Author's personal copy Wireless Netw (2016) 22:1133–1144 DOI 10.1007/s11276-015-1017-x

HierHybNET: Cut-set upper bound of ad hoc networks with cost-effective infrastructure Cheol Jeong1 • Won-Yong Shin2

Published online: 23 July 2015  Springer Science+Business Media New York 2015

Abstract This paper introduces an information-theoretic upper bound on the capacity scaling law for a hierarchical hybrid network (HierHybNET), consisting of both n wireless ad hoc nodes and m base stations (BSs) equipped with l multiple antennas per BS, where the communication takes place from wireless nodes to a remote central processor through BSs in a hierarchical way. We deal with a general scenario where m, l, and the backhaul link rate scale at arbitrary rates relative to n. Then, a generalized cut-set upper bound under the HierHybNET model is derived by cutting not only the wireless connections but also the wired connections. In addition, the corresponding infrastructurelimited regime is identified. Keywords Ad hoc network  Backhaul  Base station (BS)  Capacity scaling  Cost  Infrastructure  Remote central processor (RCP)

1 Introduction We introduce a large-scale hierarchical hybrid network (HierHybNET) assuming an arbitrary rate scaling of backhaul links, where the HierHybNET is composed of both n wireless ad hoc nodes and m base stations (BSs) & Won-Yong Shin [email protected] Cheol Jeong [email protected] 1

DMC R&D Center, Samsung Electronics, Suwon 443-742, Republic of Korea

2

Department of Computer Science and Engineering, Dankook University, Yongin 448-701, Republic of Korea

equipped with l multiple antennas per BS, where the communication takes place from wireless nodes to a remote central processor (RCP) through BSs in a hierarchical way. Provided that three scaling parameter (i.e., the number of BSs, the number of antennas at each BS, and the rate of each backhaul link) scale at arbitrary rates relative to the number of wireless nodes, n, a generalized upper bound on the capacity scaling is derived for our HierHybNET with finite-capacity infrastructure based on the cut-set theorem [4]. In order to obtain a tight upper bound on the aggregate capacity, we consider two different cuts under the network model. The first cut divides the network area into two halves by cutting the wireless connections. An interesting case is the use of a new cut (i.e., the second cut), which divides the network area into another halves by cutting not only the wireless connections but also the wired connections. In addition, using the above cut-set upper bound, we show the case where the HierHybNET is in the infrastructure-limited regime. To validate the derived upper bound for finite values of system parameters n, m, and l, numerical evaluation is also shown via computer simulations. The rest of this paper is organized as follows. The related work is summarized in Sect. 2. The system and channel models are described in Sect. 3. A generalized cutset upper bound on the capacity scaling is derived in Sect. 4. The corresponding infrastructure-limited regime is identified in Sect. 5. The numerical results are also shown in Sect. 6. Finally, Sect. 7 summarizes our paper with some concluding remarks. Throughout this paper, bold upper and lower case letters denote matrices and vectors, respectively. The superscripts T and y denote the transpose and conjugate transpose, respectively, of a matrix (or a vector). The matrix IN is an

123

Author's personal copy 1134

N  N identity matrix. Unless otherwise stated, all logarithms are assumed to be to the base 2.

2 Related work 2.1 Studies on a variety of wireless networks There have been a great number of studies on the performance of various types of wireless networks. Since the capacity of wireless channels is fundamentally limited, one can maximize the end-to-end throughput by carefully selecting a routing path. In [5], the spatial reusability of wireless channels was exploited to improve the end-to-end throughput along with multihop (MH) routing protocols. Multicast routing protocols were designed to improve the performance in terms of energy efficiency, throughput, and fairness in lossy wireless networks [6, 7]. In [8], a topology control algorithm was introduced in mobile ad hoc networks (MANETs) so as to improve the quality of service (QoS) in terms of delay. As one of MANET types, a vehicular ad hoc network (VANET) has been deployed to provide communications between vehicles as well as vehicles and infrastructure. In such VANET environments, a positioning-based routing algorithm was proposed in [9], and a ranging algorithm for positioning was investigated in [10]. Meanwhile, to improve the spectrum utilization, research in the field of cognitive radio networks has grown dramatically. In cognitive radio networks, resource allocation for secondary users based on their quality of experience (QoE) and priority was studied in [11]. Security challenges in cognitive radio networks were also discussed in [12]. Besides, an information centric network was introduced to solve inherent drawbacks of current Internet [13, 14]. In orthogonal frequency division multiple access networks, resource allocation was studied for interference mitigation [15, 16]. With regard to game-theoretic approaches, game dynamics and learning schemes were studied in heterogeneous networks [17] and a distributed channel assignment algorithm was introduced in wireless mesh networks [18]. There were other interesting topics including a routing in broadband networks [19], a software defined network [20], and a composite-radio infrastructure [21].

2.2 Studies on the capacity scaling law It was shown in [1] that the aggregate throughput achieved by the nearest-neighbor MH routing scales as pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi Hð n= log nÞ for a wireless network having n nodes randomly distributed in a unit area.1 MH schemes were further developed and analyzed in [23–25]. The aggregate

123

Wireless Netw (2016) 22:1133–1144

pffiffiffi throughput scaling was improved to Hð nÞ by using percolation theory [23]. The effect of multipath fading channels on the throughput scaling was studied in [24]. In [25], the tradeoff between power and delay was examined in terms of scaling laws. Together with the studies on the MH, it was shown that a hierarchical cooperation (HC) strategy [3, 26] achieves an almost linear throughput scaling, i.e., Hðn1 Þ for an arbitrarily small  [ 0, in dense networks of unit area. There have been alternative approaches to achieving a linear scaling in dense networks by using networks with node mobility [27], interference alignment [28, 29], directional antennas [30–32], and infrastructure support [33]. Due to the long delay and high cost of channel estimation in ad hoc networks with only wireless connectivity, hybrid networks consisting of both wireless ad hoc nodes an infrastructure nodes, or equivalently BSs, have been introduced and analyzed in [2, 33–36]. In [2], two new routing protocols, termed infrastructure-supported singlehop (ISH) and infrastructure-supported MH (IMH) protocols, were introduced in hybrid networks where the number of antennas at each BS is assumed to scale at an arbitrary rate relative to the number of wireless nodes. In the ISH protocol, either a single-hop multiple-access or a singlehop broadcast is used for communications between all wireless source nodes and its belonging BS. In the IMH protocol, the nearest-neighbor MH routing is used for communications between source nodes in each cell and its belonging BS. Using the two new routing protocols, the optimal capacity scaling was characterized by deriving the corresponding cut-set upper bound. In hybrid networks with ideal infrastructure [2, 33–36], it is assumed that BSs are interconnected by infinite-capacity wired links. In practice, since the backhaul link rate is one of factors that determine a cost of operators, it is of importance to understand what are the fundamental capabilities of hybrid networks with cost-effective rate-limited backhaul links in supporting multiple nodes that wish to communicate concurrently with each other. The throughput scaling was studied in [37, 38] for a simplified practical hybrid network, where BSs are connected only to their neighboring BSs via a finite-rate backhaul link. Recently, a general hybrid network deploying multi-antenna BSs was studied in [39] when each BS-to-BS link has a finite rate. More practically, packets arrived at a certain BS in a radio access network (RAN) are delivered to a core network (CN) in a hierarchical way, and then are transmitted from 1

