Professional Documents
Culture Documents
2, JUNE 2015
exceeds a pre-determined threshold, and as a bit-0, otherwise. becomes a major constraint at nano scale [11] by limiting both
Binary MoSK (BMoSK), on the other hand, utilizes the emis- the processing power of the communicating devices and their
sion of two different types of messenger molecules, where the capacity to produce messenger molecules. Therefore, two dif-
transmitter releases the appropriate type of molecule based on ferent approaches can be considered for dealing with the energy
the current symbol. The receiver then decodes the intended efficiency problem in an MCvD system. First approach is to
symbol based on the type and number of the molecules received reduce the signal power, i.e., number of released molecules, as
during a time slot [10]. much as possible. The second approach is to reduce the power
Problems that occur in an MCvD system can be grouped into expended by a nano-machine during the encoding/decoding
two categories. The first category involves the problems caused processes, which requires the design of filters or equaliz-
by the random movements of the messenger molecules, i.e., dif- ers with minimal computational complexity. Both of these
fusion. The random movement of the messenger molecules lim- approaches would decrease the power consumption, while
its the amount of deterministic information about the received increasing the bit error rate. As a result, a trade off is observed
signal, therefore aggravates the decoding process. Notice that between the data rate, energy efficiency, and communication
BCSK generally utilizes a pre-determined threshold at the quality.
receiver to make a decision for the received signal. In the litera- The main goal of this paper is to propose new techniques
ture, these threshold values are usually calculated empirically as applicable at both transmitter and receiver sides, which can
follows: after the information transmission is over, the receiver be chosen and implemented depending on the physical con-
calculates the bit error rate for various detection threshold val- straints of the nano machines. Proposed techniques are aimed to
ues and chooses the optimal threshold that minimizes this error improve the overall communication quality to achieve arbitrar-
rate [10], [11]. This procedure requires the receiver to know ily low error rates at shorter symbol durations, hence increasing
the transmitted signal, which makes the communication pro- the data rate, while considering the energy constraints. For
cess itself redundant. Another approach may be sending a long the transmitter side, we propose a new modulation technique,
sequence of pilot symbols before the information transmission molecular transition shift keying (MTSK), which is an energy
and calculate the optimal threshold empirically as described efficient modulation technique designed to reduce the effects
above. Problem with this approach arises due to the high sensi- of ISI for a single-transmitter single-receiver communication
tivity of the optimal threshold values both to the order and the system. To enhance the energy efficiency, a power adjustment
value of the transmitted symbols. In order to have a sufficient technique that utilizes the residual molecules in the channel
representation of the system, one also has to send these pilot is also proposed. At the receiver side, we propose a deci-
symbols repetitively, so that a comprehensive understanding sion feedback filter for the decoding process, which has a
of the system behavior can be obtained. Additionally, optimal lower computational complexity compared to a minimum mean
threshold values are also sensitive to system parameters, i.e., squared error or decision feedback equalizer. Apart from the
if one of the system parameters, such as the diffusion coeffi- optimal threshold calculation, modulation and filtering tech-
cient, transmitter - receiver distance, etc. changes slightly, this niques proposed in this paper are potential solutions for MCvD
exhaustive procedure must be repeated. Although there is one systems under different constraints.
attempt in the recent literature [12] to calculate the optimal The remainder of this paper is organized as follows: Section
threshold analytically, proposed calculations consider only the II reviews the characteristics of the diffusion process, modu-
effect of one previous symbol, which is not sufficient for a dif- lation techniques in the literature, and the ISI problem. The
fusion channel at high data rates. As a result, more advanced proposed analytical technique to determine the optimum thresh-
problems of an MCvD system can not be properly addressed old value for a nano communication system is presented in
before solving the optimal thresholding problem. In this paper, Section III. Section IV introduces the transmitter based ISI
an analytical technique to determine the optimum threshold mitigation techniques, which include the proposed modulation
value prior to information transmission is proposed, which is technique, MTSK, and the power adjustment method applied to
the first main contribution of this paper. different modulation techniques. Receiver based ISI mitigation
Another problem caused by diffusion is the inter symbol techniques that include the proposed decision feedback filter
interference (ISI). Due to the nature of diffusion, some of the (DFF) and the MMSE equalizer are given in Section V. Section
messenger molecules may fail to arrive at the receiver in their VI concludes the paper.
intended time slots and interfere with the messenger molecules
of subsequent transmissions, causing ISI. One of the possi-
ble solutions to reduce the amount of ISI at the receiver is to II. M OLECULAR C OMMUNICATION VIA
D IFFUSION AND ISI
keep the symbol duration as long as possible and, thus, allow
the messenger molecules a longer time to reach their destina- The communication model used in this paper is depicted in
tions. This effectively reduces the number of residual molecules Figure 1. Messenger molecules are used as information car-
left in the channel. On the other hand, increasing the symbol riers between a point source and a spherical receiver with
duration also decreases the data rate, which is already low com- absorbing receptors. The point source is located at a distance
pared to electromagnetic and optic channels due to the nature r0 from the center of the receiver. The point source and the
of diffusion. spherical receiver both reside in a fluid propagation medium,
The second category of problems arises due to the extremely which is an unbounded 3-dimensional (3-D) environment. After
small size of the nano scaled devices. Energy efficiency the information is modulated onto some physical property of
204 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015
the messenger molecules, these molecules are released to the given the initial distance r0 . The first boundary condition is [15,
medium, where they diffuse according to Brownian motion and Eq. (3.63)]
arrive at the receiver. To receive the molecules (i.e. the signal),
the spherical receiver with radius rr , uses receptors placed on lim p(r, t|r0 ) = 0, (2)
r
its surface.
