Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks

Size: px
Start display at page:

Download "Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks"

Transcription

1 Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are randomly deployed in an area of size N. Each is a multicast source with n d destination nodes randomly chosen. The fundamental question is as follows: what is the multicast capacity from an information-theoretic viewpoint and how can one achieve it? Our preliminary work presents an optimistic view: node cooperation has the potential to improve capacity significantly in certain regime. In particular, when 2 α < 3, the aggregated achievable multicast source rate scales as Ω((N/n d ) 2 α/2 ɛ), where ɛ > 0 can be arbitrarily small. This is a significant improvement from (N/n d ) 1/2 obtained in previous work assuming a simple protocol model [1, 2]. This is achieved through a MIMO-based multihop architecture. The key ingredient is to choose an appropriate cluster size for MIMO cooperation (and thus the corresponding distance for each hop) that optimally integrate the multicast gain and the power transfer gain (loss). 1 Introduction Multicast data transfer has many applications. In military networks it is often stated that multicast traffic dominates due to the need for group communications. In the civilian context, an emerging application that has already been tested in universities is the use of wireless ad hoc networks to broadcast replays during football games. A situation like a football game would have a large number of spectators, each having a mobile device and a desire for a replay of an important moment in the game. There is almost no infrastructure available from which they could obtain such data, and there is a strong incentive to form an ad hoc network for this purpose. Some of the users might be close to data sources (perhaps if they were close to an Internet access point), and they would act as sources for the multicast traffic. Other nodes would act as relays and sinks for the data. The questions arise as to how many multicast sessions can be supported by such a network, what the total capacity of the network would be, and how to achieve the capacity in a simple manner. Earlier work has studied multicast scaling using the protocol-model first introduced in [3]. Consider a randomly deployed network of N nodes, each is a multicast source with n d receivers randomly chosen, where n d = N γ, 0 < γ < 1. It has been shown that the aggregated multicast source rate scales as Θ( N/ n d log N) [1, 2]. In addition, in [2], a simple comb structure was proposed to achieve the capacity upperbound. The results in [1, 2] assume the simple protocol model, where a transmission is successful if and only if all other transmissions are outside a certain range from the receiver. This model captures the current widely-used physical layer technology: signals from other transmitters are interference that degrades the communication. A nature question is whether more sophisticated physical-layer technology can improve the scaling law. 1

2 The question has received a lot of research attention in the context of unicast. Xie and Kumar first show that nearest neighbor multihop is order-optimal when the pass loss exponent α is larger than 6 [4]. Later on, researchers gradually tighten the regime where multihop is order-optimal, α > 5 in [5], α > 4.5 in [6], and α > 4 in [7]. Recently, in [8], the authors identify the scaling laws of the information-theoretic capacity of the network in the previous open range of 2 < α < 4. They show that the capacity scales as n 2 α/2 for 2 α < 3 and n for α > 3 in extended networks. In addition, almost linear scaling is achievable in dense networks or when α = 2. When the path attenuation is low, i.e., 2 α < 3, the capacity is achieved within an arbitrarily small exponent by intelligent node cooperation and distributed multiple-input multiple-output (MIMO) communication. To realize the cooperation, nodes exchange information through a hierarchical and digital architecture. When the path attenuation is high, i.e., α 3, the capacity is achieved through nearest neighbor multihop. The optimistic result using hierarchical MIMO motivates us to revisit the multicast problem. The fundamental question is as follows: what is the multicast capacity from an information-theoretic viewpoint and how can one achieve it? Our preliminary work presents an optimistic view: cooperation has the potential to improve capacity significantly in certain regime, as we have constructed such a multicast structure. 2 System Model We consider an extended network where N wireless nodes are located randomly in a square of area N. Each node is a multicast source, each is associated with n d destination nodes chosen randomly. Thus, the total number source-destination pairs is N d, where N d = N n d. Each multicast source has the same traffic rate r s to send to all its destination nodes. The aggregated multicast source rate is R s = N s r s. Each node has a common average transmit power constraint of P. We assume the same physical model as in [8]. Let α be the power path loss exponent, where α = 2 in free space. We assume a narrow-band communication channel where the carrier frequency is much larger than the channel bandwidth. The complex based-band channel gain between node i and node k at time m is given by H ik [m] = Gr α/2 ik exp(jθ ik [m]) where r ik is the distance between the nodes, θ ik [m] is the random phase at time m, uniformly distributed in [0, 2π] and {θ ik [m], 1 i n, 1 k n} is a collection of independent and identically distributed (i.i.d.) random processes. The θ ik [m] and r ik are also assumed to be independent. The parameters G and α are assumed to be constant. We assume that the channel is random, depending on the node locations and the phases. Node locations are fixed. The phase changes are stationary and ergodic. We assume that the channel gains are known at all the nodes. Because we consider an extended network, the average distance between neighboring nodes remains a constant as the network size increases. In this case, we assume the far-field path-loss model, which renders a random phase model reasonable. As in [8], multipath effects are ignored. We summarize the main notations used in the paper in Table 2 for easy reference. 2.1 Hierarchical MIMO In [8], the authors propose a hierarchical MIMO structure to achieve asymptotically tight unicast scaling law (within an arbitrarily small exponent) when 2 α < 3. The scheme is used as a basic component in our proposed multicast scheme, and thus is summarized as follows. 2

