Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
|
|
|
- Kristian Hunt
- 10 years ago
- Views:
Transcription
1 Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Harish Viswanathan Lucent Technologies, Bell Labs Murray Hill, NJ Abstract Network coding has been shown to be useful for throughput and reliability in various network topologies, under a fixed-rate, point-to-multipoint wireless network model. We study the effect of introducing a wireless network model where link capacity depends on the network geometry and the signal to interference and noise ratio. In particular, we compare strategies with and without network coding on a multicast network with and without fading, and on single-user multiple path networks with fading. For the multicast network without fading, we find that the network geometry affects which scheme attains higher throughput. For the case with fading, we compare the throughput-outage probability curves achieved by network coding and repetition schemes. For the multiple path networks, we further consider the case where multiple simultaneous transmissions of identical information signals can be combined at a receiver. We find that the relative performance of the schemes we consider depends on the network geometry, the ratio of signal to noise power, whether multiple simultaneous transmissions can be combined, and the operating point on the throughput-outage probability curve. I. INTRODUCTION In this paper we examine the effect of network coding on throughput and outage probability in multi-hop wireless networks. Network coding has been shown to offer exciting advantages in throughput [1], reliability [] and distributed operation [3] for wired networks. These advantages have been translated into the wireless setting using simple fixed-rate, point-to-multipoint wireless link models, e.g. [4], [5], which generalize the wired model by including wireless multicast and interference-based restrictions on which subsets of links can be simultaneously activated. For more complex wireless models, it is not obvious when and to what extent such network coding advantages still apply. For instance, in a delay-constrained fading environment, a particular strategy gives a throughput-outage probability curve when different transmission rates are considered, whereas with a fixed transmission rate it gives a single point on the curve. In multiple path topologies, for a fixed link transmission rate, coding information across different paths gives a higher throughput but also higher outage probability compared to repeating the same information on each path. On the other hand, when the link transmission rate is not fixed, it is less clear how the throughput-outage curves of different coding strategies compare with repetition. Are some strategies always better than others, or if not, what affects their relative performance? These are among the questions are examined in this paper, which represents a first step towards understanding the wireless models and scenarios under which coding is useful in terms of throughput/reliability. More specifically, we take into account the dependence of link rates and outage probability on factors such as trasmission power and interference, and consider both the case of point-to-multipoint transmissions as well as the case where multiple transmissions of the same information can be combined at a node. For various wireless network configurations, we show how the usefulness of coding depends on factors such as the network geometry, the signal-to-noise ratio, whether multiple transmissions can be combined, and the operating point on the throughput-outage probability curve. II. WIRELESS NETWORK MODEL We consider a wireless network with a set V of nodes. Each node can transmit and receive wireless signals, but not simultaneously, i.e. we consider half-duplex operation. The distance between two nodes v 1,v V is denoted d v1v.we assume each node transmits at the same power P and has the same noise power σ. In this paper, we consider transmission schemes where each link transmits at a common (network dependent) rate R. Our wireless network model is similar to that in [6], but with the added consideration of interference and physical layer combining of identical information signals. In particular, we consider two types of wireless links: the first involves a single transmitter; the second involves multiple transmitters sending identical information signals. In both cases, all other simultaneous transmissions are treated as noise at each receiver. We do not consider joint design of physical layer code books across nodes or multiuser detection of different signals, which requires more complex receivers. In the remainder of this paper, the term coding refers to network coding, not to be confused with the physical layer coding on each link. A. Single transmitter link model Consider the simple four-node configuration in Fig 1(a), where two different signals are transmitted from A to B and from C to D, respectively, through the zero mean additive /06/$ IEEE 197
