Degrees of Freedom in Wireless Networks

Size: px
Start display at page:

Download "Degrees of Freedom in Wireless Networks"

Transcription

1 Degrees of Freedom in Wireless Networks Zhiyu Cheng Department of Electrical and Computer Engineering University of Illinois at Chicago Chicago, IL 60607, USA Abstract This paper did a survey in the area of degrees of freedom (DoF) in wireless network. We give the definitions of degrees of freedom in different areas first. Then we introduce some methods used to determine the degrees of freedom in different scenario. In section IV, we discuss the applications of the degrees of freedom. We state some interesting open questions in the end of this survey. I. INTRODUCTION There is recent interest in the degrees of freedom in wireless networks. For example, message sharing, beamforming, zero forcing, [24] successive decoding, and dirty paper coding [4] techniques may be combined in many different ways across users, data streams, and antennas to establish inner bounds on the degrees of freedom. Besides, time, frequency, and space all offer degrees of freedom [8] [18], spatial dimendions are especially interesting for how they may be accessed with distributed processing. For the various multiuser MIMO systems, several researchers has determined the degrees of freedom. Background information can be found in [1] [11] [9] [23]. Degrees of freedom for linear interference networks with local side information are explored in [22] and cognitive message sharing is found to improve the degrees of freedom for certain structured channel matrices. This paper is a survey of the area of the degrees of freedom. The rest of the paper is organized as follows. Section II gives the definitions of degrees of freedom in different areas. Section III introduces how to determine the degrees of freedom in different scenario. In section IV, we discuss the applications of the degrees of freedom. Section V state some open questions about the degrees of freedom in wireless networks. II. DEFINITIONS OF DEGREES OF FREEDOM A. Definition in statistics In statistics, the number of degrees of freedom is the number of values in the final calculation of a statistic that are free to vary. The value of calculating a statistic of the number of independent variables is equal to the difference between the total number of data points under consideration, and the number of restrictions. The number of restrictions is equal to the number of parameters which are the same in both observed data set and theoretical data set, e.g. total cumulative values, means. Another definition of degrees of freedom in statistics is given by Lane, David. M. We know that estimates of parameters can be based upon different amounts of information. The number of independent pieces of information that go into the estimate of a parameter is called the degrees of freedom. In general, the degrees of freedom of an estimate is equal to the number of independent scores that go into the estimate minus the number of parameters estimated as intermediate steps in the estimation of the parameter itself. For example, if the variance, σ 2, is to be estimated from a random sample of N independent scores, then the degrees of freedom is equal to the number of independent scores (N) minus the number of parameters estimated as intermediate steps (one, λ estimated by R) and is therefore equal to N 1. Mathematically, degrees of freedom is the dimension of the domain of a random vector, or essentially the number of free components: how many components need to be known before the vector is fully determined. B. The maximum multiplexing gain In a wireless network with each node having a symmetric transmit power constraint ρ, we could define degrees of freedom as the maximum multiplexing gain for which a nonzero diversity gain is attainable. [17] [14] We define the DOF of a matrix H as the DOF of the channel y = Hx + w where w is distributed as N(0, I). Given a random matrix H, which is a function of random variables h 1, h 2,..., h N, we define the structural rank of H as the maximum rank attained by H under any possible assignment of h i and denoted by Rank(H) Consider a channel of the form y = Hx + w, where H is a fixed N N channel matrix, x, y, w are N length column vectors representing the transmitted signal, received signal and the noise vector respectively with the noise being white in the scale of interest. Then the degrees of freedom of this channel is given by D = Rank(H). C. Estimate the capacity In the estimation of capacity of wireless networks, we define degrees of freedom D [26] [13] as the ratio of the sum capacity C(P ) of the network to the log of the total transmit power P, in the limit that P, where the local noise at each node is normalized to have unit variance. D = lim P C(P ) log(p ) It is clear that degrees of freedom provide a capacity approximation C(P ) = D log(p )+o(log(p )) whose accuracy