3 α : path loss exponent N : total number of nodes in the network N d : total number of multicast destinations. n d : # of destinations per source, n d = N γ, 0 < γ < 1 r s : per multicast source rate R s : aggregated multicast source rate, R s = N r s M : cluster size We restate Theorem 5.1 from [8] The interference constraints stated in the following theorem come from Lemma 3.1 and Lemma 3.2 in [8]. Theorem 2.1 Consider an extended network on a N N square. There are two cases. 2 α < 3: For any ɛ > 0, w.h.p., an aggregated throughput of KN 2 α/2 ɛ is achievable in the network for all possible pairings between sources and destinations. K > 0 is a constant independent of N and the source-destination pairing. The capacity is achievable when the network experiences external interference. In particular, when α > 2, the capacity is achievable if the external interference signal received by nodes is a collection of uncorrelated zero-mean stationary and ergodic random process with its power upperbounded by K I. When α = 2, the capacity is achievable if the external interference signal received by nodes is a collection of uncorrelated zero-mean stationary and ergodic random process with its power upperbounded by K I log N. In both cases, K I is a constant independent of N. α 3: w.h.p., an aggregated throughput K N is achievable in the network for all possible parings between sources and destinations. K > 0 is a constant independent of N and the source-destination pairing. The following scheme achieves the capacity within an arbitrarily small exponent. It operates in an iterative manner in three phases through clustering and long-range MIMO transmissions between clusters. One can start with a simple scheme that achieves an aggregated capacity of N b. Then divide the network into clusters of size M = N 1/(2 b). Source nodes send bits to destinations in three steps. Phase I. Setting Up Transmit Cooperation Clusters work in parallel. Within a cluster, each source node has to distribute M bits to the other nodes, 1 bit for each node, such that at the end of the phase, each node has 1 bit from each of the source nodes in the same cluster using the scheme with aggregated capacity of M b. Phase II. MIMO Transmission One performs long-distance MIMO transmissions (of size M M) between source-destination pairs, one at a time. In particular, nodes in the source cluster together can form a distributed transmit antenna array, sending the bits simultaneously to the corresponding destination cluster. 3

4 Phase III. Cooperate to Decode Clusters work in parallel. Each node in the destination cluster obtained one observation from the MIMO transmission for each source, and it quantizes and ships the observation back to the destination node, which can then do joint MIMO processing of all the observations and decode the transmitted bits. After the three steps, one obtains a scheme that achieves a capacity of N 1/(2 b), which is higher than the original scheme with capacity N b. The key ingredient of the capacity achieving scheme is iteration. One can start with a simple scheme that achieves an aggregated capacity of 1 using simple TDMA (i.e., b = 0). Applying the above steps h times, one gets a scheme achieving an aggregated throughput of Θ(N h/(h+1) ). Given any ɛ > 0, we can now choose h such that and we get a scheme that achieves aggregate throughput scaling with high probability. 3 Main Results In this section, we present the MHM scheme that can achieve the upper bound arbitrarily close. We note that the theorems are presented in their accurate form. However, for easy illustration, we outline the proof and the construction of the MHM scheme in a hand-waving fashion. In particular, we consider a special network where destination nodes of a multicast source is evenly distributed. In other words, if we divide the network into clusters of size N/n d, then each cluster has one and only one destination node from each source. We will present the the rigorous proofs in Section 4 where destinations are randomly distributed in the network. 3.1 Achievability Theorem 3.1 Consider an extended network on a N N square. There are two cases. 2 α < 3: For any ɛ > 0, w.h.p., an aggregated source rate of KN (2 α/2 ɛ)(1 γ) is achievable, where K > 0 is a constant independent of N. An optimal operation scheme is MHM. α 3: w.h.p., an aggregated throughput N K nd log N is achievable, where K > 0 is a constant independent of N. nearest-neighbor multihop. An optimal operation is the We construct a multihop hierarchical MIMO (MHM) structure to achieve the upper bound within an arbitrarily small exponent. The construction is inspired by the derivation of the upperbound. To achieve the upperbound, we notice that the cutset size is M = N 1 γ when 2 α < 3 and is 1 when α 3. We construct a similar structure. Let s first consider the case where 2 α < 3. We divide the network into clusters of size M = N 1 γ. On average, each cluster has one destination node from each source. For simplicity, we assume that there is exactly one destination node in each cluster from each source. The operation is long range MIMO enabled multihop. The length of each hop is M, which is achieved through M M long-range MIMO transmission, as shown in Figure 1. 4

