Decentralized Caching Schemes and Performance Limits in Two-layer Networks

Size: px
Start display at page:

Download "Decentralized Caching Schemes and Performance Limits in Two-layer Networks"

Transcription

1 Decentralized Caching Schemes Performance Limits in Two-layer etworks Lin Zhang, Zhao Wang, Ming Xiao, Senior Member, IEEE, Gang Wu, Member, IEEE, Ying-Chang Liang, Fellow, IEEE, Shaoqian Li, Fellow, IEEE arxiv: v [cs.it] Oct 08 Abstract We study the decentralized caching scheme in a two-layer network, which includes a sever, multiple helpers, multiple users. Basically, the proposed caching scheme consists of two phases, i.e, placement phase delivery phase. In the placement phase, each helper/user romly independently selects contents from the server stores them into its memory. In the delivery phase, the users request contents from the server, the server satisfies each user through a helper. Different from the existing caching scheme, the proposed caching scheme takes into account the pre-stored contents at both helpers users in the placement phase to design the delivery phase. Meanwhile, the proposed caching scheme exploits index coding in the delivery phase leverages multicast opportunities, even when different users request distinct contents. Besides, we analytically characterize the performance limit of the proposed caching scheme, show that the achievable rate region of the proposed caching scheme lies within constant margins to the information-theoretic optimum. In particular, the multiplicative additive factors are carefully sharpened to be 48 4 respectively, both of which are better than the state of arts. Finally, simulation results demonstrate the advantage of the proposed caching scheme compared with the state of arts. Index Terms Achievable rate region, cross-layer caching, decentralized coded caching, hybrid scheme, two-layer networks I. ITRODUCTIO Video-on-dem VoD Internet of Things IoT are envisioned to generate massive Internet traffic in the next few years inevitably causes network congestions [] [6]. To deal with this issue, the content caching is proposed by utilizing the storage capacities of network nodes [7] []. In particular, if some contents are pre-stored in a local Copyright c 05 IEEE. Personal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org. L. Zhang is with the Key Laboratory on Communications, also with the Center for Intelligent etworking Communications CIC, University of Electronic Science Technology of China UESTC, Chengdu, China linzhang93@gmail.com. Z. Wang is with Ericsson Research, Stockholm, Sweden zhao.wang@ericsson.com. M. Xiao is with the School of Electrical Engineering, Royal Institute of Technology KTH, Stockholm, Sweden mingx@kth.se. G. Wu S. Li are with the Key Laboratory on Communications, University of Electronic Science Technology of China UESTC, Chengdu, China s: wugang99@uestc.edu.cn lsq@uestc.edu.cn. Y.-C. Liang is with the Center for Intelligent etworking Communications CIC, University of Electronic Science Technology of China UESTC, Chengdu, China liangyc@ieee.org. This work was supported in part by ational atural Science Foundation of China under Grants 65700, , 66803, Part of this paper has been presented in [] at IEEE CIC/ICCC 06. storage close to a user, these pre-stored contents can be directly accessed by the user. This avoids unnecessary content deliveries from servers thus releases network congestions. Apparently, this mechanism is able to offer a local caching gain, which is particularly relevant when the local storage is large. Recently, Maddah-Ali & iesen MAU introduced index coding into a singer-layer content caching network [], [3], which includes a server multiple users. In particular, MAU proposed a centralized caching scheme in [] a decentralized caching scheme in [3], respectively We name them as MAU-Centralized scheme MAU-Decentralized scheme respectively hereafter.. The basic idea of the centralized decentralized caching schemes is as follows: By viewing the pre-stored contents as the side-information, a coded delivery can be designed to create a single-layer multicast opportunity SMO, even when users request distinct contents. With this idea, both caching schemes are able to reduce the traffic load of the network reveal coding gains. It is worth noting that both coding gains are shown to be proportional to the aggregation of all the local storage capacities. Thus, the content caching with index coding is able to leverage both local caching gain global coding gain. Due to the centralized processing, the MAU-Centralized scheme provides a larger coding gain than the MAU- Decentralized scheme. evertheless, the MAU-Centralized scheme is sensitive to the instantaneous network profile needs redesigns once the instantaneous network profile changes, while the MAU-Decentralized scheme is independent from the instantaneous network profile thus is more robust than the MAU-Centralized scheme. It is remarkable that the MAU-Decentralized scheme is proved to be with the same order-optimality as the MAU-Centralized scheme, i.e., the same multiplicative additive factors. In practical situations, the network topology is usually tree-like users have to obtain contents through some intermediate nodes, namely, helpers, from a server. Then, [4] considered a two-layer network intended to minimize the traffic loads of both layers, i.e., the first layer is from the server to the helpers the second layer is from each helper to its attached users. In particular, [4] proposed a generalized caching scheme by exploiting both the SMO of each layer the cross-layer multicast opportunity CMO between the server users. The important observation from [4] is that almost no tension exists between the traffic loads of two layers, such that the loads of both layers can be reduced

2 simultaneously. Yet, the problem still remains on whether the traffic loads of both layers can be further reduced, which is both practically theoretically important. In the rest of the paper, we describe the traffic load with a normalized transmission rate, which will be formally defined later, we use traffic load transmission rate interchangeably. In particular, a large/small transmission rate corresponds to a large/small traffic load. A. Main contributions In this paper, we study the decentralized caching in a twolayer caching network similar to [4]. It is worth noting that, a two-layer caching network can be divided into multiple single-layer caching sub-networks. In particular, the server the helpers form a single-layer caching sub-network, in which each helper requests multiple contents from the server. Each helper its attached users form a singlelayer caching sub-network, in which each user requests one content from the associated helper. Besides [] [3], advanced caching schemes in a single-layer caching network have been extensively studied in recent years. These advanced caching schemes can be directly applied into each single-layer caching sub-network, if we treat these single-layer caching sub-networks separately. However, the direct application of these advanced caching schemes may be suboptimal in terms of transmission rates in the network. Instead, we focus on the joint caching design of the two layers. To highlight the contributions, we list the main contents of this paper. We notice that the pre-stored contents at user s storage do not need to be recovered at the associated helper. This reduces the transmission rate of the first layer creates a cross-layer caching gain CCG. Then, we develop an S&C caching scheme to exploit both the SMO CCG. Meanwhile, we analytically derive the corresponding transmission rate of each layer with a closed-form expression. We propose a hybrid algorithm to exploit the SMO, CMO, CCG simultaneously. Specifically, we segment the whole network into two parallel sub-networks combine the S&C caching scheme the caching scheme B in [4] in a memory-sharing manner. Meanwhile, we introduce α,β [0,] as the memory sharing parameters in the network segmentation, analytically derive the transmission rate of each layer with a closedform expression as a function of α β. otably, different tuples of α, β correspond to different caching designs. By comparing the closed-form expressions with those in [4], we show that the transmission rate of the first layer can be reduced without increasing the transmission rate of the second layer for any α,β. It is worth noting that, the reduction of the transmission rate in the first layer is of significant importance, since the maximum traffic load at a server in the first layer is usually the bottleneck of the network capacity the load reduction at the server enables the server to support more helpers/users thus boosts the network capacity. We analytically optimize α, β obtain the performance limit of the hybrid caching scheme as follows, R H M,M RM,M c R H M,M c, where M M are the normalized storage sizes at helpers users respectively, R H is the achievable rate region with the proposed hybrid caching scheme R is the information-theoretic optimal rate region. In particular, the multiplicative additive factors are carefully quantified to be c = 48 c = 4 respectively, both of which are better than those in [4]. Compared with [4], the contribution of the paper is fourfold. Firstly, we propose a hybrid caching scheme to reduce the traffic load in a two-layer caching network. Secondly, we provide optimized tuples of α, β for different settings of the network. Thirdly, we elaborate a better quantification of the gaps between the achievable rates the informationtheoretic minimum rates. Finally, by adopting the overall traffic load in the network as the metric in simulations, we demonstrate that the proposed caching scheme is able to effectively reduce the traffic loads in different network settings compared with the caching scheme in [4]. Although the motivation of the paper originates from a trivial observation of the scheme in [4], the proposed caching scheme the associated information-theoretic analysis are not straightforward. B. Related works After [] [3], the coded caching problems are widely studied from various aspects. [5] studied the centralized coded caching intended to improve the performance of the caching scheme in []. In particular, authors in [5] treated the design of caching scheme as a combinatorial problem of optimally labeling the leaves of a directed tree. By developing a novel labeling algorithm, the lower bound of the transmission rate in [] is significantly improved. [6] proposed a novel coded caching scheme subject to a storage size constraint, showed the improvement of the required transmission rate compared with the existing approaches when the number of users satisfied some conditions. The coded caching with different storage sizes is studied in [7], [8]. In particular, [7] proposed a new decentralized coded caching scheme showed the reduction of the required transmission rate compared with the existing results when the number of users is larger than the number of files. [8] proposed an optimization framework for cache placement delivery schemes, which explicitly accounted for different storage sizes characterized the optimal caching scheme when the overall users storage size is no larger than the storage size of the file server. [9] [0] considered the romness of user dems intended to reduce the average transmission rate. In particular, [9] partitioned files with similar request probabilities into a group, applied the caching scheme in [3] to each group. However, the scheme in [9] cannot guarantee rate order-optimality in all regimes of the system parameters. Then, [0] optimized the caching scheme in [9] proposed a new

