3,662 research outputs found
Sharing the cost of multicast transmissions in wireless networks
AbstractA crucial issue in non-cooperative wireless networks is that of sharing the cost of multicast transmissions to different users residing at the stations of the network. Each station acts as a selfish agent that may misreport its utility (i.e., the maximum cost it is willing to incur to receive the service, in terms of power consumption) in order to maximize its individual welfare, defined as the difference between its true utility and its charged cost. A provider can discourage such deceptions by using a strategyproof cost sharing mechanism, that is a particular public algorithm that, by forcing the agents to truthfully reveal their utility, starting from the reported utilities, decides who gets the service (the receivers) and at what price. A mechanism is said budget balanced (BB) if the receivers pay exactly the (possibly minimum) cost of the transmission, and β-approximate budget balanced (β-BB) if the total cost charged to the receivers covers the overall cost and is at most β times the optimal one, while it is efficient if it maximizes the sum of the receivers’ utilities minus the total cost over all receivers’ sets. In this paper, we first investigate cost sharing strategyproof mechanisms for symmetric wireless networks, in which the powers necessary for exchanging messages between stations may be arbitrary and we provide mechanisms that are either efficient or BB when the power assignments are induced by a fixed universal spanning tree, or (3ln(k+1))-BB (k is the number of receivers), otherwise. Then we consider the case in which the stations lay in a d-dimensional Euclidean space and the powers fall as 1/dα, and provide strategyproof mechanisms that are either 1-BB or efficient for α=1 or d=1. Finally, we show the existence of 2(3d-1)-BB strategyproof mechanisms in any d-dimensional space for every α⩾d. For the special case of d=2 such a result can be improved to achieve 12-BB mechanisms
Scalability of broadcast performance in wireless network-on-chip
Networks-on-Chip (NoCs) are currently the paradigm of choice to interconnect the cores of a chip multiprocessor. However, conventional NoCs may not suffice to fulfill the on-chip communication requirements of processors with hundreds or thousands of cores. The main reason is that the performance of such networks drops as the number of cores grows, especially in the presence of multicast and broadcast traffic. This not only limits the scalability of current multiprocessor architectures, but also sets a performance wall that prevents the development of architectures that generate moderate-to-high levels of multicast. In this paper, a Wireless Network-on-Chip (WNoC) where all cores share a single broadband channel is presented. Such design is conceived to provide low latency and ordered delivery for multicast/broadcast traffic, in an attempt to complement a wireline NoC that will transport the rest of communication flows. To assess the feasibility of this approach, the network performance of WNoC is analyzed as a function of the system size and the channel capacity, and then compared to that of wireline NoCs with embedded multicast support. Based on this evaluation, preliminary results on the potential performance of the proposed hybrid scheme are provided, together with guidelines for the design of MAC protocols for WNoC.Peer ReviewedPostprint (published version
Fundamental Limits of Caching with Secure Delivery
Caching is emerging as a vital tool for alleviating the severe capacity
crunch in modern content-centric wireless networks. The main idea behind
caching is to store parts of popular content in end-users' memory and leverage
the locally stored content to reduce peak data rates. By jointly designing
content placement and delivery mechanisms, recent works have shown order-wise
reduction in transmission rates in contrast to traditional methods. In this
work, we consider the secure caching problem with the additional goal of
minimizing information leakage to an external wiretapper. The fundamental cache
memory vs. transmission rate trade-off for the secure caching problem is
characterized. Rather surprisingly, these results show that security can be
introduced at a negligible cost, particularly for large number of files and
users. It is also shown that the rate achieved by the proposed caching scheme
with secure delivery is within a constant multiplicative factor from the
information-theoretic optimal rate for almost all parameter values of practical
interest
Spectrum Sharing in Wireless Networks via QoS-Aware Secondary Multicast Beamforming
Secondary spectrum usage has the potential to considerably increase spectrum utilization. In this paper, quality-of-service (QoS)-aware spectrum underlay of a secondary multicast network is considered. A multiantenna secondary access point (AP) is used for multicast (common information) transmission to a number of secondary single-antenna receivers. The idea is that beamforming can be used to steer power towards the secondary receivers while limiting sidelobes that cause interference to primary receivers. Various optimal formulations of beamforming are proposed, motivated by different ldquocohabitationrdquo scenarios, including robust designs that are applicable with inaccurate or limited channel state information at the secondary AP. These formulations are NP-hard computational problems; yet it is shown how convex approximation-based multicast beamforming tools (originally developed without regard to primary interference constraints) can be adapted to work in a spectrum underlay context. Extensive simulation results demonstrate the effectiveness of the proposed approaches and provide insights on the tradeoffs between different design criteria
- …