5 S2: MxM MIMO S S1&3: intra-cluster Hierarchical MIMO Figure 1: MHM Routing is extremely simple in the scheme. Consider a multicast flow. Its source node locates in an arbitrary cluster. The information bit is first spread out vertically and then horizontally, cluster-by-cluster, as shown in Figure 1. Inter-cluster communication is through M M MIMO transmission between neighboring clusters. Step I: In each cluster of size M, each node distributes a bit to each of the other nodes in the cluster. This distribution uses hierarchical MIMO unicast within the cluster. There are total c 1 N/M = c 1 n d simultaneous transmissions in the network. This step takes M 2 /(c 1 M 2 α/2 ɛ ) unit of time. Step II: Multihop transmission. Each cluster of size M constructs a M M MIMO transmission to its neighboring cluster. There are total c 2 N/M = c 2 n d simultaneous transmissions in the network. This step takes M 2 /(c 2 M 2 α/2 ) unit of time. Step III: In each cluster of size M, each node has an observation for each other node in the cluster. Quantize each observation into Q bits. Use hierarchical MIMO unicast within the cluster to distribute the quantized symbol to the node that needs it. This step takes Q M 2 /(c 1 M 2 α/2 ɛ ) unit of time. Note that a bit for each multicast source is transmitted from the source to each of the clusters of size M hop-by-hop following the previous three steps. Each transmission reaches a constant number (one to four) of neighboring clusters. Therefore, there are totally N/M such transmissions. On the other hand, there are N/M simultaneous transmissions in each step. The aggregated source rate 5

6 can be calculated as follows: R s = 1 N M M 2 N M M 2 KM 2 α 2 ɛ + M 2 M M/M α 2 + Q M 2 KM 2 α 2 ɛ (1) = K M 2 α 2 ɛ (2) = K N (2 α 2 ɛ)(1 γ) (3) Because each source node s sending rate is limited by O(log N). R s = min(n log N, N (2 α 2 ɛ)(1 γ) ) = N (2 α 2 ɛ)(1 γ). (4) For comparison, we also consider using Unicast MIMO to deliver multicast traffic. In particular, each source sends its data to each of its destinations independently as if they are NOT multicast. Using unicast MIMO, there are N d s-d pairs. Following the capacity results in Theorem 2.1, each source node can achieve a throughput of KN 2 α 2 ɛ N d = KN 1 α 2 ɛ γ. There are N sources. So the aggregated source rate using unicast MIMO is 3.2 Path Attenuation Low Attenuation R UMIMO = KN 2 α 2 γ ɛ. (5) We have α = 2. In this case, we have two schemes that significantly improve the capacity compared to nearest-neighbor multihop: MHM and unicast MIMO. The performance of MHM, based on Eq. 3, is R s = N 1 γ ɛ. The performance using unicast MIMO is: R s = N N N d = N 1 γ ɛ. 3.3 Medium Attenuation We consider the case where 2 α < 3. Compare the achievability result obtained at Eq. 3. We note that MHM is strictly better than unicast MIMO and nearest-neighbor multihop [2, 1] High Attenuation When α 2, we use the standard multihop structure where information is relayed to the nearest neighbor toward the destination. In Figure 2, we compare MHM, Unicast MIMO, and the nearest-neighbor multicast. The x-axis is α and y-axis is exponent e(α) defined as log R n (α) e(α) := lim n log n, (6) where R n (α) is the aggregated source rate. The scaling exponent enables us to ignore less important factors (e.g., log n factor) and focus on the most salient component. For example, n and n/ log n both have scaling exponent of 1/2. 6

7 e(α) ( 1 γ ) / 2 multihop 1 γ Unicast MIMO MHM ( 2 α / 2 γ ) ( 2 α / 2)(1 γ ) 1/ 2 γ 2 3 α Figure 2: Compare MHM, Unicast MIMO, and the nearest-neighbor multicast. 3.4 Multicast Gain In this section, we provide an intuitive explanation on multicast gain using a back-of-the-envelop calculation. The metric is the aggregated multicast transport capacity, and the unit is bit-meter/sec. If a source node sends a bit to all its destinations, which has an average distance of d, then it contributes to dn d bit-meter. Normalized over the time to send this information, T, we obtain the multicast transport capacity of dn d /T bit-meter/sec. We define the multicast gain in the following sense. Consider an optimal multicast scheme with aggregated transport capacity of C m. Consider a structure that uses the optimal unicast scheme to deliver multicast traffic. In particular, it assumes that each multicast flow is n d independent unicast flows and results in an aggregated transport capacity of C u. We call the ratio between C m and C u the multicast gain. In this section, we answer the question how much the multicast gain is. The answer is somewhat counter-intuitive at the first glance. The multicast gain depends on the path loss exponent. If the path loss exponent is small (i.e., α = 2), there is NO multicast gain. On the other hand, if the pass loss exponent is large (i.e., α > 2), then there is a multicast gain. The intuition is explained as follows using a back-of-the-envelop calculation. It has been shown that the hierarchical MIMO structure achieves the optimal unicast capacity within an arbitrarily small exponent. Therefore, it is the scheme used. We call it the unicast MIMO. Its aggregated multicast transport capacity is ) ( ) C u = Θ (N 2 N α 2 N = Θ N 3 2 N 1 α 2. (7) The first term N 2 is the number of sender-receiver pairs when we use a N N MIMO structure; the second term N α/2 is the path loss; the third term N is the average distance between the multicast sender and a receiver (i.e., sending a bit to a destination contributes to 1 N bit-meter). Consider a MHM structure. Its multicast capacity is C M = Θ ( M 2 M α 2 N M N M M ) ( ) = Θ N 3 2 M 1 α 2. (8) The first term M 2 is the average number of sender-receiver pairs when we use a M M MIMO structure; the second term M α/2 is the pass loss for the M M MIMO transmission; the third 7