The messenger molecules are the information particles for which reflects the assumption that the distribution of the
an MCvD system. At this scale, random movement/diffusion of molecules vanishes at distances far greater than r0 . The second
particles through the fluid is modeled by Brownian motion. The boundary condition is [15, Eq. (3.64)]
motion is governed by the combined forces applied to a mes- p(r, t|r0 )
senger molecule by the molecules of the fluid due to thermal D = wp(r, t|r0 ) for r = rr , (3)
r
energy. Brownian motion is described by the Wiener process,
which is a continuous-time stochastic process. where D, rr and w denote the diffusion coefficient, radius of
For simulating the Brownian motion in an n-dimensional the receiver and the rate of reaction, respectively. When the rate
space, time is divided into 1 ms long steps for a variety of sym- of reaction approaches infinity, it corresponds to the boundary
bol durations at the order of 100 ms, and at each time step, ran- condition in which every collision leads to an absorption. In
dom movement is applied to each dimension as rt+t = rt + other words, receiver is completely covered with receptors and
r . The total displacement of a molecule ( r ) in one time step all receptors are perfectly absorbing.
(t) can be found as r = (x1 , . . . , xn ), where xi is the Solving (3) for w with the given boundary and initial
displacement of a molecule in the i th dimension. Movement in conditions yields [15, Eq. (3.104)]
each dimension for a given time step is modeled independently
1 1
and follows a Gaussian distribution, i.e., xi N(0, 2Dt) p(r, t|r0 ) =
i {1, . . . , n}, where N(, 2 ) denotes the Gaussian distribu- 4rr0 4 Dt
tion with mean and variance 2 . Molecules propagate in the (r r0 )2 (r +r0 2rr )2
e 4Dt e 4Dt . (4)
environment according to these dynamics. As conventionally
done in the literature, our model assumes that the molecules are
dilute enough for the frequency of collisions to be insignificant, Using (4), the hitting rate of molecules is also calculated in
and therefore, ignores the collisions between the messenger [15, Eq. (3.108)] as
molecules [13], [14]. Molecules within the receiver volume
f hit (t) = 4rr2 w p(rr , t|r0 )
at the end of each time step is assumed to be absorbed. This
model utilizing the Brownian motion is used for Monte Carlo rr 1 r 0 rr (r0 rr )2
= e 4Dt , (5)
simulations. r0 4 Dt t
Fig. 3. Effects of ISI for BCSK encoded sequence, where rr = 5 m, r0 = 10 m, D = 79.4 m 2 /s, n 0 = 0, n 1 = 500 and ts = 200ms.
Time dependent formulation for the fraction of molecules calculated, and effects of ISI on each time slot are illustrated
absorbed by the receiver is an important formulation in the in Figure 3a.
nanonetworking domain, since (5) and (6) describe the response Similar to the BCSK, the residual molecules from the pre-
of the diffusion channel completely. vious symbols also cause ISI when BMoSK is used. BMoSK
is less susceptible to ISI effects than the BCSK technique
[10]. However, BMoSK requires the synthesis of two types of
molecules rather than one, and number of molecules released
B. Modulation and Demodulation Techniques from transmitter almost doubles, since bit-0s are also encoded
with constant number of molecules. Effects of ISI for BMoSK
BCSK and BMoSK are the two most common modulation is illustrated in Figure 3b, where the same binary message
techniques for MCvD. In BCSK, number of the received mes- sequence of {1, 1, 0, 1, 0, 1, 1} is used.
senger molecules is used as the amplitude of the signal. The In conclusion, both modulation techniques are inefficient in
receiver decodes the intended symbol as a bit-1 if the num- terms of energy efficiency and ISI mitigation when molecular
ber of messenger molecules arriving at the receiver during a communication at high data rates is considered. Additionally,
time slot exceeds a pre-determined threshold, and as a bit- there is no technique in the literature besides the empirical one
0, otherwise. To represent different values of symbols, the to calculate the threshold value for a BCSK encoded sequence.
