i.e., squared error or decision feedback equalizer. Apart from the
if one of the system parameters, such as the diffusion coeffi- optimal threshold calculation, modulation and filtering tech-
cient, transmitter - receiver distance, etc. changes slightly, this niques proposed in this paper are potential solutions for MCvD
exhaustive procedure must be repeated. Although there is one systems under different constraints.
attempt in the recent literature [12] to calculate the optimal The remainder of this paper is organized as follows: Section
threshold analytically, proposed calculations consider only the II reviews the characteristics of the diffusion process, modu-
effect of one previous symbol, which is not sufficient for a dif- lation techniques in the literature, and the ISI problem. The
fusion channel at high data rates. As a result, more advanced proposed analytical technique to determine the optimum thresh-
problems of an MCvD system can not be properly addressed old value for a nano communication system is presented in
before solving the optimal thresholding problem. In this paper, Section III. Section IV introduces the transmitter based ISI
an analytical technique to determine the optimum threshold mitigation techniques, which include the proposed modulation
value prior to information transmission is proposed, which is technique, MTSK, and the power adjustment method applied to
the first main contribution of this paper. different modulation techniques. Receiver based ISI mitigation
Another problem caused by diffusion is the inter symbol techniques that include the proposed decision feedback filter
interference (ISI). Due to the nature of diffusion, some of the (DFF) and the MMSE equalizer are given in Section V. Section
messenger molecules may fail to arrive at the receiver in their VI concludes the paper.
intended time slots and interfere with the messenger molecules
of subsequent transmissions, causing ISI. One of the possi-
ble solutions to reduce the amount of ISI at the receiver is to II. M OLECULAR C OMMUNICATION VIA
D IFFUSION AND ISI
keep the symbol duration as long as possible and, thus, allow
the messenger molecules a longer time to reach their destina- The communication model used in this paper is depicted in
tions. This effectively reduces the number of residual molecules Figure 1. Messenger molecules are used as information car-
left in the channel. On the other hand, increasing the symbol riers between a point source and a spherical receiver with
duration also decreases the data rate, which is already low com- absorbing receptors. The point source is located at a distance
pared to electromagnetic and optic channels due to the nature r0 from the center of the receiver. The point source and the
of diffusion. spherical receiver both reside in a fluid propagation medium,
The second category of problems arises due to the extremely which is an unbounded 3-dimensional (3-D) environment. After
small size of the nano scaled devices. Energy efficiency the information is modulated onto some physical property of
204 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

Fig. 2. f hit (t) for rr = 5 m, r0 = 10 m, and D = 79.4 m 2 /s.


Fig. 1. MCvD system model including a point source and a spherical receiver.

the messenger molecules, these molecules are released to the given the initial distance r0 . The first boundary condition is [15,
medium, where they diffuse according to Brownian motion and Eq. (3.63)]
arrive at the receiver. To receive the molecules (i.e. the signal),
the spherical receiver with radius rr , uses receptors placed on lim p(r, t|r0 ) = 0, (2)
r
its surface.
The messenger molecules are the information particles for which reflects the assumption that the distribution of the
an MCvD system. At this scale, random movement/diffusion of molecules vanishes at distances far greater than r0 . The second
particles through the fluid is modeled by Brownian motion. The boundary condition is [15, Eq. (3.64)]
motion is governed by the combined forces applied to a mes- p(r, t|r0 )
senger molecule by the molecules of the fluid due to thermal D = wp(r, t|r0 ) for r = rr , (3)
r
energy. Brownian motion is described by the Wiener process,
which is a continuous-time stochastic process. where D, rr and w denote the diffusion coefficient, radius of
For simulating the Brownian motion in an n-dimensional the receiver and the rate of reaction, respectively. When the rate
space, time is divided into 1 ms long steps for a variety of sym- of reaction approaches infinity, it corresponds to the boundary
bol durations at the order of 100 ms, and at each time step, ran- condition in which every collision leads to an absorption. In
dom movement is applied to each dimension as rt+t = rt + other words, receiver is completely covered with receptors and
 r . The total displacement of a molecule ( r ) in one time step all receptors are perfectly absorbing.
(t) can be found as  r = (x1 , . . . , xn ), where xi is the Solving (3) for w with the given boundary and initial
displacement of a molecule in the i th dimension. Movement in conditions yields [15, Eq. (3.104)]
each dimension for a given time step is modeled independently
1 1
and follows a Gaussian distribution, i.e., xi N(0, 2Dt) p(r, t|r0 ) =
i {1, . . . , n}, where N(, 2 ) denotes the Gaussian distribu- 4rr0 4 Dt
 
tion with mean and variance 2 . Molecules propagate in the (r r0 )2 (r +r0 2rr )2
e 4Dt e 4Dt . (4)
environment according to these dynamics. As conventionally
done in the literature, our model assumes that the molecules are
dilute enough for the frequency of collisions to be insignificant, Using (4), the hitting rate of molecules is also calculated in
and therefore, ignores the collisions between the messenger [15, Eq. (3.108)] as
molecules [13], [14]. Molecules within the receiver volume
f hit (t) = 4rr2 w p(rr , t|r0 )
at the end of each time step is assumed to be absorbed. This
model utilizing the Brownian motion is used for Monte Carlo rr 1 r 0 rr (r0 rr )2
= e 4Dt , (5)
simulations. r0 4 Dt t

which is illustrated in Figure 2 for rr= 5 m, r0 = 10 m, and


A. Absorption Rate of a Perfectly Absorbing Spherical D = 79.4 m 2 /s 1 . Note that f hit (t) = molecule ratio/second,
Receiver which corresponds to the fraction of released molecules that
Fraction of molecules hitting a perfectly absorbing spherical hits the receiver per unit time. Furthermore, integrating f hit (t),
receiver located at (0, 0, 0) has been recently derived in [15] by fraction of molecules absorbed by the receiver until time t,
solving the Ficks diffusion equation with relevant initial and Fhit (t), can be obtained as [15, Eq. (3.116)]
boundary conditions and describing the absorbing process. The t  
initial condition is defined as [15, Eq. (3.61)] rr r 0 rr
Fhit (t) = f hit (t )dt = erfc . (6)
r0 4Dt
1 0
p(r, t 0|r0 ) = (r r0 ), (1)
4r02 1 These values are considered to be typical, since they simulate an environ-
ment where human insulin hormone is used as the messenger molecules, and
where p(r, t|r0 ) is the molecule distribution function at time a device whose capabilities are similar to a pancreatic -cell is used as the
t, and r is the distance of molecules from their initial position tranmistter [11].
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 205

Fig. 3. Effects of ISI for BCSK encoded sequence, where rr = 5 m, r0 = 10 m, D = 79.4 m 2 /s, n 0 = 0, n 1 = 500 and ts = 200ms.

