Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks
|
|
- Steven Darcy Flynn
- 6 years ago
- Views:
Transcription
1 Multihop Hierarchical MIMO A Multicast Structure in wireless ad hoc networks January 11, 2008 Abstract In this paper, we study multicast in large-scale wireless ad hoc networks. Consider N nodes that are randomly deployed in an area of size N. Each is a multicast source with n d destination nodes randomly chosen. The fundamental question is as follows: what is the multicast capacity from an information-theoretic viewpoint and how can one achieve it? Our preliminary work presents an optimistic view: node cooperation has the potential to improve capacity significantly in certain regime. In particular, when 2 α < 3, the aggregated achievable multicast source rate scales as Ω((N/n d ) 2 α/2 ɛ), where ɛ > 0 can be arbitrarily small. This is a significant improvement from (N/n d ) 1/2 obtained in previous work assuming a simple protocol model [1, 2]. This is achieved through a MIMO-based multihop architecture. The key ingredient is to choose an appropriate cluster size for MIMO cooperation (and thus the corresponding distance for each hop) that optimally integrate the multicast gain and the power transfer gain (loss). 1 Introduction Multicast data transfer has many applications. In military networks it is often stated that multicast traffic dominates due to the need for group communications. In the civilian context, an emerging application that has already been tested in universities is the use of wireless ad hoc networks to broadcast replays during football games. A situation like a football game would have a large number of spectators, each having a mobile device and a desire for a replay of an important moment in the game. There is almost no infrastructure available from which they could obtain such data, and there is a strong incentive to form an ad hoc network for this purpose. Some of the users might be close to data sources (perhaps if they were close to an Internet access point), and they would act as sources for the multicast traffic. Other nodes would act as relays and sinks for the data. The questions arise as to how many multicast sessions can be supported by such a network, what the total capacity of the network would be, and how to achieve the capacity in a simple manner. Earlier work has studied multicast scaling using the protocol-model first introduced in [3]. Consider a randomly deployed network of N nodes, each is a multicast source with n d receivers randomly chosen, where n d = N γ, 0 < γ < 1. It has been shown that the aggregated multicast source rate scales as Θ( N/ n d log N) [1, 2]. In addition, in [2], a simple comb structure was proposed to achieve the capacity upperbound. The results in [1, 2] assume the simple protocol model, where a transmission is successful if and only if all other transmissions are outside a certain range from the receiver. This model captures the current widely-used physical layer technology: signals from other transmitters are interference that degrades the communication. A nature question is whether more sophisticated physical-layer technology can improve the scaling law. 1
2 The question has received a lot of research attention in the context of unicast. Xie and Kumar first show that nearest neighbor multihop is order-optimal when the pass loss exponent α is larger than 6 [4]. Later on, researchers gradually tighten the regime where multihop is order-optimal, α > 5 in [5], α > 4.5 in [6], and α > 4 in [7]. Recently, in [8], the authors identify the scaling laws of the information-theoretic capacity of the network in the previous open range of 2 < α < 4. They show that the capacity scales as n 2 α/2 for 2 α < 3 and n for α > 3 in extended networks. In addition, almost linear scaling is achievable in dense networks or when α = 2. When the path attenuation is low, i.e., 2 α < 3, the capacity is achieved within an arbitrarily small exponent by intelligent node cooperation and distributed multiple-input multiple-output (MIMO) communication. To realize the cooperation, nodes exchange information through a hierarchical and digital architecture. When the path attenuation is high, i.e., α 3, the capacity is achieved through nearest neighbor multihop. The optimistic result using hierarchical MIMO motivates us to revisit the multicast problem. The fundamental question is as follows: what is the multicast capacity from an information-theoretic viewpoint and how can one achieve it? Our preliminary work presents an optimistic view: cooperation has the potential to improve capacity significantly in certain regime, as we have constructed such a multicast structure. 2 System Model We consider an extended network where N wireless nodes are located randomly in a square of area N. Each node is a multicast source, each is associated with n d destination nodes chosen randomly. Thus, the total number source-destination pairs is N d, where N d = N n d. Each multicast source has the same traffic rate r s to send to all its destination nodes. The aggregated multicast source rate is R s = N s r s. Each node has a common average transmit power constraint of P. We assume the same physical model as in [8]. Let α be the power path loss exponent, where α = 2 in free space. We assume a narrow-band communication channel where the carrier frequency is much larger than the channel bandwidth. The complex based-band channel gain between node i and node k at time m is given by H ik [m] = Gr α/2 ik exp(jθ ik [m]) where r ik is the distance between the nodes, θ ik [m] is the random phase at time m, uniformly distributed in [0, 2π] and {θ ik [m], 1 i n, 1 k n} is a collection of independent and identically distributed (i.i.d.) random processes. The θ ik [m] and r ik are also assumed to be independent. The parameters G and α are assumed to be constant. We assume that the channel is random, depending on the node locations and the phases. Node locations are fixed. The phase changes are stationary and ergodic. We assume that the channel gains are known at all the nodes. Because we consider an extended network, the average distance between neighboring nodes remains a constant as the network size increases. In this case, we assume the far-field path-loss model, which renders a random phase model reasonable. As in [8], multipath effects are ignored. We summarize the main notations used in the paper in Table 2 for easy reference. 2.1 Hierarchical MIMO In [8], the authors propose a hierarchical MIMO structure to achieve asymptotically tight unicast scaling law (within an arbitrarily small exponent) when 2 α < 3. The scheme is used as a basic component in our proposed multicast scheme, and thus is summarized as follows. 2