3 3 Server: files K Helpers K K Users M H f f f3 f... M A sub-network composed by a helper its attached users H K U,... U,K U K,... U K,K M M M M Fig.. A two-layer network with one server hosting files, K helpers with normalized memory size M, i.e., M F bits, K K users with normalized memory size M, i.e., M F bits. Each helper is dedicated for helping K users. The straight line between two nodes represents the wireless channel. Similar to [0], we assume that there is no interference among different sub-networks. caching approach with the theoretically analysis of its orderoptimality. [] considered different file sizes studied the performance limits of coded caching. In particular, [] derived a new lower bound an achievable upper bound for the worst case transmission rate. Besides, [] [4] considered multiple dems from each user [5], [6] investigated online caching schemes. Other researches include caching problems in heterogeneous networks [7], [8], device-to-device DD assisted caching [9], [30], caching in the finite length regime [3] [33], security in caching networks [34] [36], so on. II. SYSTEM MODEL We consider a two-layer caching network as shown in Fig., which includes a server, K helpers, K K users. In this network, the server is connected to K K helpers H i i [ : K ], each helper is exclusively connected to K K users U i,j j [ : K ]. In particular, the server hosts filess = {f n : n [ : ], each of which has F bits. The storage capacities of each helper each user are M F bits M F bits M,M, respectively. M = MF F For convenience, we denote M = MF F as the normalized storage capacities of each helper each user, respectively. The content caching in the network has two orthogonal phases, i.e., placement phase delivery phase. In the placement phase, M F bits are pre-stored in the storage of each helper M F bits are pre-stored in the storage of each user. In the delivery phase, each user requests a specific file. If some contents of the requested file are in the local For K = or K =, the two-layer network can be reduced to a single-layer network. Thus, we study the two-layer network with K K in this paper. For M >, it is straightforward to reduce the two-layer system to a single-layer system. For M >, each user is able to cache all the files to the local storage. storage, the user directly accesses these contents. Otherwise, the user requests these contents from the associated helper /or server. It is worth noting that the transmission rates in the network including the transmission rate from the server to the helpers the transmission rate from each helper to its attached users are determined by the requested files of users the pre-stored cached contents in each helper/user. Then, different helpers may have different transmission rates depending on the requested files of users the pre-stored cached contents in each helper/user. Similar to [0], we are interested in the worst case in which different users request distinct files, focus on the decentralized caching scheme in which each helper/user caches contents romly independently. Thus, different helpers have an identical worst-case rate. In particular, by denoting L as the number of the delivered bits from the server to the helpers denoting L as the number of the delivered bits from each helper to its attached users, we define R = L F R = L F as the normalized transmission rate from the server each helper, respectively. III. S&C CACHIG SCHEME: EXPLOITIG BOTH SMO AD CCG In this section, we propose an S&C caching scheme to exploit the SMO from the server to the helpers, the SMO from each helper to its attached users, the CCG between the helpers the users. In what follows, we first present the principle results of this scheme, then provide the placement algorithm delivery algorithm, respectively. A. Principle results of the S&C caching scheme In the considered two-layer caching network, if we directly apply the MAU-Decentralized scheme in each layer, each requested file will be resolved at both the user the associated helper. In fact, if we jointly take the pre-stored contents at the helper the user into account, the prestored contents at the user do not need to be recovered at the associated helper. Therefore, it is possible to reduce the transmission rate with the CCG between helpers users. Lemma : For M M, with the S&C caching scheme, the transmission rate from the server to the helpers is R S&C = K M M γ,k, the transmission rate from each helper to its attached users is R S&C M = γ,k, ote that, although centralized caching may further reduce the traffic load in the two-layer network, it is not straightforward to apply centralized caching into the two-layer network. The reasons are as follows: On one h, in the single-layer caching network, the centralized caching in [8] is different from the decentralized caching in [9] in terms of content placement schemes, content delivery schemes, information-theoretic quantifications. On the other h, the two-layer network is more complicated than the single-layer network, since joint optimizations including content placement schemes, content delivery schemes, information-theoretic quantifications between the two layers need to be conducted. The centralized caching is beyond the scope of the paper.

4 4 where M γ,k K M M K 0. KM 3 Remark Performance comparison with [4]: In the decentralized caching scheme A of [4], the MAU-Decentralized scheme is directly applied in each individual layer. Accordingly, the transmission rate from the server to the helpers is R A = K γ M,K the transmission rate from each helper to its attached users is R A = γ M,K. By comparing R S&C with R A, we have R S&C = R A M, which is strictly smaller than R A M due to <. Besides, we observe that R S&C is equal to R A. Therefore, with the S&C caching scheme, the transmission rate in the first layer can be reduced without increasing the transmission rate in the second layer compared with the decentralized caching scheme A in [4]. B. Placement Delivery of the S&C scheme In this part, we present the detailed placement delivery methods of the S&C scheme. Placement at helpers users: For the placement at helpers, each helper romly independently selects MF bits from each file n [ : ] stores them into its storage. Similarly, for the placement at users, each user romly independently selects MF bits from each file n [ : ] stores them into its storage. Delivery from the server to helpers: To begin with, let d i,j denote the requested file index of U i,j, let V di,j,s denote the contents of file f di,j that are exclusively cached at the nodes in set S. From the result in [3], the server needs to transmit { i S H V di,j,s H\i : S H [ : K ], S H = s,s [ : K ],j [,K ], where S H denotes the set of helper indexes, such that each helper can recover the requested files of its attached users. Since the contents are romly independently placed at helpers users, each bit in V di,j,s H \i is cached in user U i,j with probability M. As a result, we can divide each V di,j,s H \i in { i S V di,j,s H \i : S H [ : K ], S H = s,s [ : K ],j [,K ] into two parts, i.e., V di,j,s H\i = {V Ui,j Ūi,j d i,j,s H \i,vd i,j,s H \i, 4 where V Ui,j d i,j,s H\i denotes the part that is cached in user U i,j V Ūi,j d i,j,s H\i is the part that is not cached in user U i,j. Then, we have V Ui,j d i,j,s H\i M V d i,j,s H\i 5 V Ūi,j d i,j,s H\i M V di,j,s H\i. 6 In particular, when the file size F is large enough, the approximations in 5 6 can be replaced by equalities according to the law of large numbers. Since V Ui,j can be locally accessed by user U d i,j,s i,j, helper H\i H i does not need to recover V Ui,j d i,j,s H \i. In other words, the server only needs to transmit { i S H V Ūi,j : d i,j,s H\i SH [ : K ], S H = s,s [ : K ],j [,K ], such that H helper H i obtains all the requested subfiles in f i,ūi,j d i,j = {V Ūi,j d i,j,s H\i : SH [ : K ],i S, S H = s,s [ : K ],j [,K ] that are pre-stored in neither of helper H i users. Recall that, the transmission rate from the server with the scheme in [3] is R A = K γm,k. Thus, the transmission rate from the server with the proposed approach γ M = M is K M,K R A as shown in. 3 Delivery from helper H i to the attached users: From the result in [3], helper H i needs to transmit { j S U V di,j,s U\j : S U [ : K ], S U = s,s [ : K ], where S U denotes the set of user indexes attached to helper H i, such that each attached user can recover the requested files. Here, we also enable helper H i to transmit { j S U V di,j,s U\j : S U [ : K ], S U = s,s [ : K ] satisfy its attached users. In what follows, we shall prove that all the contents in { j S U V di,j,s U\j : S U [ : K ], S U = s,s [ : K ] have been pre-stored or recovered by helper H i. According to whether the contents in V di,j,s U\j are prestored in helper H i, V di,j,s U\j can be divided into two parts, i.e., V di,j,s U\j = {V Hi H d i,j,s U\j,V i d i,j,s U \j, 7 where V Hi d i,j,s denotes the part that is pre-stored in helper U \j H i V H i d i,j,s is the part that is not pre-stored in helper U \j H i. It is clear that V H i d i,j,s is pre-stored in neither of helper U \j H i nor user U i,j. Then, V H i H d i,j,s must be in f i,ūi,j U \j d i,j, which has been obtained by helper H i. Thus, if helper H i transmits { j S U V di,j,s U\j : S U [ : K ], S U = s,s [ : K ], all the requests of its attached users can be satisfied. Recall that, the transmission rate of each helper with the scheme in [3] is R A = γ M,K. Thus, the transmission rate of each helper with the proposed approach is R S&C = R A = γ M,K. IV. HYBRID CACHIG I TWO-LAYER ETWORKS In this section, we present a hybrid caching scheme to exploit SMO, CMO, CCG simultaneously. For convenience, we first introduce the caching scheme B of [4], which exploits CMO. Then, we combine the S&C caching scheme with the caching scheme B of [4] in a memory-sharing manner develop the hybrid caching scheme. A. Caching scheme B in [4] Basic principle results: To exploit the CMO, the MAU-Decentralized caching scheme is directly applied between the server K K users by ignoring the storages of the helpers. Specifically, each user romly independently selects MF bits of each file stores them into its storage in the placement phase. Then, the server conducts MAU-Decentralized delivery to satisfy all the users through the helpers. ote that there is no direct link between the server the users. Thus, the server first transmits contents to the helpers. Then, each helper forwards the contents,