Time dependent formulation for the fraction of molecules calculated, and effects of ISI on each time slot are illustrated
absorbed by the receiver is an important formulation in the in Figure 3a.
nanonetworking domain, since (5) and (6) describe the response Similar to the BCSK, the residual molecules from the pre-
of the diffusion channel completely. vious symbols also cause ISI when BMoSK is used. BMoSK
is less susceptible to ISI effects than the BCSK technique
[10]. However, BMoSK requires the synthesis of two types of
molecules rather than one, and number of molecules released
B. Modulation and Demodulation Techniques from transmitter almost doubles, since bit-0s are also encoded
with constant number of molecules. Effects of ISI for BMoSK
BCSK and BMoSK are the two most common modulation is illustrated in Figure 3b, where the same binary message
techniques for MCvD. In BCSK, number of the received mes- sequence of {1, 1, 0, 1, 0, 1, 1} is used.
senger molecules is used as the amplitude of the signal. The In conclusion, both modulation techniques are inefficient in
receiver decodes the intended symbol as a bit-1 if the num- terms of energy efficiency and ISI mitigation when molecular
ber of messenger molecules arriving at the receiver during a communication at high data rates is considered. Additionally,
time slot exceeds a pre-determined threshold, and as a bit- there is no technique in the literature besides the empirical one
0, otherwise. To represent different values of symbols, the to calculate the threshold value for a BCSK encoded sequence.
transmitter releases different number of molecules for each
value the symbol can represent, e.g., the transmitter releases
n 0 molecules for a bit-0, whereas it releases n 1 molecules
for a bit-1 [10]. As mentioned earlier, in the literature, the III. ISI T HRESHOLD C OMPUTATION T ECHNIQUE
threshold is typically empirically chosen by using a long In the literature, the optimal threshold is usually assumed to
sequence of pilot symbols. BMoSK, on the other hand, utilizes be calculated after the information transmission is over, which
the emission of two different types of messenger molecules requires the receiver to know the transmitted signal, and makes
to represent information. The transmitter releases a constant the communication process itself redundant. The error rates
number of type-A or type-B molecules for the current sym- obtained after such thresholding would provide a lower bound
bol values of bit-0 and bit-1, respectively. The receiver then for the bit error rates, rather than a realistic result. There are
decodes the intended symbol based on the type and the num- also different approaches in the literature on the design of an
ber of the molecules received during a time slot [10]. Unlike optimal receiver for a BCSK [16], [17], or BMoSK encoded
CSK, decoding of a MoSK-encoded binary sequence does sequence [18], which are elegant solutions but too complex in
not necessarily require a threshold value. The receiver can terms of computation for a nanomachine implementation. As
make a decision simply by comparing the received number of an alternative, another approach may be transmitting a suffi-
molecules of both molecule types and determining which one is ciently long sequence of pilot symbols before the information
larger. transmission in order to obtain a comprehensive model of the
The MCvD system using BCSK can be adversely affected system behavior. The problem with this approach arises due to
from ISI, caused by the residual molecules from the previous the high sensitivity of the optimal threshold values both to the
symbols [10]. By using (5), the hitting rates for a BCSK- order and the value of the transmitted symbols. Therefore, one
encoded binary message sequence of {1, 1, 0, 1, 0, 1, 1} are also has to retransmit these pilot symbols frequently to obtain a
206 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

reliable model of the channel behavior. Additionally, the opti- model can be extended by the addition of a zero-mean white
mal threshold values are also sensitive to system parameters, Gaussian noise with a constant variance c2 , which may rep-
meaning that if one of the system parameters, such as diffu- resent the counting noise at the receiver, or noise due to the
sion coefficient, transmitter - receiver distance, etc., changes molecule reactions in the environment, etc. Since the sum of
slightly, this exhaustive procedure must be repeated. This is two independent Gaussian random variables is again a Gaussian
the main motivation for developing an analytical approach to random variable, with its mean being the sum of the two means,
calculate the optimal threshold. and its variance being the sum of the two variances, the variance
By using Fhit (t) given in (6), probability of a single molecule of Ci becomes
to hit the receiver in a given time slot can be calculated. Let pk
denote the hitting probabilities, where p1 is the hitting proba-
i
2{i} = c2 + M pk (1 pk ) bik+1 . (12)
bility in the current symbol duration and pk for k 2 denote
k=1
the hitting probabilities in the consecutive symbol durations.
Hitting probabilities pk for k = 1, 2, . . . for a given system Equations (10) and (11) indicate that the parameters of the
model can be calculated using Gaussian distribution change for each symbol, which means
that each and every symbol requires its own optimal threshold.
pk = Fhit (kts ) Fhit ([k 1]ts) (7) To begin with, let us focus on finding the optimal threshold {i}
for the detection of bi in bn such that
where ts denotes the symbol duration.
Hitting probabilities are sufficient to describe the characteris- bi =1
tics of the diffusion channel completely, which implies that the Ci {i} , (13)
bi =0
choice of symbol duration has a great significance in determi-
nation of the channel response. In terms of ISI mitigation, it is
where bi denotes the estimate of bi . Note that in the case of
desirable to have p1 to be the largest in magnitude compared to
Ci = {i} , the receiver can be preset to decide for a bit-0 or
pk for k > 1. Therefore, ts should be chosen such that hitting
bit-1, or choose one of them randomly. We can treat this case
probabilities are in descending order ( p1 > p2 > p3 > . . .).
as a traditional binary detection problem in an AWGN channel
Let bn = {b1 , b2 , . . . , bn } denote the binary message
and use maximum a posteriori probability (MAP) decision rule,
sequence of length n, and let bi and Mi denote the message
given as
symbols and number of molecules sent from the transmitter
in the ith time slot for i = 1, 2, . . . , n, respectively. For sim- P[bi = 1] p(Ci |bi1 , bi = 1) bi =1
plicity, assume BCSK, where the number of molecules to be 1, (14)
P[bi = 0] p(Ci |bi1 , bi = 0) bi =0
transmitted is Mi = M for bi = 1, and Mi = 0 for bi = 0.
The number of received molecules at the receiver for a given where p() denotes the probability density function of the
time slot can be modeled as a Gaussian random variable [4]. Let Gaussian distributed Ci . Note that calculation of {i} requires
Ci denote the number of received molecules at the receiver in information about the sequence history bi1 . In case of a
the ith time slot due to the transmission of bi . The probability memoryless decoder, when the first (i 1) bits, which are cru-
model for Ci can be defined [4] as cial for (10) and (11), are unknown, all possible combinations
(candidates) for bi1 must be considered, which yields 2i1
bi BE(P[bi = 1]), (8)

candidate means, variances, and optimal thresholds. Each bi1
{i, j}
Ci |bi N {i} , 2{i} , (9) candidate also has its own probability, P[bi1 ]. Let dl =
{i, j} {i, j} {i, j}
{dl [1], dl [2], . . . , dl [i]} denote a candidate sequence
where BE(), N(, ), P[bi = 1], and P[bi = 0] denote the for bi , i.e., a possible binary sequence combination of length
Bernoulli distribution, Gaussian distribution, probability of i, and {i, j} denote its corresponding optimal threshold value.
occurrence for bit-1 and probability of occurrence for bit-0 in In this notation, l denotes whether the candidate sequence is
the message sequence, respectively. Due to ISI, the expected conditioned on bi = 0 or bi = 1, and j is equal to the decimal
number of molecules arriving at the receiver in the ith time slot {(i1), j}
value of reverse ordered dl sequence, such that
can be given as

i1

i
j=
{i, j}
dl [z]2z1 , (15)
E[Ci |bi ] = {i} = M pk bik+1 , (10)
z=1
k=1
{(i1), j} {i, j}
which is the mean of the Gaussian distributed molecule count where dl denotes the first (i 1) bits of dl . For exam-
at the receiver. The variance of Ci is similarly given by ple, for a bit sequence of length n = 3, there are 23 = 8 possible
candidate sequences, which are visualized as a binary tree given

i {3,1}
in Figure 4. One of the candidates is d0 , which corresponds
Var[Ci |bi ] = 2{i} = M pk (1 pk ) bik+1 . (11)
to the bit sequence of length three, conditioned on bit-0, and
k=1
with decimal value 1 for the reverse ordered history; which can
It should be noted that (10) and (11) do not include any ran- only be the sequence {1 0 0}. Calculating j allows for the enu-
domness except for the one due to the diffusion process. This meration of candidates with respect to the amount of ISI they
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 207