8 term N/M is the number of spatial reuse; and the last term M is the distance of this hop. The fourth term N/M is the number of destinations this bit contributes to. To elaborate, the average distance in terms of the number of M M long-rang transmissions is N/M, there are total N/M receiver clusters, and it takes N/M to reach all clusters. Therefore, each transmission contributes to an average of N M Θ N ( ) M N = Θ N M M receivers. Compare Eqs. 7 and 8, it is clear that when α = 2, the two schemes are equivalent. On the other hand, if 2 < α < 3, MHM is superior. In MHM, we observe two types of gains. The first type of gain is M 2 M α 2, which we refer to as the power gain. When the path attenuation is large, power transfer is more efficient among small clusters. The second type of gain is N/M N/M M, due to the benefit of exploring multicast where one bit is potentially used by multiple destinations. When 2 < α < 3, the two types of gains contribute to the optimal performance. Compare Eqs. 7 and 8, we see that the multicast gain, G m, is G m = 1, α = 2 n α 2 1 d, 2 α < 3 nd, α 3. (9) 4 Detailed Analysis In Section 3, to simplify the discussion, we assume that destination nodes of a multicast source is evenly distributed. In other words, if we divide the network into clusters of size N/n d, then each cluster has one and only one destination node from each source. Of course, this is not realistic. In this section, we consider the case where destinations are randomly distributed in the network. We first need an appropriate cluster size so that each cluster has at least one destination node (which is necessary to prove the upper bound). Let M be the cluster size. Lemma 1 Let the cluster size be M = 5N ln N n d, (10) Then each cluster is guaranteed to have at least one destination node from each source w.h.p., and each cluster is bounded to have at most 10 ln N = 10γ ln n d destination nodes w.h.p. In addition, the number of nodes in each cluster is between ((1 δ)m, (1 + δ)m) with probability larger than 1 N/Me Λ(δ)M where Λ(δ) is a positive constant independent of N and δ > 0. The first part of the lemma can be proved using Chernoff bound and union bound. The second half of the lemma on the number of nodes in each cluster is a restatement of Lemma 4.1 in [8], and thus the proof is omitted here. Assume M takes the value in Eq. (10) for the rest of the session. As in [8], we assume that there are exactly M nodes in each cluster to simplify the discussion. 8

9 4.1 Achievability We select one delegate for each multicast source in each cluster. If the source node is in the cluster, the source node is the delegate. Otherwise, the delegate is arbitrarily chosen, where it may or may not be a destination node of the multicast flow. There are totally N sources and each cluster has M nodes. Therefore, we can evenly distribute the load of delegates among all M nodes and let each node be delegates for N/M sources (including itself). Thus, all nodes have the same amount of load. The role of the delegate is as follows: in Steps I and III, the delegate serves as the source and destination, respectively. In Step III, through cooperation to decode, the delegate recovers the original multicast message. We then introduce a new step, Step IV. Step IV: The delegates sends the message to all other destination nodes in the cluster through unicast using hierarchical MIMO. The routing is modified accordingly. Consider a multicast flow. Its source node locates in an arbitrary cluster. Its multicast message is first spread out vertically and then horizontally, clusterby-cluster, as shown in Figure 1. Inter-cluster communication is through M M MIMO transmission between neighboring clusters. In each cluster, there are O(log N) destinations. Within each cluster, the delegate recovers the message in Step III through cooperative decoding. Then it relays the message to all other destination nodes in the cluster through unicast using hierarchical MIMO (which causes a capacity loss of O(log N)). If the destination nodes are within the same cluster as the source node, the source node uses unicast to deliver the information to each of the destinations, again with a capacity loss factor of O(log N). For a cluster, it receives the message through M M MIMO transmission at most once. It sends out information using M M MIMO transmission to at most four neighboring clusters. The multicast gain comes from that fact that a message delivered to a neighboring cluster can potentially benefit many receivers. We count the aggregated source rate as follows: each source generates M L bits-long messages. These messages are sent to all delegates hop-by-hop (A hop is a hop of a M M MIMO transmission to a neighboring cluster) and then be delivered to all destinations. To calculate the aggregated source rate, we divide the total amount of source bits (N M L) by the total time to deliver them. The system operates in a pipelining fashion. After a long time of operation, each delegate holds M message of L bits for each source it represents. In other words, each node holds N (N = M N/M) L bits-long messages. Next, we calculate the time to deliver these messages in detail. To establish the achievability result, we need to prove the following Lemmas. First, for Steps I and III, given the cluster size of M, Θ(N/M) clusters can transmit simultaneously while achieving a capacity of M 2 α/2 ɛ. Second, for Step II, there are Θ(N/M) simultaneously M M long range transmissions between neighboring clusters. Step I. Intra-Cluster Distribution Each node has M messages for each multicast source. In the worst case, it needs to deliver the messages to one delegate in each of the four neighboring clusters. Consider one delegate in one cluster. Following a similar approach in [8], we divide each cluster into two half-clusters of equal size, each with M/2 nodes (within a constant factor). One half-cluster is farther away from the destination cluster and one is close to the border. The node delivers two messages to each node in the half-cluster that is farther away from the destination cluster. We use the hierarchical MIMO scheme developed in [8] for these deliveries. Theorem 2.1 states the achievable rate of the scheme. This step may need to repeat at most four times for four neighboring clusters. We need to apply Theorem 2.1 to Step I, where each cluster is of size M. The average power constrain of each user is P. The difference is that the clusters work in parallel and thus we need to 9