We use the following notation: (1) f ðxÞ ¼ OðgðxÞÞ means that there exist constants C and c such that f ðxÞ  CgðxÞ for all x [ c, (2) f ðxÞ ¼ f ðxÞ ¼ 0, (3) f ðxÞ ¼ XðgðxÞÞ if oðgðxÞÞ means that limx!1 gðxÞ gðxÞ ¼ Oðf ðxÞÞ, (4) f ðxÞ ¼ wðgðxÞÞ if gðxÞ ¼ oðf ðxÞÞ, and (5) f ðxÞ ¼ HðgðxÞÞ if f ðxÞ ¼ OðgðxÞÞ and gðxÞ ¼ Oðf ðxÞÞ [22].

Author's personal copy Wireless Netw (2016) 22:1133–1144

1135

pffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffiffiffiffi If l ¼ wð n=mÞ and l ¼ Oðn=mÞ, then n=m antennas are regularly placed on the BS boundary and the remaining antennas are uniformly placed inside the boundary. pffiffiffiffiffiffiffiffiffi If l ¼ Oð n=mÞ, then l antennas are regularly placed on the BS boundary.

the CN to other BSs in the RAN. In this paper, the HierHybNET that is well suited to this realistic scenario [40– 44] is taken into account in analyzing the informationtheoretic upper bound on the aggregate capacity scaling law.

1.

3 System and channel models

Such an antenna deployment guarantees both the nearest neighbor transmission around the BS boundary and the enough spacing between the antennas of each BS. If antennas are uniformly placed inside the BS boundary, then the transmission rate may be reduced due to a relatively long hop distance between an antenna and the nearest neighbor node. We thus need to place the BS antennas first on the BS boundary. This antenna configuration will be widely used for future massive MIMO systems. For analytical convenience, we assume that the parameters n, m, and l are related according to

In an extended HierHybNET of unit node density, n nodes are uniformly and independently distributed on a square of area n, except for the area where BSs are placed. We randomly pick S–D pairings, so that each node acts as a source and has exactly one corresponding destination node. Assume that the BSs are neither sources nor destinations. As illustrated in Fig. 1, the network is divided into m square cells of equal area, where a BS with l antennas is located at the center of each cell. The total number of BS antennas in the network is assumed to scale at most linearly with n, i.e., ml ¼ OðnÞ. It is assumed that the radius of each pffiffiffiffiffiffiffiffiffi BS scales as 0 n=m, where 0 [ 0 is an arbitrarily small constant independent of n, m, and l. This radius scaling would ensure enough separation among the antennas since per-antenna distance scales (at least) as the average pernode distance Xð1Þ for any parameters n, m, and l. If the radius scaling scales slower than Hð1Þ, then per-antenna distance may become vanishingly small, which is undesirable under our infrastructure-supported routing protocols. The antenna configuration basically follows that of [2, 39, 45]. According to the radius scaling of each BS, the antennas of each BS are placed as follows:

2.

n ¼ m1=b ¼ l1=c ; where b; c 2 ½0; 1Þ with a constraint b þ c  1. This constraint is reasonable since the total number of antennas of all BSs deployed over the network does not need to be greater than the number of nodes in the network. As depicted in Fig. 1, it is assumed that all the BSs are fully interconnected by wired links through one RCP. Without loss of generality, it is assumed that the RCP is located at the center of the network. The packets transmitted from BSs are received at the RCP and are then conveyed to the corresponding BSs. In the previous studies [2, 33–36], the rate of backhaul links has been assumed to

RCP

RBS

RBS

RBS

BS

BS

RBS

BS

BS RBS

RBS

BS

BS

Fig. 1 The HierHybNET with limited backhaul link rate RBS between a BS and an RCP

123

Author's personal copy 1136

Wireless Netw (2016) 22:1133–1144

(a) Wireless node

L1

S

Infrastructure node

(b) BS-to-RCP link

L2

RCP

D

D

S

D

Fig. 2 The cuts L1 and L2 in the HierHybNET. The BS-to-RCP or RCP-to-BS links are not shown in (a) since they are not in effect under L1 . a The cut L1 . b The cut L2

be unlimited so that the links are not a bottleneck when packets are transmitted from one cell to another. In practice, however, it is natural for each backhaul link to have a finite capacity that may limit the transmission rate of infrastructure-supported routing protocols. In this paper, we assume that each BS is connected to one RCP through an errorless wired link with finite rate RBS ¼ ng for g 2 ð1; 1Þ. It is also assumed that the BS-to-RCP or RCP-to-BS link is not affected by interference. The uplink channel vector between node i and BS b is denoted by " ðuÞ hbi

¼

ðuÞ

ðuÞ

ejhbi;1

ejhbi;2

rbi;1

rbi;2

; ðuÞa=2

; . . .; ðuÞa=2

ðuÞ

ejhbi;l

#T

ðuÞa=2

ðuÞ

ðuÞ

rbi;t denotes the distance between node i and the tth antenna of BS b, and a [ 2 denotes the path-loss exponent. The downlink channel vector between BS b and node i is  ðdÞ  ðdÞ ðdÞ jh jh jh ðdÞ e ib;1 e ib;2 e ib;l similarly denoted by hib ¼ ðdÞa=2 ; ðdÞa=2 ; . . .; ðdÞa=2 . The rib;2

rib;l

channel between nodes i and k is given by ejhki a=2

rki

ð2Þ

For the uplink-downlink balance, it is assumed that each BS satisfies an average transmit power constraint nP / m, while each node satisfies an average transmit power constraint P. Then, the total transmit power of all BSs is the same as the total transmit power consumed by all wireless

