15,709 research outputs found
Optimal relay location and power allocation for low SNR broadcast relay channels
We consider the broadcast relay channel (BRC), where a single source
transmits to multiple destinations with the help of a relay, in the limit of a
large bandwidth. We address the problem of optimal relay positioning and power
allocations at source and relay, to maximize the multicast rate from source to
all destinations. To solve such a network planning problem, we develop a
three-faceted approach based on an underlying information theoretic model,
computational geometric aspects, and network optimization tools. Firstly,
assuming superposition coding and frequency division between the source and the
relay, the information theoretic framework yields a hypergraph model of the
wideband BRC, which captures the dependency of achievable rate-tuples on the
network topology. As the relay position varies, so does the set of hyperarcs
constituting the hypergraph, rendering the combinatorial nature of optimization
problem. We show that the convex hull C of all nodes in the 2-D plane can be
divided into disjoint regions corresponding to distinct hyperarcs sets. These
sets are obtained by superimposing all k-th order Voronoi tessellation of C. We
propose an easy and efficient algorithm to compute all hyperarc sets, and prove
they are polynomially bounded. Using the switched hypergraph approach, we model
the original problem as a continuous yet non-convex network optimization
program. Ultimately, availing on the techniques of geometric programming and
-norm surrogate approximation, we derive a good convex approximation. We
provide a detailed characterization of the problem for collinearly located
destinations, and then give a generalization for arbitrarily located
destinations. Finally, we show strong gains for the optimal relay positioning
compared to seemingly interesting positions.Comment: In Proceedings of INFOCOM 201
Hybrid Beamforming for Large Antenna Arrays with Phase Shifter Selection
This paper proposes an asymptotically optimal hybrid beamforming solution for
large antenna arrays by exploiting the properties of the singular vectors of
the channel matrix. It is shown that the elements of the channel matrix with
Rayleigh fading follow a normal distribution when large antenna arrays are
employed. The proposed beamforming algorithm is effective in both sparse and
rich propagation environments, and is applicable for both point-to-point and
multiuser scenarios. In addition, a closed-form expression and a lower-bound
for the achievable rates are derived when analog and digital phase shifters are
employed. It is shown that the performance of the hybrid beamformers using
phase shifters with more than 2-bits resolution is comparable with analog phase
shifting. A novel phase shifter selection scheme that reduces the power
consumption at the phase shifter network is proposed when the wireless channel
is modeled by Rayleigh fading. Using this selection scheme, the spectral
efficiency can be increased as the power consumption in the phase shifter
network reduces. Compared to the scenario that all of the phase shifters are in
operation, the simulation results indicate that the spectral efficiency
increases when up to 50% of phase shifters are turned off.Comment: Accepted to Transactions on Wireless Communications, 201
Applications of Geometric Algorithms to Reduce Interference in Wireless Mesh Network
In wireless mesh networks such as WLAN (IEEE 802.11s) or WMAN (IEEE 802.11),
each node should help to relay packets of neighboring nodes toward gateway
using multi-hop routing mechanisms. Wireless mesh networks usually intensively
deploy mesh nodes to deal with the problem of dead spot communication. However,
the higher density of nodes deployed, the higher radio interference occurred.
This causes significant degradation of system performance. In this paper, we
first convert network problems into geometry problems in graph theory, and then
solve the interference problem by geometric algorithms. We first define line
intersection in a graph to reflect radio interference problem in a wireless
mesh network. We then use plan sweep algorithm to find intersection lines, if
any; employ Voronoi diagram algorithm to delimit the regions among nodes; use
Delaunay Triangulation algorithm to reconstruct the graph in order to minimize
the interference among nodes. Finally, we use standard deviation to prune off
those longer links (higher interference links) to have a further enhancement.
The proposed hybrid solution is proved to be able to significantly reduce
interference in a wireless mesh network in O(n log n) time complexity.Comment: 24 Pages, JGraph-Hoc Journal 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Analyzing wireless communication network vulnerability with homological invariants
This article explains how sheaves and homology theory can be applied to
simplicial complex models of wireless communication networks to study their
vulnerability to jamming. It develops two classes of invariants (one local and
one global) for studying which nodes and links present more of a liability to
the network's performance when under attack.Comment: Submitted to ICASSP 201
- …