2 Fig. 1. Link Model with (a) Interference and (b) Physical Layer Combining white Gaussian noise (AWGN) channels. Following [6], the capacity for link AB is taken as: f AB P d C AB = log 1+ k AB (1) σ + fcb P where k is the propagation power loss exponent. Fadings are modeled as independent identically-distributed Rayleigh random variables with E[ f AB ] = E[ f CB ] = µ and cumulative density function (CDF) ( F f (x) =1 exp x ) (x >0) () µ 1. If d AC = d BC = d, then R 1 ) ) d k R 1 ) ) d k Rel = exp 1+ (7). If d AC d BC, then d k AC R 1 ) ) Rel = d k AC exp dk BC R 1 ) ) d k AC + exp (8) dk AC which reduces to Equation 7 when d AC d BC. III. COMPARISON FOR CODING AND NON-CODING SCHEMES Using this network model, we revisit three scenarios in which coding has previously been shown to be useful under a simpler point-to-multipoint fixed rate wireless network model. A. Multicast Network If R is the transmission rate, for channel AB: Pr(Outage AB ) f AB P = Pr log d 1+ k AB <R (3) σ + fcb P In this paper, we assume µ and k are the same for all links. We define = µp σ and reliability Rel AB = 1 Pr(Outage AB ). Integrating Equation 3 over the fading parameters, we get: Rel AB = exp dk AB R 1 ) ) + (4) dk AB (R 1) Similarly, if there is more than one interfering transmitter, the link reliability can be derived as: Rel = exp ( ( lk R 1 ) ) γ lk i (5) lk i + l k ( R 1) i=1 where l is the distance between the communicating nodes, l i is the distance between the receiver and the ith interfering transmitter, and γ is the number of interfering transmitters. B. Multi transmitter link model Now we consider physical layer combing of multiple identical signals. In Fig 1(b), two identical signals are transmitted from both A and B to C through AWGN channels. We approximate the link capacity by the matched filter bound: fac C comb = log 1+ d k + f BC ) ) P AC ση Similarly as above, we can obtain: (6) Fig.. Comparison for schemes with variable schedulings under Butterfly Structure by half-duplex constraint We first consider a multicast network shown in Fig, where node A multicasts the same information to nodes E and F. We compare four schemes: scheme 1 (non-coding, interference): In time slot 1, node A broadcasts to B and C. In slot, data is transmitted on links BE and CF. The throughput is R/, where R is the transmission rate on each link. scheme (non-coding, no interference): In slot 1, node A broadcasts to B and C. Data is transmitted on link BE in slot and on link CF in slot 3. The throughput is R/3. scheme 3 (coding, interference): In slot 1 node A transmits to B, and node C broadcasts to D and F; in slot node A transmits to C, and B broadcasts to D and E; in slot 3 data is transmitted on links DE and DF. The throughput is R/3. scheme 4 (coding, no interference): Data is transmitted on link AB in slot 1, and on link AC in slot. In slot 3, node B broadcasts to D and E; in slot 4, node C broadcasts to D and F. In slot 5, node D broadcasts to E and F. The throughput is R/5. 198
3 1) No fading case: Suppose f l = µ for all links l. For each scheme, we calculate the capacity of each link using Equation 1 and take the minimum over links as the common transmission rate R. As shown in Fig 3, the multicast throughputs achieved by the four schemes depends on the network geometry, which is parameterized by the distances a, a 1,a defined in Figure (b), as well as the. Fig. 5. The effect on reliability of modifying the geometry of the network of Fig. Here throughput = 0.4, a =1.6, k=3.5, = 800 ( 9dB). Fig. 3. The influence of network geometry and on the multicast throughput attained by non-coding and coding schemes in the no fading case. Here a = a 1 =1,k =. ) Delay-constrained fading case: Here we assume f l is distributed as in Equation for all links l. Using Equation 5, we calculate the reliability, i.e. probability that node E and F receive information successfully. The reliability-throughput tradeoff is shown in Fig 4. Fig 5 shows that for a fixed throughput, changing the network geometry changes the relative performance of the four schemes. Fig. 4. Reliability-throughput tradeoff for non-coding and coding schemes. Here a =1,k=, = 800 ( 9 db). B. Multiple path Network Next we consider a multiple path wireless network illustrated by Fig 6. We compare