3 α : path loss exponent N : total number of nodes in the network N d : total number of multicast destinations. n d : # of destinations per source, n d = N γ, 0 < γ < 1 r s : per multicast source rate R s : aggregated multicast source rate, R s = N r s M : cluster size We restate Theorem 5.1 from [8] The interference constraints stated in the following theorem come from Lemma 3.1 and Lemma 3.2 in [8]. Theorem 2.1 Consider an extended network on a N N square. There are two cases. 2 α < 3: For any ɛ > 0, w.h.p., an aggregated throughput of KN 2 α/2 ɛ is achievable in the network for all possible pairings between sources and destinations. K > 0 is a constant independent of N and the source-destination pairing. The capacity is achievable when the network experiences external interference. In particular, when α > 2, the capacity is achievable if the external interference signal received by nodes is a collection of uncorrelated zero-mean stationary and ergodic random process with its power upperbounded by K I. When α = 2, the capacity is achievable if the external interference signal received by nodes is a collection of uncorrelated zero-mean stationary and ergodic random process with its power upperbounded by K I log N. In both cases, K I is a constant independent of N. α 3: w.h.p., an aggregated throughput K N is achievable in the network for all possible parings between sources and destinations. K > 0 is a constant independent of N and the source-destination pairing. The following scheme achieves the capacity within an arbitrarily small exponent. It operates in an iterative manner in three phases through clustering and long-range MIMO transmissions between clusters. One can start with a simple scheme that achieves an aggregated capacity of N b. Then divide the network into clusters of size M = N 1/(2 b). Source nodes send bits to destinations in three steps. Phase I. Setting Up Transmit Cooperation Clusters work in parallel. Within a cluster, each source node has to distribute M bits to the other nodes, 1 bit for each node, such that at the end of the phase, each node has 1 bit from each of the source nodes in the same cluster using the scheme with aggregated capacity of M b. Phase II. MIMO Transmission One performs long-distance MIMO transmissions (of size M M) between source-destination pairs, one at a time. In particular, nodes in the source cluster together can form a distributed transmit antenna array, sending the bits simultaneously to the corresponding destination cluster. 3
4 Phase III. Cooperate to Decode Clusters work in parallel. Each node in the destination cluster obtained one observation from the MIMO transmission for each source, and it quantizes and ships the observation back to the destination node, which can then do joint MIMO processing of all the observations and decode the transmitted bits. After the three steps, one obtains a scheme that achieves a capacity of N 1/(2 b), which is higher than the original scheme with capacity N b. The key ingredient of the capacity achieving scheme is iteration. One can start with a simple scheme that achieves an aggregated capacity of 1 using simple TDMA (i.e., b = 0). Applying the above steps h times, one gets a scheme achieving an aggregated throughput of Θ(N h/(h+1) ). Given any ɛ > 0, we can now choose h such that and we get a scheme that achieves aggregate throughput scaling with high probability. 3 Main Results In this section, we present the MHM scheme that can achieve the upper bound arbitrarily close. We note that the theorems are presented in their accurate form. However, for easy illustration, we outline the proof and the construction of the MHM scheme in a hand-waving fashion. In particular, we consider a special network where destination nodes of a multicast source is evenly distributed. In other words, if we divide the network into clusters of size N/n d, then each cluster has one and only one destination node from each source. We will present the the rigorous proofs in Section 4 where destinations are randomly distributed in the network. 3.1 Achievability Theorem 3.1 Consider an extended network on a N N square. There are two cases. 2 α < 3: For any ɛ > 0, w.h.p., an aggregated source rate of KN (2 α/2 ɛ)(1 γ) is achievable, where K > 0 is a constant independent of N. An optimal operation scheme is MHM. α 3: w.h.p., an aggregated throughput N K nd log N is achievable, where K > 0 is a constant independent of N. nearest-neighbor multihop. An optimal operation is the We construct a multihop hierarchical MIMO (MHM) structure to achieve the upper bound within an arbitrarily small exponent. The construction is inspired by the derivation of the upperbound. To achieve the upperbound, we notice that the cutset size is M = N 1 γ when 2 α < 3 and is 1 when α 3. We construct a similar structure. Let s first consider the case where 2 α < 3. We divide the network into clusters of size M = N 1 γ. On average, each cluster has one destination node from each source. For simplicity, we assume that there is exactly one destination node in each cluster from each source. The operation is long range MIMO enabled multihop. The length of each hop is M, which is achieved through M M long-range MIMO transmission, as shown in Figure 1. 4
5 S2: MxM MIMO S S1&3: intra-cluster Hierarchical MIMO Figure 1: MHM Routing is extremely simple in the scheme. Consider a multicast flow. Its source node locates in an arbitrary cluster. The information bit is first spread out vertically and then horizontally, cluster-by-cluster, as shown in Figure 1. Inter-cluster communication is through M M MIMO transmission between neighboring clusters. Step I: In each cluster of size M, each node distributes a bit to each of the other nodes in the cluster. This distribution uses hierarchical MIMO unicast within the cluster. There are total c 1 N/M = c 1 n d simultaneous transmissions in the network. This step takes M 2 /(c 1 M 2 α/2 ɛ ) unit of time. Step II: Multihop transmission. Each cluster of size M constructs a M M MIMO transmission to its neighboring cluster. There are total c 2 N/M = c 2 n d simultaneous transmissions in the network. This step takes M 2 /(c 2 M 2 α/2 ) unit of time. Step III: In each cluster of size M, each node has an observation for each other node in the cluster. Quantize each observation into Q bits. Use hierarchical MIMO unicast within the cluster to distribute the quantized symbol to the node that needs it. This step takes Q M 2 /(c 1 M 2 α/2 ɛ ) unit of time. Note that a bit for each multicast source is transmitted from the source to each of the clusters of size M hop-by-hop following the previous three steps. Each transmission reaches a constant number (one to four) of neighboring clusters. Therefore, there are totally N/M such transmissions. On the other hand, there are N/M simultaneous transmissions in each step. The aggregated source rate 5