10 Figure 3: 9-TDMA scheduling scheme. consider the interference among simultaneously transmitting clusters. Lemma 2 Consider clusters of size M. The clusters follow a 9-TDMA scheduling scheme, as shown in Figure 3. For α > 2, the interference power received by a node from the simultaneously operating clusters transmissions is upperbounded by a constant K I, which is independent of N. For α = 2, the interference-power is bounded by K I2 log N. Moreover, the interference signals received by different nodes in the cluster are zero-mean and un-correlated. Proof: In the 9-TDMA schedule, the clusters with the same number operate simultaneously while other clusters remain inactive. There are at least two inactive clusters between any two clusters that are active. The proof of the lemma is similar to that of Lemma 4.2 in [8]. The modifications needed are as follows. In Lemma 4.2 in [8], the network is a dense network of size 1 and each node is constrained to an average power of P/M (note that M is the largest cluster in the hierarchical MIMO transmission in our context). Because we consider an extended network, the distance is scaled up by a factor of M, and the power is scaled up by a factor of M α/2 to compensate the path attenuation. To meet the average power constraint of P, the scheme only runs a fraction of time, where the fraction is 1/M α/2 1. The rest of the proof follows that of Lemma 4.2 [8] while having P j P M α/2 1 and A c = M. The above interference constraint satisfies the interference constraint required in Theorem 2.1. Therefore, applying Theorem 2.1, each cluster can finish its intra-cluster traffic within a time T (Step I) = 4 9 M N k 1 M 2 α/2 ɛ = 36 k 1N M α/2+ɛ 1 where k 1 > 0 is a constant and ɛ > 0. Step II: neighboring cluster transmission. We construct M/2 M/2 MIMO transmissions that transmit from the farther away half-cluster to the destination half-cluster. The distance between a node in the sending half-cluster and a node in the receiving cluster is lower bounded by M/2 and upper bounded by 2 M. The transmit power is P M α/2 1. To maintain the average power constraint of P, nodes operate only a fraction of time, and the fraction is M 1 α/2. This guarantees that the power received by each node in the destination bluster is bounded below and above by constants that are independent of M when transmitting. 10

11 Figure 4: 25-TDMA scheduling scheme. Lemma 3 Consider clusters of size M. Following a 25-TDMA scheme, as shown in Figure 4, the interference power received by a node from the simultaneously operating inter-cluster transmissions is upperbounded by a constant K I, which is independent of N, when α > 2. For α = 2, the interference-power is bounded by K I2 log N. The lemma holds following the same proof as in Lemma 2 using the fact that the closest interfering cluster is at least two clusters away from the receiving cluster. The lemma will be useful in determining the mutual information achieved by the simultaneous M M transmissions. In total, there are N/M/25 simultaneously transmitting clusters. Each transmission consists of an L-bits long packet, encoded into C symbols using a randomly generated Gaussian code. The M/2 nodes transmit their encoded sequences of length C symbols simultaneously to M/2 nodes in the destination half-cluster. The nodes in the destination cluster quantize the signals they observe during the C transmissions and store there quantized signals without trying to decode the transmitted symbols. Each cluster may need to transmit to four neighboring clusters. Since there are N/M/25 simultaneously transmitting clusters, the total time to complete Step II is N T (Step II) = C M 1 α/2 Step III: Cooperate to decode. In this phase, we aim to provide each delegate, the observations of the symbols that were originally intended for it, so that a delegate can decode the original message. These observations are accumulated as all nodes in the cluster in Step II. Each observation is quantized into Q bits and sent to the delegate using hierarchical MIMO unicast. Again, we use a 9-TMDA scheme as in Step I. Therefore, the total time to complete Step III is We restate Lemma 4.4 in [8]. T (Step III) = 9 Q M N k 1 M 2 α/2 ɛ = 9 k 1 Q N M α/2+ɛ 1 Lemma 4 There exists a strategy to encode the observations at a fixed rate Q bits per observation and get a linear growth of the mutual information for the resultant M M quantized MIMO channel when the network experiences interference from the exterior. 11

