1,419 research outputs found

    Upper Bounds to the Performance of Cooperative Traffic Relaying in Wireless Linear Networks

    Get PDF
    Wireless networks with linear topology, where nodes generate their own traffic and relay other nodes' traffic, have attracted increasing attention. Indeed, they well represent sensor networks monitoring paths or streets, as well as multihop networks for videosurveillance of roads or vehicular traffic. We study the performance limits of such network systems when (i) the nodes' transmissions can reach receivers farther than one-hop distance from the sender, (ii) the transmitters cooperate in the data delivery, and (iii) interference due to concurrent transmissions is taken into account. By adopting an information-theoretic approach, we derive analytical bounds to the achievable data rate in both the cases where the nodes have full-duplex and half-duplex radios. The expressions we provide are mathematically tractable and allow the analysis of multihop networks with a large number of nodes. Our analysis highlights that increasing the number of coop- erating transmitters beyond two leads to a very limited gain in the achievable data rate. Also, for half-duplex radios, it indicates the existence of dominant network states, which have a major influence on the bound. It follows that efficient, yet simple, communication strategies can be designed by considering at most two cooperating transmitters and by letting half-duplex nodes operate according to the aforementioned dominant state

    The Balanced Unicast and Multicast Capacity Regions of Large Wireless Networks

    Full text link
    We consider the question of determining the scaling of the n2n^2-dimensional balanced unicast and the n2nn 2^n-dimensional balanced multicast capacity regions of a wireless network with nn nodes placed uniformly at random in a square region of area nn and communicating over Gaussian fading channels. We identify this scaling of both the balanced unicast and multicast capacity regions in terms of Θ(n)\Theta(n), out of 2n2^n total possible, cuts. These cuts only depend on the geometry of the locations of the source nodes and their destination nodes and the traffic demands between them, and thus can be readily evaluated. Our results are constructive and provide optimal (in the scaling sense) communication schemes.Comment: 37 pages, 7 figures, to appear in IEEE Transactions on Information Theor

    Opportunistic Relaying in Wireless Networks

    Full text link
    Relay networks having nn source-to-destination pairs and mm half-duplex relays, all operating in the same frequency band in the presence of block fading, are analyzed. This setup has attracted significant attention and several relaying protocols have been reported in the literature. However, most of the proposed solutions require either centrally coordinated scheduling or detailed channel state information (CSI) at the transmitter side. Here, an opportunistic relaying scheme is proposed, which alleviates these limitations. The scheme entails a two-hop communication protocol, in which sources communicate with destinations only through half-duplex relays. The key idea is to schedule at each hop only a subset of nodes that can benefit from \emph{multiuser diversity}. To select the source and destination nodes for each hop, it requires only CSI at receivers (relays for the first hop, and destination nodes for the second hop) and an integer-value CSI feedback to the transmitters. For the case when nn is large and mm is fixed, it is shown that the proposed scheme achieves a system throughput of m/2m/2 bits/s/Hz. In contrast, the information-theoretic upper bound of (m/2)loglogn(m/2)\log \log n bits/s/Hz is achievable only with more demanding CSI assumptions and cooperation between the relays. Furthermore, it is shown that, under the condition that the product of block duration and system bandwidth scales faster than logn\log n, the achievable throughput of the proposed scheme scales as Θ(logn)\Theta ({\log n}). Notably, this is proven to be the optimal throughput scaling even if centralized scheduling is allowed, thus proving the optimality of the proposed scheme in the scaling law sense.Comment: 17 pages, 8 figures, To appear in IEEE Transactions on Information Theor

    Study of Techniques For Reliable Data Transmission In Wireless Sensor Networks

    Get PDF
    This thesis addresses the problem of traffic transfer in wireless sensor networks (WSN). In such networks, the foremost challenge in the design of data communication techniques is that the sensor's transceiver circuitry consumes the major portion of the available power. Thus, due to stringent limitations on the nodes' hardware and power resources in WSN, data transmission must be power-efficient in order to reduce the nodes' power consumption, and hence to maximize the network lifetime while satisfying the required data rate. The transmit power is itself under the influence of data rate and source-destination distance. Thanks to the dense deployment of nodes in WSN, multi-hop communication can be applied to mitigate the transmit power for sending bits of information, i.e., gathered data by the sensor nodes to the destination node (gateway) compared to single-hop scenarios. In our approach, we achieve a reasonable trade-off between power-efficiency and transmission data rate by devising cooperative communication strategies through which the network traffic (i.e. nodes' gathered information) is relayed hop-by-hop to the gateway. In such strategies, the sensor nodes serve as data originator as well as data router, and assist the data transfer from the sensors to the gateway. We develop several data transmission schemes, and we prove their capability in transmitting the data from the sensor nodes at the highest possible rates allowed by the network limitations. In particular, we consider that (i) network has linear or quasi-linear topology, (ii) nodes are equipped with half-duplex radios, implying that they cannot transmit and receive simultaneously, (iii) nodes transmit their traffic at the same average rate. We compute the average data rate corresponding to each proposed strategy. Next, we take an information-theoretic approach and derive an upper bound to the achievable rate of traffic transfer in the networks under consideration, and analyze its tightness. We show that our proposed strategies outperform the conventional multi-hop scheme, and their average achievable rate approaches the upper bound at low levels of signal to noise ratio

    Optimization Framework and Graph-Based Approach for Relay-Assisted Bidirectional OFDMA Cellular Networks

    Full text link
    This paper considers a relay-assisted bidirectional cellular network where the base station (BS) communicates with each mobile station (MS) using OFDMA for both uplink and downlink. The goal is to improve the overall system performance by exploring the full potential of the network in various dimensions including user, subcarrier, relay, and bidirectional traffic. In this work, we first introduce a novel three-time-slot time-division duplexing (TDD) transmission protocol. This protocol unifies direct transmission, one-way relaying and network-coded two-way relaying between the BS and each MS. Using the proposed three-time-slot TDD protocol, we then propose an optimization framework for resource allocation to achieve the following gains: cooperative diversity (via relay selection), network coding gain (via bidirectional transmission mode selection), and multiuser diversity (via subcarrier assignment). We formulate the problem as a combinatorial optimization problem, which is NP-complete. To make it more tractable, we adopt a graph-based approach. We first establish the equivalence between the original problem and a maximum weighted clique problem in graph theory. A metaheuristic algorithm based on any colony optimization (ACO) is then employed to find the solution in polynomial time. Simulation results demonstrate that the proposed protocol together with the ACO algorithm significantly enhances the system total throughput.Comment: 27 pages, 8 figures, 2 table
    corecore