5 5 which are relevant to the requested files of its attached users. Finally, each user recovers the requested file by combining the forwarded contents of the associated helper the prestored contents in its own storage. With this caching scheme, the transmission rate from the server to the helpers is R B M = γ,k K the transmission rate from each helper to its attached users is R B = γ M,K. 9 Placement at users: In the placement phase, each user romly independently selects MF bits of each file n [ : ] caches them into its storage. 3 Delivery from server to helpers: From the results in [3], the server needs to transmit { i K+j S 3 V di,j,s 3\i K +j : S 3 [ : K K ], S 3 = s 3,s 3 [ : K K ], where S 3 denotes a set of user indexes, such that each user can recover the requested file. Then, the transmission rate from the server to the helpers can be obtained as 8. 4 Delivery from helperh i to the attached users: From the results in [3], if helper H i forwards the contents relevant to the requested files of its attached users, the transmission rate from helper H i to its attached users can be obtained as 9. B. Hybrid caching scheme Basic principle results: ote that, the S&C caching scheme creates both SMO CCG by utilizing the storage capacity of the helpers, while the decentralized caching scheme B of [4] creates CMO by ignoring the storage capacity of each helper. To exploit SMO, CCG, CMO simultaneously, we divide the whole network into two parrel sub-networks apply S&C caching scheme the decentralized caching scheme B of [4] in a memory-sharing manner. In particular, we split each file into two parts with sizesαf 0 α αf bits. Meanwhile, we partition the storage capacity of each user into two parts of normalized storage capacities βm 0 β βm. Then, the first sub-network consists of a server hosting the first fractionαpart of each file, K helpers each with a normalized storage capacity M, K K users each with a normalized storage capacity βm. The second sub-network consists of the server hosting the second fraction α part of each file, K helpers each without any storage capacity, K K users each with a normalized storage capacity βm. In this way, we can apply the S&C caching scheme in the first sub-network which delivers the first fraction α part of each file, apply the CMO caching scheme in the second sub-network which delivers the second fraction α part of each file. It is worth noting that, with the hybrid caching scheme, the overall transmission rate of each layer is the sum rate of the layer in two sub-networks. Lemma : For M M, the transmission 8 rate from the server to the helpers is [ R H α,β =αk βm α [ α γ ] + [ γ M βm α,k K ] + α,k + ] + 0 the transmission rate from each helper to its attached users is ] + R [γ H α,β =α βm α,k + [ ] + βm α γ α,k, where [x] + max{x,0. Proof: R Hα,β RH α,β can be obtained by applying the S&C caching scheme the caching scheme B of [4] in a memory-sharing manner with factor α β. The proof is similar to that in [4] will be omitted for space limitation. Remark : Performance comparison with [4]: It is worth noting that, the generalized caching scheme in [4] is developed by combining the caching scheme A B therein in a memory-sharing manner, the proposed hybrid caching scheme is obtained by combining the S&C caching scheme the caching scheme B in [4]. Recall that, with the S&C caching scheme, the transmission rate in the first layer can be reduced without increasing the transmission rate in the second layer compared with the caching scheme A in [4]. Thus, for any α, β, the first-layer transmission rate of the hybrid caching scheme is smaller than that of the generalized caching scheme in [4]. In fact, the reduction of the transmission rate in the first layer is of significant importance, since the maximum traffic load at a server in the first layer is usually the bottleneck of the network capacity the load reduction at the server enables the server to support more helpers/users thus boosts the network capacity. Meanwhile, the transmission rates in the second layer with both schemes are identical. This is due to the fact that, both the proposed hybrid caching scheme generalized caching scheme in [4] adopt the single-layer caching scheme in [3] for the content transmission from each helper to the attached users. Performance limit: Clearly, different tuples of α, β lead to different hybrid caching designs transmission rates in two layers. In this part, we first optimize α,β evaluate the achievable rates by applying the optimized α, β into 0. Then, we quantify the gap between the achievable rate region the information-theoretic optimal rate region, after characterizing the differences between the achievable rates their information-theoretic lower bounds in two layers, respectively. To begin with, we formally define the achievable rate region of the hybrid caching scheme the information-theoretic theoretically optimal rate region in the following. Definition : For normalized memory size M,M 0, we define R H M,M = {R H α,β,r H α,β : α,β [0,]+R +

6 6 K 0 M Fig.. Different regions of M,M. as the achievable rate region of the hybrid caching scheme, where R + denotes the positive quadrant the addition corresponds to the Minkowski sum between sets. Definition : For normalized memory size M,M 0, we define RM,M = { M,M, M,M +R + 3 as the information-theoretic optimal rate region, where M,M M,M are the information-theoretic lower bounds of transmission rates in two layers, respectively. Due to the complicated expressions of the transmission rates in two layers, it is difficult to obtain the optimal α,β minimize the transmission rates in two layers simultaneously. Instead, we adopt a heuristic algorithm to optimize α,β with the following four steps. We observe that the aggregated storage size of each subnetwork including the storage size of each helper the storage size of each attached user is crucial to the transmission rate/traffic load in the considered network. Then, we divide the feasible region of M,M into two regions: Region I M +K M < Region II M +K M. In particular, M +K M < refers to the region in which the aggregated storage size of each sub-network is smaller than the overall size of the files in the server, M +K M refers to the region in which the aggregated storage size of each sub-network is no smaller than the overall size of the files in the server. We select multiple tuples of α, β with typical values in region I M + K M < evaluate the corresponding transmission rates via 0. The detailed selection of multiple tuples of α, β is as follows: In Region I, the aggregated storage size of each sub-network is smaller than the overall size of the files in the server. Then, we need to carefully design α,β make use of the small caches at helpers/users. In particular, there may exist three kinds of multi-cast opportunities in the considered network. The first one is the multi-cast opportunity from the server to the helpers namely, MO-. The second one is the multicast opportunity from the server to the users namely, MO-. The third one is the multi-cast opportunity M from each helper to its attached users namely, MO- 3. Ideally, we need to exploit the three kinds of multicast opportunities simultaneously to minimize the traffic load in the network. However, it is challenging to conduct the theoretical analysis when exploiting the three kinds of multi-cast opportunities simultaneously. Instead, we choose typical tuples of α, β such that two kinds of multi-cast opportunities can be exploited simultaneously. According to [0], α,β = M, M is able to exploit MO- MO-3 simultaneously, M α,β = M +K M,0 is able to exploit MO- MO- simultaneously. Besides, it is easy to verify that α,β =, can exploit MO- MO-3 simultaneously. Therefore, to make use of the small caches at helpers/users in a flexible manner, we choose three tuples of α,β for Region I as M, M, Tuple I, α,β = M 4,0, Tuple II, M +K M,, Tuple III. 3 We select multiple tuples of α, β with typical values in region II M + K M evaluate the corresponding transmission rates via 0. The detailed selection of multiple tuples of α, β is as follows: In Region II, the aggregated storage size of each sub-network is no smaller than the overall size of the files in the server. According to [0], for a small value of M, α,β = M, M is able to balance the traffic loads i.e., R Hα,β RH α,β in the two layers. Then, we choose α,β = M as a cidate M, M tuple of α,β for a small. For a relatively large value of M, if we still choose α,β = M, M, the traffic load i.e., R H α,β from the server to helpers may be unacceptably large since R H α,β increases as β grows. Thus, for a relatively large value of M, we choose α,β = M, to balance the traffic loads in the two layers. To summarize, we choose two tuples of α,β for Region II as M, M, Tuple I, α,β = M, 5, Tuple II. 4 We observe that the gap between the achievable rate region R H M,M the information-theoretic optimal rate region RM,M is dominated by the difference between the achievable rate its informationtheoretic lower bound in the first layer from the server to the helpers. To reduce the gap between the achievable rate region R H M,M the informationtheoretic optimal rate region RM,M, we calculate the transmission rates of the two layers with the three tuples of α, β in 4 choose the tuple that minimizes R H α,β as an optimized design of α,β, i.e., α,β, for Region I. Similarly, we calculate the