2 approaches 100% as the total transmit power P approaches infinity. III. HOW TO DETERMINE THE DEGREES OF FREEDOM There has been a recent interest in determining the degrees of freedom [1] [15] of wireless multi-antenna networks, which is the maximum multiplexing gain. The DOF for the K user interference channel was derived in [27] and the degrees of freedom of single-source single-sink (ss-ss) layered networks was obtained in [28]. In another direction, the capacity of ss-ss and multicast deterministic wireless networks were characterized in [7]. Intuition drawn from the deterministic wireless networks were used to identify capacity to within a constant for some example networks in [6]. A similar approach was used in [12] for obtaining degrees of freedom for real gaussian interference networks. In the following subsections, we will discuss how to determine the degrees of freedom in K user interference channel, real gaussian interference networks, and single-source single-sink networks. [17] A. K user interference channel First, we consider the K user interference channel, comprised of K transmitters and K receivers. Each node is equipped with only one antenna. The channel output at the kth receiver over the tth time slot is described as follows: Y [k] (t) = H [k1] (t) + H [k2] (t)x [2] (t) H [kk] (t)x [K] (t) + Z [k] (t) where, k {1, 2,..., K} is the user index, t N is the time slot index, Y [k] (t) is the output signal of the kth receiver, X [k] (t) is the input signal of the th transmitter, H [kj] (t) is the channel fade coefficient from transmitter j to receiver k over the tth time-slot and Z [k] (t) is the additive white Gaussian noise (AWGN) term at the kth receiver. We assume all noise terms are independent identically distributed (i.i.d.) zero-mean complex Gaussian with unit variance. To avoid degenerate channel conditions (e.g., all channel coefficients are equal or channel coefficients are equal to zero or infinity) we assume that the channel coefficient values are drawn i.i.d. from a continuous distribution and the absolute value of all the channel coefficients is bounded between a nonzero minimum value and a finite maximum value, 0 < H min H [kj] H max <. We assume that channel knowledge is causal and globally available. Now, we can determine the degrees of freedom for the K user interference channel: T heorem1 : The number of degrees of freedom per user for this K user interference channel is K/2 max D d 1 + d d k = K/2 B. Real Gaussian interference channel In this subsection, we also consider the K user interference network first. Recall the input-output equation for K user interference network: Y [k] (t) = K j=1 H[kj] X [j] (t) + Z [k] (t) All symbols are real and the channel coefficients are fixed. The time index t is suppressed henceforth for compact notation. Note that we are only interested in constant channels as the channel coefficients are not a function of time. For such a constant interference channel with real and nonzero coefficients, we wish to find out if interference alignment can be accomplished in a manner that K/2 degrees of freedom may be achieved. We explore this issue by constructing an interference channel with non-zero channel coefficients that can achieve within a factor (1 ε) of upperbound of K/2 degrees of freedom. In the process, we demonstrate a new kind of interference alignment scheme, that is inspired by the deterministic channel model, but applicable to the AWGN interference network that we consider. We assume a transmit power contraint P at each transmitter so that: E[(X [j] ) 2 ] P The AWGN is normalized to have zero mean and unit variance. C(P ) is the sum capacity of the K user interference channel, and according to the definition in the previous section, the degrees of freedom are: D = lim P C(P ) 1 2 log(p ) The half in the denominator is because we are dealing with real signals only. For this channel model we have the following result: T heorem2 : Given any ε > 0, there exists a fully connected K-user Gaussian interference channel with constant and real coefficients that achieves K/2(1 ε) degrees of freedom. C. Single-source single-sink networks In this subsection, we determine the degrees of freedom for single-source single-sink networks. While for single-source single-sink networks with single-antennas, it is possible to attain the optimal degrees of freedom of 1 by activating one path between the source to the destination either using amplify-and-forward or a decode-and-forward strategy, the degrees of freedom optimal strategy becomes unclear when the number of antennas is greater than 1. Now we explain the amplify-and-forward strategy and the decode-and-forward strategy first. The amplify-and-forward strategy allows the relay station to amplify the received signal from the source node and to forward it to the destination station. The decode-and-forward strategy allows the relay station to

3 decode the received signal from the source node, re-encode it and forward it to the destination station. Now, consider, for example, a two-hop relay network in the absence of a direct link, where the source and sink have both n antennas and all the relays all have a single antenna. The optimal strategy is no longer to utilize one edge disjoint path at a time since the relay participating in the communication limits the degrees of freedom to 1. While this can be remedied by asking all relays to simultaneously forward their received data, for more-complicated multi-antenna networks, the optimal strategy is no longer obvious. T heorem3 : Given a single-source single-sink gaussian wireless network, with Rayleigh fading coefficients, the degrees of freedom of the network is given by D = min ω Ω Rank(H ω ) An amplify-and-forward strategy utilizing only linear transformations at the relays (that do not depend on the channel realization) is sufficient to achieve this degrees of freedom. IV. THE DEGREES OF FREEDOM IN WIRELESS NETWORKS In this section, we will explore some applications of the degrees of freedom and find out how some factors will influence the degree of freedom in wireless networks. A. Propagation delays and degrees of freedom We know that the degrees of freedom can be used to estimate the capacity of wireless networks, which is stated in the second section of this paper. Now we will discuss how can propagation delays influence the degrees of freedom. [26] First, we consider a K user interference network, i.e., an interference channel with K transmitters and K receivers. We write the signal input-output equations as: Y [i] (n) = n j=1 H[ij] X [j] (n) d [ij] + Z [i] (n) where at discrete time index n, Y [n] (n) is the received signal and Z [i] (n) is the additive noise at the ith receiver. X [j] (n) is the signal transmitted by the jth transmitter and H [ij] is the channel coefficient and d [ij] is the propagation delay between between transmitter j and receiver i. Note that this model assumes propagation delays are integer multiples of the basic symbol duration. Non-integer delays will be addressed subsequently in this work. If we set all delays d [ij] equal to zero, we obtain the classical Gaussian interference channel model. Now we discuss the impact on capacity of propagation. The question that we address is whether propagation delays can significantly impact the capacity of a wireless network. Indeed, for the two user Gaussian interference channel, one can verify that neither the innerbounds nor the outerbounds of Gaussian interference channel capacity are affected by the propagation delays. [25] Since the inner and outerbounds are shown to be within 1 bit of each other, one can conclude that propagation delays do not impact the capacity of the 2 user Gaussian interference channel by more than 1 bit. This observation suggests that perhaps propagation delays do not significantly impact the capacity of the Gaussian interference channel. However, as we show next through an example, this is not the case for more than 2 users. Consider a K user interference channel where all channel coefficients are equal to one and all propagation delays are equal to zero, i.e. H [i,j] = 1, n i,j = 0, i, j {1, 2,..., K}. On this interference channel, all receivers observe statistically equivalent signals. Therefore, if a message can be decoded by any receiver, it can be decoded by all receivers. Consequently, the sum capacity of this interference channel is the sum capacity of the multiple access channel from all transmitters to, say, receiver 1. This multiple access channel has only 1 degree of freedom, and therefore, the sum capacity of the interference channel is log(p ) + o(log(p )). Now, suppose with the same channel coefficients as before, we allow non-zero propagation delays. In particular, we assume: d [ij] mod2 = 0, i = j d [ij] mod2 = 1, i = j Thus, all desired signals arrive with an even propagation delay and all interfering signals arrive with an odd propagation delay at each receiver. On this interference channel, suppose all transmitters tranmit only over even time slots and are silent over odd time slots. Then, each receiver is able to hear his desired signals free of interference over the even time slots and all the interference is aligned over the odd time slots. Thus, even though all the channel coefficients are equal, this interference channel achieves a sum capacity of K/2 log(p )+ o(log(p )). We see through this example, that the presence of propagation delays can increase the degrees of freedom, and therefore the high SNR capacity by a factor of K/2 for the K user interference channel. B. Feedback, cooperation, relays, full duplex operation and the degrees of freedom In this subsection, we discuss how will feedback, cooperation, relays and full duplex operation influence the degrees of freedom in wireless networks. First, we generalize the interference network to the X network, a network where there is an independent message from every source node to every destination node. [3] It was shown that the S D X network - the X network with S source nodes and D destination nodes and messages - has a capacity of S+D 1 log(snr) + o(log(snr)), and it has S+D1 degrees of freedom. In order to discuss how will feedback, cooperation, relays and full duplex operation influence the degrees of freedom in