12 Using this lemma, and Lemma 3, we conclude that the three phases can effectively realize a virtual MIMO channels achieving spatial multiplexing gain between two delegates in neighboring clusters. Step IV: Distribution from the delegate to destinations. Each delegate has O(log N) destinations in its cluster. It uses unicast to deliver the information to the destination through the hierarchical MIMO scheme. Following the same 9-TMDA scheme as in Step I, the time to deliver the message is T (Step IV) = 9 M N log N k 1 M 2 α/2 ɛ = 9 k 1 N log N M α/2+ɛ 1 Therefore, in total, the total time to deliver M L bits-long message for each source to all its destination is T t = T (Step I) + T (Step II) + T (Step III) + T (Step IV) c 2 N log N M α/2+ɛ 1 Therefore, the aggregated source rate is R s (N) = NML T t K 2 N (2 α/2 ɛ )(1 γ). We note that all the steps take roughly the same amount of time. (The time for Step I and III is higher than that of Step II by a factor of M ɛ where ɛ is positive but arbitrarily small. The time for Step IV is higher than Step II by a factor of M ɛ log N because each cluster has O(log N) destination nodes.) This implies that they are evenly loaded. The cluster size is an important design factor. For α > 2, a larger cluster size is less efficient in power transfer, and a smaller cluster size is less efficient in exploring the multicast gain. 5 Conclusion In this report, we study multicast in large-scale wireless ad hoc networks in an extended network. When 2 α < 3, MIMO is indeed more efficient in terms of power transfer. The MIMO-based multihop scheme can achieve the capacity within an arbitrarily small exponent. The key ingredient is to choose an appropriate cluster size (and thus the corresponding distance for each hop) that optimally integrate the multicast gain and the power transfer gain (loss). References [1] X.-Y. Li, S.-J. Tang, and O. Frieder, Multicast capacity for large scale wireless ad hoc networks, in MobiCom 07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. New York, NY, USA: ACM, 2007, pp [2] S. Shakkottai, X. Liu, and R. Srikant, The multicast capacity of large multihop wireless networks, in MobiHoc 07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. New York, NY, USA: ACM, 2007, pp [3] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory, vol. IT-46, no. 2, pp , March

13 [4] L. L. Xie and P. R. Kumar, A network information theory for wireless communication: Scaling laws and optimal operation, IEEE Transactions on Information Theory., vol. 50, no. 5, [5] A. Jovicic, P. Viswanath, and S. Kulkarni, Upper bounds to transport capacity of wireless networks, IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 50, no. 11, [6] S. H. A. Ahmad, A. Jovicic, and P. Viswanath, On outer bounds to the capacity region of wireless networks, IEEE/ACM Trans. Netw., vol. 14, no. SI, pp , [7] L.-L. Xie and P. R. Kumar, On the path-loss attenuation regime for positive cost and linear scaling of transport capacity in wireless networks, IEEE/ACM Trans. Netw., vol. 14, no. SI, pp , [8] A. Ozgur, O. Leveque, and D. Tse, Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks, IEEE Transactions on Information Theory, vol. 53, no. 10, pp ,

How does the Information Capacity of Ad Hoc Networks Scale?

How does the Information Capacity of Ad Hoc Networks Scale? How does the Information Capacity of Ad Hoc Networks Scale? Ayfer Özgür, Olivier Lévêque, David Tse Abstract n source and destination pairs randomly located in an area want to communicate with each other.

More information

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Presentation: Alexandros Manolakos EE 360 Stanford University February 13, 2012 Table of Contents What are we trying to solve?

More information

On the Impact of Mobility on Multicast Capacity of Wireless Networks

On the Impact of Mobility on Multicast Capacity of Wireless Networks On the Impact of Mobility on Multicast Capacity of Wireless Networs Jubin Jose, Ahmed Abdel-Hadi, Piyush Gupta and Sriram Vishwanath University of Texas at Austin, Austin, TX Bell Labs, Alcatel-Lucent,

More information

Delay-Throughput Tradeoff for Supportive Two-Tier Networks

Delay-Throughput Tradeoff for Supportive Two-Tier Networks Delay-Throughput Tradeoff for Supportive Two-Tier Networks arxiv:082.4826v [cs.it] 28 Dec 2008 Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui Department of Electrical and Computer Engineering Texas

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

Information-Theoretic Operating Regimes of Large Wireless Networks

Information-Theoretic Operating Regimes of Large Wireless Networks IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 1, JANUARY 2010 427 Information-Theoretic Operating Regimes of Large Wireless Networks Ayfer Özgür, Ramesh Johari, Member, IEEE, David N. C. Tse, Fellow,

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Heterogeneity Increases Multicast Capacity in Clustered Network

Heterogeneity Increases Multicast Capacity in Clustered Network Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline

More information

I. INTRODUCTION. and > 0 is any positive real number. We also show that for k = O( ), the per-flow multicast capacity under Gaussian

I. INTRODUCTION. and > 0 is any positive real number. We also show that for k = O( ), the per-flow multicast capacity under Gaussian IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 18, NO 4, AUGUST 2010 1145 Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model Xiang-Yang Li, Senior Member, IEEE, Yunhao Liu, Senior Member,

More information

CAPACITY of wireless ad hoc networks is constrained. Multicast Performance With Hierarchical Cooperation

CAPACITY of wireless ad hoc networks is constrained. Multicast Performance With Hierarchical Cooperation This article has been accepted for inclusion in a future issue of this journal Content is final as presented, with the exception of pagination IEEE/ACM TRANSACTIONS ON NETWORKING 1 Multicast Performance

More information

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE

More information

5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST We use the following notation: i) f (x) =O(g(x)) means that there exist

5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST We use the following notation: i) f (x) =O(g(x)) means that there exist 5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011 Improved Capacity Scaling in Wireless Networks With Infrastructure Won-Yong Shin, Member, IEEE, Sang-Woon Jeon, Student Member,