7 7 corresponding transmission rates of the two layers with the two tuples in 5 of α, β choose the tuple that minimizes R H α,β as an optimized design of α,β, i.e., α,β, for Region II. To this end, we obtain an optimized α,β, the corresponding transmission ratesr Hα,β R Hα,β in each region. With the optimized α,β, we can characterize the gap between the achievable rate region of the proposed hybrid caching scheme the information-theoretic rate region in the following theorem. Theorem : For M M, we have R H M,M RM,M 48 RH M,M 4. 6 Sketches of proof: Since it is straightforward to obtain R H M,M RM,M, we only prove RM,M 48 RH M,M 4. Firstly, we let M,M M represent the information-theoretic lower bounds of transmission rates in two layers, respectively. Based on the cut-set theorem [37], we have [4]: s s s M s s M M,M max s {,,,K +s s s {,,,K 7 M t tm max. 8 t {,,,K +t Secondly, we denote the upper bounds of transmission rates R H α,β R H α,β as R ub M,M R ub M, respectively. Then, we calculate the upper bounds in Appendix A prove that M,M 48 Rub M,M 4 M 48 Rub M 4 can be satisfied simultaneously in Appendix B Appendix C, respectively. More specifically, we divide Region I Region II into two sub-regions based on the value of M, i.e., whether M is larger or smaller than /. Therefore, we have four sub-regions in total to investigate, i.e., M +K M < M </, Sub-region I-, M +K M < M /, Sub-region I-, 9 M +K M M </, Sub-region II-, M +K M M /, Sub-region II-. After characterizing the gap between M,M R ubm,m, the gap between M R ubm in the four regions, we summarize that M,M 48 Rub M,M 4 M 48 Rub M 4 can be achieved simultaneously for all possible M,M. Remark 3 Performance comparison with [4]: Similar to the definition in 3, we define R G M,M as the achievable rate region of the generalized caching scheme in [4]. Accordingly to the results in [4], we have R G M,M RM,M 60 RG M,M 6. 0 By comparing the multiplicative additive factors in 6 0, the achievable rate region of the proposed hybrid caching scheme is better than that of the generalized caching scheme in [4]. The improvement results from three aspects. The first aspect is the utilization of the CCG, which leads to smaller achievable rates. The second aspect is the optimization of α β. The third aspect is a better quantification of the information-theoretic gap, including a better division of the entire region in Fig. an improved mathematical proof. It should be pointed out that the improvement of the multiplicative additive factors is obtained by exploiting the gains in the three aspects simultaneously, any absence of the gains in the three aspects may fail to achieve the improvement. For instance, we would not be able to obtain the same improvement with the division of the subregions in [0], even if we exploit the former two gains. Remark 4: Optimized division of the entire region in Fig. compared with [4]: Basically, the division of the entire region in Fig. is optimized based on the following two observations. On one h, we observe that the multiplicative factor is mainly determined by the gap between the achievable rate region the information-theoretic optimal rate region in Region I. To optimize the multiplicative factor, we further divide Region I into two sub-regions, i.e., Region I- Region I-. On the other h, we observe that the additive factor is mainly determined by the gap between the achievable rate region the information-theoretic optimal rate region in Region II. To obtain a better additive factor, we optimize the division of Region II compared with [0]. It is worth pointing out that, dividing the entire region in Fig. into more sub-regions may further improve the quantifications of the multiplicative additive factors. evertheless, this requires a more complicated analysis will be one of our future works. V. SIMULATIO RESULTS In this section, we provide simulation results to show the advantage of the proposed caching scheme over the caching scheme in [0]. In particular, we adopt the overall traffic load in the network, i.e., R +K R, as the metric. ext, we first show the traffic load comparison with general values of α β, then give the traffic load comparison with optimized α β in 4 5. Fig. 3 Fig. 4 illustrate the traffic load comparison with general values of α β in Region I M + K M < Region II M +K M, respectively. In particular, we consider the network setting in Region I as follows: F = M bits, = 00, K = 0, K = 5, M = 50, M = 8. Similarly, we consider the network setting in Region II as follows: F = M bits, = 00, K = 0, K = 5, M = 50, M = 30. Both figures show that the proposed caching scheme achieves a traffic load similar to the caching scheme in [4] for a small α, the proposed caching scheme is able to effectively reduce the traffic load compared with the caching scheme in [4] for a relatively large α. Besides, the traffic load gap of the two caching schemes becomes large as α increases. The reason is as follows: On one h, a small α leads to a low CCG of the proposed caching scheme this can be easily verified from 0, which has little impact on the traffic load reduction compared with the caching scheme in [4]; On the

8 8 Traffic load in the network β=0.6 β=0.4 β=0.8 Proposed β=0.4 [4] β=0.4 Proposed β=0.6 [4] β=0.6 Proposed β=0.8 [4] β=0.8 Traffic load in the network M =50 M =60 M =70 M =80 Proposed M =50 [4] M =50 Proposed M =60 [4] M =60 Proposed M =70 [4] M =70 Proposed M =80 [4] M = α Fig. 3. Comparison of the traffic load in the network in Region I with different α β M Fig. 5. Comparison of the traffic load in the network with optimized α β in 4 5. Traffic load in the network Proposed β=0.4 [4] β=0.4 Proposed β=0.6 [4] β=0.6 Proposed β=0.8 [4] β=0.8 β=0.8 β=0.4 β= α Fig. 4. Comparison of the traffic load in the network in Region II with different α β. other h, a large α leads to a high CCG, which contributes to a significant traffic load reduction compared with the caching scheme in [4]. Furthermore, by comparing the two figures, we observe that the proposed caching scheme is able to provide larger reductions of traffic load in Region II than in Region I. This is because, the traffic load reduction is proportional to M, which is small in Region I is relatively large in Region II. Fig. 5 compares the traffic load in the network between the proposed caching scheme the caching scheme in [4] as a function of M. In particular, we consider the network setting as follows: F = M bits, = 00,K = 0, K = 5. In addition, the traffic load of the proposed algorithm is evaluated with the optimized α β in 4 5. The traffic load of the algorithm in [4] is evaluated with its optimized α β. From the figure, we observe that, the proposed caching scheme achieves a traffic load similar to the caching scheme in [4] in Region I, i.e., M is small satisfies M +K M <. Meanwhile, the proposed caching scheme is able to effectively reduce the traffic load compared with the caching scheme in [4] in Region II, i.e., M is relatively large satisfies M + K M. Furthermore, the traffic load gap of the two caching schemes becomes large as M increases. This demonstrates the advantage of the proposed caching scheme compared with the caching scheme in [4]. VI. COCLUSIOS In this paper, we studied the decentralized caching in twolayer networks, in which users request contents from a server the server satisfies users through helpers. By simultaneously utilizing the CCG, SMO, CMO, we developed an hybrid caching scheme to reduce the traffic loads/transmission rates from both the server the helpers. Besides, we analytically derived the transmission rates demonstrated that the hybrid caching scheme is able to reduce the transmission rate from the server without increasing the transmission rate from each helper compared with the caching scheme in [4]. Furthermore, we theoretically analyzed the performance limit of the proposed caching scheme demonstrated that the achievable rate region of the proposed caching scheme lies within constant margins to the information-theoretic optimum. In particular, the multiplicative additive factors are carefully sharpened to be 48 4 respectively, both of which are better than those in [4]. Finally, simulation results demonstrated the advantage of the proposed caching scheme compared with the caching scheme in [4] in terms of the overall traffic load in the network. APPEDIX A UPPER BOUDS R ubm,m AD R ubm Since the transmission rates R Hα,β,RH α,β are highly related to the values of α, β, the upper bounds R ubm,m R ubm are also determined by α,β. Meanwhile, transmission rates differ in variable M,M regimes. Thus, we first consider two regimes, i.e., Regime I M +K M Regime II M +K M >. In what