4 Fig. 1. The S R D network [20] wireless networks, we need to generalize the S D X network to the S R D network(figure 1). This network has S full duplex source nodes, R relays, D full-duplex destination nodes, perfect feedback to all source and relay nodes, noisy co-operation among all nodes. [20] The network is assumed to be fully connected, meaning that all channel gains are non-zero. The main result of this paper is that like S D X network, the S R D network also S+D1 has degrees of freedom. While, achievability follows trivially from the interference alignment based scheme of [3], the main contribution of [20] is the converse argument presented in Theorem 4 as follows. T heorem4 : Let D out = {[(d ij )] : (u, v) {1...S} {S + R + 1,..., S + R + D} S+R+D q=s+r+1 d q,u + S p=1 d v,p d v,u 1} Then D D out where D represents the degrees of freedom region of the S R D node X network. D out is the outerbounds. Furthermore, max [(dij)] D dij S+D 1 Equivalently, the sum-capacity C (ρ) may be expressed as C (ρ) = S+D 1 log(ρ) + o(log(ρ)) Therefore, in most cases, feedback, cooperation, relays and full duplex operation cannot increase the degrees of freedom in wireless networks. In other words, the search for improvements of the order of log(sn R) in most wireless networks ends in interference alignment. The techniques of relays, feedback to source/relay nodes, noisy co-operation and full-duplex operation can only improve the capacity upto a o(log(sn R)) term. There are, however, a few exceptions precluded by our system model where these techniques can improve the degrees of freedom. 1) Relays can improve the degrees of freedom if a network is not fully connected. 2) Co-operation can increase the degrees of freedom if the cost of co-operation is not accounted for (i.e. in genie aided networks). 3) Full duplex operation can increase the degrees of freedom if source nodes can also be destination nodes for other messages. 4) Feedback can improve the degrees of freedom if it is provided to a destination node, in which case, it behaves, in effect, like an extra antenna and can be used to null out the interference. C. Generalized degrees of freedom and interference alignment In this subsection, we will introduce the notion of generalized degrees of freedom first, and then discuss the role of interference alignment in wireless networks. Etkin, Tse, and Wang [25] introduced the notion of generalized degrees of freedom (GDOF) to study the performance of various interference management schemes. As its name suggests, the idea of GDOF is a generalization of the concept of degrees of freedom. Unlike the conventional degrees of freedom perspective where all signals are approximately equally strong in the db scale, the GDOF perspective provides a richer characterization by allowing the full range of relative signal strengths in the db scale. A useful technique in the characterization of the GDOF of a wireless network is the deterministic approach [5]. The deterministic approach essentially maps a Gaussian network to a deterministic channel, i.e, a channel whose outputs are deterministic functions of its inputs. The deterministic channel captures the essential structure of the Gaussian channel, but is significantly simpler to analyze. Reference [2] showed that the deterministic approach leads to a GDOF characterization of the 2-user interference network, which leads to a constant bit approximation of its capacity. The X channel is a generalization of the 2-user interference channel with 4 independent messages, one from each transmitter to each receiver. It is the smallest (in terms of the number of nodes) network where the newly discovered concept of interference alignment [19], [16] becomes relevant. Here we give the GDOF characterization for the X channel [21] and the interference channel [25] respectively. For the X channel, d(α) = lim sup ρ C (ρ,α) 1 2 log(ρ) where C (ρ, α) is the sum capacity of the X channel. Figure 2 is the 2-user Gaussian X channel, and the system model is