6 can be calculated as follows: R s = 1 N M M 2 N M M 2 KM 2 α 2 ɛ + M 2 M M/M α 2 + Q M 2 KM 2 α 2 ɛ (1) = K M 2 α 2 ɛ (2) = K N (2 α 2 ɛ)(1 γ) (3) Because each source node s sending rate is limited by O(log N). R s = min(n log N, N (2 α 2 ɛ)(1 γ) ) = N (2 α 2 ɛ)(1 γ). (4) For comparison, we also consider using Unicast MIMO to deliver multicast traffic. In particular, each source sends its data to each of its destinations independently as if they are NOT multicast. Using unicast MIMO, there are N d s-d pairs. Following the capacity results in Theorem 2.1, each source node can achieve a throughput of KN 2 α 2 ɛ N d = KN 1 α 2 ɛ γ. There are N sources. So the aggregated source rate using unicast MIMO is 3.2 Path Attenuation Low Attenuation R UMIMO = KN 2 α 2 γ ɛ. (5) We have α = 2. In this case, we have two schemes that significantly improve the capacity compared to nearest-neighbor multihop: MHM and unicast MIMO. The performance of MHM, based on Eq. 3, is R s = N 1 γ ɛ. The performance using unicast MIMO is: R s = N N N d = N 1 γ ɛ. 3.3 Medium Attenuation We consider the case where 2 α < 3. Compare the achievability result obtained at Eq. 3. We note that MHM is strictly better than unicast MIMO and nearest-neighbor multihop [2, 1] High Attenuation When α 2, we use the standard multihop structure where information is relayed to the nearest neighbor toward the destination. In Figure 2, we compare MHM, Unicast MIMO, and the nearest-neighbor multicast. The x-axis is α and y-axis is exponent e(α) defined as log R n (α) e(α) := lim n log n, (6) where R n (α) is the aggregated source rate. The scaling exponent enables us to ignore less important factors (e.g., log n factor) and focus on the most salient component. For example, n and n/ log n both have scaling exponent of 1/2. 6
7 e(α) ( 1 γ ) / 2 multihop 1 γ Unicast MIMO MHM ( 2 α / 2 γ ) ( 2 α / 2)(1 γ ) 1/ 2 γ 2 3 α Figure 2: Compare MHM, Unicast MIMO, and the nearest-neighbor multicast. 3.4 Multicast Gain In this section, we provide an intuitive explanation on multicast gain using a back-of-the-envelop calculation. The metric is the aggregated multicast transport capacity, and the unit is bit-meter/sec. If a source node sends a bit to all its destinations, which has an average distance of d, then it contributes to dn d bit-meter. Normalized over the time to send this information, T, we obtain the multicast transport capacity of dn d /T bit-meter/sec. We define the multicast gain in the following sense. Consider an optimal multicast scheme with aggregated transport capacity of C m. Consider a structure that uses the optimal unicast scheme to deliver multicast traffic. In particular, it assumes that each multicast flow is n d independent unicast flows and results in an aggregated transport capacity of C u. We call the ratio between C m and C u the multicast gain. In this section, we answer the question how much the multicast gain is. The answer is somewhat counter-intuitive at the first glance. The multicast gain depends on the path loss exponent. If the path loss exponent is small (i.e., α = 2), there is NO multicast gain. On the other hand, if the pass loss exponent is large (i.e., α > 2), then there is a multicast gain. The intuition is explained as follows using a back-of-the-envelop calculation. It has been shown that the hierarchical MIMO structure achieves the optimal unicast capacity within an arbitrarily small exponent. Therefore, it is the scheme used. We call it the unicast MIMO. Its aggregated multicast transport capacity is ) ( ) C u = Θ (N 2 N α 2 N = Θ N 3 2 N 1 α 2. (7) The first term N 2 is the number of sender-receiver pairs when we use a N N MIMO structure; the second term N α/2 is the path loss; the third term N is the average distance between the multicast sender and a receiver (i.e., sending a bit to a destination contributes to 1 N bit-meter). Consider a MHM structure. Its multicast capacity is C M = Θ ( M 2 M α 2 N M N M M ) ( ) = Θ N 3 2 M 1 α 2. (8) The first term M 2 is the average number of sender-receiver pairs when we use a M M MIMO structure; the second term M α/2 is the pass loss for the M M MIMO transmission; the third 7
8 term N/M is the number of spatial reuse; and the last term M is the distance of this hop. The fourth term N/M is the number of destinations this bit contributes to. To elaborate, the average distance in terms of the number of M M long-rang transmissions is N/M, there are total N/M receiver clusters, and it takes N/M to reach all clusters. Therefore, each transmission contributes to an average of N M Θ N ( ) M N = Θ N M M receivers. Compare Eqs. 7 and 8, it is clear that when α = 2, the two schemes are equivalent. On the other hand, if 2 < α < 3, MHM is superior. In MHM, we observe two types of gains. The first type of gain is M 2 M α 2, which we refer to as the power gain. When the path attenuation is large, power transfer is more efficient among small clusters. The second type of gain is N/M N/M M, due to the benefit of exploring multicast where one bit is potentially used by multiple destinations. When 2 < α < 3, the two types of gains contribute to the optimal performance. Compare Eqs. 7 and 8, we see that the multicast gain, G m, is G m = 1, α = 2 n α 2 1 d, 2 α < 3 nd, α 3. (9) 4 Detailed Analysis In Section 3, to simplify the discussion, we assume that destination nodes of a multicast source is evenly distributed. In other words, if we divide the network into clusters of size N/n d, then each cluster has one and only one destination node from each source. Of course, this is not realistic. In this section, we consider the case where destinations are randomly distributed in the network. We first need an appropriate cluster size so that each cluster has at least one destination node (which is necessary to prove the upper bound). Let M be the cluster size. Lemma 1 Let the cluster size be M = 5N ln N n d, (10) Then each cluster is guaranteed to have at least one destination node from each source w.h.p., and each cluster is bounded to have at most 10 ln N = 10γ ln n d destination nodes w.h.p. In addition, the number of nodes in each cluster is between ((1 δ)m, (1 + δ)m) with probability larger than 1 N/Me Λ(δ)M where Λ(δ) is a positive constant independent of N and δ > 0. The first part of the lemma can be proved using Chernoff bound and union bound. The second half of the lemma on the number of nodes in each cluster is a restatement of Lemma 4.1 in [8], and thus the proof is omitted here. Assume M takes the value in Eq. (10) for the rest of the session. As in [8], we assume that there are exactly M nodes in each cluster to simplify the discussion. 8
