218 research outputs found

    Spatial Interference Cancelation for Mobile Ad Hoc Networks: Perfect CSI

    Full text link
    Interference between nodes directly limits the capacity of mobile ad hoc networks. This paper focuses on spatial interference cancelation with perfect channel state information (CSI), and analyzes the corresponding network capacity. Specifically, by using multiple antennas, zero-forcing beamforming is applied at each receiver for canceling the strongest interferers. Given spatial interference cancelation, the network transmission capacity is analyzed in this paper, which is defined as the maximum transmitting node density under constraints on outage and the signal-to-interference-noise ratio. Assuming the Poisson distribution for the locations of network nodes and spatially i.i.d. Rayleigh fading channels, mathematical tools from stochastic geometry are applied for deriving scaling laws for transmission capacity. Specifically, for small target outage probability, transmission capacity is proved to increase following a power law, where the exponent is the inverse of the size of antenna array or larger depending on the pass loss exponent. As shown by simulations, spatial interference cancelation increases transmission capacity by an order of magnitude or more even if only one extra antenna is added to each node.Comment: 6 pages; submitted to IEEE Globecom 200

    Airborne Directional Networking: Topology Control Protocol Design

    Get PDF
    This research identifies and evaluates the impact of several architectural design choices in relation to airborne networking in contested environments related to autonomous topology control. Using simulation, we evaluate topology reconfiguration effectiveness using classical performance metrics for different point-to-point communication architectures. Our attention is focused on the design choices which have the greatest impact on reliability, scalability, and performance. In this work, we discuss the impact of several practical considerations of airborne networking in contested environments related to autonomous topology control modeling. Using simulation, we derive multiple classical performance metrics to evaluate topology reconfiguration effectiveness for different point-to-point communication architecture attributes for the purpose of qualifying protocol design elements

    Enhancing Secrecy with Multi-Antenna Transmission in Wireless Ad Hoc Networks

    Full text link
    We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of the outage performance of the legitimate communication and the eavesdropping links. We then investigate the networkwide secrecy throughput performance of both schemes in terms of the secrecy transmission capacity, and study the optimal power allocation between the information signal and the artificial noise. Our analysis indicates that, under transmit power optimization, the beamforming scheme outperforms the sectoring scheme, except for the case where the number of transmit antennas are sufficiently large. Our study also reveals some interesting differences between the optimal power allocation for the sectoring and beamforming schemes.Comment: to appear in IEEE Transactions on Information Forensics and Securit

    Cross-layer design of multi-hop wireless networks

    Get PDF
    MULTI -hop wireless networks are usually defined as a collection of nodes equipped with radio transmitters, which not only have the capability to communicate each other in a multi-hop fashion, but also to route each others’ data packets. The distributed nature of such networks makes them suitable for a variety of applications where there are no assumed reliable central entities, or controllers, and may significantly improve the scalability issues of conventional single-hop wireless networks. This Ph.D. dissertation mainly investigates two aspects of the research issues related to the efficient multi-hop wireless networks design, namely: (a) network protocols and (b) network management, both in cross-layer design paradigms to ensure the notion of service quality, such as quality of service (QoS) in wireless mesh networks (WMNs) for backhaul applications and quality of information (QoI) in wireless sensor networks (WSNs) for sensing tasks. Throughout the presentation of this Ph.D. dissertation, different network settings are used as illustrative examples, however the proposed algorithms, methodologies, protocols, and models are not restricted in the considered networks, but rather have wide applicability. First, this dissertation proposes a cross-layer design framework integrating a distributed proportional-fair scheduler and a QoS routing algorithm, while using WMNs as an illustrative example. The proposed approach has significant performance gain compared with other network protocols. Second, this dissertation proposes a generic admission control methodology for any packet network, wired and wireless, by modeling the network as a black box, and using a generic mathematical 0. Abstract 3 function and Taylor expansion to capture the admission impact. Third, this dissertation further enhances the previous designs by proposing a negotiation process, to bridge the applications’ service quality demands and the resource management, while using WSNs as an illustrative example. This approach allows the negotiation among different service classes and WSN resource allocations to reach the optimal operational status. Finally, the guarantees of the service quality are extended to the environment of multiple, disconnected, mobile subnetworks, where the question of how to maintain communications using dynamically controlled, unmanned data ferries is investigated

    Power-based topology control for mobile ad hoc networks

    Get PDF

    Connectivity, throughput, and end-to-end latency in infrastructureless wireless Networks with beamforming-enabled devices