Fig. 4. Binary tree for n = 3.

induce, since the latter symbols contribute more to the ISI than which is equal to the sum of error probabilities for a given
the former ones. threshold . To minimize Ji ( ), derivative with respect to
By conditioning each candidate on bit-1 and bit-0, the opti- can be set to zero as
{i, j} {i, j}
mal threshold {i, j} can be found for siblings {d0 , d1 } in
the binary tree, which are basically two Gaussian distributions Ji ( ) 1  {i, j} 
2i1
{i, j}

N {i} |1 , 1
2{i, j}
{i, j} {i, j} {i, j} {i, j} = P d1
with parameter sets {0 , 0 } and {1 , 1 }, respec-
j=0
tively. Each {i, j} can be calculated by writing (14) and (13)  

{i, j} {i, j}
N {i} |0 , 0
2{i, j}
explicitly, which yields P d0 = 0, (23)

P[bi = 1] p( {i} |bi1 , bi = 1) = (16) which yields

P[bi = 0] p( {i} |bi1 , bi = 0), 1


2i1 
{i, j}

{i, j}

N {i} |1 , 1
2{i, j}

 P d1 =
 {i} {i, j} 2 2{i, j}
2 2{i, j} exp 1 /21 j=0
0
log  
 1
2i1  

{i, j} {i, j}
N {i} |0 , 0
2{i, j}
2{i, j}
2 1 {i} {i, j} 2 2{i, j} P d0 . (24)
exp /20 0
i=1
 
P[bi = 0]
= log , (17) For i > 2, (24) becomes a hard problem to solve analytically
P[bi = 1] due to the combinatorial nature of the equation, so numerical
methods are used instead.
resulting in the quadratic equation {i} can be efficiently computed using two fundamental

2 observations. The first observation makes use of (10), (11), and
a {i} + b {i} + c = 0, (18) the fact that ts is chosen such that hitting probabilities are in an
descending order, i.e., pi > p j for i < j. We can then sort the
where, distribution parameters as
  {i,1} {i,2} {i,2i1 1}
2{i, j} 2{i, j} 0 < 0 < < 0 ,
a = 1 0 , (19)
{i,1} {i,2} {i,2i1 1}
  1 < 1 < < 1 ,
2{i, j} {i, j} 2{i, j} {i, j}
b = 2 0 1 1 0 , (20) {i,1} {i,2} {i,2i1 1}
0 < 0 < < 0 ,
2{i, j} 2{i, j} 2{i, j} 2{i, j}
c = 1 0 0 1 {i,1} {i,2} {i,2i1 1}
  1 < 1 < < 1 . (25)
{i, j}
2{i, j} 2{i, j} P[bi = 0]1
21 0 log {i, j}
. (21) Consequently, optimal thresholds can also be sorted
P[bi = 1]0
as {i,1} < {i,2} < < {i,2 1} . Being able to sort
i1

these optimal thresholds provides us with an upper bound


This equation can be solved analytically considering the posi-
{i,2 1} , since the optimal threshold considering all candi-
i1

tive root {i} = b+


2a

, where  = b2 4ac.
dates cannot be greater than the optimal threshold considering
To find the optimal threshold {i} that minimizes the over- {i,2i1 1} {i,2i1 1}
all probability of error in the detection of bi considering all only the siblings {d0 , d1 } with the highest mean
and variance values, i.e., {i} < {i,2i1 1}
.
candidate sequences, the minimizing function can be written as
The second observation is that, as n increases, due to the
 
1
2i1   0
{i, j} accumulating molecules in the diffusion channel, the optimal
{i, j}
Ji ( ) = P d0 Q threshold also increases monotonically, i.e., {i1} < {i} .
{i, j}
j=0 0 In conclusion, the lower and upper bounds for {i} can be
 {i, j}  written as {i1} < {i} < {2 1} . These bounds allow
i1
  1
{i, j} {i}
+ P d1 Q {i, j}
, i 1, (22) for the search of by employing a fixed point iteration.
1 Such an iterative algorithm is given in Algorithm 1, where
208 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

Algorithm 1. Calculation of {N }
1: Compute {1}
2: for i = 2 to N do
3: for j = 0 to 2i1 1 do
{i, j} {i, j} {i, j} {i, j}
4: Calculate {0 , 1 , 0 , 1 }
5: if j = 2i1 1 then
Compute optimal threshold {i,2 1}
i1
6:
max {i,2 1}
i1
7:
8: end if
9: end for
10: Set step size = M/100
11: = {i1} : : max
12: While > do
13: Calculate the sum of likelihoods
Fig. 5. Optimal threshold values for i 25, where P[bi = 0] = 0.5 and ts =
200ms. 2i1 1 {i, j} {i, j}
j=0 P[bi = 1]N( |1 , 1 )
r =  i1 {i, j} {i, j}
2 1
TABLE I
j=0 P[bi = 0]N( |0 , 0 )
D ISTRIBUTION PARAMETERS
14: m argmin |1 r (m)|
m
15: {i} (m )
16: {i} : /10 : {i} +
17: /10
18: end while
19: end for

and denote the step size and stopping parameter of the the likelihoods are equal to each other. Likewise, {2,1} is the
algorithm, respectively. The first 25 threshold values computed intersection point of the two Gaussian distributions that arise
{2,1} {2,1}
using Algorithm 1 are shown in Figure 5. The step size is due to d0 and d1 . Thus, {2,0} and {2,1} must satisfy
initialized to M/100, since the threshold value will be pro-

{2,0}
0.5N {2,0} |0 , 0
2{2,0}
portional to the number of molecules transmitted for bi = 1.

Additionally, a proper choice for would be 1, since the algo- {2,0}


= 0.5N {2,0} |1 , 1
2{2,0}
, (26)
rithm is searching a value which has the unit of molecules.

Although the calculations are conducted using = 104 in the {2,1}


0.5N {2,1} |0 , 0
2{2,1}
manuscript, on a practical level, having an integer threshold

{2,1}
= 0.5N {2,1} |1 , 1
2{2,1}
value would be more meaningful, since the number of received . (27)
molecules will be an integer as well.
Example 1: Consider a BCSK modulated random binary On the other hand, {2} must satisfy (24), and requires
sequence, where P[bi = 0] = P[bi = 1] = 0.5, i. To cal- {2, j} {2, j}
equating the sum of likelihoods for d0 and d1 for j =
culate the optimal threshold {2} , the distribution parame-
{0, 1}, which yields
ters must be calculated by using (10) and (11). Candidate

{2,0} {2,1}
0.25N {2} |0 , 0 + 0.25N {2} |0 , 0
sequences and their corresponding parameters are given in 2{2,0} 2{2,1}
Table I.