9 4.1 Achievability We select one delegate for each multicast source in each cluster. If the source node is in the cluster, the source node is the delegate. Otherwise, the delegate is arbitrarily chosen, where it may or may not be a destination node of the multicast flow. There are totally N sources and each cluster has M nodes. Therefore, we can evenly distribute the load of delegates among all M nodes and let each node be delegates for N/M sources (including itself). Thus, all nodes have the same amount of load. The role of the delegate is as follows: in Steps I and III, the delegate serves as the source and destination, respectively. In Step III, through cooperation to decode, the delegate recovers the original multicast message. We then introduce a new step, Step IV. Step IV: The delegates sends the message to all other destination nodes in the cluster through unicast using hierarchical MIMO. The routing is modified accordingly. Consider a multicast flow. Its source node locates in an arbitrary cluster. Its multicast message is first spread out vertically and then horizontally, clusterby-cluster, as shown in Figure 1. Inter-cluster communication is through M M MIMO transmission between neighboring clusters. In each cluster, there are O(log N) destinations. Within each cluster, the delegate recovers the message in Step III through cooperative decoding. Then it relays the message to all other destination nodes in the cluster through unicast using hierarchical MIMO (which causes a capacity loss of O(log N)). If the destination nodes are within the same cluster as the source node, the source node uses unicast to deliver the information to each of the destinations, again with a capacity loss factor of O(log N). For a cluster, it receives the message through M M MIMO transmission at most once. It sends out information using M M MIMO transmission to at most four neighboring clusters. The multicast gain comes from that fact that a message delivered to a neighboring cluster can potentially benefit many receivers. We count the aggregated source rate as follows: each source generates M L bits-long messages. These messages are sent to all delegates hop-by-hop (A hop is a hop of a M M MIMO transmission to a neighboring cluster) and then be delivered to all destinations. To calculate the aggregated source rate, we divide the total amount of source bits (N M L) by the total time to deliver them. The system operates in a pipelining fashion. After a long time of operation, each delegate holds M message of L bits for each source it represents. In other words, each node holds N (N = M N/M) L bits-long messages. Next, we calculate the time to deliver these messages in detail. To establish the achievability result, we need to prove the following Lemmas. First, for Steps I and III, given the cluster size of M, Θ(N/M) clusters can transmit simultaneously while achieving a capacity of M 2 α/2 ɛ. Second, for Step II, there are Θ(N/M) simultaneously M M long range transmissions between neighboring clusters. Step I. Intra-Cluster Distribution Each node has M messages for each multicast source. In the worst case, it needs to deliver the messages to one delegate in each of the four neighboring clusters. Consider one delegate in one cluster. Following a similar approach in [8], we divide each cluster into two half-clusters of equal size, each with M/2 nodes (within a constant factor). One half-cluster is farther away from the destination cluster and one is close to the border. The node delivers two messages to each node in the half-cluster that is farther away from the destination cluster. We use the hierarchical MIMO scheme developed in [8] for these deliveries. Theorem 2.1 states the achievable rate of the scheme. This step may need to repeat at most four times for four neighboring clusters. We need to apply Theorem 2.1 to Step I, where each cluster is of size M. The average power constrain of each user is P. The difference is that the clusters work in parallel and thus we need to 9
10 Figure 3: 9-TDMA scheduling scheme. consider the interference among simultaneously transmitting clusters. Lemma 2 Consider clusters of size M. The clusters follow a 9-TDMA scheduling scheme, as shown in Figure 3. For α > 2, the interference power received by a node from the simultaneously operating clusters transmissions is upperbounded by a constant K I, which is independent of N. For α = 2, the interference-power is bounded by K I2 log N. Moreover, the interference signals received by different nodes in the cluster are zero-mean and un-correlated. Proof: In the 9-TDMA schedule, the clusters with the same number operate simultaneously while other clusters remain inactive. There are at least two inactive clusters between any two clusters that are active. The proof of the lemma is similar to that of Lemma 4.2 in [8]. The modifications needed are as follows. In Lemma 4.2 in [8], the network is a dense network of size 1 and each node is constrained to an average power of P/M (note that M is the largest cluster in the hierarchical MIMO transmission in our context). Because we consider an extended network, the distance is scaled up by a factor of M, and the power is scaled up by a factor of M α/2 to compensate the path attenuation. To meet the average power constraint of P, the scheme only runs a fraction of time, where the fraction is 1/M α/2 1. The rest of the proof follows that of Lemma 4.2 [8] while having P j P M α/2 1 and A c = M. The above interference constraint satisfies the interference constraint required in Theorem 2.1. Therefore, applying Theorem 2.1, each cluster can finish its intra-cluster traffic within a time T (Step I) = 4 9 M N k 1 M 2 α/2 ɛ = 36 k 1N M α/2+ɛ 1 where k 1 > 0 is a constant and ɛ > 0. Step II: neighboring cluster transmission. We construct M/2 M/2 MIMO transmissions that transmit from the farther away half-cluster to the destination half-cluster. The distance between a node in the sending half-cluster and a node in the receiving cluster is lower bounded by M/2 and upper bounded by 2 M. The transmit power is P M α/2 1. To maintain the average power constraint of P, nodes operate only a fraction of time, and the fraction is M 1 α/2. This guarantees that the power received by each node in the destination bluster is bounded below and above by constants that are independent of M when transmitting. 10