three schemes: coding scheme with interference, illustrated in Fig 6(a), where independent information transmitted on paths and the binary sum of corresponding data bits is transmitted on the third. Fig. 6. Illustration of multiple path wireless network for (a): coding scheme, for (b): repetition with combining, and for (c): repetition without combining. Here p=3. Links marked (i), (i =1,, 3) are active on i th slot (channel). For computational tractability, when calculating the outage probabilities of transmissions within the dashed box, we only integrate over the fading parameters of the channels within the box, and approximate the interference power due to transmitters outside the box by their mean values. repetition with combining, illustrated in Fig 6(b), where the same information is transmitted on each path, with physical layer combining of simultaneous transmissions of the same information. Simultaneous transmissions of different information are treated as noise. repetition without combining, illustrated in Fig 6(c), where the same information is transmitted on each path. Simultaneous transmissions are treated as interference Since the interference at the start and the end where the paths meet depends on the exact geometry and channel assignment, we focus on characterizing the middle section. We define the following variables: p is the number of timeslots (channels) used; l 1 is the length (number of links) of each of the three path segments; d is the distance between neighbor paths. The throughput of the coding scheme is R p and that of the repetition schemes is R p. For finite d (the distance between neighbor paths), the results are shown in Fig 7. We observe that the relative usefulness of coding and repetition depends on the operating point on the throughput-reliability curve: coding becomes relatively advantageous as throughput increases. Furthermore, increasing d and increases the range of reliability over which the coding scheme offers higher throughput. This is 199
4 Fig. 7. Reliability-throughput tradeoff for the multiple path network of Fig 6. Here (1) is for coding, () is for repetition with combining and (3) is for repetition without combining. l =1,k=.5, for (a): d =5.5, = 800; for (b) d =8, = 800; for (c): d =8, =40. because when d goes up, both the effects of physical layer combining and interference decrease, making coding more advantageous. When goes up, the reliability of both coding and repetition increases, shifting all the curves upwards. As d increases to, the transmission schemes reduce to the multiple path wireless network with interference only within a path. For this case, we consider the coding scheme and the repetition scheme with combining under different values of p, and l 1, showing our results in Figures 8 and 9. As before, we observe that coding is useful in high-throughput region, and can show the following asymptotic result: Proposition 1: For the multiple path network with d =, when throughput 0, Rel coding, Rel repetition 1 and Rel repetition >Rel coding ; when throughput, Rel coding, Rel repetition 0 and Rel coding >Rel repetition. Proof: From Equations 5, we have: 1. For repetition scheme: Pr succ (Tp)=exp ( α ( β Tp 1 )) γ lk i lk i=1 i + li k (β Tp 1) Rel =Pr 3 succ + 3Pr succ (1 Pr succ ) + 3Pr succ (1 Pr succ ) Fig. 8. Reliability-throughput tradeoff for multiple path wireless network. For coding scheme: where d =. Herel 1 =64,p=8,l=1,k=3, = 800. Pr succ (Tp)=exp ( α ( β Tp 1 )) γ lk i lk i + li k (β Tp 1) Rel = Pr 3 succ +3 Pr succ i=1 (1 Pr succ ) where Tp denotes throughput, α, β are certain positive coefficients. Rel, Rel are the network reliability, Pr succ, Prsucc are the success probabilities for each path. When Tp 0, using exp (x) x +1; x 1 (ln) x as x 0, weget: Pr succ (Tp) 1 λ Tp; Prsucc (Tp) 1 λ Tp Rel 1 (λ Tp) 3 ; Rel 1 3(λ Tp) where λ is a certain coefficient. So Rel, Rel 1, and since 3(λ Tp) > (λ Tp) 3 for sufficiently small Tp, Rel > Rel. When Tp, it is easy to note that Rel, Rel 0, and we find: Rel Rel µ exp ( α β Tp) 1 ( ) α β Tp ( exp µexp ( α β Tp) 0 β Tp ) 1 β Tp where µ is a certain positive coefficient, so Rel < Rel. Also, the range of reliability over which coding is advantageous increases as p and increase (see Fig 9(a) (b)), or as l 1 decreases (see Fig 9(c)), because reliability is generally improved. C. Generalized Multiple path Wireless Network Finally, we consider a wireless network with multiple groups of paths, where paths within a group are physically close together while paths in different groups are far apart. The results of the previous section show that it is advantageous to send the same information on the closely-spaced paths within a group to take advantage of physical layer combining. Here we investigate the benefit of coding across different groups of paths. Analogously to the previous section, we consider two transmission schemes for a simple network consisting of three widely-spaced groups of paths, illustrated in Fig 10, with negligible interference across groups: a coding scheme where independent information is transmitted on groups and the binary sum of corresponding data bits is transmitted on the third 00