transmitter releases different number of molecules for each
value the symbol can represent, e.g., the transmitter releases
n 0 molecules for a bit-0, whereas it releases n 1 molecules
for a bit-1 [10]. As mentioned earlier, in the literature, the III. ISI T HRESHOLD C OMPUTATION T ECHNIQUE
threshold is typically empirically chosen by using a long In the literature, the optimal threshold is usually assumed to
sequence of pilot symbols. BMoSK, on the other hand, utilizes be calculated after the information transmission is over, which
the emission of two different types of messenger molecules requires the receiver to know the transmitted signal, and makes
to represent information. The transmitter releases a constant the communication process itself redundant. The error rates
number of type-A or type-B molecules for the current sym- obtained after such thresholding would provide a lower bound
bol values of bit-0 and bit-1, respectively. The receiver then for the bit error rates, rather than a realistic result. There are
decodes the intended symbol based on the type and the num- also different approaches in the literature on the design of an
ber of the molecules received during a time slot [10]. Unlike optimal receiver for a BCSK [16], [17], or BMoSK encoded
CSK, decoding of a MoSK-encoded binary sequence does sequence [18], which are elegant solutions but too complex in
not necessarily require a threshold value. The receiver can terms of computation for a nanomachine implementation. As
make a decision simply by comparing the received number of an alternative, another approach may be transmitting a suffi-
molecules of both molecule types and determining which one is ciently long sequence of pilot symbols before the information
larger. transmission in order to obtain a comprehensive model of the
The MCvD system using BCSK can be adversely affected system behavior. The problem with this approach arises due to
from ISI, caused by the residual molecules from the previous the high sensitivity of the optimal threshold values both to the
symbols [10]. By using (5), the hitting rates for a BCSK- order and the value of the transmitted symbols. Therefore, one
encoded binary message sequence of {1, 1, 0, 1, 0, 1, 1} are also has to retransmit these pilot symbols frequently to obtain a
206 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015
reliable model of the channel behavior. Additionally, the opti- model can be extended by the addition of a zero-mean white
mal threshold values are also sensitive to system parameters, Gaussian noise with a constant variance c2 , which may rep-
meaning that if one of the system parameters, such as diffu- resent the counting noise at the receiver, or noise due to the
sion coefficient, transmitter - receiver distance, etc., changes molecule reactions in the environment, etc. Since the sum of
slightly, this exhaustive procedure must be repeated. This is two independent Gaussian random variables is again a Gaussian
the main motivation for developing an analytical approach to random variable, with its mean being the sum of the two means,
calculate the optimal threshold. and its variance being the sum of the two variances, the variance
By using Fhit (t) given in (6), probability of a single molecule of Ci becomes
to hit the receiver in a given time slot can be calculated. Let pk
denote the hitting probabilities, where p1 is the hitting proba-
i
2{i} = c2 + M pk (1 pk ) bik+1 . (12)
bility in the current symbol duration and pk for k 2 denote
k=1
the hitting probabilities in the consecutive symbol durations.
Hitting probabilities pk for k = 1, 2, . . . for a given system Equations (10) and (11) indicate that the parameters of the
model can be calculated using Gaussian distribution change for each symbol, which means
that each and every symbol requires its own optimal threshold.
pk = Fhit (kts ) Fhit ([k 1]ts) (7) To begin with, let us focus on finding the optimal threshold {i}
for the detection of bi in bn such that
where ts denotes the symbol duration.
Hitting probabilities are sufficient to describe the characteris- bi =1
tics of the diffusion channel completely, which implies that the Ci {i} , (13)
bi =0
choice of symbol duration has a great significance in determi-
nation of the channel response. In terms of ISI mitigation, it is
where bi denotes the estimate of bi . Note that in the case of
desirable to have p1 to be the largest in magnitude compared to
Ci = {i} , the receiver can be preset to decide for a bit-0 or
pk for k > 1. Therefore, ts should be chosen such that hitting
bit-1, or choose one of them randomly. We can treat this case
probabilities are in descending order ( p1 > p2 > p3 > . . .).
as a traditional binary detection problem in an AWGN channel
Let bn = {b1 , b2 , . . . , bn } denote the binary message
and use maximum a posteriori probability (MAP) decision rule,
sequence of length n, and let bi and Mi denote the message
given as
symbols and number of molecules sent from the transmitter
in the ith time slot for i = 1, 2, . . . , n, respectively. For sim- P[bi = 1] p(Ci |bi1 , bi = 1) bi =1
plicity, assume BCSK, where the number of molecules to be 1, (14)
P[bi = 0] p(Ci |bi1 , bi = 0) bi =0
transmitted is Mi = M for bi = 1, and Mi = 0 for bi = 0.
The number of received molecules at the receiver for a given where p() denotes the probability density function of the
time slot can be modeled as a Gaussian random variable [4]. Let Gaussian distributed Ci . Note that calculation of {i} requires
Ci denote the number of received molecules at the receiver in information about the sequence history bi1 . In case of a
the ith time slot due to the transmission of bi . The probability memoryless decoder, when the first (i 1) bits, which are cru-
model for Ci can be defined [4] as cial for (10) and (11), are unknown, all possible combinations
(candidates) for bi1 must be considered, which yields 2i1
bi BE(P[bi = 1]), (8)
candidate means, variances, and optimal thresholds. Each bi1
{i, j}
Ci |bi N {i} , 2{i} , (9) candidate also has its own probability, P[bi1 ]. Let dl =
{i, j} {i, j} {i, j}
{dl [1], dl [2], . . . , dl [i]} denote a candidate sequence
where BE(), N(, ), P[bi = 1], and P[bi = 0] denote the for bi , i.e., a possible binary sequence combination of length
Bernoulli distribution, Gaussian distribution, probability of i, and {i, j} denote its corresponding optimal threshold value.