9 9 follows, we will discuss the upper bounds R ubm,m R ubm in the two regimes, respectively. A. Upper Bounds R ub M,M R ub M in Regime I In this regime, we consider three tuples of α,β. Tuple I is α,β = M, M, Tuple II is α,β = M M +K M,0, Tuple III is α,β =,. Firstly, we substitute α,β = M, M into 0. Then, we have R H α,β = M K K M K K M M KK M M min {K K, M M R H α,β =K min M M K K M {K, M. M Substitute α,β = M +K M,0 into 0, we have R H α,β M { K min K, + M +K M M +M K { K M K min K K, M +K M M +M K { M K = min K K, + M +K M M +M K { K M K min K K, M +K M M +M K { K min K K, 3 M +M K R H a α,β K = min {K, M, 4 where a follows from K M < in regime I. Substitute α,β =, into 0. Then, we have R H α,β =K K M M K M M K = K M 5 M R H a α,β K = min {K, M, 6 where a follows from K M < in regime I. Thus, if we choose α,β in three considered tuples corresponding to the minimum R H α,β, we can achieve the upper bounds R ubm,m R ubm in Regime I as {K K, M R ub M,M min K M M M K,, M +M K. 7 R ub M min {K, M. 8 B. Upper Bounds R ub M,M R ub M in Regime II In this regime, we consider the tuples of α,β as follows: Tuple I is α,β = M, M, Tuple II is α,β = M,. Since we have obtained the upper bounds with Tuple I in, we will only calculate the upper bounds with Tuple II in the following. Substitute α,β = M, into 0, we have R H α,β = M + M M M M KK M M M { min K K, M M min {K K, M M R H α,β = M M M M M M M M { min =min { K, M M M K M M M K, + M M min K M M { min K, M 9 {K, M. 30 Thus, if we choose α,β in two considered tuples corresponding to the minimum R H α,β, we can achieve the upper bounds R ubm,m R ubm in Regime II as R ub M,M min {K K, M M, M M 3 respectively. R ub M min {K, M, 3

10 0 APPEDIX B GAP BETWEE THE UPPER BOUD R ub M,M AD LOWER BOUD M,M In this section, we will characterize the gap between the upper bound R ub M,M the lower bound M,M. Recall that we consider K, K, K K. A. Gap between R ub M,M M,M in Regime I In regime I, we consider two subregimes, i.e., Subregime I 0 M Subregime II M. Then, we will discuss the gap in the two subregimes respectively. Gap in Subregime I: In this subregime, we have M + K M 0 M. Then, we have 0 M M K using K. Thus, we consider: A 0 M < K 0 M K K ; B 0 M < K K K M K ; C 0 M < K K M ; D K M < 4 0 M 4K ; E K M < 4 4K M ; F 4 M < 0 M M G 4 M < M K M M A 0 M < K 0 M K ; K. K K s = K s = K in the lower bound 7. This is valid choice since K, thus s = K. Then, we have K M K K,M M K K M a b + K K K K 4 MK MKK + KK K K = K K 4, 33 where a follows from x x x for any x b follows from KM 4 by using M K, KKM by using M K K K, K by using K K. Combining with 7, we have M,M K K {K K, M M, 4 K, K M +M K M 4 min M 4 Rub M,M. 34 B 0 M < K K K M K s = M K s = K in the lower bound 7. ote that this is a valid choice since a b c K M K M K, 35 where a follows from M K, b follows from x x for any x, c follows from K K M. Substitute s s into the lower bound 7, we have M,M M K K M K M M K K M + M K K a b 4M M M K + = M 4M 4 + = 4M 4M 4M M M K + M M, 36 where a follows from x x x for any x, b follows from M M K /K /K 4 since M < K M K K, M KK using K K M K K. Combining with 7, we have M,M M 4M {K 4 min K, M M, K, K M M +M K M 4 Rub M,M. 37 C 0 M < K K M s = s = M in the lower bound 7. This is a valid choice since a b c K, 38 / M M where a follows from M, b follows from x x for any x, c follows from K M. Substitute s s into the lower bound 7, we have M M M M M,M + a b 4M M + M = M 4M M + 4M 4 + = 4M 4M M M, 39 where a follows from x x x for any x, b follows from M /K 4 using M K K, M K KK K K using K M, K K, K. Combining with 7, we have M,M M 4M 4 Rub M,M. 40 D s = K M < 4 0 M M +M K 4K s = K in the lower bound 7.

11 This is a valid choice since = /4+/4 a b M +M K M M +M K c K, 4 where a follows from M 4 M 4K, b follows fromx x for anyx, c follows from K M. Then, we have M,M M +M K K + a b c K M +M K M +M K K 4M +M K M M +M K +K M K + 4M +M K + K K M K M +M K M +M K 4M +M K + K = 6M +M K, 4 where a follows from x x x for any x, K b follows from M K +M k M, c follows from K M K K by using K M. Combining with 7, we have M K,M 6M +M K { 6 min K K, M, M K, K M M +M K M 6 Rub M,M. 43 E K M < 4 4K M : Let M,, if M M, 4M M s,s =,, otherwise. 4M 44 in the lower bound 7. This is a valid choice since for M M, we have a b = c K 45 4 /4 4M 4M = M M M d /4 M /4K = K, 46 wherea follows fromm < 4, b follows fromx x x for any x, c follows from K M, d follows from M 4 M 4K. For M < M, we have = 4 /4 4M 4M 4M K. 47 ote that s 4M 6M s s 4M due to x x x for any x. Then, we have M,M a 6M + 6M 4M M 4M M + 4M = 48M 48M M, 48 where a follows from 4M K = KK K KK using 4K M, > K K, K. Combined with 7, we have M,M M 48M 48 Rub M,M. 49 F 4 M < 0 M M K s = s = K in the lower bound 7. Then, we have M,M K M M K +K a K M M +/ = K M 3 = K M b M K M 3M 3M 4 = K M, 50 M where a follows from x x x for any x K KK K by using K K K, b follows from M /4 = 4. Combining with 7, we have M,M K M M M M G 4 M < choose s = s = This is a valid choice since a M K M min{k K,, K M +M K, K M M Rub M,M. 5 b M K M M M M M M K : we in the lower bound 7. c M d K, 5 M where a follows from M +K M, b follows from K, c follows from x x for any x, d follows from M K M.