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 181-188).Infrastructureless wireless networks are an important class of wireless networks best fitted to operational situations with temporary, localized demand for communication ability. These networks are composed of wireless communication devices that autonomously form a network without the need for pre-deployed infrastructure such as wireless base-stations and access points. Significant research and development has been devoted to mobile ad hoc wireless networks (MANETs) in the past decade, a particular infrastructureless wireless network architecture. While MANETs are capable of autonomous network formation and multihop routing, the practical adoption of this technology has been limited since these networks are not designed to support more than about thirty users or to provide the quality of service (QoS) assurance required by many of the envisioned driving applications for infrastructureless wireless networks. In particular, communication during disaster relief efforts or tactical military operations requires guaranteed network service capabilities for mission-critical, time-sensitive data and applications. MANETs may be frequently disconnected due to device mobility and mismatches between routing and transport layer protocols, making them unsuitable for these scenarios. Network connectivity is fundamentally important to a network designed to provide QoS guarantees to the end-user. Without network connectivity, at least one pair of devices in the network experiences zero sustainable data rate and infinite end-to-end message delay, a catastrophic condition during a search and rescue mission or in a battlefield. We consider the use of wireless devices equipped with beamforming-enabled antennas to expand deployment regimes in which there is a high probability of instantaneous connectivity and desirable network scalability. Exploiting the increased communication reach of directional antennas and electronic beam steering techniques in fixed rate systems, we characterize the probability of instantaneous connectivity for a finite number of nodes operating in a bounded region and identify required conditions to achieve an acceptably high probability of connectivity. Our analysis shows significant improvements to highly-connected regimes of operation with added antenna directivity. Following the characterization of instantaneous network connectivity, we analyze the achievable network throughput and scalability of both fixed and variable rate beamforming-enabled power-limited networks operating in a bounded region. Our study of the scaling behavior of the network is concerned with three QoS metrics of central importance for a system designed to provide service assurance to the end-user: achievable throughput, end-to-end delay (which we quantify as the number of end-to-end hops), and network energy consumption. We find that the infrastructureless wireless network can achieve scalable performance that is independent of end-user device density with high probability, as well as identify the existence of a system characteristic hopping distance for routing schemes that attain this scaling-optimal behavior. Our results also reveal achievable QoS performance gains from the inclusion of antenna directivity. Following these insights, we develop a scalable, heuristic geographic routing algorithm using device localization information and the characteristic hopping distance guideline that achieves sub-optimal but high network throughput in simulation.by Matthew F. Carey.S.M

    Multi-layer Utilization of Beamforming in Millimeter Wave MIMO Systems

    Get PDF
    mmWave frequencies ranging between (30-300GHz) have been considered the perfect solution to the scarcity of bandwidth in the traditional sub-6GHz band and to the ever increasing demand of many emerging applications in today\u27s era. 5G and beyond standards are all considering the mmWave as an essential part of there networks. Beamforming is one of the most important enabling technologies for the mmWave to compensate for the huge propagation lose of these frequencies compared to the sub-6GHz frequencies and to ensure better spatial and spectral utilization of the mmWave channel space. In this work, we tried to develop different techniques to improve the performance of the systems that use mmWave. In the physical layer, we suggested several hybrid beamforming architectures that both are relatively simple and spectrally efficient by achieving fully digital like spectral efficiency (bits/sec/Hz). For the mobility management, we derived the expected degradation that can affect the performance of a special type of beamforming that is called the Random Beamforming (RBF) and optimized the tunable parameters for such systems when working in different environments. Finally, in the networking layer, we first studied the effect of using mmWave frequencies on the routing performance comparing to the performance achieved when using sub-6 GHz frequencies. Then we developed a novel opportunistic routing protocol for Mobile Ad-Hoc Networks (MANET) that uses a modified version of the Random Beamforming (RBF) to achieve better end to end performance and to reduce the overall delay in delivering data from transmitting nodes to the intended receiving nodes. From all these designs and studies, we conclude that mmWave frequencies and their enabling technologies (i.e. Beamforming, massive MIMO, ...etc.) are indeed the future of wireless communicatons in a high demanding world of Internet of Things (IoT), Augmented Reality (AR), Virtual Reality (VR), and self driving cars

    Enhancing secrecy with multi-antenna transmission in wireless ad hoc networks

    No full text
    We study physical-layer security in wireless ad hoc networks and investigate two types of multi-antenna transmission schemes for providing secrecy enhancements. To establish secure transmission against malicious eavesdroppers, we consider the generation of artificial noise with either sectoring or beamforming. For both approaches, we provide a statistical characterization and tradeoff analysis of the outage performance of the legitimate communication and the eavesdropping links. We then investigate the network-wide secrecy throughput performance of both schemes in terms of the secrecy transmission capacity, and study the optimal power allocation between the information signal and the artificial noise. Our analysis indicates that, under transmit power optimization, the beamforming scheme outperforms the sectoring scheme, except for the case where the number of transmit antennas are sufficiently large. Our study also reveals some interesting differences between the optimal power allocation for the sectoring and beamforming schemes.The work of X. Zhang andM. R.McKay was supported by the Hong Kong Research Grants Council under Grant 616312. The work of X. Zhou was supported by the Australian Research Council's Discovery Projects funding scheme under Project DP11010254
    • …
    corecore