5 ACKNOWLEDGMENT I would like to thank Prof. Devroye for giving advice on this project. REFERENCES Fig user Gaussian X channel [21] Y 1 (t) = ρx 1 (t) + ρ α X 2 (t) + Z 1 (t) Y 2 (t) = ρ α X 1 (t) + ρx 2 (t) + Z 2 (t) where ρ, ρ α are the channel gain coefficients. For the interference channel, d(α) = lim sup SNR C (SNR,α) 1 2 log(snr) where C (SNR, α) is the sum capacity of the interference channel. In terms of GDOF, both the X channel and the interference channel perform equally well when interference alignment is not applicable. But when interference alignment is applicable, the X channel has larger GDOF and, therefore, higher capacity than the interference channel. V. CONCLUSION AND FUTURE WORK The area of degrees of freedom contains many open problems that appear to hold significant challenges. Now we state some interesting open questions. 1) Although we could use the degrees of freedom to estimate the capacity of certain channel, such as K user interferernce channel, the exact evaluation of capacity for the simplest relay networks remains open. 2) Another open question is although we know that in most cases, feedback, cooperation, relays and full duplex operation cannot increase the degrees of freedom of wireless networks, we could find some other techniques to improve the degrees of freedom. 3) We know that the distributed processing nature of the MIMO interference channel leads to the loss in the degrees of freedom. For example, while a (1, n, n, 1) interference channel has only one degrees of freedom, the point-to-point MIMO system with n + 1 antennas at both transmitter and receiver has 1 + n degrees of freedom. Although several researchers consider techniques such as user cooperation and cognitive message sharing to improve the degrees of freedom, [10]finding other techniques to compensate for the loss in degrees of freedom remains open. [1] Host-Madsen A. and Nosratinia A. The multiplexing gain of wireless networks. In Information Theory, ISIT Proceedings. International Symposium on 4-9 Sept. 2005, pages , [2] G. Bresler and D. Tse. The two-user gaussian interference channel: a deterministic view. Telecommunications, European Transactions, 19: , [3] Viveck Cadambe and Syed A. Jafar. Degrees of freedom of wireless x networks. In arxiv: [4] M. Costa. Writing on dirty paper. Information Theory, IEEE Transactions, 29: , [5] A. Avestimehr; S. Diggavi and D. Tse. A deterministic approach to wireless relay networks. In arxiv: [cs.it], Oct [6] A. S. Avestimehr; S. N. Diggavi and D. Tse. A deterministic approach to wireless relay networks. In Forty-Fifth Annual Allerton Conf., Sep 2007, [7] A. S. Avestimehr; S. N. Diggavi and D. Tse. Wireless network information flow. In Forty-Fifth Annual Allerton Conf., Sep 2007, [8] L. Hanlen and T. Abhayapala. Space-time-frequency degrees of freedom: Fundamental limits for spatial information. In arxiv:cs/ v1 [cs.it], [9] A. Host-Madsen. Capacity bounds for cooperative diversity. Information Theory, IEEE Transactions, 52: , [10] Chiachi Huang and Syed A. Jafar. Degrees of freedom of the mimo interference channel with cooperation and cognition. Information Theory, IEEE Transactions, 55: , [11] S. A. Jafar and M. Fakhereddin. Degrees of freedom on the mimo interference channel. In Information Theory, ISIT IEEE International Symposium on July. 2006, pages , [12] Viveck Cadambe; Syed A. Jafar and Shlomo Shamai. Interference alignment on the deterministic channel and application to fully connected awgn interference networks. In arxiv: [13] Zheng L. and Tse D. Packing spheres in the grassmann manifold: A geometric approach to the non-coherent multi-antenna channel. Information Theory, IEEE Transactions, 48: , [14] Zheng L. and Tse D. Diversity and multiplexing: A fundamental tradeoff in multiple-antenna channels. Information Theory, IEEE Transactions, 49: , [15] Godavarti M. and Hero A.O. III. Diversity and degrees of freedom in wireless communications. In IAcoustics, Speech, and Signal Processing, Proceedings. (ICASSP 02). IEEE International Conference on Volume 3, May 2002, pages , [16] M. Maddah-Ali; A. Motahari and A. Khandani. Communication over mimo x channels: interference alignment, decomposition, and performance analysis. Information Theory, IEEE Transactions, 54: , [17] Sreeram K.; Birenjith S.and Vijay Kumar P. Diversity and degrees of freedom of cooperative wireless networks. In Information Theory, ISIT IEEE International Symposium on 6-11 July 2008, pages , [18] Poon A.S.Y.; Brodersen R.W. and Tse D.N.C. Degrees of freedom in multiple-antenna channels: a signal space approach. Information Theory, IEEE Transactions, 51: , [19] Jafar S.A.and Shamai S. Degrees of freedom region of the mimo x channel. Information Theory, IEEE Transactions, 54: , [20] Cadambe V.R.and Jafar S.A. Can feedback, cooperation, relays and full duplex operation increase the degrees of freedom of wireless networks? In Information Theory, ISIT IEEE International Symposium on 6-11 July 2008, pages , [21] Huang C.; Cadambe V.R.and Jafar S.A. Interference alignment and the generalized degrees of freedom of the x channel. In Information Theory, ISIT IEEE International Symposium on June July , pages , [22] A. Lapidoth; S. Shamai (Shitz) and M.Wigger. A linear interference network with local side-information. In Information Theory, ISIT IEEE International Symposium on June. 2007, pages , 2007.

6 [23] H. Weingarten; S. Shamai (Shitz) and G. Kramer. On the compound mimo broadcast channel. In Proc. Annu. Information Theory and Applications Workshop UC, [24] Q. Spencer; A. Swindlehurst and M. Haardt. Zero-forcing methods for downlink spatial multiplexing in multiuser mimo channels. Signal Process, IEEE Transactions, 52: , [25] R. Etkin; D. Tse and H. Wang. Gaussian interference channel capacity to within one bit. Information Theory, IEEE Transactions, 54: , [26] Cadambe V.R. and Jafar S.A. Degrees of freedom of wireless networkswhat a difference delay makes. In Signals, Systems and Computers, ACSSC Conference Record of the Forty-First Asilomar Conference on 4-7 Nov. 2007, pages , [27] Cadambe V.R. and Jafar S.A. Interference alignment and degrees of freedom of the k-user interference channel. Information Theory, IEEE Transactions, 54: , [28] S. Borade; L. Zheng and R. Gallager. Amplify and forward in wireless relay networks: Rate, diversity and network size. Information Theory, IEEE Transactions, 53: , 2007.