123

n!1

log Tn ða; b; c; gÞ : log n

4 Cut-set upper bound

where hbi;t represents the random phases uniformly distributed over ½0; 2pÞ based on a far-field assumption, which is valid if the wavelength is sufficiently small [2, 23]. Here,

hki ¼

eða; b; c; gÞ ¼ lim

ð1Þ

;

rbi;l

rib;1

nodes. This assumption is based on the same argument as duality connection between multiple access channel (MAC) and broadcast channel (BC) in [46]. Suppose that each source transmits with the same average transmission rate Rn . The total throughput of the network is then defined as Tn ða; b; c; gÞ ¼ nRn and its scaling exponent is given by2

In this section, to see the fundamental limit of the HierHybNET with rate-limited BS-to-RCP (or RCP-to-BS) links, a generalized cut-set upper bound on the aggregate capacity scaling based on the information-theoretic approach is derived. As illustrated in Fig. 2, in order to provide a tight upper bound, two cuts L1 and L2 are taken into account. Similarly as in [2], the cut L1 divides the network area into two halves by cutting the wireless connections between wireless source nodes on the left of the network and the other nodes, including all BS antennas and one RCP. In addition, to fully utilize the main characteristics of the network with finitecapacity infrastructure, we consider another cut L2 , which divides the network area into another two halves by cutting the wired connections between BSs and the RCP as well as the wireless connections between all nodes (including BS

2

To simplify notations, Tn ða; b; c; gÞ will be written as Tn if dropping a, b, c, and g does not cause any confusion.

Author's personal copy Wireless Netw (2016) 22:1133–1144

1137

L2

L1

Fig. 3 The partition of destinations under the cuts L1 and L2 in the extended HierHybNET. To simplify the figure, one and two BSs are shown in (a) and (b) with the RCP, respectively. a The cut L1 . b The cut L2

BS

BS RCP

D

(1) L1

RCP BS

D

(2) L1

(3 a) L1

D

Wired link

DL 2

(3b) L1

D

antennas) located on the left of the network and all nodes (including BS antennas and the RCP) on the right. Upper bounds obtained under the cuts L1 and L2 are ð1Þ Tn

h  i y Tnð1Þ  max E log det In2þml þ HL1 QL1 HL1 QL1  0

denoted by and respectively. By the cut-set theorem, the total capacity is upper-bounded by n o Tn  min Tnð1Þ ; Tnð2Þ : ð3Þ The following two lemmas will be used to derive an upper bound on the capacity in the remainder of this section. Lemma 1 In our two-dimensional extended network, where n nodes are uniformly distributed and there are m BSs with l regularly spaced antennas, the minimum distance between any two nodes or between a node and an antenna on the BS boundary is greater than 1=n1=2þ1 whp for an arbitrarily small 1 [ 0. The Lemma 1 can be easily proved by essentially following the same line as [3, Sect. V-B] and [2, Lemma 6]. Lemma 2 Assume a two-dimensional extended network. When the network area with the exclusion of BS area is divided into n squares of unit area, there are less than log n nodes in each square whp. The proof of Lemma 2 is given by slightly modifying the proof of in [23, Lemma 1]. Let us first focus on the cut L1 . Let SL1 and DL1 denote the sets of sources and destinations, respectively, for L1 in the network. Then, all wireless ad hoc nodes on the left half of the network are SL1 , while all ad hoc nodes on the right half and all BS antennas in the network are destinations DL1 (see Fig. 2a). Note that the wired BS-toRCP (or RCP-to-BS) links do not need to be considered under L1 since all BSs in the network act as destinations DL1 .   In this case, the n2  n2 þ ml MIMO channel between the two sets of nodes and BSs separated by the cut L1 is formed.

ð4Þ

y ¼ max E½log detðIHðnÞ þ HL1 QL1 HL1 Þ

ð2Þ Tn ,

QL1  0

where the equality comes from the fact that n ¼ XðmlÞ.3 Here, the channel matrix HL1 consists of the uplink channel ðuÞ

vectors hbi in (1) for i 2 SL1 , b 2 B, and hki in (2) for i 2 SL1 , k 2 Dr , where B and Dr denotes the set of BSs in the network and the set of wireless nodes on the right half, respectively. The matrix QL1 is the positive semidefinite input covariance matrix whose kth diagonal element satisfies ½QL1 kk  P for k 2 SL1 . In order to obtain a tight upper bound, it is necessary to narrow down the class of S– D pairs according to their Euclidean distances. As illustrated in Fig. 3a, the set DL1 is partitioned into the folð1Þ

ð2Þ

lowing four groups according to their locations: DL1 , DL1 , ð3aÞ

ð3bÞ

ð3aÞ

ð3bÞ

DL1 , and DL1 . The set DL1 [ DL1 ð1Þ

ð3Þ

is denoted by DL1 .

ð2Þ

The sets DL1 and DL1 represent the sets of destinations located on the rectangular slab with width one immediately to the right of the centerline (cut) L1 including the RCP and on the ring with width one immediately inside each BS ð3Þ

boundary (cut) on the left half, respectively. The set DL1 is ð1Þ

ð2Þ

given by DL1 n ðDL1 [ DL1 Þ. By generalized Hadamard’s inequality [47] as in [3, 48], we then have h  i ð1Þy ð1Þ Tnð1Þ  max E log det Ipffiffin log nþ1 þ HL1 QL1 HL1 QL1  0

h  i ð2Þy ð2Þ ffi þ max E log det IOðpffiffiffiffi mnÞ þ HL1 QL1 HL1 QL1  0

h  i ð3Þy ð3Þ þ max E log det IHðnÞ þ HL1 QL1 HL1 : QL1  0

ð5Þ

ð1Þ

The total throughput Tn for sources on the left half is bounded by the capacity of the MIMO channel between SL1 and DL1 , and thus is given by

3

Here and in the sequel, the noise variance is assumed to be one to simplify the notation.