11 Figure 4: 25-TDMA scheduling scheme. Lemma 3 Consider clusters of size M. Following a 25-TDMA scheme, as shown in Figure 4, the interference power received by a node from the simultaneously operating inter-cluster transmissions is upperbounded by a constant K I, which is independent of N, when α > 2. For α = 2, the interference-power is bounded by K I2 log N. The lemma holds following the same proof as in Lemma 2 using the fact that the closest interfering cluster is at least two clusters away from the receiving cluster. The lemma will be useful in determining the mutual information achieved by the simultaneous M M transmissions. In total, there are N/M/25 simultaneously transmitting clusters. Each transmission consists of an L-bits long packet, encoded into C symbols using a randomly generated Gaussian code. The M/2 nodes transmit their encoded sequences of length C symbols simultaneously to M/2 nodes in the destination half-cluster. The nodes in the destination cluster quantize the signals they observe during the C transmissions and store there quantized signals without trying to decode the transmitted symbols. Each cluster may need to transmit to four neighboring clusters. Since there are N/M/25 simultaneously transmitting clusters, the total time to complete Step II is N T (Step II) = C M 1 α/2 Step III: Cooperate to decode. In this phase, we aim to provide each delegate, the observations of the symbols that were originally intended for it, so that a delegate can decode the original message. These observations are accumulated as all nodes in the cluster in Step II. Each observation is quantized into Q bits and sent to the delegate using hierarchical MIMO unicast. Again, we use a 9-TMDA scheme as in Step I. Therefore, the total time to complete Step III is We restate Lemma 4.4 in [8]. T (Step III) = 9 Q M N k 1 M 2 α/2 ɛ = 9 k 1 Q N M α/2+ɛ 1 Lemma 4 There exists a strategy to encode the observations at a fixed rate Q bits per observation and get a linear growth of the mutual information for the resultant M M quantized MIMO channel when the network experiences interference from the exterior. 11
12 Using this lemma, and Lemma 3, we conclude that the three phases can effectively realize a virtual MIMO channels achieving spatial multiplexing gain between two delegates in neighboring clusters. Step IV: Distribution from the delegate to destinations. Each delegate has O(log N) destinations in its cluster. It uses unicast to deliver the information to the destination through the hierarchical MIMO scheme. Following the same 9-TMDA scheme as in Step I, the time to deliver the message is T (Step IV) = 9 M N log N k 1 M 2 α/2 ɛ = 9 k 1 N log N M α/2+ɛ 1 Therefore, in total, the total time to deliver M L bits-long message for each source to all its destination is T t = T (Step I) + T (Step II) + T (Step III) + T (Step IV) c 2 N log N M α/2+ɛ 1 Therefore, the aggregated source rate is R s (N) = NML T t K 2 N (2 α/2 ɛ )(1 γ). We note that all the steps take roughly the same amount of time. (The time for Step I and III is higher than that of Step II by a factor of M ɛ where ɛ is positive but arbitrarily small. The time for Step IV is higher than Step II by a factor of M ɛ log N because each cluster has O(log N) destination nodes.) This implies that they are evenly loaded. The cluster size is an important design factor. For α > 2, a larger cluster size is less efficient in power transfer, and a smaller cluster size is less efficient in exploring the multicast gain. 5 Conclusion In this report, we study multicast in large-scale wireless ad hoc networks in an extended network. When 2 α < 3, MIMO is indeed more efficient in terms of power transfer. The MIMO-based multihop scheme can achieve the capacity within an arbitrarily small exponent. The key ingredient is to choose an appropriate cluster size (and thus the corresponding distance for each hop) that optimally integrate the multicast gain and the power transfer gain (loss). References [1] X.-Y. Li, S.-J. Tang, and O. Frieder, Multicast capacity for large scale wireless ad hoc networks, in MobiCom 07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking. New York, NY, USA: ACM, 2007, pp [2] S. Shakkottai, X. Liu, and R. Srikant, The multicast capacity of large multihop wireless networks, in MobiHoc 07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. New York, NY, USA: ACM, 2007, pp [3] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEE Transactions on Information Theory, vol. IT-46, no. 2, pp , March
13 [4] L. L. Xie and P. R. Kumar, A network information theory for wireless communication: Scaling laws and optimal operation, IEEE Transactions on Information Theory., vol. 50, no. 5, [5] A. Jovicic, P. Viswanath, and S. Kulkarni, Upper bounds to transport capacity of wireless networks, IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 50, no. 11, [6] S. H. A. Ahmad, A. Jovicic, and P. Viswanath, On outer bounds to the capacity region of wireless networks, IEEE/ACM Trans. Netw., vol. 14, no. SI, pp , [7] L.-L. Xie and P. R. Kumar, On the path-loss attenuation regime for positive cost and linear scaling of transport capacity in wireless networks, IEEE/ACM Trans. Netw., vol. 14, no. SI, pp , [8] A. Ozgur, O. Leveque, and D. Tse, Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks, IEEE Transactions on Information Theory, vol. 53, no. 10, pp ,
How does the Information Capacity of Ad Hoc Networks Scale?
How does the Information Capacity of Ad Hoc Networks Scale? Ayfer Özgür, Olivier Lévêque, David Tse Abstract n source and destination pairs randomly located in an area want to communicate with each other.
More informationHierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks Presentation: Alexandros Manolakos EE 360 Stanford University February 13, 2012 Table of Contents What are we trying to solve?
