7 research outputs found

    Analyzing Linear Communication Networks using the Ribosome Flow Model

    Full text link
    The Ribosome Flow Model (RFM) describes the unidirectional movement of interacting particles along a one-dimensional chain of sites. As a site becomes fuller, the effective entry rate into this site decreases. The RFM has been used to model and analyze mRNA translation, a biological process in which ribosomes (the particles) move along the mRNA molecule (the chain), and decode the genetic information into proteins. Here we propose the RFM as an analytical framework for modeling and analyzing linear communication networks. In this context, the moving particles are data-packets, the chain of sites is a one dimensional set of ordered buffers, and the decreasing entry rate to a fuller buffer represents a kind of decentralized backpressure flow control. For an RFM with homogeneous link capacities, we provide closed-form expressions for important network metrics including the throughput and end-to-end delay. We use these results to analyze the hop length and the transmission probability (in a contention access mode) that minimize the end-to-end delay in a multihop linear network, and provide closed-form expressions for the optimal parameter values

    On the Catalyzing Effect of Randomness on the Per-Flow Throughput in Wireless Networks

    Get PDF
    This paper investigates the throughput capacity of a flow crossing a multi-hop wireless network, whose geometry is characterized by general randomness laws including Uniform, Poisson, Heavy-Tailed distributions for both the nodes' densities and the number of hops. The key contribution is to demonstrate \textit{how} the \textit{per-flow throughput} depends on the distribution of 1) the number of nodes NjN_j inside hops' interference sets, 2) the number of hops KK, and 3) the degree of spatial correlations. The randomness in both NjN_j's and KK is advantageous, i.e., it can yield larger scalings (as large as Θ(n)\Theta(n)) than in non-random settings. An interesting consequence is that the per-flow capacity can exhibit the opposite behavior to the network capacity, which was shown to suffer from a logarithmic decrease in the presence of randomness. In turn, spatial correlations along the end-to-end path are detrimental by a logarithmic term

    Energy-Aware WiFi Network Selection via Forecasting Energy Consumption

    Get PDF
    Covering a wide area by a large number of WiFi networks is anticipated to become very popular with Internet-of-things (IoT) and initiatives such as smart cities. Such network configuration is normally realized through deploying a large number of access points (APs) with overlapped coverage. However, the imbalanced traffic load distribution among different APs affects the energy consumption of a WiFi device if it is associated to a loaded AP. This research work aims at predicting the communication-related energy that shall be consumed by a WiFi device if it transferred some amount of data through a certain selected AP. In this paper, a forecast of the energy consumption is proposed to be obtained using an algorithm that is supported by a mathematical model. Consequently, the proposed algorithm can automatically select the best WiFi network (best AP) that the WiFi device can connect to in order to minimize energy consumption. The proposed algorithm is experimentally validated in a realistic lab setting. The observed performance indicates that the algorithm can provide an accurate forecast to the energy that shall be consumed by a WiFi transceiver in sending some amount of data via a specific AP

    Towards a System Theoretic Approach to Wireless Network Capacity in Finite Time and Space

    Get PDF
    In asymptotic regimes, both in time and space (network size), the derivation of network capacity results is grossly simplified by brushing aside queueing behavior in non-Jackson networks. This simplifying double-limit model, however, lends itself to conservative numerical results in finite regimes. To properly account for queueing behavior beyond a simple calculus based on average rates, we advocate a system theoretic methodology for the capacity problem in finite time and space regimes. This methodology also accounts for spatial correlations arising in networks with CSMA/CA scheduling and it delivers rigorous closed-form capacity results in terms of probability distributions. Unlike numerous existing asymptotic results, subject to anecdotal practical concerns, our transient one can be used in practical settings: for example, to compute the time scales at which multi-hop routing is more advantageous than single-hop routing

    End-to-End Delay Distribution Analysis for Stochastic Admission Control in Multi-hop Wireless Networks

    Get PDF
    published_or_final_versio

    Intrinsically secure communication in large-scale wireless networks

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.Cataloged from PDF version of thesis.Includes bibliographical references (p. 169-181).The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security - widely accepted as the strictest notion of security - relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this thesis aims at a characterization of the fundamental secrecy limits of large-scale wireless networks. We start by introducing an information-theoretic definition of the intrinsically secure communications graph (iS-graph), based on the notion of strong secrecy. The iS-graph is a random geometric graph which captures the connections that can be securely established over a large-scale network, in the presence of spatially scattered eavesdroppers. Using fundamental tools from stochastic geometry, we analyze how the spatial densities of legitimate and eavesdropper nodes influence various properties of the Poisson iS-graph, such as the distribution of node degrees, the node isolation probabilities, and the achievable secrecy rates. We study how the wireless propagation effects (e.g., fading and shadowing) and eavesdropper collusion affect the secrecy properties of the network. We also explore the potential of sectorized transmission and eavesdropper neutralization as two techniques for enhancing the secrecy of communications. We then shift our focus to the global properties of the iS-graph, which concern secure connectivity over multiple hops. We first characterize percolation of the Poisson iS-graph on the infinite plane. We show that each of the four components of the iS-graph (in, out, weak, and strong component) experiences a phase transition at some nontrivial critical density of legitimate nodes. Operationally, this is important because it implies that long-range communication over multiple hops is still feasible when a security constraint is present. We then consider full-connectivity on a finite region of the Poisson iS-graph. Specifically, we derive simple, explicit expressions that closely approximate the probability of a node being securely connected to all other nodes inside the region. We also show that the iS-graph is asymptotically fully out-connected with probability one, but full in-connectivity remains bounded away from one, no matter how large the density of legitimate nodes is made. Our results clarify how the spatial density of eavesdroppers can compromise the intrinsic security of wireless networks. We are hopeful that further efforts in combining stochastic geometry with information-theoretic principles will lead to a more comprehensive treatment of wireless security.by Pedro C. Pinto.Ph.D
    corecore