5 Fig. 9. Influence of network geometry (p, l 1 ) and SNR on the reliability-throughput tradeoff. Here l =1,k=3,d= and (a): l 1 =64, = 800 (b): p =8,l 1 =3(c): p =8, = 800 a repetition scheme where the same information is transmitted on each path. By similar assumptions and calculations as for the previous section, we focus on the middle section and obtain the results in Fig 11. We observe that similar to the multiple path network of the previous section, for this network the coding scheme is advantageous for higher throughput values. However, compared to the multiple path network, for this network there is a larger range of reliability values over which the coding scheme gives higher throughput than the repetition scheme. Fig. 10. Illustration of a group of paths in a generalized multiple path wireless network consisting of three such groups of paths. The groups are spaced widely enough that interference between groups can be neglected. Links marked (i), (i =1, ) areactiveontheith slot (channel). Fig. 11. Comparison of coding and repetition for (a) the multiple path network of Fig 6 and (b) generalized multiple path wireless network of Fig 10. Here = 800, d=8,k=.5, l=1,p=,l 1 =6. networks: a multicast network with and without fading, and two multiple path networks with fading. For the multicast network without fading, we find that the network geometry and affect which schemes attain higher throughput. For the case with fading, we compare the throughput-outage probability curves. We see that the relative performance of the schemes we consider depend on the network geometry, the ratio of signal to noise power, whether multiple simultaneous transmissions can be combined, and the operating point on the throughput-outage probability curve. Our results suggest that for the kinds of transmission schemes we consider, where each link transmits at a common network dependent rate R, schemes with higher overall throughput relative to R are generally more useful in the higher throughput/lower reliability range, and less useful in the lower throughput/higher reliability range. Further work remains to characterize these relationships more precisely. In any case, network coding enlarges the set of possible transmission schemes and corresponding throughput-reliability trade-offs, and it is of interest to develop techniques for predicting the usefulness of different network coding schemes for given network scenarios. REFERENCES [1] R. Ahlswede, N. Cai, S.-Y.R. Li and R.W. Yeung, Network Information Flow, IEEE Transactions on Information Theory, Vol. 46, Page , 000. [] R. Koetter and M. Médard, An Algebraic Approach to Network Coding IEEE/ACM Transactions on Networking, October, 003. [3] T. Ho, R. Koetter, M. Médard, D. R. Karger and M. Effros, The Benefits of Coding over Routing in a Randomized Setting, Proceedings of IEEE International Symposium on Information Theory, July, 003. [4] D. Lun, M. Medard, T. Ho and R. Koetter, Network Coding with a Cost Criterion, MIT LIDS TECHNICAL REPORT P-584, 004. [5] Y. Wu, P. A. Chou, Q. Zhang, K. Jain, W. Zhu and S. Kung, Network Planning in Wireless Ad Hoc Networks: A Cross-Layer Approach IEEE Journal on Selected Areas in Communications, Special Issue on Wireless Ad Hoc Networks, January, 005. [6] E. Khandani, E. Modiano, J. Abounadi and L. Zheng, Reliability and Route Diversity in Wireless Networks, Proceedings of Conference on Information Sciences and Systems, March, 005. IV. CONCLUSION We have investigated the benefits of network coding for throughput and reliability using a wireless network model where link capacity depends on the network geometry and the signal to interference and noise ratio. In particular, we compare strategies with and without network coding on three 01
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
Network Monitoring in Multicast Networks Using Network Coding
Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: [email protected] Ben Leong, Yu-Han Chang, Yonggang Wen
IN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 341 Multinode Cooperative Communications in Wireless Networks Ahmed K. Sadek, Student Member, IEEE, Weifeng Su, Member, IEEE, and K.