123

Author's personal copy 1138

Wireless Netw (2016) 22:1133–1144

h i ðtÞ ðtÞ where HL1 is the matrix with entries HL1 for i 2 SL1 , ki

ðtÞ

k 2 DL1 , and t ¼ 1; 2; 3. By analyzing either the sum of the capacities of the multiple-input single-output (MISO) channel or the amount of power transferred across the network, an upper bound for each term in (5) can be derived. We now establish the following lemma, which shows an upper bound under the cut L1 . Under the cut L1 in Fig. 3a, an upper bound

Lemma 3

ð1Þ

on the aggregate capacity, Tn , of the HierHybNET with rate-limited infrastructure is given by   rffiffiffiffi

m a=21 n pffiffiffi 2a=2 Tnð1Þ ¼ O n max ml ; m min l; ; n; n ; n m

( ð1Þ Tn;3

¼

Oðn2a=2þ Þ if 2\a\3

ð9Þ Oðn1=2þ Þ if a  3: pffiffiffiffiffiffiffiffiffi If l ¼ Xð n=mÞ, using an upper bound for the power ð3aÞ

ð1Þ

transfer from the set SL1 to the set DL1 , the term Tn;3 is upper-bounded by [2] 8 ma=2

>  2a=2 > > c4 n max n ; nl if 2\a\3 > < n ð1Þ ( ) Tn;3  > pffiffiffi n ml a=2 >  > p ffi c n max n ; if a  3 > : 4 l n ð10Þ

ð6Þ

where c4 [ 0 is some constant independent of n. Using (7)– (10) finally yields (6), which completes the proof of the lemma. h

Proof Let Tn;1 , Tn;2 , and Tn;3 denote the first to third terms in (5), respectively. By further applying generalized Hadamard’s

The upper bound Tn matches the achievable throughput scaling within a factor of n in the network with infinite-capacity infrastructure (g ! 1), which

where  [ 0 is an arbitrarily small constant. ð1Þ

ð1Þ

ð1Þ

ð1Þ

inequality [47], the term Tn;1 is upper-bounded by 0 1 X X ð1Þ 2 Tn;1  log@1 þ P jhki j A ð1Þ

k2DL

1

i2SL1

ð1Þ

indicates that Tn does not rely on the parameter g. Note that the first to fourth terms in the max operation of (6) represent the amount of information transferred to the ð7Þ

pffiffiffi  c1 ð n log n þ 1Þ log n pffiffiffi  c2 n n

where c1 and c2 are some positive constants, independent of n, and  [ 0 is an arbitrarily small constant. The second inequality follows from the fact that the minimum distance between any source and destination (including the RCP) is greater than 1=n1=2þ1 whp for an arbitrarily small 1 [ 0 by Lemma 1 and pffiffiffi ð1Þ there exist no more than n log n þ 1 nodes in DL1 whp by Lemma 2. Since the remaining terms (i.e., the second and third terms) in (5) can be computed regardless of the presence of the RCP, they are derived by basically following the same approach as that in [2]. From the antenna configuration in our network, ð1Þ

the second term in (5), Tn;2 , is bounded by [2] ( pffiffiffiffiffiffiffiffiffi c3 ml log n if l ¼ oð n=mÞ ð1Þ Tn;2  pffiffiffiffiffiffiffiffiffi pffiffiffiffiffiffi c3 mn log n if l ¼ Xð n=mÞ rffiffiffiffi

n  c3 m min l; log n m

ð8Þ

where c3 [ 0 is some constant independent of n. An upper ð1Þ

bound for the third term in (5), Tn;3 , is derived now. If pffiffiffiffiffiffiffiffiffi ð3aÞ l ¼ oð n=mÞ, there is no destination in DL1 (see Fig. 3a) ð3Þ

and thus the information transfer to the set DL1 is the same as that in wireless network with no infrastructure (that is, the ð3bÞ

information transfer to the set DL1 ). Hence, it follows that [3]

123

ð1Þ

ð3aÞ

ð2Þ

ð1Þ

ð3bÞ

destination sets DL1 , DL1 , DL1 , and DL1 , respectively. The third and fourth terms characterize the cut-set upper bound of wireless networks with no infrastructure. By employing infrastructure nodes, it is possible to get an additional information transfer for a given cut L1 , corresponding to the first and second terms in the max operation of (6). In addition to the cut L1 , we now turn to the cut L2 in Fig. 2b to obtain a tight cut-set upper bound in the network with rate-limited infrastructure. Let SL2 and DL2 denote the sets of sources and destinations, respectively, for L2 in the network. More precisely, under L2 , all the wireless and infrastructure nodes on the left half are SL2 , while all the nodes on the right half including the RCP are included in DL2 (see Fig. 2b). Unlike the case of L1 , we take into account information flows over the wired connections as well as the wireless connections. In consequence, an upper bound on the aggregate capacity is established based on using the min-cut of our network, and is presented in the following theorem. Theorem 1 In the HierHybNET with the backhaul link rate RBS , the aggregate throughput Tn is upper-bounded by ma=21 Tn ¼ O max min max n ml ; n rffiffiffiffi



n  1=2þ 2a=2þ n m min l; ; mRBS ; n ;n ; m ð11Þ

Author's personal copy Wireless Netw (2016) 22:1133–1144

1139

Table 1 The operating regime for an extended HierHybNET with finite-capacity infrastructure Regime

Condition

eða; b; c; gÞ

B~

2\a\4  2b  2g

2  a2

a  4  2b  2g

bþg

2\a\4  2b  2g

2  a2

4  2b  2g  a\2 þ 2ðcgÞ 1b

bþg

2c 2 þ 2ðcgÞ 1b  a\1 þ 1b

1 þ c  að1bÞ 2

2c a  1 þ 1b

1þb 2

~ D

Proof By the min-cut of the network, the aggregate capacity is upper-bounded by (3). The upper bound on the ð1Þ

capacity, Tn , under the cut L1 directly follows from Lemma 3. ð2Þ

An upper bound on the capacity, Tn , under the cut L2 is derived below. Since the cut-set argument under L1 does not utilize the main characteristics of rate-limited backhaul links, we now deal with a new cut L2 , which divides the network into two equal halves. A wired link between two BSs that lie on the opposite side of each other from the cut is illustrated in   nþml  Fig. 3b. In this case, we get the nþml  2 þ 1 MIMO 2 wireless channel and the m2  1 MISO wired channel between the two sets SL2 and DL2 separated by L2 . We now derive the amount of information transferred by each channel. Let ð2Þ

Tn;wireless and Tn;wired denote the amount of information transferred through the wireless and wired channels under L2 , respectively. The aggregate capacity obtained under L2 is ð2Þ

ð2Þ

ð2Þ

then upper-bounded by Tn  Tn;wireless þ Tn;wired . ð2Þ

Let us first focus on deriving Tn;wireless , which is bounded by the capacity of the MIMO channel between SL2 and DL2 . Using the same power transfer argument as [3], an upper bound on ð2Þ Tn;wireless ,  

ð2Þ Tn;wireless

under the cut L2 in Fig. 2b, is given by ¼

pffiffiffi 2a=2  O n max n; n , where  [ 0 is an arbitrarily small constant. Next, we turn to analyzing the capacity of the MISO wired channel. There also exist wired links between the two sets separated by L2 (i.e., BSs on the left half of the network and the RCP placed at the center of the network). From the fact that the m2 BS-to-RCP (or RCP-to-BS) links ð2Þ

can be created under L2 , we have Tn;wired ¼ OðmRBS Þ since the capacity of each backhaul link is assumed to be RBS . In consequence, under the cut L2 , it follows that

4

ð2Þ

ð12Þ

Using (6) and (12), the total throughput Tn is finally upperbounded by Tn  minfTnð1Þ ; Tnð2Þ g (   m a=21 ¼ O min n max ml ; n rffiffiffiffi

n pffiffiffi 2a=2 ; n; n m min l; g; m )! maxfmRBS ; n1=2þ ; n2a=2þ g

where  [ 0 is an arbitrarily small constant.4

ð2Þ

ð2Þ

Tnð2Þ  Tn;wireless þ Tn;wired  n o ¼ O max mRBS ; n1=2þ ; n2a=2þ :

To simplify notations, the terms including  are omitted if dropping them does not cause any confusion.