{2,0} {2,1}
To calculate {2} , (10) and (11) must be used, which = 0.25N {2} |1 , 1
2{2,0}
+ 0.25N {2} |1 , 1
2{2,1}
.
means that information of the first two hitting probabilities are (28)
required. Let us define a parameter set, denoted by P, where
rr = 5 m, r0 = 10 m, c2 = 1, molecules similar to insulin Equations (26) and (27) can be solved analytically, and
hormone are used as information carriers, and the channel is more importantly, as i increases, calculating {i, j} for j =
filled with a liquid which results in a diffusion coefficient of {0, 1, . . . , 2i1 1} requires solving 2i1 separate equations,
79.4 m 2 /s [11]. This parameter set will be used for all the which are individually analytically solvable. On the other hand,
latter simulations and examples in this paper. For this exam- {2} in (28) is hard to solve for analytically, and becomes
ple, in addition to the set of parameters P, the symbol duration harder due to the combinatorial nature of (24) as i increases,
is chosen as ts = 200ms, and M = 100 molecules are used as hence requires the use of Algorithm 1.
messenger molecules on each symbol duration. Distribution of candidate sequences and threshold values for
According to (16), {2,0} is the intersection point of the two this example are plotted in Figure 6. These results can be
{2,0} {2,0}
Gaussian distributions that arise due to d0 and d1 , where interpreted as follows. If the receiver is memoryless, it has to
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 209

Fig. 6. Distributions of recieved molecule counts and threshold values. Fig. 8. Comparison of empirical threshold values and linear regression outputs,
where P[bi = 0] = 0.5, ts = 200 ms, and M = 500.


linear relationship between 1/ i and the optimal threshold val-
ues {i} for i 3 (i = 3 is denoted with a dashed vertical line),
where ts = 200 ms and M = 500. As a result, linear regression
can be applied to calculate the the threshold values {i} for
3 i 25, using (29) where = 0.5.
The motivation of using a function of this from can be justi-
fied based on two facts. First, note that hitting probabilities have
a cumulative effect on both distribution parameters, as seen in
(10) and (11). As i increases, the marginal effect of hitting prob-
abilities will decrease, indicating that there should be a limit
value as i goes to infinity. Physical interpretation of this is as
follows: since the channel is assumed to be free of molecules
before the transmission begins, the optimal threshold value will
increase in the early stages of the transmission. As transmis-
Fig. 7. Linear relationship between 1/ i and {i} for i 25, where P[bi =
0] = 0.5, ts = 200 ms. sion continues, due to the accumulation of the molecules in the
diffusion channel, number of molecules in the channel will go
consider all possible candidate sequences in order to make a into saturation and the optimal threshold value will converge to
decision for b2 . In this case, {2} must be used, meaning that a constant.
any number of molecules below approximately 13 molecules To verify the reliability of the linear regression outputs, 1000
yields a decision of b2 = 0. On the other hand, if the receiver random binary messages, consisting of 100 equally likely bits,
stores information about b1 , depending on the binary value of are generated, and the empirical thresholds for each i are cal-
b1 , either {2,0} or {2,1} can be used. culated such that the error rate for each bi is minimized by
considering all the 1000 realizations at the same time. This is
repeated for 500 times, and the results are presented in Figure 8.
A. Linear Regression As can be seen from the figure, linear regression outputs follow
the mean of the empirically chosen thresholds, which verifies
Computing the optimal threshold for bi requires computa-
the performance of the linear regression and Algorithm 1.
tion of the distribution parameters for all candidates, which
It should be noted that , 0 , and 1 in (29) are dependent on
means that the number of operations increases with powers of
both M and hitting probabilities pk , since the mean and vari-
2 as i increases. However, in the case of a continuous trans-
ance of the molecule counts at the receiver are also dependent
mission, the optimal threshold must be calculated for very long
on them, as given in (10) and (12). Furthermore, hitting prob-
sequences of bits, i.e., as i . In order to predict {i} for
abilities are determined by both the symbol duration ts and the
large values of i, common transforms are applied to i values, in
environmental parameters such as diffusion coefficient, receiver
the form of [19, Eq. (10.8)]
radius, etc. As a result, if one of these parameters change, , 0 ,
{i} = 1 i + 0 , (29) and 1 must be calculated accordingly.
Since it is possible to compute {i} , i, and limiinf {i} =
where 0 , 1 R, and 0 < < 1. This transformation enables 0 , different strategies can be used for thresholding. A realistic
to use linear regression techniques more effectively with non- scenario could be as follows: receiver senses the hitting proba-
linear data given in Figure 5. As seen in Figure 7, there is a bilities first. Using these hitting probabilities and Algorithm 1,
210 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

Fig. 10. First 20 hitting probabilities, where ts = 200 ms.

modulation technique that aims to decrease the detrimental


effects of the ISI by utilizing two different molecule types.
Second technique employs a power adjustment strategy by
utilizing the residual molecules from the previous symbols,
Fig. 9. Comparison of bit error rates for the proposed strategies. which is applicable for BCSK, BMoSK, and MTSK.

it can calculate the first n optimal thresholds and then apply


A. Molecular Transition Shift Keying
the linear regression given in (29) for a range of values for
to arrive at the optimal set of {, 0 , 1 }, which minimizes the In case of continuous transmission, the first bit-0 after a large
root mean squared error (RMSE) between the data points and number of consecutive bit-1s becomes hard to detect due to
the linear regression outputs. Note that the accuracy will depend the ISI caused by the accumulated molecules in the channel.
on the number of thresholds calculated in the first step. After b5 = {1, 1, 1, 1, 0} can be given as an example for such a case.
obtaining the values for , 0 , and 1 , the receiver can then It is hard for the decoder to detect b5 due to the ISI caused by
implement one of the following strategies: b4 . This is the main motivation for MTSK, which aims to dis-
Strategy 1: Since optimal threshold values converge to a tinguish whether the number of received molecules Ci in the ith
constant (limi {i} = 0 ), the receiver decodes each time slot is induced by the ISI due to bi1 , or a bi being a 1, by
bi independent of i using 0 as the threshold. decreasing the amount of ISI due to the residual molecules that
Strategy 2: Receiver decodes each bi depending on i, i.e., belong to previous symbols.
it calculates {i} for each i, using 1 and 0 . As discussed in Section II, a proper choice of sym-
Note that, in case of a change in system parameters, the bol duration allows us to sort the hitting probabilities in a
receiver can re-calculate , 0 , and 1 , which is much more descending order, such as p1 > p2 > p3 > . The amount of
efficient than utilizing a long sequence of pilot symbols each decay between consecutive hitting probabilities also decreases
time there is a slight change in the environment. decreasingly, which implies that most of the residual molecules
A performance comparison between the proposed strategies that lead to ISI belong to the time slot immediately preceding
and the empirically computed thresholds is given in Figure 9. the current one, and depends on the magnitude of p2 . Residual
Binary sequences of length 105 were used in the simulations molecules from two or more previous time slots which are
and 100 iterations were realized to take an average. RMSE of related to the magnitude of pi for i 3 have less significance.
the linear regression outputs are calculated for each M and ts to To visually illustrate this behavior, the hitting probabilities pk
find the optimal values. Empirical thresholds were calculated for k = 1, 2, . . . , 10 are given in Figure 10.
by trying various number of threshold values and minimizing MTSK can be explained as follows. The bit-0s are encoded
the Hamming distance d H (b n , bn ) after gathering all the infor- by the absence of the messenger molecules, and bit-1s are
mation about molecule counts at the receiver, which means that encoded by using two different types of molecules, denoted
they provide a lower bound to the bit error rate. Thresholding as type-A and type-B, of constant number of molecules, M,
strategy 2 performs slightly better compared to strategy 1, as where the choice of the molecule type depends on the value of
expected, since it adjusts the threshold value for every i. As the the following symbol in the message sequence. For the sake of
symbol duration increases, the lower bound for bit error rate simplicity, we assume that both molecule types have the same
decreases, hence the gap between the proposed strategies and diffusion coefficient. type-A or type-B molecules are released
the lower bound increases. As a result, both strategies provide a for the next symbol values of bit-0 and bit-1, respectively. In
solution for the thresholding problem with noteworthy error rate case of CSK, bit-1s are encoded by emitting only type- A (or
results, which was not addressed in a comprehensive manner in only type-B) molecules, which causes high amounts of ISI
the literature. observed by bit-0s due to the accumulation of the same type of
molecules in the channel. On the other hand, in case of MTSK,
emitting type-B instead of type- A molecules before each bit-
IV. T RANSMITTER -BASED ISI M ITIGATION 0 reduces the ISI induced by type-A molecules on each bit-0.
In this section, two transmitter-based ISI mitigation tech- Similarly, since type-B molecules are only emitted before a
niques are proposed. The first technique is the molecular bit-0, their accumulation in the channel is less than the case
transition shift keying (MTSK), which is an energy efficient where CSK is employed by emitting only type-B molecules.
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 211

