7 research outputs found
Analyzing Linear Communication Networks using the Ribosome Flow Model
The Ribosome Flow Model (RFM) describes the unidirectional movement of
interacting particles along a one-dimensional chain of sites. As a site becomes
fuller, the effective entry rate into this site decreases. The RFM has been
used to model and analyze mRNA translation, a biological process in which
ribosomes (the particles) move along the mRNA molecule (the chain), and decode
the genetic information into proteins.
Here we propose the RFM as an analytical framework for modeling and analyzing
linear communication networks. In this context, the moving particles are
data-packets, the chain of sites is a one dimensional set of ordered buffers,
and the decreasing entry rate to a fuller buffer represents a kind of
decentralized backpressure flow control. For an RFM with homogeneous link
capacities, we provide closed-form expressions for important network metrics
including the throughput and end-to-end delay. We use these results to analyze
the hop length and the transmission probability (in a contention access mode)
that minimize the end-to-end delay in a multihop linear network, and provide
closed-form expressions for the optimal parameter values
On the Catalyzing Effect of Randomness on the Per-Flow Throughput in Wireless Networks
This paper investigates the throughput capacity of a flow crossing a
multi-hop wireless network, whose geometry is characterized by general
randomness laws including Uniform, Poisson, Heavy-Tailed distributions for both
the nodes' densities and the number of hops. The key contribution is to
demonstrate \textit{how} the \textit{per-flow throughput} depends on the
distribution of 1) the number of nodes inside hops' interference sets, 2)
the number of hops , and 3) the degree of spatial correlations. The
randomness in both 's and is advantageous, i.e., it can yield larger
scalings (as large as ) than in non-random settings. An interesting
consequence is that the per-flow capacity can exhibit the opposite behavior to
the network capacity, which was shown to suffer from a logarithmic decrease in
the presence of randomness. In turn, spatial correlations along the end-to-end
path are detrimental by a logarithmic term
Energy-Aware WiFi Network Selection via Forecasting Energy Consumption
Covering a wide area by a large number of WiFi networks is anticipated to become very popular with Internet-of-things (IoT) and initiatives such as smart cities. Such network configuration is normally realized through deploying a large number of access points (APs) with overlapped coverage. However, the imbalanced traffic load distribution among different APs affects the energy consumption of a WiFi device if it is associated to a loaded AP. This research work aims at predicting the communication-related energy that shall be consumed by a WiFi device if it transferred some amount of data through a certain selected AP. In this paper, a forecast of the energy consumption is proposed to be obtained using an algorithm that is supported by a mathematical model. Consequently, the proposed algorithm can automatically select the best WiFi network (best AP) that the WiFi device can connect to in order to minimize energy consumption. The proposed algorithm is experimentally validated in a realistic lab setting. The observed performance indicates that the algorithm can provide an accurate forecast to the energy that shall be consumed by a WiFi transceiver in sending some amount of data via a specific AP
Towards a System Theoretic Approach to Wireless Network Capacity in Finite Time and Space
In asymptotic regimes, both in time and space (network size), the derivation
of network capacity results is grossly simplified by brushing aside queueing
behavior in non-Jackson networks. This simplifying double-limit model, however,
lends itself to conservative numerical results in finite regimes. To properly
account for queueing behavior beyond a simple calculus based on average rates,
we advocate a system theoretic methodology for the capacity problem in finite
time and space regimes. This methodology also accounts for spatial correlations
arising in networks with CSMA/CA scheduling and it delivers rigorous
closed-form capacity results in terms of probability distributions. Unlike
numerous existing asymptotic results, subject to anecdotal practical concerns,
our transient one can be used in practical settings: for example, to compute
the time scales at which multi-hop routing is more advantageous than single-hop
routing
End-to-End Delay Distribution Analysis for Stochastic Admission Control in Multi-hop Wireless Networks
published_or_final_versio
Intrinsically secure communication in large-scale wireless networks
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.Cataloged from PDF version of thesis.Includes bibliographical references (p. 169-181).The ability to exchange secret information is critical to many commercial, governmental, and military networks. Information-theoretic security - widely accepted as the strictest notion of security - relies on channel coding techniques that exploit the inherent randomness of the propagation channels to significantly strengthen the security of digital communications systems. Motivated by recent developments in the field, this thesis aims at a characterization of the fundamental secrecy limits of large-scale wireless networks. We start by introducing an information-theoretic definition of the intrinsically secure communications graph (iS-graph), based on the notion of strong secrecy. The iS-graph is a random geometric graph which captures the connections that can be securely established over a large-scale network, in the presence of spatially scattered eavesdroppers. Using fundamental tools from stochastic geometry, we analyze how the spatial densities of legitimate and eavesdropper nodes influence various properties of the Poisson iS-graph, such as the distribution of node degrees, the node isolation probabilities, and the achievable secrecy rates. We study how the wireless propagation effects (e.g., fading and shadowing) and eavesdropper collusion affect the secrecy properties of the network. We also explore the potential of sectorized transmission and eavesdropper neutralization as two techniques for enhancing the secrecy of communications. We then shift our focus to the global properties of the iS-graph, which concern secure connectivity over multiple hops. We first characterize percolation of the Poisson iS-graph on the infinite plane. We show that each of the four components of the iS-graph (in, out, weak, and strong component) experiences a phase transition at some nontrivial critical density of legitimate nodes. Operationally, this is important because it implies that long-range communication over multiple hops is still feasible when a security constraint is present. We then consider full-connectivity on a finite region of the Poisson iS-graph. Specifically, we derive simple, explicit expressions that closely approximate the probability of a node being securely connected to all other nodes inside the region. We also show that the iS-graph is asymptotically fully out-connected with probability one, but full in-connectivity remains bounded away from one, no matter how large the density of legitimate nodes is made. Our results clarify how the spatial density of eavesdroppers can compromise the intrinsic security of wireless networks. We are hopeful that further efforts in combining stochastic geometry with information-theoretic principles will lead to a more comprehensive treatment of wireless security.by Pedro C. Pinto.Ph.D