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Performance Evaluation of Network Coding: Effects of Topology and Network Traffic for Linear and XOR Coding
JOURNAL OF COMMUNICATIONS, VOL., NO. 11, DECEMBER 9 88 Performance Evaluation of Network Coding: Effects of Topology and Network Traffic for Linear and XOR Coding Borislava Gajic, Janne Riihijärvi and
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
ALOHA Performs Delay-Optimum Power Control
ALOHA Performs Delay-Optimum Power Control Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu Abstract As
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
On the Multiple Unicast Network Coding Conjecture
On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel [email protected] Muriel Médard Research Laboratory of Electronics
WIRELESS communication channels have the characteristic
512 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 3, MARCH 2009 Energy-Efficient Decentralized Cooperative Routing in Wireless Networks Ritesh Madan, Member, IEEE, Neelesh B. Mehta, Senior Member,
Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks
Capacity of the Multiple Access Channel in Energy Harvesting Wireless Networks R.A. Raghuvir, Dinesh Rajan and M.D. Srinath Department of Electrical Engineering Southern Methodist University Dallas, TX
Cooperative Wireless Networks: From Radio to. Network Protocol Designs
Cooperative Wireless Networks: From Radio to 1 Network Protocol Designs Zhengguo Sheng, Zhiguo Ding, and Kin K Leung *Department of Electrical and Electronic Engineering, Imperial College, UK School of
A Practical Scheme for Wireless Network Operation
A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving
Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 2, FEBRUARY 2002 359 Communication on the Grassmann Manifold: A Geometric Approach to the Noncoherent Multiple-Antenna Channel Lizhong Zheng, Student
Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,
203 IEEE. Reprinted, with permission, from Johannes Richter, Elke Franz, Sabrina Gerbracht, Stefan Pfennig, and Eduard A. Jorswieck, Secret Key Generation from Reciprocal Spatially Correlated MIMO Channels,
Survey of Applications of Network Coding in Wired and Wireless Networks
Survey of Applications of Network Coding in Wired and Wireless Networks Zunnun Narmawala and Sanjay Srivastava Dhirubhai Ambani Institute of Information and Communication Technology Gandhinagar 382 007,
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Mostafa Dehghan, Dennis L. Goeckel, Majid Ghaderi, and Zhiguo Ding Department of Electrical and Computer Engineering, University
Diversity and Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 49, NO 5, MAY 2003 1073 Diversity Multiplexing: A Fundamental Tradeoff in Multiple-Antenna Channels Lizhong Zheng, Member, IEEE, David N C Tse, Member, IEEE
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
Coded Bidirectional Relaying in Wireless Networks
Coded Bidirectional Relaying in Wireless Networks Petar Popovski and Toshiaki Koike - Akino Abstract The communication strategies for coded bidirectional (two way) relaying emerge as a result of successful
CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CHARACTERIZING OF INFRASTRUCTURE BY KNOWLEDGE OF MOBILE HYBRID SYSTEM Mohammad Badruzzama Khan 1, Ayesha Romana 2, Akheel Mohammed
Weakly Secure Network Coding
Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this
Cooperative Communication for Spatial Frequency Reuse Multihop Wireless Networks under Slow Rayleigh Fading
his full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 211 proceedings Cooperative Communication for Spatial Frequency
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Path Loss Radio Wave Propagation The wireless radio channel puts fundamental limitations to the performance of wireless communications systems Radio channels are extremely random, and are not easily analyzed
Coding and decoding with convolutional codes. The Viterbi Algor
Coding and decoding with convolutional codes. The Viterbi Algorithm. 8 Block codes: main ideas Principles st point of view: infinite length block code nd point of view: convolutions Some examples Repetition
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
Secure Network Coding via Filtered Secret Sharing
Secure Network Coding via Filtered Secret Sharing Jon Feldman, Tal Malkin, Rocco Servedio, Cliff Stein (Columbia University) jonfeld@ieor, tal@cs, rocco@cs, cliff@ieor columbiaedu Feldman, Malkin, Servedio,
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 8, AUGUST 2008 3425. 1 If the capacity can be expressed as C(SNR) =d log(snr)+o(log(snr))
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 54, NO 8, AUGUST 2008 3425 Interference Alignment and Degrees of Freedom of the K-User Interference Channel Viveck R Cadambe, Student Member, IEEE, and Syed
You will need the following pieces of equipment to complete this experiment:
UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING The Edward S. Rogers Sr. Department of Electrical and Computer Engineering ECE422H1S: RADIO AND MICROWAVE WIRELESS SYSTEMS EXPERIMENT 3:
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