THE problems of characterizing the fundamental limits

THE problems of characterizing the fundamental limits Beamforming and Aligned Interference Neutralization Achieve the Degrees of Freedom Region of the 2 2 2 MIMO Interference Network (Invited Paper) Chinmay S. Vaze and Mahesh K. Varanasi Abstract We study

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 8, AUGUST 2008 3425. 1 If the capacity can be expressed as C(SNR) =d log(snr)+o(log(snr))

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 8, AUGUST 2008 3425. 1 If the capacity can be expressed as C(SNR) =d log(snr)+o(log(snr)) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 8, AUGUST 2008 3425 Interference Alignment and Degrees of Freedom of the K-User Interference Channel Viveck R Cadambe, Student Member, IEEE, and Syed

More information

Interference Alignment and the Degrees of Freedom of Wireless X Networks

Interference Alignment and the Degrees of Freedom of Wireless X Networks Interference Alignment and the Degrees of Freedom of Wireless X Networs Vivec R. Cadambe, Syed A. Jafar Center for Pervasive Communications and Computing Electrical Engineering and Computer Science University

More information

Multiuser Communications in Wireless Networks

Multiuser Communications in Wireless Networks Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: antti.tolli@ee.oulu.fi, tel. +358445000180 Course period

More information

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel

Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student

More information

The Degrees of Freedom of Compute-and-Forward

The Degrees of Freedom of Compute-and-Forward The Degrees of Freedom of Compute-and-Forward Urs Niesen Jointly with Phil Whiting Bell Labs, Alcatel-Lucent Problem Setting m 1 Encoder m 2 Encoder K transmitters, messages m 1,...,m K, power constraint

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

Degrees of Freedom for MIMO Two-Way X Relay Channel

Degrees of Freedom for MIMO Two-Way X Relay Channel 1 Degrees of Freedom for MIMO Two-Way X Relay Channel Zhengzheng Xiang, Meixia Tao, Senior Member, IEEE, Jianhua Mo, and Xiaodong Wang, Fellow, IEEE Abstract We study the degrees of freedom (DOF) of a

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

Mobile Wireless Access via MIMO Relays

Mobile Wireless Access via MIMO Relays Mobile Wireless Access via MIMO Relays Tae Hyun Kim and Nitin H. Vaidya Dept. of Electrical and Computer Eng. Coordinated Science Laborartory University of Illinois at Urbana-Champaign, IL 680 Emails:

More information

On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSIT

On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSIT On the Degrees of Freedom of time correlated MISO broadcast channel with delayed CSI Mari Kobayashi, Sheng Yang SUPELEC Gif-sur-Yvette, France {mari.kobayashi, sheng.yang}@supelec.fr David Gesbert, Xinping

More information

The Cooperative DPC Rate Region And Network Power Allocation

The Cooperative DPC Rate Region And Network Power Allocation Power and Bandwidth Allocation in Cooperative Dirty Paper Coding Chris T. K. Ng, Nihar Jindal, Andrea J. Goldsmith and Urbashi Mitra Dept. of Electrical Engineering, Stanford University, Stanford, CA 94305

More information

On Secure Communication over Wireless Erasure Networks

On Secure Communication over Wireless Erasure Networks On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472

More information

Full- or Half-Duplex? A Capacity Analysis with Bounded Radio Resources

Full- or Half-Duplex? A Capacity Analysis with Bounded Radio Resources Full- or Half-Duplex? A Capacity Analysis with Bounded Radio Resources Vaneet Aggarwal AT&T Labs - Research, Florham Park, NJ 7932. vaneet@research.att.com Melissa Duarte, Ashutosh Sabharwal Rice University,

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

8 MIMO II: capacity and multiplexing

8 MIMO II: capacity and multiplexing CHAPTER 8 MIMO II: capacity and multiplexing architectures In this chapter, we will look at the capacity of MIMO fading channels and discuss transceiver architectures that extract the promised multiplexing

More information

Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks

Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks R.A. Raghuvir, Dinesh Rajan and M.D. Srinath Department of Electrical Engineering Southern Methodist University Dallas, TX

More information

On the Mobile Wireless Access via MIMO Relays

On the Mobile Wireless Access via MIMO Relays On the Mobile Wireless Access via MIMO Relays Tae Hyun Kim and Nitin H. Vaidya Dept. of Electrical and Computer Eng. Coordinated Science Laborartory University of Illinois at Urbana-Champaign, IL 6181

More information

4932 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 11, NOVEMBER 2009

4932 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 11, NOVEMBER 2009 4932 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 11, NOVEMBER 2009 The Degrees-of-Freedom of the K-User Gaussian Interference Channel Is Discontinuous at Rational Channel Coefficients Raúl H Etkin,

More information

Cooperative Communication in Wireless Networks

Cooperative Communication in Wireless Networks ADAPTIVE ANTENNAS AND MIMO SYSTEMS FOR WIRELESS COMMUNICATIONS Cooperative Communication in Wireless Networks Aria Nosratinia, University of Texas, Dallas, Todd E. Hunter, Nortel Networks Ahmadreza Hedayat,

More information

Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels

Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 5, MAY 2003 1073 Diversity Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels Lizhong Zheng, Member, IEEE, David N C Tse, Member, IEEE

More information

Department of Electrical Engineering, Pennsylvania State University, University Park PA.