(

ma=21 ¼ O max min max n ml ; n )! rffiffiffiffi

n  1=2þ 2a=2þ m min l; g; mRBS g; n ;n ; m

where the last equality follows from minfmaxfa; xg; maxfb; xgg ¼ maxfminfa; bg; xg. This completes the proof of Theorem 1. h Now we would like to examine in detail the amount of information transfer by each separated destination set. Remark 2 As mentioned earlier, each term in (11) is associated with one of the destination sets for a given cut. To be concrete, the first and the second terms in the max operation of (11) represent the amount of information ð3aÞ

ð2Þ

transferred to DL1 and DL1 over the wireless connections, respectively. The third term represents the information flows over the wired connections from the BSs on the left half to the BSs on the right half. The fourth and fifth terms represent the amount of information transferred ð1Þ

ð3bÞ

to DL1 and DL1 respectively.

over the wireless connections,

5 Infrastructure-limited regime We show the case where our HierHybNET is in the infrastructure-limited regime using the cut-set argument drawn under L1 and L2 . Using the identified infrastructurelimited regime, one can see whether or not the throughput scaling in a certain regime can be improved by increasing ~ and D ~ the backhaul link rate. Two operating regimes B causing an infrastructure limitation for some a are intro~ and D ~ become duced in Table 1. Note that Regimes B infrastructure-limited when a  4  2b  2g and 4  2b  2g  a\2 þ 2ðcgÞ 1b , respectively.

123

Author's personal copy 1140

Wireless Netw (2016) 22:1133–1144

˜ B

˜ ˜

Fig. 4 The operating regimes with respect to b and c, where  12  g\0The operating regimes with respect to b and c, where 1 2  g\1

Fig. 5 The operating regimes with respect to b and c, where 0  g\ 12

The infrastructure-limited regime is identified using the upper bound derived under the two cuts. The network is shown to be fundamentally infrastructure-limited if the following two conditions are satisfied:   pffiffiffi iÞ mng ¼ X n maxf n; n2a=2 g ð13aÞ   rffiffiffiffi

m a=21 n g  iiÞ mn ¼ o n max ml ; m min l; ; n m ð13bÞ where the first and second conditions come from (12) and (6), respectively, corresponding to the aggregate throughput under the cuts L2 and L1 each. In order to satisfy the first condition (13a), the value g must be greater than or equal to  12. The infrastructure-limited regime is thus identified for the following three cases depending on g (   12). •



 12  g\0: The first condition (13a) holds if b  12  g and a  4  2b  2g, while the second condition (13b) always holds in this case since  n pffiffiffio g n mn ¼ o m min l; m . Hence, the network is infrastructure-limited if b  12  g and ~ a  4  2b  2g, which is depicted in Regime B of Fig. 4. 0  g\ 12: As in the previous range of g, b  12  g and a  4  2b  2g need to be satisfied so that the first condition (13a) holds. Let us now examine the case where the second condition (13b) follows according to the two-dimensional operating regimes with respect to b and c, which is non-trivial. –

b þ 2c\1: In this case, from the fact that the righthand side (RHS) of (13b) is simply given by ml, (13b) is satisfied if g\c. The regime under these

123

˜

Fig. 6 The operating regimes with respect to b and c, where 12  g\1



~ below conditions corresponds to a part of Regime B the line b þ 2c ¼ 1 in Fig. 5. b þ 2c  1: Let us first consider the case where the pffiffiffiffiffiffi RHS of (13b) is given by mn. Then, (13b) is satisfied if b\1  2g, which corresponds to the ~ in Fig. 5. Let us now remaining part of Regime B turn to the case where the RHS of (13b) is given by  a=21 ml mn . In this case, (13b) is satisfied if a\2 þ 2ðcgÞ 1b . Our network is thus infrastructurelimited when 4  2b  2g\2 þ 2ðcgÞ 1b (equivalent to c [ b2 þ ðg  2Þb þ 1), which is depicted in ~ of Fig. 5. Note that the network is Regime D infrastructure-limited at the medium path-loss attenuation regime, corresponding to 4  2b  2g  a\2 þ 2ðcgÞ 1b .

Author's personal copy Wireless Netw (2016) 22:1133–1144 1 2

 g\1: We show the case where the two conditions in (13) follow according to the operating regimes with respect to b and c.

80

b þ 2c\1: In this case, the RHS of (13b) is given by ml. There is no infrastructure limitation since g [ c. b þ 2c  1: The conditions in (13) are satisfied if

60





2ðcgÞ 1b .

a  4  2b  2g and a\2 þ As a consequence, the network is infrastructure-limited 4  2b  2g\2 þ 2ðcgÞ 1b

when

R

=0

R

=1

R

=10

BS

70

BS BS

Upper bound (bps/Hz)



1141

50 40 30 20

(equivalent

to 2 ~ c [ b þ ðg  2Þb þ 1), which is depicted in Regime D of Fig. 6.

10 0

100

200

300

400

500

600

700

800

900

1000

The number of nodes, n

Fig. 7 The upper bound on the aggregate throughput Tn versus the number of nodes, n

6 Numerical evaluation In this section, to validate the performance of the upper bound in Sect. 4, we perform extensive computer simulations according to finite values of the system parameters n, m, l, and RBS . Using (3), the upper bound on the aggregate ð1Þ

More specifically, the term Tn is numerically computed as   the capacity of the n2  n2 þ ml MIMO wireless channel between SL1 and DL1 , which is expressed as (4). From the ð2Þ