occurrence for bit-1 and probability of occurrence for bit-0 in In this notation, l denotes whether the candidate sequence is
the message sequence, respectively. Due to ISI, the expected conditioned on bi = 0 or bi = 1, and j is equal to the decimal
number of molecules arriving at the receiver in the ith time slot {(i1), j}
value of reverse ordered dl sequence, such that
can be given as
i1
i
j=
{i, j}
dl [z]2z1 , (15)
E[Ci |bi ] = {i} = M pk bik+1 , (10)
z=1
k=1
{(i1), j} {i, j}
which is the mean of the Gaussian distributed molecule count where dl denotes the first (i 1) bits of dl . For exam-
at the receiver. The variance of Ci is similarly given by ple, for a bit sequence of length n = 3, there are 23 = 8 possible
candidate sequences, which are visualized as a binary tree given
i {3,1}
in Figure 4. One of the candidates is d0 , which corresponds
Var[Ci |bi ] = 2{i} = M pk (1 pk ) bik+1 . (11)
to the bit sequence of length three, conditioned on bit-0, and
k=1
with decimal value 1 for the reverse ordered history; which can
It should be noted that (10) and (11) do not include any ran- only be the sequence {1 0 0}. Calculating j allows for the enu-
domness except for the one due to the diffusion process. This meration of candidates with respect to the amount of ISI they
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 207
induce, since the latter symbols contribute more to the ISI than which is equal to the sum of error probabilities for a given
the former ones. threshold . To minimize Ji ( ), derivative with respect to
By conditioning each candidate on bit-1 and bit-0, the opti- can be set to zero as
{i, j} {i, j}
mal threshold {i, j} can be found for siblings {d0 , d1 } in
the binary tree, which are basically two Gaussian distributions Ji ( ) 1 {i, j}
2i1
{i, j}
N {i} |1 , 1
2{i, j}
{i, j} {i, j} {i, j} {i, j} = P d1
with parameter sets {0 , 0 } and {1 , 1 }, respec-
j=0
tively. Each {i, j} can be calculated by writing (14) and (13)
{i, j} {i, j}
N {i} |0 , 0
2{i, j}
explicitly, which yields P d0 = 0, (23)
N {i} |1 , 1
2{i, j}
P d1 =
{i} {i, j} 2 2{i, j}
2 2{i, j} exp 1 /21 j=0
0
log
1
2i1
{i, j} {i, j}
N {i} |0 , 0
2{i, j}
2{i, j}
2 1 {i} {i, j} 2 2{i, j} P d0 . (24)
exp /20 0
i=1
P[bi = 0]
= log , (17) For i > 2, (24) becomes a hard problem to solve analytically
P[bi = 1] due to the combinatorial nature of the equation, so numerical
methods are used instead.
resulting in the quadratic equation {i} can be efficiently computed using two fundamental
2 observations. The first observation makes use of (10), (11), and
a {i} + b {i} + c = 0, (18) the fact that ts is chosen such that hitting probabilities are in an
descending order, i.e., pi > p j for i < j. We can then sort the
where, distribution parameters as
{i,1} {i,2} {i,2i1 1}
2{i, j} 2{i, j} 0 < 0 < < 0 ,
a = 1 0 , (19)
{i,1} {i,2} {i,2i1 1}
1 < 1 < < 1 ,
2{i, j} {i, j} 2{i, j} {i, j}
b = 2 0 1 1 0 , (20) {i,1} {i,2} {i,2i1 1}
0 < 0 < < 0 ,
2{i, j} 2{i, j} 2{i, j} 2{i, j}
c = 1 0 0 1 {i,1} {i,2} {i,2i1 1}
1 < 1 < < 1 . (25)
{i, j}
2{i, j} 2{i, j} P[bi = 0]1
21 0 log {i, j}
. (21) Consequently, optimal thresholds can also be sorted
P[bi = 1]0
as {i,1} < {i,2} < < {i,2 1} . Being able to sort
i1
Algorithm 1. Calculation of {N }
1: Compute {1}
2: for i = 2 to N do
3: for j = 0 to 2i1 1 do
{i, j} {i, j} {i, j} {i, j}
4: Calculate {0 , 1 , 0 , 1 }
5: if j = 2i1 1 then
Compute optimal threshold {i,2 1}
i1
6:
max {i,2 1}
i1
7:
8: end if
9: end for
10: Set step size = M/100
11: = {i1} : : max
12: While > do
13: Calculate the sum of likelihoods
Fig. 5. Optimal threshold values for i 25, where P[bi = 0] = 0.5 and ts =
200ms. 2i1 1 {i, j} {i, j}
j=0 P[bi = 1]N( |1 , 1 )
r = i1 {i, j} {i, j}
2 1
TABLE I
j=0 P[bi = 0]N( |0 , 0 )
D ISTRIBUTION PARAMETERS
14: m argmin |1 r (m)|
m
15: {i} (m )
16: {i} : /10 : {i} +
17: /10
18: end while
19: end for
and denote the step size and stopping parameter of the the likelihoods are equal to each other. Likewise, {2,1} is the
algorithm, respectively. The first 25 threshold values computed intersection point of the two Gaussian distributions that arise
{2,1} {2,1}
using Algorithm 1 are shown in Figure 5. The step size is due to d0 and d1 . Thus, {2,0} and {2,1} must satisfy
initialized to M/100, since the threshold value will be pro-
{2,0}
0.5N {2,0} |0 , 0
2{2,0}
portional to the number of molecules transmitted for bi = 1.
{2,1}
= 0.5N {2,1} |1 , 1
2{2,1}
value would be more meaningful, since the number of received . (27)
molecules will be an integer as well.
Example 1: Consider a BCSK modulated random binary On the other hand, {2} must satisfy (24), and requires
sequence, where P[bi = 0] = P[bi = 1] = 0.5, i. To cal- {2, j} {2, j}
equating the sum of likelihoods for d0 and d1 for j =
culate the optimal threshold {2} , the distribution parame-
{0, 1}, which yields
ters must be calculated by using (10) and (11). Candidate
{2,0} {2,1}
0.25N {2} |0 , 0 + 0.25N {2} |0 , 0
sequences and their corresponding parameters are given in 2{2,0} 2{2,1}
Table I.