Fig. 11. MTSK modulated binary sequence example.

Let Ci (A) and Ci (B) denote the number of received type-A


and type-B molecules at the receiver due to the transmission of
bi (A) and bi (B), respectively. Decision rule for each molecule
type can be given as
bi (A)=1
{i}
Ci (A) A ,
Fig. 12. State diagram for MTSK encoder. bi (A)=0

where bi (A) and bi (B) denote the estimation of bi (A) and


bi (B), respectively. To decide for a bit-0, both bi (A) = 0 and
bi (B) = 0 must be satisfied. On the other hand, if at least one
Fig. 13. MTSK encoded binary sequence example. of the number of received molecules exceeds its corresponding
threshold regardless of its molecule type, the decoder decides
for a bit-1. Consequently, the decision rule for an MTSK
As a result, ISI observed by each bit-0 is decreased compared encoded binary sequence can be given as
to the case where CSK is employed. An example sequence is 
{i} {i}
given in Figure 11, where the modulated sequence is delayed bi = 1, if Ci (A) > A{i} or Ci (B) > B {i}
,
(32)
for one symbol duration to obtain a causal representation, and 0, if Ci (A) A and Ci (B) B .
mn = {m 1 , m 2 , . . . , m n } represents the molecule types of the
modulated message sequence that will be transmitted through Example 2: Consider a random binary sequence b3 =
the diffusion channel, where absence of messenger molecules {1, 1, 0}, where P[bi = 0] = 0.5, ts = 200ms and M = 100.
is denoted with an . This causal system can now be rep- To compare the error performance of the BCSK, BMoSK, and
resented by the first-order Markov chain whose state transition MTSK, probability of an erroneous decision for b3 will be used,
diagram is given in Figure 12. since ISI observed by b3 due to previous bits being bit-1 makes
Since there are two types of molecules to be sensed in an it harder to decode.
MTSK modulated signal, a decision should be made based upon Calculating hitting probabilities for these parameters yields
the information they jointly possess. Consequently, decoding an { p1 , p2 } = {0.1875, 0.0777}. Using these probabilities, the
MTSK modulated signal requires an optimal choice of decision parameters with their corresponding sequences and threshold
threshold for both molecule types. Since the receiver is assumed values (calculated via Algorithm 1) are given in Table II.
to detect both molecule types independently, bn can be treated Additionally, the decision rule for the BMoSK encoded
as two different messages; one modulated by using type- A and sequences does not employ a threshold value and it can be
the other using type-B molecules, denoted as bn (A) and bn (B), expressed as
respectively. bn (A) and bn (B) are illustrated in Figure 13 for
bi =1
the same b16 in Figure 11. Splitting bn into bn (A) and bn (B) Ci (A) Ci (B), (33)
allows us to find optimal thresholds for each sequence, which bi =0
{n} {n}
are denoted by A and B , respectively.
since bit-1 is encoded by molecule type-A and bit-0 is encoded
Let PA [bi = 1] and PB [bi = 1] denote the probability of
by molecule type-B.
occurrence for 1 in bn (A) and bn (B), respectively. As given in
Let PeBCSK (bi ), PeBMoSK (bi ), and PeMTSK (bi ) denote the
(8), bn (A) and bn (B) can also be approximated as n indepen-
probabilities of error in the detection of bi for BCSK, BMoSK,
dent Bernoulli trials with probabilities of success PA [bi = 1]
and MTSK modulated messages, respectively. These probabili-
and PB [bi = 1], respectively. Considering that each bit-1 run of
ties can be calculated as
length r 1 in bn contains exactly one bit encoded by molecule  
type-B, PB [bi = 1] and PA [bi = 1] can be calculated as   {3} 0
{3,3}
{3}
PeBCSK
(b3 ) = P C3 > =Q {3,3}
0
PB [bi = 1] = P[bi = 1](1 P[bi = 1]), (30)
= 0.1950,
PA [bi = 1] = P[bi = 1] P[bi = 1](1 P[bi = 1])
PeBMoSK (b3 ) = P[C3 (B) > C3 (A)] = P[C3 (B) C3 (A) > 0]
= P[bi = 1]2 , (31)
{3,0} {3,3}
1 (B) 0 (A)
{i} {i} = Q 
A and B can therefore be determined by employing {3,3} {3,0}
(0 (A)) + (1 (B))
2 2
Algorithm 1 using the probabilities in (30) and (31), respec-
tively. = 0.0913,
212 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

TABLE II
PARAMETERS FOR BCSK, BM O SK, AND MTSK
MODULATION TECHNIQUES

employing MTSK increases the system complexity, since it


utilizes two different types of molecules instead of one. On
the other hand, if utilization of two different molecule types
is allowed, one can easily prefer MTSK over BMoSK, since
the improvement in the communication quality is very signif-
icant. Furthermore, although both BMoSK and MTSK utilize
two different types of molecules, employing BMoSK requires
the transmitter to release molecules for both bit-0 and bit-1,
whereas employing MTSK requires the release of molecules
only for a bit-1. Thus, MTSK has an energy advantage.