More informationOn the Impact of Mobility on Multicast Capacity of Wireless Networks
On the Impact of Mobility on Multicast Capacity of Wireless Networs Jubin Jose, Ahmed Abdel-Hadi, Piyush Gupta and Sriram Vishwanath University of Texas at Austin, Austin, TX Bell Labs, Alcatel-Lucent,
More informationDelay-Throughput Tradeoff for Supportive Two-Tier Networks
Delay-Throughput Tradeoff for Supportive Two-Tier Networks arxiv:082.4826v [cs.it] 28 Dec 2008 Long Gao, Rui Zhang, Changchuan Yin, Shuguang Cui Department of Electrical and Computer Engineering Texas
More informationMinimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions
Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,
More informationInformation-Theoretic Operating Regimes of Large Wireless Networks
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 1, JANUARY 2010 427 Information-Theoretic Operating Regimes of Large Wireless Networks Ayfer Özgür, Ramesh Johari, Member, IEEE, David N. C. Tse, Fellow,
More informationThe Capacity of Wireless Networks
The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of
More informationHeterogeneity Increases Multicast Capacity in Clustered Network
Heterogeneity Increases Multicast Capacity in Clustered Network Qiuyu Peng Xinbing Wang Huan Tang Department of Electronic Engineering Shanghai Jiao Tong University April 15, 2010 Infocom 2011 1 / 32 Outline
More informationI. INTRODUCTION. and > 0 is any positive real number. We also show that for k = O( ), the per-flow multicast capacity under Gaussian
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 18, NO 4, AUGUST 2010 1145 Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model Xiang-Yang Li, Senior Member, IEEE, Yunhao Liu, Senior Member,
More informationCAPACITY of wireless ad hoc networks is constrained. Multicast Performance With Hierarchical Cooperation
This article has been accepted for inclusion in a future issue of this journal Content is final as presented, with the exception of pagination IEEE/ACM TRANSACTIONS ON NETWORKING 1 Multicast Performance
More informationOptimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE
More information5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST We use the following notation: i) f (x) =O(g(x)) means that there exist
5088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 8, AUGUST 2011 Improved Capacity Scaling in Wireless Networks With Infrastructure Won-Yong Shin, Member, IEEE, Sang-Woon Jeon, Student Member,
More informationNEW! Updates from previous draft Based on group mailing list discussions Added definition of optimal scalability with examples (captures idea of suffi
IRTF ANS WG Meeting, November 12, 2003 Notes on Scalability of Wireless Ad hoc Networks Onur Arpacioglu, Tara Small and Zygmunt J. Haas , which extends
More informationA Communication Architecture for Large Heterogeneous Wireless Networks
A Communication Architecture for Large Heterogeneous Wireless Networks Urs Niesen Bell Laboratories, Alcatel-Lucent Murray Hill, NJ 07974 urs.niesen@alcatel-lucent.com Piyush upta Bell Laboratories, Alcatel-Lucent
More informationTopology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications
Topology Control in Mobile Ad-Hoc Networks by Using Cooperative Communications 1 S.Shahinsha, 2 Mr.M.Sri Raghavendra 1 PG Scholar, St. Johns College of Engineering &Technology, Yerakota, AP, India 2 Assistant
More informationCHARACTERIZING the capacity region of wireless
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 5, MAY 2010 2249 The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks Abstract We consider the question of determining the
More informationOn the Scalability of Hierarchical Ad Hoc Wireless Networks
On the Scalability of Hierarchical Ad Hoc Wireless Networks Suli Zhao and Dipankar Raychaudhuri Fall 2006 IAB 11/15/2006 Outline Motivation Ad hoc wireless network architecture Three-tier hierarchical
More informationBounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks
Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationThe Complexity of Connectivity in Wireless Networks. Roger WISARD
The Complexity of Connectivity in Wireless Networks Roger Wattenhofer @ WISARD 2008 1 The paper Joint work with Thomas Moscibroda Former PhD student of mine Now researcher at Microsoft Research, Redmond
More informationTime Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks
Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationCapacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads
Capacity Deficit in Mobile Wireless Ad Hoc Networks Due to Geographic Routing Overheads Nabhendra Bisnik, Alhussein Abouzeid Abstract Mobility of nodes may cause routing protocols to incur large overheads
More informationCAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS
CAPACITY COMPATIBLE TWO-LEVEL LINK STATE ROUTING FOR MOBILE AD HOC NETWORKS John Sucec and Ivan Marsic Rutgers University ABSTRACT The throughput of mobile ad hoc networks (MANETs has been analyzed previously.
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationTHE past decade has seen an emergence of wireless communication
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 6, JUNE 2004 1041 A Deterministic Approach to Throughput Scaling in Wireless Networks Sanjeev R. Kulkarni, Fellow, IEEE, and Pramod Viswanath, Member,
More informationWireless Device-to-Device Communications with Distributed Caching
Wireless Device-to-Device Communications with Distributed Caching Negin Golrezaei, Alexandros G. Dimakis, Andreas F. Molisch Dept. of Electrical Eng. University of Southern California Los Angeles, CA,
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationDelay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective
Delay and Capacity Trade-offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Ness Shroff School of Electrical and Computer Engineering Purdue University West Lafayette, IN
More informationTHE demand for widespread Internet access over large
3596 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 Cooperative Strategies and Achievable Rate for Tree Networks With Optimal Spatial Reuse Omer Gurewitz, Member, IEEE, Alexandre
More informationDistributed MIMO. Patrick Maechler. April 2, 2008
Distributed MIMO Patrick Maechler April 2, 2008 Outline 1. Motivation: Collaboration scheme achieving optimal capacity scaling 2. Distributed MIMO 3. Synchronization errors 4. Implementation 5. Conclusion/Outlook
More informationEnhanced Parity Packet Transmission for Video Multicast using R-DSTC
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip
More informationPhysical Layer Security from Inter-Session Interference in Large Wireless Networks
Physical Layer Security from Inter-Session Interference in Large Wireless Networks Azadeh Sheikholeslami, Dennis Goeckel, Hossein Pishro-Nik, Don Towsley University of Massachussets, Amherst Outline 1.