Department of Electrical Engineering, Pennsylvania State University, University Park PA. Viveck R Cadambe E-mail: viveck@engr.psu.edu Phone no : +1-814-867-4774 http://www.ee.psu.edu/viveck/ Current Employment Assistant Professor Researcher Aug 2014 - Current Department of Electrical Engineering,

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

Wireless Networks with Symmetric Demands

Wireless Networks with Symmetric Demands Wireless Networks with Symmetric Demands Sudeep Kamath EECS Dept., UC Berkeley Berkeley, CA 94720 Email: sudeep@eecs.berkeley.edu Sreeram Kannan CSL and Dept. of ECE UIUC, IL 680 Email: kannan@illinois.edu

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis

Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Ahmed K. Sadek, K. J. Ray Liu, and Anthony Ephremides Department of Electrical and Computer Engineering, and Institute

More information

MIMO: What shall we do with all these degrees of freedom?

MIMO: What shall we do with all these degrees of freedom? MIMO: What shall we do with all these degrees of freedom? Helmut Bölcskei Communication Technology Laboratory, ETH Zurich June 4, 2003 c H. Bölcskei, Communication Theory Group 1 Attributes of Future Broadband

More information

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks

Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Mostafa Dehghan, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding Department of Electrical and Computer Engineering, University

More information

ALOHA Performs Delay-Optimum Power Control

ALOHA Performs Delay-Optimum Power Control ALOHA Performs Delay-Optimum Power Control Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu Abstract As

More information

Diversity and Degrees of Freedom in Wireless Communications

Diversity and Degrees of Freedom in Wireless Communications 1 Diversity and Degrees of Freedom in Wireless Communications Mahesh Godavarti Altra Broadband Inc., godavarti@altrabroadband.com Alfred O. Hero-III Dept. of EECS, University of Michigan hero@eecs.umich.edu

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Degrees of Freedom of the Interference Channel: a General Formula

Degrees of Freedom of the Interference Channel: a General Formula 0 IEEE International Symposium on Information Theory Proceedings Degrees of Freedom of the Interference Channel: a General Formula Yihong Wu Princeton University Princeton, NJ 08544, USA Email: yihongwu@princeton.edu

More information

Half-Duplex or Full-Duplex Relaying: A Capacity Analysis under Self-Interference

Half-Duplex or Full-Duplex Relaying: A Capacity Analysis under Self-Interference Half-Duplex or Full-Duplex elaying: A Capacity Analysis under Self-Interference Nirmal Shende Department of ECE, Polytechnic Institute of NYU Brooklyn, NY 0 Email: nvs5@students.poly.edu Ozgur Gurbuz Faculty

More information

How performance metrics depend on the traffic demand in large cellular networks

How performance metrics depend on the traffic demand in large cellular networks How performance metrics depend on the traffic demand in large cellular networks B. B laszczyszyn (Inria/ENS) and M. K. Karray (Orange) Based on joint works [1, 2, 3] with M. Jovanovic (Orange) Presented

More information

Alternative proof for claim in [1]

Alternative proof for claim in [1] Alternative proof for claim in [1] Ritesh Kolte and Ayfer Özgür Aydin The problem addressed in [1] is described in Section 1 and the solution is given in Section. In the proof in [1], it seems that obtaining

More information

Multiuser MIMO Beamforming with. Full-duplex Open-loop Training

Multiuser MIMO Beamforming with. Full-duplex Open-loop Training ultiuser IO Beamforming with 1 Full-duplex Open-loop raining Xu Du, John adrous, Chris Dick, and Ashutosh Sabharwal arxiv:1505.01746v1 [cs.i] 7 ay 2015 Abstract In this paper, full-duplex radios are used

More information

Division algebras for coding in multiple antenna channels and wireless networks

Division algebras for coding in multiple antenna channels and wireless networks Division algebras for coding in multiple antenna channels and wireless networks Frédérique Oggier frederique@systems.caltech.edu California Institute of Technology Cornell University, School of Electrical

More information

Coding and decoding with convolutional codes. The Viterbi Algor

Coding and decoding with convolutional codes. The Viterbi Algor Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition

More information

THE IMPACT OF IMPERFECT FEEDBACK ON THE CAPACITY OF WIRELESS NETWORKS

THE IMPACT OF IMPERFECT FEEDBACK ON THE CAPACITY OF WIRELESS NETWORKS THE IMPACT OF IMPERFECT FEEDBACK ON THE CAPACITY OF WIRELESS NETWORKS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for

More information

Capacity Limits of MIMO Systems

Capacity Limits of MIMO Systems 1 Capacity Limits of MIMO Systems Andrea Goldsmith, Syed Ali Jafar, Nihar Jindal, and Sriram Vishwanath 2 I. INTRODUCTION In this chapter we consider the Shannon capacity limits of single-user and multi-user

More information

WIRELESS communication channels have the characteristic

WIRELESS communication channels have the characteristic 512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed

More information

Cooperative Wireless Networks: From Radio to. Network Protocol Designs

Cooperative Wireless Networks: From Radio to. Network Protocol Designs Cooperative Wireless Networks: From Radio to 1 Network Protocol Designs Zhengguo Sheng, Zhiguo Ding, and Kin K Leung *Department of Electrical and Electronic Engineering, Imperial College, UK School of

More information

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING

ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA

More information

MIMO Antenna Systems in WinProp

MIMO Antenna Systems in WinProp MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011