B. Power Adjustment
Effects of ISI can both be beneficial (constructive interfer-
ence) and harmful (destructive interference) to the symbol in
Fig. 14. BER curves for different modulation techniques, where ts = 200 ms. question. In BCSK, BMoSK, and MTSK, residual molecules
become a source of destructive interference when the intended
   
{3} {3} symbol is a bit-0. On the other hand, they may actually be
PeMTSK (b3 ) = 1 P C3 (A) < A P C3 (B) < B
  {3}  beneficial for consecutive bit-1s in a sequence and may be
{3,1}
A 0 (A) used to support the messenger molecules that will be emitted
=1 1 Q {3,1} in the next time slots. With this motivation, BCSK, BMoSK,
(A) and MTSK were modified to utilize the residual molecules
  {3} 0 {3,2} 
B 0 (B) from the previous symbols, and modified versions are denoted
1 Q {3,2} by BCSK-PA, BMoSK-PA, and MTSK-PA, where PA stands
0 (B)
for power adjustment. A similar approach on utilizing resid-
= 0.0064. ual molecules in terms of symbol duration adjustments can
be found in [20]. Briefly, in [20], authors propose a dynamic
As a result, PeBCSK (b3 ) > PeBMoSK (b3 ) > PeMTSK (b3 ). Note
structure at the receiver side, where they dynamically lengthen
that even though there are only two bit-1s before b3 , differences
the symbol duration as the number of accumulated molecules
between error probabilities are noteworthy.
increase in the channel. This helps to prevent ISI.
In order to compare the error performance of BCSK,
Recall that, in case of a BCSK modulated signal, Mi = 0
BMoSK, and MTSK, average signal power per symbol for
for bi = 0 and Mi = M for bi = 1. Since BCSK-PA intends to
these techniques must be defined. For BCSK, where Mi = 0
adjust the signal power considering the effects of constructive
for bi = 0, and Mi = M for bi = 1, average power per sym-
ISI, in case of a BCSK-PA modulated signal, value of M will
bol can be defined as P = M P[bi = 1]. This is also valid for
be adjusted depending on the number of residual molecules in
MTSK, since bit-1s are encoded with a constant number of M
the channel.
molecules, and bit-0s are encoded by the absence of molecules,
Let E[M R EC ] denote the expected value of the received
independent of the molecule type. On the other hand, since
number of molecules at the receiver by sending M number of
BMoSK utilizes M number of molecules for both bit-0 and bit-
molecules for the first bit-1 in bi . Since Mi = 0 for bi = 0,
1, average signal power of BMoSK will be equal to M. Error
bit-0s before the first bit-1 in bi will not effect the number of
performance of the BCSK, BMoSK, and MTSK modulation
molecules accumulated in the channel. Relationship between
techniques are compared via Monte Carlo simulations, and the
E[M R EC ] and M is given as
resulting BER curves are given in Figure 14. Binary sequences
of length 1000 were used, 104 realizations were performed, and E[M R EC ] = p1 M. (34)
threshold values computed via Algorithm 1 are employed in the
simulations. As seen in Figure 14, error rates are significantly For correct transmission, the threshold at the receiver side
decreased when MTSK is employed. By comparison with CSK, should be chosen so that E[M R EC ] number of molecules leads
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 213

to a symbol decision of bit-1. For a sequence containing con-


secutive bit-1s, sending the same amount of molecules for each
symbol increases the cumulative number of received molecules
at the receiver side, exceeding E[M R EC ]. This will also cause
more molecules to accumulate in the channel and become a
source of ISI for the following bit-0s. On the other hand, for
the second and latter symbols, by sending a smaller number of
molecules and making use of the residual ones from the previ-
ous time slots, E[M R EC ] can still be received and the intended
symbol can be decoded correctly. This guarantees the accu-
mulation of fewer molecules in the channel, which, in turn,
reduces the amount of ISI for the following symbols. Number of
molecules required to maintain E[M R EC ] number of molecules
at the receiver after the transmission of the first bit-1 can be
calculated as

Mi = E[M R EC ] E[MiR ], (35) Fig. 15. BER Curves for different modulation techniques with power adjust-
ment for K = 2, where ts = 200 ms and P[bi = 0] = 0.5.
where E[MiR ] denotes the expected value of the residual
molecules accumulated in the channel due to the transmission
of bi1 . Since the channel is assumed to be free of messen-
ger molecules before the transmission begins, E[MiR ] can be
calculated as
  i
E MiR = p j Mi j+1 . (36)
j=2

Continuously calculating the effects of a large number of


symbols from previous time slots is impractical. It is also pos-
sible to adjust Mi by using a finite memory of length K , and
rewrite (36) as
  K
E MiR = p j Mi j+1 . (37)
j=2
Fig. 16. BER Curves for different modulation techniques with power adjust-
ment for K = 4, where ts = 200 ms and P[bi = 0] = 0.5.
In order to apply power adjustment to BMoSK and MTSK
modulated signals, expected value of the number of residual
molecules must be calculated for both types of molecules, employed. Since MTSK was also proposed to mitigate ISI,
which are denoted by E[MiR (A)] and E[MiR (B)] for type- the marginal effect of MTSK decreases when its combined
A and type-B molecules, respectively. Splitting bi into bi (A) with the power adjustment technique. As a result, when power
and bi (B) as was done in Figure 13 allows us to calculate adjustment is employed, error rates for MTSK-PA and BMoSK-
E[MiR (A)] and E[MiR (B)] separately. PA differ slightly. Furthermore, since the effect of K previous
The power adjustment technique aims to maintain a constant bits are considered, as K increases, improvement in the com-
number of received molecules for a bit-1, but by doing so, num- munication quality also increases. On the other hand, increasing
ber of received molecules for a bit-0 fluctuates depending on K , K introduces more memory to the system, which results in a
and distorts the monotonically increasing behavior of optimal trade off between memory length and communication quality.
threshold values. Consequently, (i) cannot be calculated for
large i, and empirically found threshold values are used in the
simulations. V. R ECEIVER -BASED ISI M ITIGATION
Error performance of the BCSK-PA, BMoSK-PA, and In this section, we consider a new type of decision-feedback
MTSK-PA were compared via Monte Carlo simulations and filter for a BCSK-encoded sequence with a lower computa-
BER curves for K = 2 and K = 4 are given in Figure 15 and tional complexity than the MMSE equalizer proposed in [21].
16, respectively. 15000 realizations were performed in order to Unlike the additive Gaussian noise, the variance of Ci is sig-
obtain an average, and average power P is calculated by aver- nal dependent, and equalizer tap coefficients must be updated
aging the number of molecules used per realization for each for each sample based on previously detected bits with a feed-
modulation. Note that employing power adjustment decreases back mechanism [21]. Each update requires solving the set of
the error rates for all modulation techniques significantly, com- equations given in [21, Eq. (30)], which implies that the com-
pared to the Figure 14, where there is no power adjustment putational complexity of the equalizer increases as the number
214 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

of equalizer taps increases. On the other hand, DFF introduced


in this section has a computational complexity independent
of the number of filter taps, but requires a larger number of
memory elements in order to achieve the same BER with the
MMSE filter. Additionally, another approach for detection with
low computational complexity can be found in [22], which
decreases the expected ISI from each observation before com-
paring with a threshold, rather than adjusting the threshold itself
as in proposed DFF. Likewise, an ISI cancellation technique
that utilizes decision feedback for compensating the effect of
one previously demodulated symbol can be found in [23].
As mentioned in Section III, the number of candidate
{i, j} {i, j}
sequences d1 and d0 increases with powers of 2 as
i increases. On the other hand, when b i1 is available to
receiver, there are only two candidate sequences conditioned
{i, j} {i, j}
on bit-0 and bit-1, which are d0 = {b i1 , 0} and d1 = Fig. 17. Block diagram of decision feedback filter.
{i, j} {i, j} {i, j} {i, j}
{b i1 , 1}, respectively. 1 , 0 , 0 , and 1 can be
calculated using (10) and (12), and these parameters can be
used to calculate {i, j} via solving the quadratic equation
given in (18). Consequently, by storing previously estimated
bits at the receiver, {i, j} for each i can be calculated in
a signal dependent manner, assuming that the decisions are
correct.
In case of continuous transmission, storing b i1 for
each i requires infinite memory, and is hence impractical.
Rewriting distribution parameters for a finite memory receiver
yields

{i, j}

S
0 =M pk bik+1 ,
k=2

{i, j}

S
1 =M pk bik+1 + M p1 ,
Fig. 18. BER Curves for DFF and MMSE equalizer3 , where M = 500 and
k=2
ts = 200 ms.