{2,0} {2,1}
To calculate {2} , (10) and (11) must be used, which = 0.25N {2} |1 , 1
2{2,0}
+ 0.25N {2} |1 , 1
2{2,1}
.
means that information of the first two hitting probabilities are (28)
required. Let us define a parameter set, denoted by P, where
rr = 5 m, r0 = 10 m, c2 = 1, molecules similar to insulin Equations (26) and (27) can be solved analytically, and
hormone are used as information carriers, and the channel is more importantly, as i increases, calculating {i, j} for j =
filled with a liquid which results in a diffusion coefficient of {0, 1, . . . , 2i1 1} requires solving 2i1 separate equations,
79.4 m 2 /s [11]. This parameter set will be used for all the which are individually analytically solvable. On the other hand,
latter simulations and examples in this paper. For this exam- {2} in (28) is hard to solve for analytically, and becomes
ple, in addition to the set of parameters P, the symbol duration harder due to the combinatorial nature of (24) as i increases,
is chosen as ts = 200ms, and M = 100 molecules are used as hence requires the use of Algorithm 1.
messenger molecules on each symbol duration. Distribution of candidate sequences and threshold values for
According to (16), {2,0} is the intersection point of the two this example are plotted in Figure 6. These results can be
{2,0} {2,0}
Gaussian distributions that arise due to d0 and d1 , where interpreted as follows. If the receiver is memoryless, it has to
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 209
Fig. 6. Distributions of recieved molecule counts and threshold values. Fig. 8. Comparison of empirical threshold values and linear regression outputs,
where P[bi = 0] = 0.5, ts = 200 ms, and M = 500.
linear relationship between 1/ i and the optimal threshold val-
ues {i} for i 3 (i = 3 is denoted with a dashed vertical line),
where ts = 200 ms and M = 500. As a result, linear regression
can be applied to calculate the the threshold values {i} for
3 i 25, using (29) where = 0.5.
The motivation of using a function of this from can be justi-
fied based on two facts. First, note that hitting probabilities have
a cumulative effect on both distribution parameters, as seen in
(10) and (11). As i increases, the marginal effect of hitting prob-
abilities will decrease, indicating that there should be a limit
value as i goes to infinity. Physical interpretation of this is as
follows: since the channel is assumed to be free of molecules
before the transmission begins, the optimal threshold value will
increase in the early stages of the transmission. As transmis-
Fig. 7. Linear relationship between 1/ i and {i} for i 25, where P[bi =
0] = 0.5, ts = 200 ms. sion continues, due to the accumulation of the molecules in the
diffusion channel, number of molecules in the channel will go
consider all possible candidate sequences in order to make a into saturation and the optimal threshold value will converge to
decision for b2 . In this case, {2} must be used, meaning that a constant.
any number of molecules below approximately 13 molecules To verify the reliability of the linear regression outputs, 1000
yields a decision of b2 = 0. On the other hand, if the receiver random binary messages, consisting of 100 equally likely bits,
stores information about b1 , depending on the binary value of are generated, and the empirical thresholds for each i are cal-
b1 , either {2,0} or {2,1} can be used. culated such that the error rate for each bi is minimized by
considering all the 1000 realizations at the same time. This is
repeated for 500 times, and the results are presented in Figure 8.
A. Linear Regression As can be seen from the figure, linear regression outputs follow
the mean of the empirically chosen thresholds, which verifies
Computing the optimal threshold for bi requires computa-
the performance of the linear regression and Algorithm 1.
tion of the distribution parameters for all candidates, which
It should be noted that , 0 , and 1 in (29) are dependent on
means that the number of operations increases with powers of
both M and hitting probabilities pk , since the mean and vari-
2 as i increases. However, in the case of a continuous trans-
ance of the molecule counts at the receiver are also dependent
mission, the optimal threshold must be calculated for very long
on them, as given in (10) and (12). Furthermore, hitting prob-
sequences of bits, i.e., as i . In order to predict {i} for
abilities are determined by both the symbol duration ts and the
large values of i, common transforms are applied to i values, in
environmental parameters such as diffusion coefficient, receiver
the form of [19, Eq. (10.8)]
radius, etc. As a result, if one of these parameters change, , 0 ,
{i} = 1 i + 0 , (29) and 1 must be calculated accordingly.
Since it is possible to compute {i} , i, and limiinf {i} =
where 0 , 1 R, and 0 < < 1. This transformation enables 0 , different strategies can be used for thresholding. A realistic
to use linear regression techniques more effectively with non- scenario could be as follows: receiver senses the hitting proba-
linear data given in Figure 5. As seen in Figure 7, there is a bilities first. Using these hitting probabilities and Algorithm 1,
210 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015
TABLE II
PARAMETERS FOR BCSK, BM O SK, AND MTSK
MODULATION TECHNIQUES
B. Power Adjustment
Effects of ISI can both be beneficial (constructive interfer-
ence) and harmful (destructive interference) to the symbol in
Fig. 14. BER curves for different modulation techniques, where ts = 200 ms. question. In BCSK, BMoSK, and MTSK, residual molecules
become a source of destructive interference when the intended
{3} {3} symbol is a bit-0. On the other hand, they may actually be
PeMTSK (b3 ) = 1 P C3 (A) < A P C3 (B) < B
{3} beneficial for consecutive bit-1s in a sequence and may be
{3,1}
A 0 (A) used to support the messenger molecules that will be emitted
=1 1 Q {3,1} in the next time slots. With this motivation, BCSK, BMoSK,
(A) and MTSK were modified to utilize the residual molecules
{3} 0 {3,2}
B 0 (B) from the previous symbols, and modified versions are denoted
1 Q {3,2} by BCSK-PA, BMoSK-PA, and MTSK-PA, where PA stands
0 (B)
for power adjustment. A similar approach on utilizing resid-
= 0.0064. ual molecules in terms of symbol duration adjustments can
be found in [20]. Briefly, in [20], authors propose a dynamic
As a result, PeBCSK (b3 ) > PeBMoSK (b3 ) > PeMTSK (b3 ). Note
structure at the receiver side, where they dynamically lengthen
that even though there are only two bit-1s before b3 , differences
the symbol duration as the number of accumulated molecules
between error probabilities are noteworthy.
