1,301 research outputs found
On Capacity and Delay of Multi-channel Wireless Networks with Infrastructure Support
In this paper, we propose a novel multi-channel network with infrastructure
support, called an MC-IS network, which has not been studied in the literature.
To the best of our knowledge, we are the first to study such an MC-IS network.
Our proposed MC-IS network has a number of advantages over three existing
conventional networks, namely a single-channel wireless ad hoc network (called
an SC-AH network), a multi-channel wireless ad hoc network (called an MC-AH
network) and a single-channel network with infrastructure support (called an
SC-IS network). In particular, the network capacity of our proposed MC-IS
network is times higher than that of an SC-AH network and an
MC-AH network and the same as that of an SC-IS network, where is the number
of nodes in the network. The average delay of our MC-IS network is times lower than that of an SC-AH network and an MC-AH network, and
times lower than the average delay of an SC-IS network, where
and denote the number of channels dedicated for infrastructure
communications and the number of interfaces mounted at each infrastructure
node, respectively. Our analysis on an MC-IS network equipped with
omni-directional antennas only has been extended to an MC-IS network equipped
with directional antennas only, which are named as an MC-IS-DA network. We show
that an MC-IS-DA network has an even lower delay of compared with an SC-IS network and our
MC-IS network. For example, when and , an
MC-IS-DA network can further reduce the delay by 24 times lower that of an
MC-IS network and reduce the delay by 288 times lower than that of an SC-IS
network.Comment: accepted, IEEE Transactions on Vehicular Technology, 201
Hybrid Spectrum Sharing in mmWave Cellular Networks
While spectrum at millimeter wave (mmWave) frequencies is less scarce than at
traditional frequencies below 6 GHz, still it is not unlimited, in particular
if we consider the requirements from other services using the same band and the
need to license mmWave bands to multiple mobile operators. Therefore, an
efficient spectrum access scheme is critical to harvest the maximum benefit
from emerging mmWave technologies. In this paper, we introduce a new hybrid
spectrum access scheme for mmWave networks, where data is aggregated through
two mmWave carriers with different characteristics. In particular, we consider
the case of a hybrid spectrum scheme between a mmWave band with exclusive
access and a mmWave band where spectrum is pooled between multiple operators.
To the best of our knowledge, this is the first study proposing hybrid spectrum
access for mmWave networks and providing a quantitative assessment of its
benefits. Our results show that this approach provides major advantages with
respect to traditional fully licensed or fully unlicensed spectrum access
schemes, though further work is needed to achieve a more complete understanding
of both technical and non technical implications
Physical Layer Network Coding: A Cautionary Story with Interference and Spatial Reservation
Physical layer network coding (PLNC) has the potential to improve throughput
of multi-hop networks. However, most of the works are focused on the simple,
three-node model with two-way relaying, not taking into account the fact that
there can be other neighboring nodes that can cause/receive interference. The
way to deal with this problem in distributed wireless networks is usage of
MAC-layer mechanisms that make a spatial reservation of the shared wireless
medium, similar to the well-known RTS/CTS in IEEE 802.11 wireless networks. In
this paper, we investigate two-way relaying in presence of interfering nodes
and usage of spatial reservation mechanisms. Specifically, we introduce a
reserved area in order to protect the nodes involved in two-way relaying from
the interference caused by neighboring nodes. We analytically derive the
end-to-end rate achieved by PLNC considering the impact of interference and
reserved area. A relevant performance measure is data rate per unit area, in
order to reflect the fact that any spatial reservation blocks another data
exchange in the reserved area. The numerical results carry a cautionary message
that the gains brought by PLNC over one-way relaying may be vanishing when the
two-way relaying is considered in a broader context of a larger wireless
network.Comment: 6 pages, 11 figures, Proc. of IEEE CoCoNet Workshop in conjunction
with IEEE ICC 201
Scaling Laws for Vehicular Networks
Equipping automobiles with wireless communications and networking capabilities is becoming the frontier in the evolution to the next generation intelligent transportation systems (ITS). By means of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, information generated by the vehicle-borne computer, vehicle control system, on-board sensors, or roadside infrastructure, can be effectively disseminated among vehicles/infrastructure in proximity or to vehicles/infrastructure multiple hops away, known as vehicular networks (VANETs), to enhance the situational awareness of vehicles and provide motorist/passengers with an information-rich travel environment. Scaling law for throughput capacity and delay in wireless networks has been considered as one of the most fundamental issues, which characterizes the trend of throughput/delay behavior when the network size increases. The study of scaling laws can lead to a better understanding of intrinsic properties of wireless networks and theoretical guidance on network design and deployment. Moreover, the results could also be applied to predict network performance, especially for the large-scale vehicular networks. However, map-restricted mobility and spatio-temporal dynamics of vehicle density dramatically complicate scaling laws studies for VANETs. As an effort to lay a scientific foundation of vehicular networking, my thesis investigates capacity scaling laws for vehicular networks with and without infrastructure, respectively.
Firstly, the thesis studies scaling law of throughput capacity and end-to-end delay for a social-proximity vehicular network, where each vehicle has a restricted mobility region around a specific social spot and services are delivered in a store-carry-and-forward paradigm. It has been shown that although the throughput and delay may degrade in a high vehicle density area, it is still possible to achieve almost constant scaling for per vehicle throughput and end-to-end delay.
Secondly, in addition to pure ad hoc vehicular networks, the thesis derives the capacity scaling laws for networks with wireless infrastructure, where services are delivered uniformly from infrastructure to all vehicles in the network. The V2V communication is also required to relay the downlink traffic to the vehicles outside the coverage of infrastructure. Three kinds of infrastructures have been considered, i.e., cellular base stations, wireless mesh backbones (a network of mesh nodes, including one mesh gateway), and roadside access points. The downlink capacity scaling is derived for each kind of infrastructure. Considering that the deployment/operation costs of different infrastructure are highly variable, the capacity-cost tradeoffs of different deployments are examined. The results from the thesis demonstrate the feasibility of deploying non-cellular infrastructure for supporting high-bandwidth vehicular applications.
Thirdly, the fundamental impact of traffic signals at road intersection on drive-thru Internet access is particularly studied. The thesis analyzes the time-average throughput capacity of a typical vehicle driving through randomly deployed roadside Wi-Fi networks. Interestingly, we show a significant throughput gain for vehicles stopping at intersections due to red signals. The results provide a quick and efficient way of determining the Wi-Fi deployment scale according to required quality of services.
In summary, the analysis developed and the scaling laws derived in the thesis provide should be very useful for understanding the fundamental performance of vehicular networks
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of
security--relies on channel coding techniques that exploit the inherent
randomness of propagation channels to strengthen the security of communications
systems. Within this paradigm, we explore strategies to improve secure
connectivity in a wireless network. We first consider the intrinsically secure
communications graph (iS-graph), a convenient representation of the links that
can be established with information-theoretic security on a large-scale
network. We then propose and characterize two techniques--sectorized
transmission and eavesdropper neutralization--which are shown to dramatically
enhance the connectivity of the iS-graph.Comment: Pre-print, IEEE Global Telecommunications Conference (GLOBECOM'10),
Miami, FL, Dec. 201
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
- …