More information

Achievable Strategies for General Secure Network Coding

Achievable Strategies for General Secure Network Coding Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

A Dynamic Clustering Approach in Wireless Networks with Multi-Cell Cooperative Processing

A Dynamic Clustering Approach in Wireless Networks with Multi-Cell Cooperative Processing A Dynamic Clustering Approach in Wireless Networks with Multi-Cell Cooperative Processing Agisilaos Papadogiannis, David Gesbert and Eric Hardouin France Telecom, Research & Development Division 38-40

More information

Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,

Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels, 203 IEEE. Reprinted, with permission, from Johannes Richter, Elke Franz, Sabrina Gerbracht, Stefan Pfennig, and Eduard A. Jorswieck, Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,

More information

Network Coding for Distributed Storage

Network Coding for Distributed Storage Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas

Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas Nihar Jindal ECE Department University of Minnesota nihar@umn.edu Jeffrey G. Andrews ECE Department University

More information

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2

INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena *1, K. Upendra Chowdary 2 ISSN 2277-2685 IJESR/June 2014/ Vol-4/Issue-6/333-337 Y. Naveena et al./ International Journal of Engineering & Science Research INTER CARRIER INTERFERENCE CANCELLATION IN HIGH SPEED OFDM SYSTEM Y. Naveena

More information

Transport Capacity Regions for Wireless Networks with Multi-User Links

Transport Capacity Regions for Wireless Networks with Multi-User Links Transport Capacity Regions for Wireless Networks with Multi-User Links Christian B. Peel, A. Lee Swindlehurst Brigham Young University Electrical & Computer Engineering Dept. CB, Provo, UT 60 chris.peel@ieee.org,

More information

CODED COOPERATION: A NEW FRAMEWORK FOR USER COOPERATION IN WIRELESS NETWORKS

CODED COOPERATION: A NEW FRAMEWORK FOR USER COOPERATION IN WIRELESS NETWORKS CODED COOPERATION: A NEW FRAMEWORK FOR USER COOPERATION IN WIRELESS NETWORKS APPROVED BY SUPERVISORY COMMITTEE: Dr. Aria Nosratinia, Chair Dr. Naofal Al-Dhahir Dr. John Fonseka Dr. Hlaing Minn Copyright

More information

Vector Bin-and-Cancel for MIMO Distributed Full-Duplex

Vector Bin-and-Cancel for MIMO Distributed Full-Duplex Vector Bin-and-Cancel for MIMO Distributed Full-Duplex Jingwen Bai, Chris Dick and Ashutosh Sabharwal, Fellow, IEEE 1 arxiv:1402.0614v3 [cs.it] 16 Jan 2015 Abstract In a multi-input multi-output (MIMO)

More information

Cloud Radios with Limited Feedback

Cloud Radios with Limited Feedback Cloud Radios with Limited Feedback Dr. Kiran Kuchi Indian Institute of Technology, Hyderabad Dr. Kiran Kuchi (IIT Hyderabad) Cloud Radios with Limited Feedback 1 / 18 Overview 1 Introduction 2 Downlink

More information

Cooperative Communications in. Mobile Ad-Hoc Networks: Rethinking

Cooperative Communications in. Mobile Ad-Hoc Networks: Rethinking Chapter 1 Cooperative Communications in Mobile Ad-Hoc Networks: Rethinking the Link Abstraction Anna Scaglione, Dennis L. Goeckel and J. Nicholas Laneman Cornell University, University of Massachusetts

More information

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System

Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source

More information

Secure Physical-layer Key Generation Protocol and Key Encoding in Wireless Communications

Secure Physical-layer Key Generation Protocol and Key Encoding in Wireless Communications IEEE Globecom Workshop on Heterogeneous, Multi-hop Wireless and Mobile Networks Secure Physical-layer ey Generation Protocol and ey Encoding in Wireless Communications Apirath Limmanee and Werner Henkel

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

PERFORMANCE ANALYSIS OF THRESHOLD BASED RELAY SELECTION TECHNIQUE IN COOPERATIVE WIRELESS NETWORKS

PERFORMANCE ANALYSIS OF THRESHOLD BASED RELAY SELECTION TECHNIQUE IN COOPERATIVE WIRELESS NETWORKS International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 7, Issue 1, Jan-Feb 2016, pp. 115-124, Article ID: IJECET_07_01_012 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=1

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Delayed Channel State Information: Incremental Redundancy with Backtrack Retransmission

Delayed Channel State Information: Incremental Redundancy with Backtrack Retransmission Delayed Channel State Information: Incremental Redundancy with Backtrack Retransmission Petar Popovski Department of Electronic Systems, Aalborg University Email: petarp@es.aau.dk Abstract In many practical

More information

Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels

Coding Schemes for a Class of Receiver Message Side Information in AWGN Broadcast Channels Coding Schemes for a Class of eceiver Message Side Information in AWG Broadcast Channels Behzad Asadi Lawrence Ong and Sarah J. Johnson School of Electrical Engineering and Computer Science The University

More information

Virtual MIMO Channels in Cooperative Multi-hop Wireless Sensor Networks

Virtual MIMO Channels in Cooperative Multi-hop Wireless Sensor Networks Virtual MIMO Channels in Cooperative Multi-hop Wireless Sensor Networks Aitor del Coso, Stefano Savazzi, Umberto Spagnolini and Christian Ibars Centre Tecnològic de Telecomunicacions de Catalunya CTTC)

More information

Performance Analysis over Slow Fading. Channels of a Half-Duplex Single-Relay. Protocol: Decode or Quantize and Forward