increase in the channel. This helps to prevent ISI.
In order to compare the error performance of BCSK,
Recall that, in case of a BCSK modulated signal, Mi = 0
BMoSK, and MTSK, average signal power per symbol for
for bi = 0 and Mi = M for bi = 1. Since BCSK-PA intends to
these techniques must be defined. For BCSK, where Mi = 0
adjust the signal power considering the effects of constructive
for bi = 0, and Mi = M for bi = 1, average power per sym-
ISI, in case of a BCSK-PA modulated signal, value of M will
bol can be defined as P = M P[bi = 1]. This is also valid for
be adjusted depending on the number of residual molecules in
MTSK, since bit-1s are encoded with a constant number of M
the channel.
molecules, and bit-0s are encoded by the absence of molecules,
Let E[M R EC ] denote the expected value of the received
independent of the molecule type. On the other hand, since
number of molecules at the receiver by sending M number of
BMoSK utilizes M number of molecules for both bit-0 and bit-
molecules for the first bit-1 in bi . Since Mi = 0 for bi = 0,
1, average signal power of BMoSK will be equal to M. Error
bit-0s before the first bit-1 in bi will not effect the number of
performance of the BCSK, BMoSK, and MTSK modulation
molecules accumulated in the channel. Relationship between
techniques are compared via Monte Carlo simulations, and the
E[M R EC ] and M is given as
resulting BER curves are given in Figure 14. Binary sequences
of length 1000 were used, 104 realizations were performed, and E[M R EC ] = p1 M. (34)
threshold values computed via Algorithm 1 are employed in the
simulations. As seen in Figure 14, error rates are significantly For correct transmission, the threshold at the receiver side
decreased when MTSK is employed. By comparison with CSK, should be chosen so that E[M R EC ] number of molecules leads
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 213
Mi = E[M R EC ] E[MiR ], (35) Fig. 15. BER Curves for different modulation techniques with power adjust-
ment for K = 2, where ts = 200 ms and P[bi = 0] = 0.5.
where E[MiR ] denotes the expected value of the residual
molecules accumulated in the channel due to the transmission
of bi1 . Since the channel is assumed to be free of messen-
ger molecules before the transmission begins, E[MiR ] can be
calculated as
i
E MiR = p j Mi j+1 . (36)
j=2
{i, j}
S
0 =M pk bik+1 ,
k=2
{i, j}
S
1 =M pk bik+1 + M p1 ,
Fig. 18. BER Curves for DFF and MMSE equalizer3 , where M = 500 and
k=2
ts = 200 ms.
S
pk (1 pk ) bik+1 ,
2{i, j}
0 = c2 + M
variance of the received molecule counts depends on the trans-
k=2
mitted message as given in (11), hence restricts the application
S
of classical equalization methods.
pk (1 pk ) bik+1 + p1 (1 p1 ),
2{i, j}
1 = c2 + M
k=2
VI. C ONCLUSIONS
where S denotes the length of the receiver memory. Block dia-
gram of this DFF is given in Figure 17. Note that the use of In this paper, transmitter and receiver-side energy efficient
erroneously detected b i1 may cause error propagation, which ISI mitigation techniques were proposed for MCvD in terms
may decrease the performance of the DFF. of modulation, filtering, and signal power adjustment. To work
Error performance of DFF and the MMSE equalizer pro- on modulation techniques for a real time communication sce-
posed in [21] are compared via Monte Carlo simulations and nario, decision threshold for detection had to be determined
bit error rates with respect to memory lengths are given in prior to the information transmission, which was a problem
Figure 18. BCSK modulation is employed for binary messages never addressed in the literature before. An analytical method
of length 1000 bits, and 500 realizations were performed in that minimizes the overall error rate when the system parame-
order to obtain an average. As seen in Figure 18, in order for ters are known was proposed to determine the optimal decision
the DFF and the MMSE equalizer to perform at a bit error rate threshold for each symbol. Since the number of operations per-
of around 103 , DFF must have S = 35, whereas S = 13 is suf- formed for calculating the optimal threshold increases for the
ficient for MMSE equalizer. However, if the computation of the latter symbols in the sequence, linear regression is applied to
distribution parameters are ignored, computational complexity the first 25 threshold values, using a function that resembles
of MMSE equalizer is at the order of O(S 3 ), whereas com- the dynamics of the diffusion channel. By doing so, optimal
putational complexity of DFF is equal to O(S), since it only thresholds can be calculated for each symbol regardless of the
requires solving the quadratic equation given in (18). Note that sequence length. These threshold values are compared with the
TEPEKULE et al.: ISI MITIGATION TECHNIQUES IN MOLECULAR COMMUNICATION 215
ACKNOWLEDGMENT
The authors would like to thank . Deniz Akyldz for his
valuable comments and suggestions to improve the manuscript.