More information

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi

NEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi IRTF ANS WG Meeting, November 12, 2003 Notes on Scalability of Wireless Ad hoc Networks Onur Arpacioglu, Tara Small and Zygmunt J. Haas , which extends

More information

A Communication Architecture for Large Heterogeneous Wireless Networks

A Communication Architecture for Large Heterogeneous Wireless Networks A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent

More information

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications

Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant

More information

CHARACTERIZING the capacity region of wireless

CHARACTERIZING the capacity region of wireless IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 5, MAY 2010 2249 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Abstract We consider the question of determining the

More information

On the Scalability of Hierarchical Ad Hoc Wireless Networks

On the Scalability of Hierarchical Ad Hoc Wireless Networks On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical

More information

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

The Complexity of Connectivity in Wireless Networks. Roger WISARD

The Complexity of Connectivity in Wireless Networks. Roger WISARD The Complexity of Connectivity in Wireless Networks Roger Wattenhofer @ WISARD 2008 1 The paper Joint work with Thomas Moscibroda Former PhD student of mine Now researcher at Microsoft Research, Redmond

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads

Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Nabhendra Bisnik, Alhussein Abouzeid Abstract Mobility of nodes may cause routing protocols to incur large overheads

More information

CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS

CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS John Sucec and Ivan Marsic Rutgers University ABSTRACT The throughput of mobile ad hoc networks (MANETs has been analyzed previously.

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

THE past decade has seen an emergence of wireless communication

THE past decade has seen an emergence of wireless communication IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 6, JUNE 2004 1041 A Deterministic Approach to Throughput Scaling in Wireless Networks Sanjeev R. Kulkarni, Fellow, IEEE, and Pramod Viswanath, Member,

More information

Wireless Device-to-Device Communications with Distributed Caching

Wireless Device-to-Device Communications with Distributed Caching Wireless Device-to-Device Communications with Distributed Caching Negin Golrezaei, Alexandros G. Dimakis, Andreas F. Molisch Dept. of Electrical Eng. University of Southern California Los Angeles, CA,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective

Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN

More information

THE demand for widespread Internet access over large

THE demand for widespread Internet access over large 3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre

More information

Distributed MIMO. Patrick Maechler. April 2, 2008

Distributed MIMO. Patrick Maechler. April 2, 2008 Distributed MIMO Patrick Maechler April 2, 2008 Outline 1. Motivation: Collaboration scheme achieving optimal capacity scaling 2. Distributed MIMO 3. Synchronization errors 4. Implementation 5. Conclusion/Outlook

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Physical Layer Security from Inter-Session Interference in Large Wireless Networks

Physical Layer Security from Inter-Session Interference in Large Wireless Networks Physical Layer Security from Inter-Session Interference in Large Wireless Networks Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley University of Massachussets, Amherst Outline 1.

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

AMOBILE ad hoc network (MANET) consists of a collection

AMOBILE ad hoc network (MANET) consists of a collection 1354 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Delay and Capacity Tradeoff Analysis for MotionCast Xinbing Wang, Member, IEEE, Wentao Huang, Shangxing Wang, Jinbei Zhang, and Chenhui

More information

Summary of Raptor Codes

Summary of Raptor Codes Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.

More information

Wireless Network Capacity. Nitin Vaidya

Wireless Network Capacity. Nitin Vaidya Wireless Network Capacity Nitin Vaidya 2009 1 Wireless Networks Why use multi-hop routes to delivery data? Is this optimal? What s the best performance achievable? Capacity analysis can help answer such

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks

Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks Alireza Keshavarz-Haddad Department of Electrical and Computer Engineering Rice University, 6100 Main Street,

More information

PRESENTED BY SARAH KWAN NETWORK CODING

PRESENTED BY SARAH KWAN NETWORK CODING PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms

More information

Stream Sessions: Stochastic Analysis

Stream Sessions: Stochastic Analysis Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds

More information

Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET)

Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET) Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET) 1 Syed S. Rizvi, 2 Aasia Riasat, and 3 Khaled M. Elleithy 1, 3 Computer Science and Engineering Department, University

More information

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION

OPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information

5016 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 10, OCTOBER 2010

5016 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 10, OCTOBER 2010 5016 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 10, OCTOBER 2010 Restricted Mobility Improves Delay-Throughput Tradeoffs in Mobile Ad Hoc Networks Michele Garetto, Member, IEEE, and Emilio Leonardi,

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK

DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:

More information

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks

Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks Yue Wang,DahMingChiu 2, and John C.S. Lui Dept. of Computer Science & Engineering, The Chinese University of

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

NETWORK coding is an area that has emerged in 2000 [1],

NETWORK coding is an area that has emerged in 2000 [1], 450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider

More information

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS

IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,

More information

Infrastructure Support Increases the Capacity of Ad Hoc Wireless Networks

Infrastructure Support Increases the Capacity of Ad Hoc Wireless Networks Infrastructure Support Increases the Capacity of Ad Hoc Wireless Networks Jeong-woo Cho, Seong-Lyun Kim and Song Chong Dept. of Electrical Engineering and Computer Science, Korea Advanced Institute of