Performance Analysis over Slow Fading. Channels of a Half-Duplex Single-Relay. Protocol: Decode or Quantize and Forward Performance Analysis over Slow Fading 1 Channels of a Half-Duplex Single-Relay Protocol: Decode or Quantize and Forward Nassar Ksairi 1), Philippe Ciblat 2), Pascal Bianchi 2), Walid Hachem 2) Abstract

More information

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 12, DECEMBER 2012 3755. Design of Network Codes for Multiple-User Multiple-Relay Wireless Networks

IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 12, DECEMBER 2012 3755. Design of Network Codes for Multiple-User Multiple-Relay Wireless Networks IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 2, DECEMBER 202 3755 Design of Network Codes for Multiple-User Multiple-Relay Wireless Networks Ming Xiao, Member, IEEE, Jörg Kliewer, Senior Member, IEEE,

More information

IN current film media, the increase in areal density has

IN current film media, the increase in areal density has IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 1, JANUARY 2008 193 A New Read Channel Model for Patterned Media Storage Seyhan Karakulak, Paul H. Siegel, Fellow, IEEE, Jack K. Wolf, Life Fellow, IEEE, and

More information

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS 1. Bandwidth: The bandwidth of a communication link, or in general any system, was loosely defined as the width of

More information

Coded Bidirectional Relaying in Wireless Networks

Coded Bidirectional Relaying in Wireless Networks Coded Bidirectional Relaying in Wireless Networks Petar Popovski and Toshiaki Koike - Akino Abstract The communication strategies for coded bidirectional (two way) relaying emerge as a result of successful

More information

Performance of TD-CDMA systems during crossed slots

Performance of TD-CDMA systems during crossed slots Performance of TD-CDMA systems during s Jad NASREDDINE and Xavier LAGRANGE Multimedia Networks and Services Department, GET / ENST de Bretagne 2 rue de la châtaigneraie, CS 1767, 35576 Cesson Sévigné Cedex,

More information

Power Control is Not Required for Wireless Networks in the Linear Regime

Power Control is Not Required for Wireless Networks in the Linear Regime Power Control is Not Required for Wireless Networks in the Linear Regime Božidar Radunović, Jean-Yves Le Boudec School of Computer and Communication Sciences EPFL, Lausanne CH-1015, Switzerland Email:

More information

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p

T = 1 f. Phase. Measure of relative position in time within a single period of a signal For a periodic signal f(t), phase is fractional part t p Data Transmission Concepts and terminology Transmission terminology Transmission from transmitter to receiver goes over some transmission medium using electromagnetic waves Guided media. Waves are guided

More information

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System

A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: choiys@mobile.snu.ac.kr Illsoo Sohn Email: sohnis@mobile.snu.ac.kr Kwang Bok Lee Email: klee@snu.ac.kr Abstract

More information

A Framework for supporting VoIP Services over the Downlink of an OFDMA Network

A Framework for supporting VoIP Services over the Downlink of an OFDMA Network A Framework for supporting VoIP Services over the Downlink of an OFDMA Network Patrick Hosein Huawei Technologies Co., Ltd. 10180 Telesis Court, Suite 365, San Diego, CA 92121, US Tel: 858.882.0332, Fax:

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse

Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone

More information

BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK

BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK Nithin S. and M. Kannan Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai,

More information

Cooperative Communication for Spatial Frequency Reuse Multihop Wireless Networks under Slow Rayleigh Fading

Cooperative Communication for Spatial Frequency Reuse Multihop Wireless Networks under Slow Rayleigh Fading his full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Cooperative Communication for Spatial Frequency

More information

Solution of Linear Systems

Solution of Linear Systems Chapter 3 Solution of Linear Systems In this chapter we study algorithms for possibly the most commonly occurring problem in scientific computing, the solution of linear systems of equations. We start

More information

Bluetooth voice and data performance in 802.11 DS WLAN environment

Bluetooth voice and data performance in 802.11 DS WLAN environment 1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

LECTURE 4. Last time: Lecture outline

LECTURE 4. Last time: Lecture outline LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

I. INTRODUCTION. of the biometric measurements is stored in the database

I. INTRODUCTION. of the biometric measurements is stored in the database 122 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 6, NO 1, MARCH 2011 Privacy Security Trade-Offs in Biometric Security Systems Part I: Single Use Case Lifeng Lai, Member, IEEE, Siu-Wai

More information

Information Theory and Stock Market

Information Theory and Stock Market Information Theory and Stock Market Pongsit Twichpongtorn University of Illinois at Chicago E-mail: ptwich2@uic.edu 1 Abstract This is a short survey paper that talks about the development of important

More information

Wireless Network Coding with partial Overhearing information

Wireless Network Coding with partial Overhearing information Wireless network coding with partial overhearing information Georgios S. Paschos Massachusetts Institute of Technology (MIT) Joint work with: C. Fragkiadakis University of Thessaly, Greece L. Georgiadis

More information

Physical Layer Research Trends for 5G

Physical Layer Research Trends for 5G Physical Layer Research Trends for 5G Brett T. Walkenhorst, Ph.D. Principal Research Engineer, Georgia Tech Research Institute Adjunct Professor, Georgia Tech, School of Electrical and Computer Engineering

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications Physical Layer Security in Wireless Communications Dr. Zheng Chang Department of Mathematical Information Technology zheng.chang@jyu.fi Outline Fundamentals of Physical Layer Security (PLS) Coding for

More information

Voice Service Support over Cognitive Radio Networks

Voice Service Support over Cognitive Radio Networks Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,

More information