R EFERENCES
[1] I. F. Akyildiz, F. Brunetti, and C. Blzquez, Nanonetworks: A new com-
munication paradigm, Comput. Netw., vol. 52, no. 12, pp. 22602279,
Aug. 2008.
[2] S. Hiyama et al., Molecular communication, in Proc. NSTI
Nanotechnol. Conf., May 2005, vol. 3, pp. 392395.
[3] N. Farsad, W. Guo, and A. W. Eckford, Tabletop molecular communica-
tion: Text messages through chemical signals, PloS ONE, vol. 8, no. 12,
p. e82935, Aug. 2013.
[4] T. Nakano, A. W. Eckford, and T. Haraguchi, Molecular Communication.
Cambridge, U.K.: Cambridge Univ. Press, 2013.
[5] I. F. Akyildiz, J. M. Jornet, and M. Pierobon, Nanonetworks: A new
frontier in communications, Commun. ACM, vol. 54, no. 11, pp. 8489,
Fig. 19. BER Curves for conventional and proposed modulation techniques, Nov. 2011.
where ts = 200 ms. [6] T. Nakano, M. Moore, F. Wei, A. Vasilakos, and J. Shuai, Molecular
communication and networking: Opportunities and challenges, IEEE
Trans. NanoBiosci., vol. 11, no. 2, pp. 135148, Jun. 2012.
[7] M. Mahfuz, D. Makrakis, and H. Mouftah, On the characterization
empirical threshold values found via Monte Carlo simulations, of binary concentration-encoded molecular communication in nanonet-
and are verified to be optimal in the sense of minimizing the works, Nano Commun. Netw., vol. 1, no. 4, pp. 289300, Dec. 2010.
overall bit error rate. It is concluded that, as long as 0 , 1 , [8] S. Pudasaini, S. Shin, and K. S. Kwak, Robust modulation tech-
nique for diffusion-based molecular communication in nanonetworks,
and in (29) are known, different thresholding strategies can CoRR, vol. abs/1401.3938, 2014 [Online]. Available: http://arxiv.org/abs/
be applied depending on the system constraints. Resolving the 1401.3938
thresholding problem is the pre-requisite step which allows us [9] A. Aijaz and A.-H. Aghvami, Error performance of diffusion-based
molecular communication using pulse-based modulation, IEEE Trans.
to propose new ISI mitigation techniques. NanoBiosci., vol. 14, no. 1, pp. 146151, Jan. 2015.
The first transmitter-based solution proposed for ISI miti- [10] M. S. Kuran, H. B. Yilmaz, T. Tugcu, and I. F. Akyildiz, Modulation
gation is a novel modulation technique, titled MTSK, which techniques for communication via diffusion in nanonetworks, in Proc.
IEEE Int. Conf. Commun. (ICC), Jun. 2011, pp. 15.
uses multiple molecule types in order to increase the data [11] M. S. Kuran, H. B. Yilmaz, T. Tugcu, and B. zerman, Energy model for
rate by suppressing the negative impact of the ISI on com- communication via diffusion in nanonetworks, Nano Commun. Netw.,
munication quality. It was shown via Monte Carlo simulations vol. 1, no. 2, pp. 8695, Jul. 2010.
[12] C. Jiang, Y. Chen, and K. J. Ray, Nanoscale molecular communica-
that MTSK decreases the bit error rates significantly, and out- tion networks: A game-theoretic perspective, EURASIP J. Adv. Signal
performs the two most common modulation techniques in Process., Dec. 2015.
the literature, which are BCSK and BMoSK. Furthermore, [13] M.-J. Moore, T. Suda, and K. Oiwa, Molecular communication:
Modeling noise effects on information rate, IEEE Trans. NanoBiosci.,
as the second transmitter-based solution, a power adjustment vol. 8, no. 2, pp. 169180, Jun. 2009.
technique, which uses residual molecules in the channel, is pro- [14] M. J. Saxton, Modeling 2D and 3D diffusion, in Methods in Membrane
posed to improve the energy efficiency. Error performance of Lipids. New York, NY, USA: Springer, 2007, pp. 295321.
[15] K. Schulten and I. Kosztin, Lectures in Theoretical Biophysics,
CSK-PA, MoSK-PA, and MTSK-PA were compared via Monte CreateSpace Independent Publishing Platform, 2015.
Carlo simulations, and it was shown that the power adjust- [16] A. Noel, K. C. Cheung, and R. Schober, Optimal receiver design for
ment technique decreases the ISI, hence the bit error rate for diffusive molecular communication with flow and additive noise, IEEE
Trans. NanoBiosci., vol. 13, no. 3, pp. 350362, Sep. 2014.
a fixed signal power for all modulation techniques, signifi- [17] M. Mahfuz, D. Makrakis, and H. Mouftah, A comprehensive anal-
cantly. Furthermore, a trade off is observed between memory ysis of strength-based optimum signal detection in concentration-
length (K ) employed in PA and communication quality. In encoded molecular communication with spike transmission, IEEE
Trans. NanoBiosci., vol. 14, no. 1, pp. 6783, Jan. 2015.