ð2Þ

ð2Þ

ð2Þ

fact that Tn  Tn;wireless þ Tn;wired , the terms Tn;wireless and ð2Þ

Tn;wired are numerically computed as the capacity of the nþml  nþml m 2  2 þ 1 MIMO wireless channel and the 2  1 MISO wired channel, respectively, between SL2 and DL2 , which eventually leads to (12). We slightly modify our system model so that the model is suitable for numerical evaluation—to remove any randomness of node location, a regular network is assumed, where nodes are equally spaced over a square network such that the distance between nearest-neighbor nodes is 1 (m). The path-loss exponent a is assumed to be 4. In our Monte-Carlo simulations, each channel is randomly generated 1  103 times for given system parameters. The upper bound on the aggregate throughput Tn versus the number of nodes, n, is first evaluated in Fig. 7, where m ¼ 4, l ¼ 2, and RBS ¼ 0; 1; 10 (bps/Hz). In Fig. 8, the upper bound on the aggregate throughput Tn is evaluated according to the number of BSs, m, where n ¼ 256, l ¼ 2, and RBS ¼ 0; 1; 10. Figure 9 shows the upper bound on the aggregate throughput Tn according to the number of antennas per BS, l, where n ¼ 256, m ¼ 4, and RBS ¼ 0; 1; 10. In Figs. 8 and 9, a sufficient number of nodes (n ¼ 256) are deployed so that a large-scale network is suitably modelled in practice. Moreover, in Figs. 7, 8, 9 and 10, it is observed that

=0

R

=1

BS

600

RBS=10

ð2Þ

throughput is numerically computed as minfTn ; Tn g.

R

BS

Upper bound (bps/Hz)

ð1Þ

700

500 400 300 200 100 0

20

40

60

80

100

120

140

The number of BSs, m

Fig. 8 The upper bound on the aggregate throughput Tn versus the number of BSs, m

the upper bound on Tn is monotonically increasing with respect to parameters n, m, and l, which shows trends consistent with our analytical behaviors in Theorem 1. It is also seen that the performance gets greatly improved when the backhaul link rate RBS increases up to 10. Finally, Fig. 10 illustrates the upper bound on Tn versus RBS , where n ¼ 256, m ¼ 4, and l ¼ 2. From Fig. 10, the following interesting observations are made under our simulation environments: • •

The upper bound on Tn is monotonically increasing as RBS \4. For RBS  4, the performance is not improved with increasing RBS .

123

Author's personal copy 1142

Wireless Netw (2016) 22:1133–1144

upper bound result, we concretely studied the case where our network is fundamentally infrastructure-limited. Our analysis was also validated using extensive computer simulations. Our comprehensive analysis sheds more light on the backhaul design policies and on operational issues for ad hoc networks with rate-limited infrastructure.

80 75

R

=0

Upper bound (bps/Hz)

BS

70

RBS=1

65

R

=10

BS

60 55

Acknowledgments This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2054577) and by the research fund of Dankook University(BK21 Plus) in 2014. This paper was presented in part at the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, June/July 2014.

50 45 40 35 30

5

10

15

20

25

30

References

The number of antennas per BS, l

Fig. 9 The upper bound on the aggregate throughput Tn versus the number of antennas per BS, l

46

Upper bound (bps/Hz)

44 42 40 38 36 34 32

0

6

8

The backhaul link rate, R

2

4

(bps/Hz)

BS

10

Fig. 10 The upper bound on the aggregate throughput Tn versus the backhaul link rate RBS



Hence, the minimum backhaul link rate RBS required to achieve the same capacity scaling law as in the infinitecapacity backhaul link case (i.e., RBS ! 1) is given by 4 (bps/Hz).

7 Conclusion A generalized cut-set upper bound was derived using two cuts under the HierHybNET model. In the HierHybNET with rate-limited infrastructure, it was shown that the upper bound matches the achievable throughput scaling for all the three-dimensional operating regimes with respect to m, l, and backhaul link rate RBS . Furthermore, based on the

123

1. Gupta, P., & Kumar, P. R. (2000). The capacity of wireless networks. IEEE Transactions on Information Theory, 46, 388–404. 2. Shin, W.-Y., Jeon, S.-W., Devroye, N., Vu, M. H., Chung, S.-Y., Lee, Y. H., et al. (2008). Improved capacity scaling in wireless networks with infrastructure. IEEE Transactions on Information Theory, 57, 5088–5102. ¨ zgu¨r, A., Le´veˆque, O., & Tse, D. N. C. (2007). Hierarchical 3. O cooperation achieves optimal capacity scaling in ad hoc networks. IEEE Transactions on Information Theory, 53, 3549–3572. 4. Cover, T. M., & Thomas, J. A. (1991). Element of information theory. New York: Wiley. 5. Meng, T., Wu, F., Yang, Z., Chen, G., & Vasilakos, A. V. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE Transactions on Computers, to appear. 6. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In Proceedings of IEEE INFOCOM, pp. 100–108. 7. Li, P., Guo, S., Yu, S., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25, 3264–3273. 8. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14, 742–754. 9. Liu, J., Wan, J., Wang, Q., Deng, P., Zhou, K., & Qiao, Y. (2015). A survey on position-based routing for vehicular ad hoc networks. Telecommunication Systems, 59, 1–16. 10. Liu, J., Wan, J., Wang, Q., Li, D., Qiao, Y., & Cai, H. (2015). A novel energy-saving one-sided synchronous two-way ranging algorithm for vehicular positioning. Mobile Networks and Applications, 20, 1–12. 11. Jiang, T., Wang, H., & Vasilakos, A. V. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30, 1215–1224. 12. Attar, A., Tang, H., Vasilakos, A. V., Yu, F. R., & Leung, V. C. M. (2012). A survey of security challenges in cognitive radio networks: Solutions and future research directions. Proceedings of the IEEE, 100, 3172–3186. 13. Quan, W., Xu, C., Vasilakos, A. V., Guan, J., Zhang, H., & Grieco, L. A. (2014). TB2F: Tree-bitmap and bloom-filter for a

Author's personal copy Wireless Netw (2016) 22:1133–1144

14.

15.

16.

17.

18.

19.

20.

21.

22.

23.

24.

25.

26.

27.

28.

29.