A REVIEW ON NETWORK CODING AND ITS APPLICATIONS IN WIRED AND WIRELESS NETWORKS
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 5, May 2014, 179-186 Impact Journals A REVIEW ON NETWORK CODING
The Effect of Network Cabling on Bit Error Rate Performance. By Paul Kish NORDX/CDT
The Effect of Network Cabling on Bit Error Rate Performance By Paul Kish NORDX/CDT Table of Contents Introduction... 2 Probability of Causing Errors... 3 Noise Sources Contributing to Errors... 4 Bit Error
Mobility Increases the Capacity of Ad Hoc Wireless Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 4, AUGUST 2002 477 Mobility Increases the Capacity of Ad Hoc Wireless Networks Matthias Grossglauser and David N. C. Tse Abstract The capacity of ad hoc
Power management of video transmission on wireless networks for multiple receivers
Power management of video transmission on wireless networks for multiple receivers Christos Bouras, Kostas Stamos and Giannis Zaoudis Research Academic Computer Technology Institute and Computer Engineering
Power Control is Not Required for Wireless Networks in the Linear Regime
Power Control is Not Required for Wireless Networks in the Linear Regime Božidar Radunović, Jean-Yves Le Boudec School of Computer and Communication Sciences EPFL, Lausanne CH-1015, Switzerland Email:
Kodo: An Open and Research Oriented Network Coding Library Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul
Aalborg Universitet Kodo: An Open and Research Oriented Network Coding Library Pedersen, Morten Videbæk; Heide, Janus; Fitzek, Frank Hanns Paul Published in: Lecture Notes in Computer Science DOI (link
1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
Multiuser Communications in Wireless Networks
Multiuser Communications in Wireless Networks Instructor Antti Tölli Centre for Wireless Communications (CWC), University of Oulu Contact e-mail: [email protected], tel. +358445000180 Course period
Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis
Cooperative Multiple Access for Wireless Networks: Protocols Design and Stability Analysis Ahmed K. Sadek, K. J. Ray Liu, and Anthony Ephremides Department of Electrical and Computer Engineering, and Institute
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding
Link Loss Inference in Wireless Sensor Networks with Randomized Network Coding Vahid Shah-Mansouri and Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British Columbia,
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
Digital Modulation. David Tipper. Department of Information Science and Telecommunications University of Pittsburgh. Typical Communication System
Digital Modulation David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh http://www.tele.pitt.edu/tipper.html Typical Communication System Source
Multihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
communication over wireless link handling mobile user who changes point of attachment to network
Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks
Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,
Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile Ad Hoc Networks
Topology-Transparent Distributed Multicast and Broadcast Scheduling in Mobile d Hoc Networks Yiming Liu, Victor O. K. Li, Ka-Cheong Leung, and Lin Zhang, Department of Electronic Engineering Tsinghua University,
Secure Network Coding for Wiretap Networks of Type II
1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
Efficient Load Balancing Routing in Wireless Mesh Networks
ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept
Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas
Rethinking MIMO for Wireless Networks: Linear Throughput Increases with Multiple Receive Antennas Nihar Jindal ECE Department University of Minnesota [email protected] Jeffrey G. Andrews ECE Department University
Enhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Selfish MAC Layer Misbehavior in Wireless Networks
1 Selfish MAC Layer Misbehavior in Wireless Networks Pradeep Kyasanur + and Nitin H. Vaidya This research was supported in part by UIUC Campus Research Board. This research was published in part at International
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
Capacity Limits of MIMO Channels
Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References
Mobility Increases the Capacity of Ad-hoc Wireless Networks
Mobility Increases the apacity of Ad-hoc Wireless Networks Matthias Grossglauser David Tse AT&T Labs- Research Department of EES 10 Park Avenue University of alifornia Florham Park NJ 07 Berkeley A 470
MULTIHOP cellular networks have been proposed as an
1206 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 7, SEPTEMBER 2004 On the Throughput Enhancement of the Downstream Channel in Cellular Radio Networks Through Multihop Relaying Jaeweon
Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding
International Journal of Emerging Trends in Engineering Research (IJETER), Vol. 3 No.6, Pages : 151-156 (2015) ABSTRACT Optimizing Congestion in Peer-to-Peer File Sharing Based on Network Coding E.ShyamSundhar
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
MIMO: What shall we do with all these degrees of freedom?