S
pk (1 pk ) bik+1 ,
2{i, j}
0 = c2 + M
variance of the received molecule counts depends on the trans-
k=2
mitted message as given in (11), hence restricts the application

S
of classical equalization methods.
pk (1 pk ) bik+1 + p1 (1 p1 ),
2{i, j}
1 = c2 + M
k=2

VI. C ONCLUSIONS
where S denotes the length of the receiver memory. Block dia-
gram of this DFF is given in Figure 17. Note that the use of In this paper, transmitter and receiver-side energy efficient
erroneously detected b i1 may cause error propagation, which ISI mitigation techniques were proposed for MCvD in terms
may decrease the performance of the DFF. of modulation, filtering, and signal power adjustment. To work
Error performance of DFF and the MMSE equalizer pro- on modulation techniques for a real time communication sce-
posed in [21] are compared via Monte Carlo simulations and nario, decision threshold for detection had to be determined
bit error rates with respect to memory lengths are given in prior to the information transmission, which was a problem
Figure 18. BCSK modulation is employed for binary messages never addressed in the literature before. An analytical method
of length 1000 bits, and 500 realizations were performed in that minimizes the overall error rate when the system parame-
order to obtain an average. As seen in Figure 18, in order for ters are known was proposed to determine the optimal decision
the DFF and the MMSE equalizer to perform at a bit error rate threshold for each symbol. Since the number of operations per-
of around 103 , DFF must have S = 35, whereas S = 13 is suf- formed for calculating the optimal threshold increases for the
ficient for MMSE equalizer. However, if the computation of the latter symbols in the sequence, linear regression is applied to
distribution parameters are ignored, computational complexity the first 25 threshold values, using a function that resembles
of MMSE equalizer is at the order of O(S 3 ), whereas com- the dynamics of the diffusion channel. By doing so, optimal
putational complexity of DFF is equal to O(S), since it only thresholds can be calculated for each symbol regardless of the
requires solving the quadratic equation given in (18). Note that sequence length. These threshold values are compared with the
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 215

ACKNOWLEDGMENT
The authors would like to thank . Deniz Akyldz for his
valuable comments and suggestions to improve the manuscript.

R EFERENCES
[1] I. F. Akyildiz, F. Brunetti, and C. Blzquez, Nanonetworks: A new com-
munication paradigm, Comput. Netw., vol. 52, no. 12, pp. 22602279,
Aug. 2008.
[2] S. Hiyama et al., Molecular communication, in Proc. NSTI
Nanotechnol. Conf., May 2005, vol. 3, pp. 392395.
[3] N. Farsad, W. Guo, and A. W. Eckford, Tabletop molecular communica-
tion: Text messages through chemical signals, PloS ONE, vol. 8, no. 12,
p. e82935, Aug. 2013.
[4] T. Nakano, A. W. Eckford, and T. Haraguchi, Molecular Communication.
Cambridge, U.K.: Cambridge Univ. Press, 2013.
[5] I. F. Akyildiz, J. M. Jornet, and M. Pierobon, Nanonetworks: A new
frontier in communications, Commun. ACM, vol. 54, no. 11, pp. 8489,
Fig. 19. BER Curves for conventional and proposed modulation techniques, Nov. 2011.
where ts = 200 ms. [6] T. Nakano, M. Moore, F. Wei, A. Vasilakos, and J. Shuai, Molecular
communication and networking: Opportunities and challenges, IEEE
Trans. NanoBiosci., vol. 11, no. 2, pp. 135148, Jun. 2012.
[7] M. Mahfuz, D. Makrakis, and H. Mouftah, On the characterization
empirical threshold values found via Monte Carlo simulations, of binary concentration-encoded molecular communication in nanonet-
and are verified to be optimal in the sense of minimizing the works, Nano Commun. Netw., vol. 1, no. 4, pp. 289300, Dec. 2010.
overall bit error rate. It is concluded that, as long as 0 , 1 , [8] S. Pudasaini, S. Shin, and K. S. Kwak, Robust modulation tech-
nique for diffusion-based molecular communication in nanonetworks,
and in (29) are known, different thresholding strategies can CoRR, vol. abs/1401.3938, 2014 [Online]. Available: http://arxiv.org/abs/
be applied depending on the system constraints. Resolving the 1401.3938
thresholding problem is the pre-requisite step which allows us [9] A. Aijaz and A.-H. Aghvami, Error performance of diffusion-based
molecular communication using pulse-based modulation, IEEE Trans.
to propose new ISI mitigation techniques. NanoBiosci., vol. 14, no. 1, pp. 146151, Jan. 2015.
The first transmitter-based solution proposed for ISI miti- [10] M. S. Kuran, H. B. Yilmaz, T. Tugcu, and I. F. Akyildiz, Modulation
gation is a novel modulation technique, titled MTSK, which techniques for communication via diffusion in nanonetworks, in Proc.
IEEE Int. Conf. Commun. (ICC), Jun. 2011, pp. 15.
uses multiple molecule types in order to increase the data [11] M. S. Kuran, H. B. Yilmaz, T. Tugcu, and B. zerman, Energy model for
rate by suppressing the negative impact of the ISI on com- communication via diffusion in nanonetworks, Nano Commun. Netw.,
munication quality. It was shown via Monte Carlo simulations vol. 1, no. 2, pp. 8695, Jul. 2010.
[12] C. Jiang, Y. Chen, and K. J. Ray, Nanoscale molecular communica-
that MTSK decreases the bit error rates significantly, and out- tion networks: A game-theoretic perspective, EURASIP J. Adv. Signal
performs the two most common modulation techniques in Process., Dec. 2015.
the literature, which are BCSK and BMoSK. Furthermore, [13] M.-J. Moore, T. Suda, and K. Oiwa, Molecular communication:
Modeling noise effects on information rate, IEEE Trans. NanoBiosci.,
as the second transmitter-based solution, a power adjustment vol. 8, no. 2, pp. 169180, Jun. 2009.
technique, which uses residual molecules in the channel, is pro- [14] M. J. Saxton, Modeling 2D and 3D diffusion, in Methods in Membrane
posed to improve the energy efficiency. Error performance of Lipids. New York, NY, USA: Springer, 2007, pp. 295321.
[15] K. Schulten and I. Kosztin, Lectures in Theoretical Biophysics,
CSK-PA, MoSK-PA, and MTSK-PA were compared via Monte CreateSpace Independent Publishing Platform, 2015.
Carlo simulations, and it was shown that the power adjust- [16] A. Noel, K. C. Cheung, and R. Schober, Optimal receiver design for
ment technique decreases the ISI, hence the bit error rate for diffusive molecular communication with flow and additive noise, IEEE
Trans. NanoBiosci., vol. 13, no. 3, pp. 350362, Sep. 2014.
a fixed signal power for all modulation techniques, signifi- [17] M. Mahfuz, D. Makrakis, and H. Mouftah, A comprehensive anal-
cantly. Furthermore, a trade off is observed between memory ysis of strength-based optimum signal detection in concentration-
length (K ) employed in PA and communication quality. In encoded molecular communication with spike transmission, IEEE
Trans. NanoBiosci., vol. 14, no. 1, pp. 6783, Jan. 2015.
order to present a comprehensive comparison, bit error rates [18] H. Shah Mohammadian, G. G. Messier, and S. Magierowski, Optimum
for all modulation techniques are presented in Figure 19. The receiver for molecule shift keying modulation in diffusion-based molec-
receiver-based solution proposed for the energy efficiency prob- ular communication channels, Nano Commun. Netw., vol. 3, no. 3,
pp. 183195, Sep. 2012.
lem was to employ a simpler decoder in terms of computational [19] M. Mohri, A. Rostamizadeh, and A. Talwalkar, Foundations of Machine
complexity, titled decision feedback filter. DFF calculates the Learning. Cambridge, MA, USA: MIT Press, 2012.
optimum threshold value for the symbol in question and updates [20] A. Einolghozati, M. Sardari, A. Beirami, and F. Fekri, Capacity of dis-
crete molecular diffusion channels, in Proc. IEEE Int. Symp. Inf. Theory
the decision threshold for each sample by using the previously (ISIT), Jul. 2011, pp. 723727.
estimated bits. DFF was compared with the MMSE equalizer [21] D. Kilinc and O. Akan, Receiver design for molecular communica-
proposed in [21] in terms of bit error rate, memory length, and tion, IEEE J. Sel. Areas Commun., vol. 31, no. 12, pp. 705714, Dec.
2013.
computational complexity via Monte Carlo simulations. It was [22] A. Noel, K. C. Cheung, and R. Schober, Overcoming noise and multiuser
concluded that DFF requires more memory to reach the same interference in diffusive molecular communication, in Proc. 1st ACM
error rate as that of the MMSE equalizer, but since calculating Annu. Int. Conf. Nanoscale Comput. Commun., May 2007, pp. 1:11:9.
[23] H. B. Yilmaz, N.-R. Kim, and C.-B. Chae, Effect of ISI mitigation on
the optimal threshold value has computational complexity at the modulation techniques in molecular communication via diffusion, in
order of O(S), DFF becomes more advantageous when energy Proc. 1st ACM Annu. Int. Conf. Nanoscale Comput. Commun., May 2007,
efficiency is a priority. pp. 3:13:9.
216 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015