30.

scalable and efficient name lookup in content-centric networking. In Proceedings of IFIP networking conference, pp. 1–9. Vasilakos, A. V., Li, Z., Simon, G., & You, W. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10. Lopez-Perez, D., Chu, X., Vasilakos, A. V., & Claussen, H. (2013). On distributed and coordinated resource allocation for interference mitigation in self-organizing LTE networks. IEEE/ ACM Transactions on Networking, 21, 1145–1158. Lopez-Perez, D., Chu, X., Vasilakos, A. V., & Claussen, H. (2014). Power minimization based resource allocation for interference mitigation in OFDMA femtocell networks. IEEE Journal on Selected Areas in Communications, 32, 333–344. Khan, M. A., Tembine, H., & Vasilakos, A. V. (2012). Game dynamics and cost of learning in heterogeneous 4G networks. IEEE Journal on Selected Areas in Communications, 30, 198–213. Duarte, P. B. F., Fadlullah, Z. M., Vasilakos, A. V., & Kato, N. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. IEEE Journal on Selected Areas in Communications, 30, 119–127. Vasilakos, A. V., Ricudis, C. Anagnostakis, K. G., Pedrycz, W., Pitsillides, A., & Gao, X. Z. (1998). Evolutionary-fuzzy prediction for strategic ID-QoS routing in broadband networks. In Proceedings of IEEE international conference on Fuzzy, pp. 1488–1493. Yang, M., Li, Y., Jin, D., Zeng, L., Wu, X., & Vasilakos, A. V. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20, 4–18. Demestichas, P. P., Stavroulaki, V.-A. G., Papadopoulou, L.-M. I., Vasilakos, A. V., & Theologou, M. E. (2004). Service configuration and traffic distribution in composite radio environments. IEEE Transactions on Systems, Man, and CyberneticsPart C: Applications and Reviews, 34, 69–81. Knuth, D. E. (1976). Big omicron and big omega and big theta. ACM Special Interest Group on Algorithms and Computation Theory (SIGACT) News, 8, 18–24. Franceschetti, M., Dousse, O., Tse, D. N. C., & Thiran, P. (2007). Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transactions on Information Theory, 53, 1009–1018. Shin, W.-Y., Chung, S.-Y., & Lee, Y. H. (2013). Parallel opportunistic routing in wireless networks. IEEE Transactions on Information Theory, 59, 6290–6300. El Gamal, A., Mammen, J., Prabhakar, B., & Shah, D. (2006). Optimal throughput-delay scaling in wireless networks-Part I: The fluid model. IEEE Transactions on Information Theory, 52, 2568–2592. Niesen, U., Gupta, P., & Shah, D. (2010). The balanced unicast and multicast capacity regions of large wireless networks. IEEE Transactions on Information Theory, 56, 2249–2271. Grossglauser, M., & Tse, D. N. C. (2002). Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Transactions on Networking, 10, 477–486. Cadambe, V. R., & Jafar, S. A. (2008). Interference alignment and degrees of freedom of the K-user interference channel. IEEE Transactions on Information Theory, 54, 3425–3441. Niesen, U. (2011). Interference alignment in dense wireless networks. IEEE Transactions on Information Theory, 57, 2889–2901. Yi, S., Pei, Y., Kalyanaraman, S., & Azimi-Sadjadi, B. (2007). How is the capacity of ad hoc networks improved with directional antennas? Wireless Networks, 13, 635–648.

1143 31. Li, P., Zhang, C., & Fang, Y. (2011). The capacity of wireless ad hoc networks using directional antennas. IEEE Transactions on Mobile Computing, 10, 1374–1387. 32. Yoon, J., Shin, W.-Y., & Jeon, S.-W. (2014). Elastic routing in wireless networks with directional antennas. In Proceedings of IEEE international symposium of information theory (ISIT), pp. 1001–1005. 33. Zemlianov, A., & de Veciana, G. (2005). Capacity of ad hoc wireless networks with infrastructure support. IEEE Journal of Selected Areas on Communications, 23, 657–667. 34. Dousse, O., Thiran, P., & Hasler, M. (2002). Connectivity in adhoc and hybrid networks. In Proceedings of IEEE INFOCOM, pp. 1079–1088. 35. Liu, B., Thiran, P., & Towsley, D. (2007). Capacity of a wireless ad hoc network with infrastructure. In Proceedings of ACM international symposium on mobile ad hoc networking and computing (MobiHoc), pp. 239–246. 36. Kozat, U. C., & Tassiulas, L. (2003). Throughput capacity of random ad hoc networks with infrastructure support. In Proceedings of ACM international conference on mobile computing and networking (MobiCom), pp. 55–65. 37. C¸apar, C¸., Goeckel, D., Towsley, D., Gibbens, R., & Swami, A. (2011). Cut results for the capacity of hybrid networks. In Proceedings of annual confererence of international technology alliance (ACITA), pp. 1–2. 38. C¸apar, C¸., Goeckel, D., Towsley, D., Gibbens, R., & Swami, A. Capacity of hybrid networks. In Proceedings of annual conference of international technology alliance (ACITA), pp. 1–8. 39. Jeong, C., & Shin, W.-Y. (2013). Large-scale ad hoc networks with rate-limited infrastructure: Information-theoretic operating regimes. In Proceedings of IEEE international symposium on information theory (ISIT), pp. 424–428. 40. Marsch, P., & Fettweis, G. (2007). A framework for optimizing the uplink performance of distributed antenna systems under a constrained backhaul. In Proceedings of IEEE international conference on communications (ICC), pp. 975–979. 41. Nazer, B., Sanderovich, A., Gastpar, M., & Shamai (Shitz), S. (2009). Structured superposition for backhaul constrained cellular uplink. In Proceedings of IEEE international symposium on information theory (ISIT), pp. 1530–1534. 42. Sanderovich, A., Somekh, O., & Shamai (Shitz), S. (2007). Uplink macro diversity with limited backhaul capacity. In Proceedings of international symposium on information theory (ISIT), pp. 11–15. 43. Shamai (Shitz), S., Simeone, O., Somekh, O., & Sanderovich, A. (2009). Uplink macro diversity of limited backhaul cellular network. IEEE Transactions on Information Theory, 55, 3457–3478. 44. Shamai (Shitz), S., Simeone, O., Somekh, O., & Sanderovich, A. (2008). Information-theoretic implications of constrained cooperation in simple cellular models. In Proceedings of IEEE annual international symposium on personal, indoor, and mobile radio communications (PIMRC), pp. 1–5. 45. Gomez-Cuba, F., Rangan, S., & Erkip, E. (2014). Scaling laws for infrastructure single and multihop wireless networks in wideband regimes. In Proceedings of IEEE international symposium on information theory (ISIT), pp. 76–80. 46. Viswanath, P., & Tse, D. N. C. (2003). Sum capacity of the vector Gaussian broadcast channel and uplink-downlk duality. IEEE Transactions on Information Theory, 49, 1912–1921. 47. Constantinescu, F., & Scharf, G. (1998). Generalized GramHadamard inequality. Journal of Inequalities and Applications, 2, 381–386. 48. Jovicic, A., Viswanath, P., & Kulkarni, S. R. (2004). Upper bounds to transport capacity of wireless networks. IEEE Transactions on Information Theory, 50, 2555–2565.