order to present a comprehensive comparison, bit error rates [18] H. Shah Mohammadian, G. G. Messier, and S. Magierowski, Optimum
for all modulation techniques are presented in Figure 19. The receiver for molecule shift keying modulation in diffusion-based molec-
receiver-based solution proposed for the energy efficiency prob- ular communication channels, Nano Commun. Netw., vol. 3, no. 3,
pp. 183195, Sep. 2012.
lem was to employ a simpler decoder in terms of computational [19] M. Mohri, A. Rostamizadeh, and A. Talwalkar, Foundations of Machine
complexity, titled decision feedback filter. DFF calculates the Learning. Cambridge, MA, USA: MIT Press, 2012.
optimum threshold value for the symbol in question and updates [20] A. Einolghozati, M. Sardari, A. Beirami, and F. Fekri, Capacity of dis-
crete molecular diffusion channels, in Proc. IEEE Int. Symp. Inf. Theory
the decision threshold for each sample by using the previously (ISIT), Jul. 2011, pp. 723727.
estimated bits. DFF was compared with the MMSE equalizer [21] D. Kilinc and O. Akan, Receiver design for molecular communica-
proposed in [21] in terms of bit error rate, memory length, and tion, IEEE J. Sel. Areas Commun., vol. 31, no. 12, pp. 705714, Dec.
2013.
computational complexity via Monte Carlo simulations. It was [22] A. Noel, K. C. Cheung, and R. Schober, Overcoming noise and multiuser
concluded that DFF requires more memory to reach the same interference in diffusive molecular communication, in Proc. 1st ACM
error rate as that of the MMSE equalizer, but since calculating Annu. Int. Conf. Nanoscale Comput. Commun., May 2007, pp. 1:11:9.
[23] H. B. Yilmaz, N.-R. Kim, and C.-B. Chae, Effect of ISI mitigation on
the optimal threshold value has computational complexity at the modulation techniques in molecular communication via diffusion, in
order of O(S), DFF becomes more advantageous when energy Proc. 1st ACM Annu. Int. Conf. Nanoscale Comput. Commun., May 2007,
efficiency is a priority. pp. 3:13:9.
216 IEEE TRANSACTIONS ON MOLECULAR, BIOLOGICAL, AND MULTI-SCALE COMMUNICATIONS, VOL. 1, NO. 2, JUNE 2015
Burcu Tepekule received the M.Sc. degree in elec- Chan-Byoung Chae (S06M09SM12) received
trical and electronics engineering from Bogazici the Ph.D. degree in electrical and computer engi-
University, Istanbul, Turkey. She is working with the neering from the University of Texas (UT), Austin,
Institute of Integrative Biology, ETH Zurich, Zurich, TX, USA, in 2008. He is an Associate Professor
Switzerland, where she is currently pursuing the with the School of Integrated Technology, College
Ph.D. degree. Her research interests include mod- of Engineering, Yonsei University, Seoul, South
eling and simulating population dynamics of virus Korea. He was a Member of Technical Staff
infections within infected individuals. (Research Scientist) at Bell Laboratories, Alcatel-
Lucent, Murray Hill, NJ, USA, from 2009 to 2011,
and the Wireless Networking and Communications
Group (WNCG) at the University of Texas. Before
joining Bell Laboratories, he was a Postdoctoral Research Fellow with the
School of Engineering and Applied Sciences, Harvard University, Cambridge,
MA, USA. Prior to joining UT, he was a Research Engineer with the
Telecommunications R&D Center, Samsung Electronics, Suwon, South Korea,
Ali E. Pusane received the B.Sc. and M.Sc. degrees from 2001 to 2005. His research interests include capacity analysis and
in electronics and communications engineering from interference management in energy-efficient wireless mobile networks and
Istanbul Technical University, Istanbul, Turkey, in nano (molecular) communications. He has served/serves as an Editor for
1999 and 2002, respectively, and the M.Sc. degree the IEEE T RANSACTIONS ON W IRELESS C OMMUNICATIONS, the IEEE
in electrical engineering, the M.Sc. degree in applied T RANSACTIONS ON S MART G RID and the IEEE/KICS J OURNAL OF
mathematics, and the Ph.D. degree in electrical engi- C OMMUNICATIONS AND N ETWORKS. He is a Guest Editor for the IEEE
neering from the University of Notre Dame, Notre J OURNAL ON S ELECTED A REAS IN C OMMUNICATIONS (special issue on
Dame, IN, USA, in 2004, 2006, and 2008, respec- molecular, biological, and multi-scale communications). He was the recipi-
tively. He was a Visiting Assistant Professor at the ent/corecipient of the IEEE INFOCOM best demo award (2015), the IEIE/IEEE
Department of Electrical Engineering, University of Joint Award for Young IT Engineer of the Year (2014), the Haedong Young
Notre Dame, from 2008 to 2009. He is currently Scholar Award (2013), the IEEE Signal Processing Magazine best paper award
an Associate Professor with the Department of Electrical and Electronics (2013), the IEEE ComSoc AP Outstanding Young Researcher Award (2012),
Engineering, Bogazici University, Istanbul, Turkey. His research interests the IEEE VTS Dan. E. Noble Fellowship Award (2008), the Gold Prize (1st) in
include coding theory and wireless communications. the 14th/19th Humantech Paper Contests, and the KSEA-KUSCO scholar-
ship (2007). He was also the recipient of the Korea Government Fellowship
(KOSEF) during the Ph.D. studies.