MIMO: What shall we do with all these degrees of freedom? Helmut Bölcskei Communication Technology Laboratory, ETH Zurich June 4, 2003 c H. Bölcskei, Communication Theory Group 1 Attributes of Future Broadband
A survey on Spectrum Management in Cognitive Radio Networks
A survey on Spectrum Management in Cognitive Radio Networks Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty Georgia Institute of Technology Communications Magazine, vol 46, April 2008,
Load Balancing Routing Algorithm for Data Gathering Sensor Network
Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum
is the power reference: Specifically, power in db is represented by the following equation, where P0 P db = 10 log 10
RF Basics - Part 1 This is the first article in the multi-part series on RF Basics. We start the series by reviewing some basic RF concepts: Decibels (db), Antenna Gain, Free-space RF Propagation, RF Attenuation,
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
OPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
IEEE 802.11 Ad Hoc Networks: Performance Measurements
IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: [email protected] E. Borgia, M. Conti, E.
File Sharing between Peer-to-Peer using Network Coding Algorithm
File Sharing between Peer-to-Peer using Network Coding Algorithm Rathod Vijay U. PG Student, MBES College Of Engineering, Ambajogai V.R. Chirchi PG Dept, MBES College Of Engineering, Ambajogai ABSTRACT
Two-slot Channel Estimation for Analog Network Coding Based on OFDM in a Frequency-selective Fading Channel
Two-slot Channel Estimation for Analog Network Coding Bed on OFDM in a Frequency-selective Fading Channel Tom Sjödin Department of Computing Science Umeå University SE-901 87 Umeå Sweden Haris Gacanin
Implementation of Digital Signal Processing: Some Background on GFSK Modulation
Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering [email protected] Version 4 (February 7, 2013)
Cooperative Communications in. Mobile Ad-Hoc Networks: Rethinking
Chapter 1 Cooperative Communications in Mobile Ad-Hoc Networks: Rethinking the Link Abstraction Anna Scaglione, Dennis L. Goeckel and J. Nicholas Laneman Cornell University, University of Massachusetts
Performance Evaluation of The Split Transmission in Multihop Wireless Networks
Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr
System Design in Wireless Communication. Ali Khawaja
System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing
IN current film media, the increase in areal density has
IEEE TRANSACTIONS ON MAGNETICS, VOL. 44, NO. 1, JANUARY 2008 193 A New Read Channel Model for Patterned Media Storage Seyhan Karakulak, Paul H. Siegel, Fellow, IEEE, Jack K. Wolf, Life Fellow, IEEE, and
Degrees of Freedom in Wireless Networks
Degrees of Freedom in Wireless Networks Zhiyu Cheng Department of Electrical and Computer Engineering University of Illinois at Chicago Chicago, IL 60607, USA Email: [email protected] Abstract This paper
Optimizing the SINR operating point of spatial networks
Optimizing the SIR operating point of spatial networks ihar Jindal ECE Department University of Minnesota [email protected] Jeffrey G. Andrews ECE Department University of Texas at Austin [email protected]
Physical Layer Security in Wireless Communications
Physical Layer Security in Wireless Communications Dr. Zheng Chang Department of Mathematical Information Technology [email protected] Outline Fundamentals of Physical Layer Security (PLS) Coding for
Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks
Optimal Multicast in Dense Multi-Channel Multi-Radio Wireless Networks Rahul Urgaonkar IBM TJ Watson Research Center Yorktown Heights, NY 10598 Email: [email protected] Prithwish Basu and Saikat Guha
NEW applications of wireless multi-hop networks, such
870 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 3, JUNE 2009 Delay Aware Link Scheduling for Multi-Hop TDMA Wireless Networks Petar Djukic, Member, IEEE, and Shahrokh Valaee, Senior Member, IEEE
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
5 Signal Design for Bandlimited Channels
225 5 Signal Design for Bandlimited Channels So far, we have not imposed any bandwidth constraints on the transmitted passband signal, or equivalently, on the transmitted baseband signal s b (t) I[k]g