123

Author's personal copy 1144 Cheol Jeong received the B.S. degree in electrical and electronics engineering from Yonsei University, Seoul, Korea, in 2003, and the Ph.D. degree in electrical engineering from KAIST, Daejeon, Korea, in 2010. From August 2010 to July 2011, he was with the Department of Electrical and Computer Engineering, Queen’s University, Kingston, Canada, as a Postdoctoral Fellow. In September 2011, he joined the Samsung Electronics, where he is currently a senior engineer. His research interests include MIMO relay communications, physical layer security, ad hoc networks, and millimeter-wave communications. Won-Yong Shin received the B.S. degree in electrical engineering from Yonsei University, Seoul, Korea, in 2002. He received the M.S. and the Ph.D. degrees in electrical engineering and computer science from Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea, in 2004 and 2008, respectively. From February 2008 to April 2008, he was a Visiting Scholar in the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA. From September 2008 to April 2009, he

123

Wireless Netw (2016) 22:1133–1144 was with the Brain Korea Institute and CHiPS at KAIST as a Postdoctoral Fellow. From August 2008 to April 2009, he was with the Lumicomm, Inc., Daejeon, Korea, as a Visiting Researcher. In May 2009, he joined Harvard University as a Postdoctoral Fellow and was promoted to a Research Associate in October 2011. Since March 2012, he has been with the Division of Mobile Systems Engineering, College of International Studies and the Department of Computer Science and Engineering, Dankook University, Yongin, Korea, where he is currently an Assistant Professor. His research interests are in the areas of information theory, communications, signal processing, mobile computing, big data analytics, and their applications to multiuser networking issues. Dr. Shin has served as an Associate Editor for the IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS, COMPUTER SCIENCES, for the IEIE TRANSACTIONS ON SMART PROCESSING & COMPUTING, and for the JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY. He has also served as an Organizing Committee for the 2015 IEEE Information Theory Workshop.

HierHybNET: Cut-set upper bound of ad hoc networks ...

Jul 23, 2015 - س Springer Science+Business Media New York 2015. Abstract This paper ... number of wireless nodes, n, a generalized upper bound on the capacity scaling is .... Hًn1ہ ق for an arbitrarily small [ 0, in dense networks of unit area. ...... 800. 900 1000. 0. 10. 20. 30. 40. 50. 60. 70. 80. The number of nodes, n.

917KB Sizes 0 Downloads 151 Views

Recommend Documents

HierHybNET: Capacity scaling of ad hoc networks with ...
networks consisting of both wireless ad hoc nodes and in- frastructure .... 3 It was shown that the HC scheme is order-optimal in a dense network even with ...... cessing, mobile computing, big data analytics, and online social networks analysis.

Routing in Ad-Hoc Networks
generate a significant amount of network control traffic when the topology of the network changes frequently. Lastly, packets can .... time, which happens very often in radio networks due to collisions or other transmission problems. In addition, OLS

wireless ad hoc networks pdf
Loading… Page 1. Whoops! There was a problem loading more pages. wireless ad hoc networks pdf. wireless ad hoc networks pdf. Open. Extract. Open with.

Regularity, Interference, and Capacity of Large Ad Hoc Networks
Moreover, even if the complete set of nodes constitutes a PPP, the subset of active nodes (e.g., transmitters in a given timeslot or sentries in a sensor network), ...

Regularity, Interference, and Capacity of Large Ad Hoc Networks
alytical tools from stochastic geometry are used, including the probability generating functional of Poisson cluster processes, the Palm characterization of Poisson cluster ..... Let Cl(ϵ, T) and Cu(ϵ, T) denote lower and upper bounds to the transm

performance of network coding in ad hoc networks
Computer Science Department, University of California, Los Angeles ... Laboratory for Information and Decision Systems, Massachusetts Institute of Technology.

Alexandropoulou_S._et_al. The Likelihood of Upper-Bound ...
The Likelihood of Upper-Bound Construals among Different Modified Numerals.pdf. Alexandropoulou_S._et_al. The Likelihood of Upper-Bound Construals ...

Modelling cooperation in mobile ad hoc networks: a ...
one. However, the general approach followed was proposing a mechanism or a protocol ... network with probability one. ... nodes from all the network services.

Mitigating starvation in Wireless Ad hoc Networks: Multi ...
sage indicating the transmission power Pd. Upon receiving the ATIM-ACK, node S ..... mation Computing Development Program through the Na- tional Research ...

Overhearing-aided Data Caching in Wireless Ad Hoc Networks
Abstract—The wireless ad hoc network is a promising networking technology to provide users with various network services anywhere anytime. To cope with resource constraints of wireless ad hoc networks, data caching is widely used to efficiently red

Ad Hoc Networks Using Opportunistic Routing
Jun 29, 2007 - [10] show achievable scaling laws do not change funda- mentally if ... This workwas supported in part by the University Information Technology.

Connected k-Hop Clustering in Ad Hoc Networks
information transmission flooding could be confined within each cluster. In an ad ...... dominating set (CDS) to carry out data propagation. Find- ing a minimum ...

Secure Anonymous routing in Ad Hoc networks
vulnerable to packet type analysis attacks thus do not provide complete ... requiring operations, this goal effectively means that the protocol should make ...

Certificate Status Validation in Mobile Ad-Hoc Networks
nodes that can be connected or disconnected from the Internet. On the other hand, trust and security are basic requirements to support business ... Like in PGP, the nodes build trust paths certifying from one node to other, as in a .... knowledge of

Stable Topology Control for Mobile Ad-Hoc Networks - IEEE Xplore
Abstract—Topology control is the problem of adjusting the transmission parameters, chiefly power, of nodes in a Mobile. Ad Hoc Network (MANET) to achieve a ...

Mobility-enhanced positioning in ad hoc networks
Abstract— This paper discusses and investigates the effects of mobility on positioning of wireless ad hoc networks. We present a Mobility-enhanced Ad hoc ...

Communication in disconnected ad hoc networks using ...
An ad hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous .... We are inspired by recent progress in three areas: ad.

Policy Based SLA for Wireless Ad Hoc Networks
propagation range of each mobile host's wireless transmissions. ... The Framework uses a Policy Server to take decisions on the service trading issues.

An Exposure towards Neighbour Discovery in Wireless Ad Hoc Networks
geographic position presented by GPS or by a Mac address. The objective is to recommend an algorithm in which nodes in the discovery of network their one-hop neighbours. It was assumed that time is separated into time slots and nodes are completely s

Topology Control in Unreliable Ad hoc Networks
Topology control is a basic subroutine in many wireless networking problems and is, in general, a multi-criteria optimization problem involving (contradictory) objectives of connectivity, interfer- ence, and power minimization. Wireless devices are o