12 Then, we have M,M M M M M M M + M M a M 4M M M M M = M +/ M = K M M M M M K b K M M 4 = K M, 53 48M where a follows from x x x M M M M K KK K for any x by using M K M, K K, K, b follows from M M K M /4 = 4 by using M 4. Combining with 7, we have M,M K 48M 48 min { K K, M K M M M M K,, M +M K 48 Rub M,M. 54 Gap between R ub M,M M,M in Subregime II: In this subregime, i.e., M + K M M, we have M M K. Then, we consider two regions: A M < 0 M M K ; B M < M K M M K, A M < 0 M M K s = s = K in the lower bound 7. Then, we have M,M K M K M +K a K M M = K M = K 6 / +/ M b K 6M 3 M M = K 3, 55 where a follows from M M K K = KK K K K using > K K K, b follows from M. Combining with 7, we have M,M K M 6M 6 min { K K, M M K,, K M +M K M M 6 Rub M,M. 56 B M < M K M M K s = s = M in the lower bound 7. This is a valid choice since a M b K M M M M c M d K, 57 M where a follows from M M K, b follows from K, c follows from x x for any x, d follows from M K M. Substituting s s in the lower bound 7, we obtain M M M M M M M,M + M M a M 4M M M M M + = K M M M K M M = M M K M, 58 4M b where a follows from x x x for any x, M M M M K K M using K M, K K, K, b follows from M K M M. Combining with 7, we have M,M K M 4M 4 Rub M,M. 59 B. Gap between R ub M,M M,M in Regime II In regime II, we consider two subregimes, i.e., Subregime I 0 M Subregime II M. Then, we will discuss the gap in the two subregimes, respectively. Gap in Subregime I: In this subregime, i.e., M + K M 0 M, we have M M K 4K. Then, we consider: A 0 M < K K M ; B 0 M < K M ; C K M < 4 4K M ; D K M < 4 M ; E 4 M < M K M M ; F 4 M < M M. A 0 M < K K M s = s = M in the lower bound 7. This is a valid choice since a b c K, 60 / M M where a follows from M, b follows from x x for any x, c follows from K M. Substitute s s into the lower bound 7, we have M M M M M,M + a b 4M M + M = M 4M M + 4M 4 + = 4M 4M M M K, 6 where a follows from x x x for any x, b follows from M /K = K 4 using M K

13 3 K, M K KK K K using K M, K K, K. Combining with 7, we have M,M M 4M 4 Rub M,M. 6 B 0 M < K M : We have 0 = M. 63 M M Combining with 3, we have M,M M R ub M M,M. 64 C K M < 4 4K M : Let M,, if M M, 4M M s,s =,, otherwise. 4M 65 in the lower bound 7. This is a valid choice since for M M, we have a b = c K 66 4 /4 4M 4M = M M M d /4 M /4K = K, 67 wherea follows fromm 4, b follows fromx x x for any x, c follows from M K, d follows from M 4 M 4K. For M < M, we have = a K 4 /4 4M 4M 4M, 68 where a follows from M K. ote that s 4M 6M s s 4M due to x x x for any x. Then, we have M,M a 6M + 6M 4M M 4M M + 4M = 48M 48M M, 69 where a follows from 4M K = KK K KK using > K K K. Combined with 7, we have M,M M 48M 48 Rub M,M. 70 D K M < 4 M : We have M,M 0 M. 7 M M Combined with 3, we have M,M M Rub M,M. 7 M E 4 M < M K M M s = s = M M in the lower bound 7. This is a valid choice since M M a K M M, 73 where a follows from M K M. Substitute s s into the lower bound 7, we have M,M M M M + M M M M M a M 4M M M + 4 = M, 74 0M where a follows from x x x for any x, M M K K KK K M 4 using K M, K K, K. Combining with 7, we have M,M M {K 0M 0 min K, M M, M M 0 Rub M,M. 75 F 4 M < M M : We have M,M 0 = M M M M = M M M M M a M = M 4, 76 M M where a follows from M M M. Combined with 3, we have M,M M M M M 4 min{k K,, M M 4R ub M,M Gap in Subregime II: In this subregime, i.e., M + K M M, we have M M K. Then, we consider: A M < M K M M ; B M < M M. A M < M K M M M s = s = M in the lower bound 7. This is a valid choice since M a M b K M M, 78 where a follows from x x for any x, b follows from M K M.

14 4 Then, we obtain M,M M M M M M M + M M a M 4M M M M M + 4 = M 0M, 79 where a follows from x x x for any x M M K K KK K M 4 using K M, K K, K. Combining with 3, we have M,M M 0M 0 Rub M,M. 80 B M < M M : We have M,M 0 = M M M M = M M M M M a M = M 4, 8 M M where a follows from M M M. Combining with 3, we have M,M M M 4R ub M,M 4. 8 Combining the results in Subsections A B, we have that the upper bound R ub the lower bound are within a constant multiplicative additive gap for all pairs of M M. More specifically, we have M,M 48 Rub M,M APPEDIX C GAP BETWEE THE UPPER BOUD R ub M AD LOWER BOUD M In this section, we will characterize the gap between the upper boundr ub M the lower bound M. We also consider K, K, K K. Recall that lower bound upper bound of the transmission rate R α,β are t tm M max 84 t [K ] +t R ub M = min {K, M, 85 respectively. To discuss the gap between the lower the upper bound, we consider two regimes: A 0 M < ; B M. A 0 M < t = min{k, M in the lower bound 84. This is a valid choice since = min{k, K M. 86 Then, we have M min{k, M a 4 min{k, M + 4 min{k, M M + min{k, M = 0 min{k, M, 87 where a follows from x x x for any x min{k, M K KK K 4 using K K K. Combining with 85, we have M 0 min{k, M 0 min{k, M 0 Rub M. 88 B M < : We have M 0 = M M. 89 Combining with 85, we have M M M min{k, M 4 R ub M By combining 88 90, we have M 0 Rub M 4. 9 REFERECES [] L. Zhang, Z. Wang, M. Xiao, G. Wu, Order-optimal caching in hierarchical networks, in IEEE/CIC International Conference on Communications in China ICCC, 06, pp. 5. [] L. Zhang, M. Xiao, G. Wu, M. Alam, Y.-C. Liang, S. Li, A survey of advanced techniques for spectrum sharing in 5g networks, IEEE Wireless Commun., vol. 65, no. 0, pp , Oct. 07. [3] G. Yang, Y.-C. Liang, R. Zhang,, Y. Pei, Modulation in the air: Backscatter communications over ambient ofdm signals, IEEE Trans. Commun., vol. 66, no. 3, pp. 9 33, Mar. 08. [4] G. Yang, Q. Zhang, Y.-C. Liang, Cooperative ambient backscatter communication systems for future internet-of-things, IEEE Internet Things J., vol. 5, no., pp. 6 30, Apr. 08. [5] X. Kang, Y.-C. Liang, J. Yang, Riding on the primary: A new spectrum sharing paradigm for wireless-powered iot devices, IEEE Trans. on Wireless Commun., vol. 7, no. 9, pp , Sep. 08. [6] L. Zhang, J. Liu, M. Xiao, G. Wu, Y.-C. Liang, S. Li, Performance analysis optimization in downlink noma systems with cooperative full-duplex relaying, IEEE J. Sel. Areas in Commun., vol. 35, no. 0, pp , Oct. 07. [7] L. W. Dowdy D. V. Foster, Comparative models of the file assignment problem, ACM Computing Survey, vol. 4, no., pp , Jun. 98. [8] M. R. Korupolu, C. G. Plaxton, R. Rajaraman, Placement algorithms for hierarchical cooperative caching, Journal of Algorithms, vol. 38, no., pp , 00. [9] J. Kangasharju, J. W. Roberts, K. W. Ross, Object replication strategies in content distribution networks, Comp. Commu. Journal, vol. 5, no. 4, pp , Mar. 00.

On Multi-Server Coded Caching in the Low Memory Regime

On Multi-Server Coded Caching in the Low Memory Regime On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study

Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Cooperative Tx/Rx Caching in Interference Channels: A Storage-Latency Tradeoff Study Fan Xu Kangqi Liu and Meixia Tao Dept of Electronic Engineering Shanghai Jiao Tong University Shanghai China Emails:

More information

Pareto Optimization for Uplink NOMA Power Control

Pareto Optimization for Uplink NOMA Power Control Pareto Optimization for Uplink NOMA Power Control Eren Balevi, Member, IEEE, and Richard D. Gitlin, Life Fellow, IEEE Department of Electrical Engineering, University of South Florida Tampa, Florida 33620,

More information

On the Capacity Regions of Two-Way Diamond. Channels

On the Capacity Regions of Two-Way Diamond. Channels On the Capacity Regions of Two-Way Diamond 1 Channels Mehdi Ashraphijuo, Vaneet Aggarwal and Xiaodong Wang arxiv:1410.5085v1 [cs.it] 19 Oct 2014 Abstract In this paper, we study the capacity regions of

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Multicast Mode Selection for Multi-antenna Coded Caching

Multicast Mode Selection for Multi-antenna Coded Caching Multicast Mode Selection for Multi-antenna Coded Caching Antti Tölli, Seyed Pooya Shariatpanahi, Jarkko Kaleva and Babak Khalaj Centre for Wireless Communications, University of Oulu, P.O. Box 4500, 9004,

More information

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT

On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT On the Capacity Region of the Vector Fading Broadcast Channel with no CSIT Syed Ali Jafar University of California Irvine Irvine, CA 92697-2625 Email: syed@uciedu Andrea Goldsmith Stanford University Stanford,