More informationARELAY network consists of a pair of source and destination
158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper
More informationData gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks
Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro
More informationAMOBILE ad hoc network (MANET) consists of a collection
1354 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 5, OCTOBER 2011 Delay and Capacity Tradeoff Analysis for MotionCast Xinbing Wang, Member, IEEE, Wentao Huang, Shangxing Wang, Jinbei Zhang, and Chenhui
More informationSummary of Raptor Codes
Summary of Raptor Codes Tracey Ho October 29, 2003 1 Introduction This summary gives an overview of Raptor Codes, the latest class of codes proposed for reliable multicast in the Digital Fountain model.
More informationWireless Network Capacity. Nitin Vaidya
Wireless Network Capacity Nitin Vaidya 2009 1 Wireless Networks Why use multi-hop routes to delivery data? Is this optimal? What s the best performance achievable? Capacity analysis can help answer such
More informationMulti-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks
Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,
More information1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based
1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,
More informationBounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks
Bounds on the Benefit of Network Coding: Throughput and Energy Saving in Wireless Networks Alireza Keshavarz-Haddad Department of Electrical and Computer Engineering Rice University, 6100 Main Street,
More informationPRESENTED BY SARAH KWAN NETWORK CODING
PRESENTED BY SARAH KWAN NETWORK CODING NETWORK CODING PRESENTATION OUTLINE What is Network Coding? Motivation and Approach Network Coding with Lossless Networks Challenges in Developing Coding Algorithms
More informationStream Sessions: Stochastic Analysis
Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds
More informationQuantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET)
Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET) 1 Syed S. Rizvi, 2 Aasia Riasat, and 3 Khaled M. Elleithy 1, 3 Computer Science and Engineering Department, University
More informationOPTIMIZING THE DELAY IN MULTIHOP WIRELESS NETWORK USING NETWORK CODING AND SUCCESSIVE INTERFERENCE CANCELLATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationProbabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks
Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu
More information5016 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 10, OCTOBER 2010
5016 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 10, OCTOBER 2010 Restricted Mobility Improves Delay-Throughput Tradeoffs in Mobile Ad Hoc Networks Michele Garetto, Member, IEEE, and Emilio Leonardi,
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationDISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK
DISCOVERING OPTIMUM FORWARDER LIST IN MULTICAST WIRELESS SENSOR NETWORK G.Ratna kumar, Dr.M.Sailaja, Department(E.C.E), JNTU Kakinada,AP, India ratna_kumar43@yahoo.com, sailaja.hece@gmail.com ABSTRACT:
More informationRandomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching
Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationCharacterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks
Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks Yue Wang,DahMingChiu 2, and John C.S. Lui Dept. of Computer Science & Engineering, The Chinese University of
More informationAN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS
AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT
More informationNETWORK coding is an area that has emerged in 2000 [1],
450 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 2, APRIL 2008 Efficient Broadcasting Using Network Coding Christina Fragouli, Jörg Widmer, and Jean-Yves Le Boudec, Fellow, IEEE Abstract We consider
More informationIMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS
IMPACT OF LEADER SELECTION STRATEGIES ON THE PEGASIS DATA GATHERING PROTOCOL FOR WIRELESS SENSOR NETWORKS Indu Shukla, Natarajan Meghanathan Jackson State University, Jackson MS, USA indu.shukla@jsums.edu,
More informationInfrastructure Support Increases the Capacity of Ad Hoc Wireless Networks
Infrastructure Support Increases the Capacity of Ad Hoc Wireless Networks Jeong-woo Cho, Seong-Lyun Kim and Song Chong Dept. of Electrical Engineering and Computer Science, Korea Advanced Institute of
More informationSome problems in ad hoc wireless networking. Balaji Prabhakar
Some problems in ad hoc wireless networking Balaji Prabhakar Background Example scenarios for ad hoc packet networks - sensor networks (many nodes, low data rates) - wireless LANs (fewer nodes, high data
More informationMinimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model
Minimum-Latency Aggregation Scheduling in Wireless Sensor Networks under Physical Interference Model Hongxing Li Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong hxli@cs.hku.hk
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationKeywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION
Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1
More informationMulticasting in ad hoc networks: Energy efficient
Multicasting in ad hoc networks: Energy efficient Blerta Bishaj Helsinki University of Technology 1. Introduction...2 2. Sources of power consumption... 3 3. Directional antennas... 3 4. TCP... 3 5. Energy-efficient
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationANALYSIS OF COOPERATIVE TRANSMISSION MODIFIED ROUTING PROTOCOL IN MANETS
ANALYSIS OF COOPERATIVE TRANSMISSION MODIFIED ROUTING PROTOCOL IN MANETS * K. Vanisree and V.S.K. Reddy 2 1 Department of ECE, Holy Mary Institute of Technology and science, Hyderabad, Andra Pradesh, India
More informationTime Synchronization in Wireless Sensor Networks: CCTS
Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm
More informationWireless MACs: MACAW/802.11
Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical
More informationEnergy-Latency Tradeoff for In-Network Function Computation in Random Networks
Energy-Latency Tradeoff for In-Network Function Computation in Random Networks P. Balister 1 B. Bollobás 1 A. Anandkumar 2 A.S. Willsky 3 1 Dept. of Math., Univ. of Memphis, Memphis, TN, USA 2 Dept. of
More informationUnderstanding the Impact of Interference on Collaborative Relays
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. XX, NO. X, MONTH 200X 1 Understanding the Impact of Interference on Collaborative Relays Yan Zhu, Student Member, IEEE and Haitao Zheng, Member, IEEE Abstract
More informationThroughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions
Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction
More informationTOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS
IEEE 2012 Transactions on Wireless Communications, Volume: 9, Issue: 2 TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS Abstract Cooperative communication has received tremendous
More informationStar-Structure Network Coding for Multiple Unicast Sessions in Wireless Mesh Networks
Wireless Pers Commun (2013) 72:2185 2214 DOI 10.1007/s11277-013-1143-7 Star-Structure Network Coding for Multiple Unicast Sessions in Wireless Mesh Networks Alireza Shafieinejad Faramarz Hendessi Faramarz
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationQueue Management for Network Coding in Ad Hoc Networks
2012 Third International Conference on Intelligent Systems Modelling and Simulation Queue Management for Network Coding in Ad Hoc Networks S.E. Tan H.T. Yew M.S. Arifianto I. Saad K.T.K. Teo Modelling,
More informationImpact of Node Velocity and Density on Probabilistic Flooding and its Effectiveness in MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationCENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.
CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering,
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationOutline. Wireless Channel Characteristics. Multi-path Fading. Opportunistic Communication - with a focus on WLAN environments -
Outline Opportunistic Communication - with a focus on WLAN environments - Jong-won Lee 2006. 02.20. Background? Wireless Channels? Opportunistic communication? Examples? Basics of WLAN Previous Works?
More informationVenkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)
Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in
More informationRate Adaptation in
Rate Adaptation in 802.11 SAMMY KUPFER Outline Introduction Intuition Basic techniques Techniques General Designs Robust Rate Adaptation for 802.11 (2006) Efficient Channel aware Rate Adaptation in Dynamic
More informationAdmission Control in Time-Slotted Multihop Mobile Networks
dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai
More informationA Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks
A Cluster-Based Energy Balancing Scheme in Heterogeneous Wireless Sensor Networks Jing Ai, Damla Turgut, and Ladislau Bölöni Networking and Mobile Computing Research Laboratory (NetMoC) Department of Electrical
More informationWireless Networks Research Seminar April 22nd 2013
Wireless Networks Research Seminar April 22nd 2013 Distributed Transmit Power Minimization in Wireless Sensor Networks via Cross-Layer Optimization NETS2020 Markus Leinonen, Juha Karjalainen, Marian Codreanu,
More informationEnergy-Aware Routing in Wireless Ad-hoc Networks
Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless
More informationA Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks
A Location-aided Power-aware Routing Protocol in Mobile Ad Hoc Networks Yuan Xue Department of Computer Science University of Illinois at Urbana-Champaign Baochun Li Department of Electrical and Computer
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 5, MAY 2011 2837 Approximate Capacity of a Class of Gaussian Interference-Relay Networks Soheil Mohajer, Member, IEEE, Suhas N. Diggavi, Member, IEEE,
More informationOn minimum m-connected k-dominating set problem in unit disc graphs
J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December
More information1 Introduction and Results
On the Structure of Graphs with Large Minimum Bisection Cristina G. Fernandes 1,, Tina Janne Schmidt,, and Anusch Taraz, 1 Instituto de Matemática e Estatística, Universidade de São Paulo, Brazil, cris@ime.usp.br
More informationGroup Secret Key Generation Algorithms
Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]
More informationThomas Moscibroda Roger Wattenhofer MASS Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks
Efficient Computation of Maximal Independent Sets in Unstructured Multi-Hop Radio Networks Thomas Moscibroda Roger Wattenhofer Distributed Computing Group MASS 2004 Algorithms for Ad Hoc and Sensor Networks...
More information(INTERFERENCE AND CONGESTION AWARE ROUTING PROTOCOL)
Qos of Network Using Advanced Hybrid Routing in WMN, Abstract - Maximizing the network throughput in a multichannel multiradio wireless mesh network various efforts have been devoted. The recent solutions
More informationCapacity of Wireless Ad-hoc Networks under Ultra Wide Band with Power Constraint
1 Capacity of Wireless Ad-hoc Networks under Ultra Wide Band with Power Constraint Honghai Zhang and Jennifer C. Hou Department of Computer Science University of Illinois at Urbana-Champaign Email:{hzhang3,jhou}@cs.uiuc.edu
More informationEfficiently decodable insertion/deletion codes for high-noise and high-rate regimes
Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Venkatesan Guruswami Carnegie Mellon University Pittsburgh, PA 53 Email: guruswami@cmu.edu Ray Li Carnegie Mellon University
More informationEfficient Content Delivery and Low Complexity Codes. Amin Shokrollahi
Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter
More informationDynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication P.Deepa 1, Dr. P.S.K Patra 2 1 Department of Computer Science and Engineering, 2 Head of the Department, Agni College of
More informationNetwork Design for QoS under IEEE ( Zigbee ) CSMA/CA for Internet of Things Applications
Network Design for QoS under IEEE 802.15.4 ( Zigbee ) CSMA/CA for Internet of Things Applications EECS Symposium Abhijit Bhattacharya Advisor: Prof. Anurag Kumar Dept. of ECE, IISc, Bangalore April 28,
More informationJoint Routing, Scheduling, and Network Coding for Wireless Multihop Networks
211 International Symposium of Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks Joint Routing, Scheduling, and Network Coding for Wireless Multihop Networks Samat Shabdanov, Catherine
More informationAn Architecture for Future Configurable Millimeter Wave Networks. Hang Liu
An Architecture for Future Configurable Millimeter Wave Networks Hang Liu Outline Motivation and Industrial Relevance Project Objectives Approach and Previous Results Future Work Outcome and Impact [2]
More information554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE
554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and
More informationRouting with Mutual Information Accumulation in Energy-Limited Wireless Networks
Routing with Mutual Information Accumulation in Energy-Limited Wireless Networks Mahdi Shakiba-Herfeh Department of Electrical and Electronics Engineering METU, Ankara, Turkey 68 Email: mahdi@eee.metu.edu.tr
More informationVolume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com Efficient
More information