More information

Some problems in ad hoc wireless networking. Balaji Prabhakar

Some problems in ad hoc wireless networking. Balaji Prabhakar Some problems in ad hoc wireless networking Balaji Prabhakar Background Example scenarios for ad hoc packet networks - sensor networks (many nodes, low data rates) - wireless LANs (fewer nodes, high data

More information

Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model

Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model Hongxing Li Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong hxli@cs.hku.hk

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Multicasting in ad hoc networks: Energy efficient

Multicasting in ad hoc networks: Energy efficient Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

ANALYSIS OF COOPERATIVE TRANSMISSION MODIFIED ROUTING PROTOCOL IN MANETS

ANALYSIS OF COOPERATIVE TRANSMISSION MODIFIED ROUTING PROTOCOL IN MANETS ANALYSIS OF COOPERATIVE TRANSMISSION MODIFIED ROUTING PROTOCOL IN MANETS * K. Vanisree and V.S.K. Reddy 2 1 Department of ECE, Holy Mary Institute of Technology and science, Hyderabad, Andra Pradesh, India

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

Energy-Latency Tradeoff for In-Network Function Computation in Random Networks

Energy-Latency Tradeoff for In-Network Function Computation in Random Networks Energy-Latency Tradeoff for In-Network Function Computation in Random Networks P. Balister 1 B. Bollobás 1 A. Anandkumar 2 A.S. Willsky 3 1 Dept. of Math., Univ. of Memphis, Memphis, TN, USA 2 Dept. of

More information

Understanding the Impact of Interference on Collaborative Relays

Understanding the Impact of Interference on Collaborative Relays IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, MONTH 200X 1 Understanding the Impact of Interference on Collaborative Relays Yan Zhu, Student Member, IEEE and Haitao Zheng, Member, IEEE Abstract

More information

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions

Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction

More information

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS

TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous

More information

Star-Structure Network Coding for Multiple Unicast Sessions in Wireless Mesh Networks

Star-Structure Network Coding for Multiple Unicast Sessions in Wireless Mesh Networks Wireless Pers Commun (2013) 72:2185 2214 DOI 10.1007/s11277-013-1143-7 Star-Structure Network Coding for Multiple Unicast Sessions in Wireless Mesh Networks Alireza Shafieinejad Faramarz Hendessi Faramarz

More information

Distributed STDMA in Ad Hoc Networks

Distributed STDMA in Ad Hoc Networks Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad

More information

Queue Management for Network Coding in Ad Hoc Networks

Queue Management for Network Coding in Ad Hoc Networks 2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,

More information

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET

Impact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,

More information

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,

More information

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput. Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis

More information

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -

Outline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments - Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Rate Adaptation in

Rate Adaptation in Rate Adaptation in 802.11 SAMMY KUPFER Outline Introduction Intuition Basic techniques Techniques General Designs Robust Rate Adaptation for 802.11 (2006) Efficient Channel aware Rate Adaptation in Dynamic

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks

A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical

More information

Wireless Networks Research Seminar April 22nd 2013

Wireless Networks Research Seminar April 22nd 2013 Wireless Networks Research Seminar April 22nd 2013 Distributed Transmit Power Minimization in Wireless Sensor Networks via Cross-Layer Optimization NETS2020 Markus Leinonen, Juha Karjalainen, Marian Codreanu,

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks

A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks Yuan Xue Department of Computer Science University of Illinois at Urbana-Champaign Baochun Li Department of Electrical and Computer

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2837 Approximate Capacity of a Class of Gaussian Interference-Relay Networks Soheil Mohajer, Member, IEEE, Suhas N. Diggavi, Member, IEEE,

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

1 Introduction and Results

1 Introduction and Results On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br

More information

Group Secret Key Generation Algorithms

Group Secret Key Generation Algorithms Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]

More information

Thomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks

Thomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks Thomas Moscibroda Roger Wattenhofer Distributed Computing Group MASS 2004 Algorithms for Ad Hoc and Sensor Networks...

More information

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)

(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL) Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions

More information

Capacity of Wireless Ad-hoc Networks under Ultra Wide Band with Power Constraint

Capacity of Wireless Ad-hoc Networks under Ultra Wide Band with Power Constraint 1 Capacity of Wireless Ad-hoc Networks under Ultra Wide Band with Power Constraint Honghai Zhang and Jennifer C. Hou Department of Computer Science University of Illinois at Urbana-Champaign Email:{hzhang3,jhou}@cs.uiuc.edu

More information

Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes

Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Venkatesan Guruswami Carnegie Mellon University Pittsburgh, PA 53 Email: guruswami@cmu.edu Ray Li Carnegie Mellon University

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication

Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of

More information

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications

Network Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,

More information

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks

Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks 211 International Symposium of Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks Samat Shabdanov, Catherine

More information

An Architecture for Future Configurable Millimeter Wave Networks. Hang Liu

An Architecture for Future Configurable Millimeter Wave Networks. Hang Liu An Architecture for Future Configurable Millimeter Wave Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2]

More information

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE 554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and

More information

Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks

Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Mahdi Shakiba-Herfeh Department of Electrical and Electronics Engineering METU, Ankara, Turkey 68 Email: mahdi@eee.metu.edu.tr

More information

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient

More information