More information

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing

On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing 1 On the Unicast Capacity of Stationary Multi-channel Multi-radio Wireless Networks: Separability and Multi-channel Routing Liangping Ma arxiv:0809.4325v2 [cs.it] 26 Dec 2009 Abstract The first result

More information

arxiv: v1 [cs.it] 29 Sep 2014

arxiv: v1 [cs.it] 29 Sep 2014 RF ENERGY HARVESTING ENABLED arxiv:9.8v [cs.it] 9 Sep POWER SHARING IN RELAY NETWORKS XUEQING HUANG NIRWAN ANSARI TR-ANL--8 SEPTEMBER 9, ADVANCED NETWORKING LABORATORY DEPARTMENT OF ELECTRICAL AND COMPUTER

More information

Variations on the Index Coding Problem: Pliable Index Coding and Caching

Variations on the Index Coding Problem: Pliable Index Coding and Caching Variations on the Index Coding Problem: Pliable Index Coding and Caching T. Liu K. Wan D. Tuninetti University of Illinois at Chicago Shannon s Centennial, Chicago, September 23rd 2016 D. Tuninetti (UIC)

More information

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks

Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Sequential Multi-Channel Access Game in Distributed Cognitive Radio Networks Chunxiao Jiang, Yan Chen, and K. J. Ray Liu Department of Electrical and Computer Engineering, University of Maryland, College

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels

On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels On the Achievable Diversity-vs-Multiplexing Tradeoff in Cooperative Channels Kambiz Azarian, Hesham El Gamal, and Philip Schniter Dept of Electrical Engineering, The Ohio State University Columbus, OH

More information

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks

ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks Salman Avestimehr In collaboration with Navid Naderializadeh ITA 2/10/14 D2D Communication Device-to-Device (D2D) communication

More information

Coordinated Scheduling and Power Control in Cloud-Radio Access Networks

Coordinated Scheduling and Power Control in Cloud-Radio Access Networks Coordinated Scheduling and Power Control in Cloud-Radio Access Networks Item Type Article Authors Douik, Ahmed; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim Citation Coordinated Scheduling

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

arxiv: v1 [cs.it] 12 Jan 2011

arxiv: v1 [cs.it] 12 Jan 2011 On the Degree of Freedom for Multi-Source Multi-Destination Wireless Networ with Multi-layer Relays Feng Liu, Chung Chan, Ying Jun (Angela) Zhang Abstract arxiv:0.2288v [cs.it] 2 Jan 20 Degree of freedom

More information

A NUMBER THEORY APPROACH TO PROBLEM REPRESENTATION AND SOLUTION

A NUMBER THEORY APPROACH TO PROBLEM REPRESENTATION AND SOLUTION Session 22 General Problem Solving A NUMBER THEORY APPROACH TO PROBLEM REPRESENTATION AND SOLUTION Stewart N, T. Shen Edward R. Jones Virginia Polytechnic Institute and State University Abstract A number

More information

Joint Node Deployment and Wireless Energy Transfer Scheduling for Immortal Sensor Networks

Joint Node Deployment and Wireless Energy Transfer Scheduling for Immortal Sensor Networks Joint ode Deployment and Wireless Energy Transfer Scheduling for Immortal Sensor etworks Rong Du, Carlo Fischione, Ming Xiao Department of etwork and Systems Engineering, Communication Theory Department

More information

arxiv: v2 [cs.it] 29 Mar 2014

arxiv: v2 [cs.it] 29 Mar 2014 1 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija and Mai Vu Abstract arxiv:1312.2169v2 [cs.it] 29 Mar 2014 We propose a time-division uplink

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Optimum Power Allocation in Cooperative Networks

Optimum Power Allocation in Cooperative Networks Optimum Power Allocation in Cooperative Networks Jaime Adeane, Miguel R.D. Rodrigues, and Ian J. Wassell Laboratory for Communication Engineering Department of Engineering University of Cambridge 5 JJ

More information

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding

Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Anthony Man-Cho So Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong (Joint

More information

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks Xiaobing Wu 1, Jiangchuan Liu 2, Guihai Chen 1 1 State Key Laboratory for Novel Software Technology, Nanjing University, China wuxb@dislab.nju.edu.cn,

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Deployment and Radio Resource Reuse in IEEE j Multi-hop Relay Network in Manhattan-like Environment

Deployment and Radio Resource Reuse in IEEE j Multi-hop Relay Network in Manhattan-like Environment Deployment and Radio Resource Reuse in IEEE 802.16j Multi-hop Relay Network in Manhattan-like Environment I-Kang Fu and Wern-Ho Sheen Department of Communication Engineering National Chiao Tung University

More information

On the Optimum Power Allocation in the One-Side Interference Channel with Relay

On the Optimum Power Allocation in the One-Side Interference Channel with Relay 2012 IEEE Wireless Communications and etworking Conference: Mobile and Wireless etworks On the Optimum Power Allocation in the One-Side Interference Channel with Relay Song Zhao, Zhimin Zeng, Tiankui Zhang

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks

Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networks Energy-Balanced Cooperative Routing in Multihop Wireless Ad Hoc Networs Siyuan Chen Minsu Huang Yang Li Ying Zhu Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Dynamic Fair Channel Allocation for Wideband Systems

Dynamic Fair Channel Allocation for Wideband Systems Outlines Introduction and Motivation Dynamic Fair Channel Allocation for Wideband Systems Department of Mobile Communications Eurecom Institute Sophia Antipolis 19/10/2006 Outline of Part I Outlines Introduction

More information

On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks

On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 9, SEPTEMBER 9 On Hierarchical Pipeline Paging in Multi-Tier Overlaid Hierarchical Cellular Networks Yang Xiao, Senior Member, IEEE, Hui Chen, Member,

More information

Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks

Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networks Dynamic Subcarrier, Bit and Power Allocation in OFDMA-Based Relay Networs Christian Müller*, Anja Klein*, Fran Wegner**, Martin Kuipers**, Bernhard Raaf** *Communications Engineering Lab, Technische Universität

More information

Fig.1channel model of multiuser ss OSTBC system

Fig.1channel model of multiuser ss OSTBC system IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. V (Feb. 2014), PP 48-52 Cooperative Spectrum Sensing In Cognitive Radio

More information

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference

End-to-End Known-Interference Cancellation (E2E-KIC) with Multi-Hop Interference End-to-End Known-Interference Cancellation (EE-KIC) with Multi-Hop Interference Shiqiang Wang, Qingyang Song, Kailai Wu, Fanzhao Wang, Lei Guo School of Computer Science and Engnineering, Northeastern

More information

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach

Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Cooperative Spectrum Sharing in Cognitive Radio Networks: A Game-Theoretic Approach Haobing Wang, Lin Gao, Xiaoying Gan, Xinbing Wang, Ekram Hossain 2. Department of Electronic Engineering, Shanghai Jiao

More information

A Game-Theoretic Analysis of Uplink Power Control for a Non-Orthogonal Multiple Access System with Two Interfering Cells

A Game-Theoretic Analysis of Uplink Power Control for a Non-Orthogonal Multiple Access System with Two Interfering Cells A Game-Theoretic Analysis of Uplink Power Control for a on-orthogonal Multiple Access System with Two Interfering Cells Chi Wan Sung City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong Email:

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

Dynamic Resource Allocation for Multi Source-Destination Relay Networks

Dynamic Resource Allocation for Multi Source-Destination Relay Networks Dynamic Resource Allocation for Multi Source-Destination Relay Networks Onur Sahin, Elza Erkip Electrical and Computer Engineering, Polytechnic University, Brooklyn, New York, USA Email: osahin0@utopia.poly.edu,

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users

Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Scaling Laws for Cognitive Radio Network with Heterogeneous Mobile Secondary Users Y.Li, X.Wang, X.Tian and X.Liu Shanghai Jiaotong University Scaling Laws for Cognitive Radio Network with Heterogeneous

More information

Dynamic Carrier and Power Amplifier Mapping for Energy Efficient Multi-Carrier Wireless Communications

Dynamic Carrier and Power Amplifier Mapping for Energy Efficient Multi-Carrier Wireless Communications Dynamic Carrier and Power Amplifier Mapping for Energy Efficient Multi-Carrier Wireless Communications arxiv:1901.06134v1 [eess.sp] 18 Jan 2019 Shunqing Zhang, Chenlu Xiang, Shan Cao, Shugong Xu*, and

