258 research outputs found
Interference in Poisson Networks with Isotropically Distributed Nodes
Practical wireless networks are finite, and hence non-stationary with nodes
typically non-homo-geneously deployed over the area. This leads to a
location-dependent performance and to boundary effects which are both often
neglected in network modeling. In this work, interference in networks with
nodes distributed according to an isotropic but not necessarily stationary
Poisson point process (PPP) are studied. The resulting link performance is
precisely characterized as a function of (i) an arbitrary receiver location and
of (ii) an arbitrary isotropic shape of the spatial distribution. Closed-form
expressions for the first moment and the Laplace transform of the interference
are derived for the path loss exponents and , and simple
bounds are derived for other cases. The developed model is applied to practical
problems in network analysis: for instance, the accuracy loss due to neglecting
border effects is shown to be undesirably high within transition regions of
certain deployment scenarios. Using a throughput metric not relying on the
stationarity of the spatial node distribution, the spatial throughput locally
around a given node is characterized.Comment: This work was presented in part at ISIT 201
Mobility Increases the Data Offloading Ratio in D2D Caching Networks
Caching at mobile devices, accompanied by device-to-device (D2D)
communications, is one promising technique to accommodate the exponentially
increasing mobile data traffic. While most previous works ignored user
mobility, there are some recent works taking it into account. However, the
duration of user contact times has been ignored, making it difficult to
explicitly characterize the effect of mobility. In this paper, we adopt the
alternating renewal process to model the duration of both the contact and
inter-contact times, and investigate how the caching performance is affected by
mobility. The data offloading ratio, i.e., the proportion of requested data
that can be delivered via D2D links, is taken as the performance metric. We
first approximate the distribution of the communication time for a given user
by beta distribution through moment matching. With this approximation, an
accurate expression of the data offloading ratio is derived. For the
homogeneous case where the average contact and inter-contact times of different
user pairs are identical, we prove that the data offloading ratio increases
with the user moving speed, assuming that the transmission rate remains the
same. Simulation results are provided to show the accuracy of the approximate
result, and also validate the effect of user mobility.Comment: 6 pages, 5 figures, accepted to IEEE Int. Conf. Commun. (ICC), Paris,
France, May 201
Modeling Network Interference in the Angular Domain: Interference Azimuth Spectrum
published_or_final_versio
Coexistence of RF-powered IoT and a Primary Wireless Network with Secrecy Guard Zones
This paper studies the secrecy performance of a wireless network (primary
network) overlaid with an ambient RF energy harvesting IoT network (secondary
network). The nodes in the secondary network are assumed to be solely powered
by ambient RF energy harvested from the transmissions of the primary network.
We assume that the secondary nodes can eavesdrop on the primary transmissions
due to which the primary network uses secrecy guard zones. The primary
transmitter goes silent if any secondary receiver is detected within its guard
zone. Using tools from stochastic geometry, we derive the probability of
successful connection of the primary network as well as the probability of
secure communication. Two conditions must be jointly satisfied in order to
ensure successful connection: (i) the SINR at the primary receiver is above a
predefined threshold, and (ii) the primary transmitter is not silent. In order
to ensure secure communication, the SINR value at each of the secondary nodes
should be less than a predefined threshold. Clearly, when more secondary nodes
are deployed, more primary transmitters will remain silent for a given guard
zone radius, thus impacting the amount of energy harvested by the secondary
network. Our results concretely show the existence of an optimal deployment
density for the secondary network that maximizes the density of nodes that are
able to harvest sufficient amount of energy. Furthermore, we show the
dependence of this optimal deployment density on the guard zone radius of the
primary network. In addition, we show that the optimal guard zone radius
selected by the primary network is a function of the deployment density of the
secondary network. This interesting coupling between the two networks is
studied using tools from game theory. Overall, this work is one of the few
concrete works that symbiotically merge tools from stochastic geometry and game
theory
Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks
Future wireless networks have a substantial potential in terms of supporting
a broad range of complex compelling applications both in military and civilian
fields, where the users are able to enjoy high-rate, low-latency, low-cost and
reliable information services. Achieving this ambitious goal requires new radio
techniques for adaptive learning and intelligent decision making because of the
complex heterogeneous nature of the network structures and wireless services.
Machine learning (ML) algorithms have great success in supporting big data
analytics, efficient parameter estimation and interactive decision making.
Hence, in this article, we review the thirty-year history of ML by elaborating
on supervised learning, unsupervised learning, reinforcement learning and deep
learning. Furthermore, we investigate their employment in the compelling
applications of wireless networks, including heterogeneous networks (HetNets),
cognitive radios (CR), Internet of things (IoT), machine to machine networks
(M2M), and so on. This article aims for assisting the readers in clarifying the
motivation and methodology of the various ML algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.Comment: 46 pages, 22 fig
- …