Burcu Tepekule received the M.Sc. degree in elec- Chan-Byoung Chae (S06M09SM12) received
trical and electronics engineering from Bogazici the Ph.D. degree in electrical and computer engi-
University, Istanbul, Turkey. She is working with the neering from the University of Texas (UT), Austin,
Institute of Integrative Biology, ETH Zurich, Zurich, TX, USA, in 2008. He is an Associate Professor
Switzerland, where she is currently pursuing the with the School of Integrated Technology, College
Ph.D. degree. Her research interests include mod- of Engineering, Yonsei University, Seoul, South
eling and simulating population dynamics of virus Korea. He was a Member of Technical Staff
infections within infected individuals. (Research Scientist) at Bell Laboratories, Alcatel-
Lucent, Murray Hill, NJ, USA, from 2009 to 2011,
and the Wireless Networking and Communications
Group (WNCG) at the University of Texas. Before
joining Bell Laboratories, he was a Postdoctoral Research Fellow with the
School of Engineering and Applied Sciences, Harvard University, Cambridge,
MA, USA. Prior to joining UT, he was a Research Engineer with the
Telecommunications R&D Center, Samsung Electronics, Suwon, South Korea,
Ali E. Pusane received the B.Sc. and M.Sc. degrees from 2001 to 2005. His research interests include capacity analysis and
in electronics and communications engineering from interference management in energy-efficient wireless mobile networks and
Istanbul Technical University, Istanbul, Turkey, in nano (molecular) communications. He has served/serves as an Editor for
1999 and 2002, respectively, and the M.Sc. degree the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS, the IEEE
in electrical engineering, the M.Sc. degree in applied T RANSACTIONS ON S MART G RID and the IEEE/KICS J OURNAL OF
mathematics, and the Ph.D. degree in electrical engi- C OMMUNICATIONS AND N ETWORKS. He is a Guest Editor for the IEEE
neering from the University of Notre Dame, Notre J OURNAL ON S ELECTED A REAS IN C OMMUNICATIONS (special issue on
Dame, IN, USA, in 2004, 2006, and 2008, respec- molecular, biological, and multi-scale communications). He was the recipi-
tively. He was a Visiting Assistant Professor at the ent/corecipient of the IEEE INFOCOM best demo award (2015), the IEIE/IEEE
Department of Electrical Engineering, University of Joint Award for Young IT Engineer of the Year (2014), the Haedong Young
Notre Dame, from 2008 to 2009. He is currently Scholar Award (2013), the IEEE Signal Processing Magazine best paper award
an Associate Professor with the Department of Electrical and Electronics (2013), the IEEE ComSoc AP Outstanding Young Researcher Award (2012),
Engineering, Bogazici University, Istanbul, Turkey. His research interests the IEEE VTS Dan. E. Noble Fellowship Award (2008), the Gold Prize (1st) in
include coding theory and wireless communications. the 14th/19th Humantech Paper Contests, and the KSEA-KUSCO scholar-
ship (2007). He was also the recipient of the Korea Government Fellowship
(KOSEF) during the Ph.D. studies.

Tuna Tugcu received the B.S. degree in com-


puter engineering from Bogazici University, Istanbul,
H. Birkan Yilmaz received the B.S. degree in math- Turkey, the M.S. degree in computer and infor-
ematics, and the M.Sc. and Ph.D. degrees in com- mation science from the New Jersey Institute of
puter engineering from Bogazici University, Istanbul, Technology, Newark, NJ, USA, and the Ph.D. degree
Turkey, in 2002, 2006, and 2012, respectively. in computer engineering from Bogazici University,
Currently, he works as a Postdoctoral Researcher with in 1993, 1994, and 2001, respectively. He worked
Yonsei Institute of Convergence Technology, Yonsei as a Postdoctoral Fellow and a Visiting Professor
University, Seoul, South Korea. He is a Member of with Georgia Institute of Technology, Atlanta, GA,
TMD (Turkish Mathematical Society). His research USA. He is currently a Professor with the Computer
interests include cognitive radio, spectrum sensing, Engineering Department, an Advisor to the Rector,
molecular communications, and detection and esti- and the Director of the Computer Center at Bogazici University. His research
mation theory. He was the recipient of the TUBITAK interests include nanonetworking, molecular communications, cognitive radio
National Ph.D. Scholarship. networks, and wireless networks. He serves in the NATO Science and
Technology Groups and IEEE Standard Groups.

You might also like