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Distributed Power Allocation For OFDM Wireless Ad-Hoc Networks Based On Average Consensus

Distributed Power Allocation For OFDM Wireless Ad-Hoc Networks Based On Average Consensus Distributed Power Allocation For OFDM Wireless Ad-Hoc etworks Based On Average Consensus Mohammad S. Talebi, Babak H. Khalaj Sharif University of Technology, Tehran, Iran. Email: mstalebi@ee.sharif.edu,

More information

Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks

Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks Performance Analysis of Power Control and Cell Association in Heterogeneous Cellular Networks Prasanna Herath Mudiyanselage PhD Final Examination Supervisors: Witold A. Krzymień and Chintha Tellambura

More information

Fairness and Efficiency Tradeoffs for User Cooperation in Distributed Wireless Networks

Fairness and Efficiency Tradeoffs for User Cooperation in Distributed Wireless Networks Fairness and Efficiency Tradeoffs for User Cooperation in Distributed Wireless Networks Yong Xiao, Jianwei Huang, Chau Yuen, Luiz A. DaSilva Electrical Engineering and Computer Science Department, Massachusetts

More information

Constructions of Coverings of the Integers: Exploring an Erdős Problem

Constructions of Coverings of the Integers: Exploring an Erdős Problem Constructions of Coverings of the Integers: Exploring an Erdős Problem Kelly Bickel, Michael Firrisa, Juan Ortiz, and Kristen Pueschel August 20, 2008 Abstract In this paper, we study necessary conditions

More information

Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints

Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Frequency and Power Allocation for Low Complexity Energy Efficient OFDMA Systems with Proportional Rate Constraints Pranoti M. Maske PG Department M. B. E. Society s College of Engineering Ambajogai Ambajogai,

More information

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network

EasyChair Preprint. A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network EasyChair Preprint 78 A User-Centric Cluster Resource Allocation Scheme for Ultra-Dense Network Yuzhou Liu and Wuwen Lai EasyChair preprints are intended for rapid dissemination of research results and

More information

Generalized Signal Alignment For MIMO Two-Way X Relay Channels

Generalized Signal Alignment For MIMO Two-Way X Relay Channels Generalized Signal Alignment For IO Two-Way X Relay Channels Kangqi Liu, eixia Tao, Zhengzheng Xiang and Xin Long Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China Emails:

More information

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

The Framework of the Integrated Power Line and Visible Light Communication Systems

The Framework of the Integrated Power Line and Visible Light Communication Systems The Framework of the Integrated Line and Visible Light Communication Systems Jian Song 1, 2, Wenbo Ding 1, Fang Yang 1, 2, Hongming Zhang 1, 2, Kewu Peng 1, 2, Changyong Pan 1, 2, Jun Wang 1, 2, and Jintao

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network

DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network DoF Analysis in a Two-Layered Heterogeneous Wireless Interference Network Meghana Bande, Venugopal V. Veeravalli ECE Department and CSL University of Illinois at Urbana-Champaign Email: {mbande,vvv}@illinois.edu

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic

Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Optimal Utility-Based Resource Allocation for OFDM Networks with Multiple Types of Traffic Mohammad Katoozian, Keivan Navaie Electrical and Computer Engineering Department Tarbiat Modares University, Tehran,

More information

Degrees of Freedom of the MIMO X Channel

Degrees of Freedom of the MIMO X Channel Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department

More information

On Global Channel State Estimation and Dissemination in Ring Networks

On Global Channel State Estimation and Dissemination in Ring Networks On Global Channel State Estimation and Dissemination in Ring etworks Shahab Farazi and D. Richard Brown III Worcester Polytechnic Institute Institute Rd, Worcester, MA 9 Email: {sfarazi,drb}@wpi.edu Andrew

More information

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks

Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Joint Spectrum and Power Allocation for Inter-Cell Spectrum Sharing in Cognitive Radio Networks Won-Yeol Lee and Ian F. Akyildiz Broadband Wireless Networking Laboratory School of Electrical and Computer

More information

An Overlaid Hybrid-Duplex OFDMA System with Partial Frequency Reuse

An Overlaid Hybrid-Duplex OFDMA System with Partial Frequency Reuse An Overlaid Hybrid-Duplex OFDMA System with Partial Frequency Reuse Jung Min Park, Young Jin Sang, Young Ju Hwang, Kwang Soon Kim and Seong-Lyun Kim School of Electrical and Electronic Engineering Yonsei

More information

Modulation Classification based on Modified Kolmogorov-Smirnov Test

Modulation Classification based on Modified Kolmogorov-Smirnov Test Modulation Classification based on Modified Kolmogorov-Smirnov Test Ali Waqar Azim, Syed Safwan Khalid, Shafayat Abrar ENSIMAG, Institut Polytechnique de Grenoble, 38406, Grenoble, France Email: ali-waqar.azim@ensimag.grenoble-inp.fr

More information

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks

Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Information-Theoretic Study on Routing Path Selection in Two-Way Relay Networks Shanshan Wu, Wenguang Mao, and Xudong Wang UM-SJTU Joint Institute, Shanghai Jiao Tong University, Shanghai, China Email:

More information

A New Design for WDM Packet Switching Networks with Wavelength Conversion and Recirculating Buffering

A New Design for WDM Packet Switching Networks with Wavelength Conversion and Recirculating Buffering A New Design for WDM Packet Switching Networks with Wavelength Conversion and Recirculating Buffering Zhenghao Zhang and Yuanyuan Yang Department of Electrical & Computer Engineering State University of

More information

Lossy Compression of Permutations

Lossy Compression of Permutations 204 IEEE International Symposium on Information Theory Lossy Compression of Permutations Da Wang EECS Dept., MIT Cambridge, MA, USA Email: dawang@mit.edu Arya Mazumdar ECE Dept., Univ. of Minnesota Twin

More information

Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things

Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things 1 Full-Duplex Machine-to-Machine Communication for Wireless-Powered Internet-of-Things Yong Xiao, Zixiang Xiong, Dusit Niyato, Zhu Han and Luiz A. DaSilva Department of Electrical and Computer Engineering,

More information

Optimization Methods on the Planning of the Time Slots in TD-SCDMA System

Optimization Methods on the Planning of the Time Slots in TD-SCDMA System Optimization Methods on the Planning of the Time Slots in TD-SCDMA System Z.-P. Jiang 1, S.-X. Gao 2 1 Academy of Mathematics and Systems Science, CAS, Beijing 100190, China 2 School of Mathematical Sciences,

More information

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless

Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Forty-Ninth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 28-30, 2011 Multi-user Two-way Deterministic Modulo 2 Adder Channels When Adaptation Is Useless Zhiyu Cheng, Natasha

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

Cognitive Radios Games: Overview and Perspectives

Cognitive Radios Games: Overview and Perspectives Cognitive Radios Games: Overview and Yezekael Hayel University of Avignon, France Supélec 06/18/07 1 / 39 Summary 1 Introduction 2 3 4 5 2 / 39 Summary Introduction Cognitive Radio Technologies Game Theory

More information

PoC #1 On-chip frequency generation

PoC #1 On-chip frequency generation 1 PoC #1 On-chip frequency generation This PoC covers the full on-chip frequency generation system including transport of signals to receiving blocks. 5G frequency bands around 30 GHz as well as 60 GHz

More information

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter

On Fading Broadcast Channels with Partial Channel State Information at the Transmitter On Fading Broadcast Channels with Partial Channel State Information at the Transmitter Ravi Tandon 1, ohammad Ali addah-ali, Antonia Tulino, H. Vincent Poor 1, and Shlomo Shamai 3 1 Dept. of Electrical

More information

Full/Half-Duplex Relay Selection for Cooperative NOMA Networks

Full/Half-Duplex Relay Selection for Cooperative NOMA Networks Full/Half-Duplex Relay Selection for Cooperative NOMA Networks Xinwei Yue, Yuanwei Liu, Rongke Liu, Arumugam Nallanathan, and Zhiguo Ding Beihang University, Beijing, China Queen Mary University of London,

More information

Traffic-Aware Transmission Mode Selection in D2D-enabled Cellular Networks with Token System

Traffic-Aware Transmission Mode Selection in D2D-enabled Cellular Networks with Token System 217 25th European Signal Processing Conference (EUSIPCO) Traffic-Aware Transmission Mode Selection in D2D-enabled Cellular Networks with Token System Yiling Yuan, Tao Yang, Hui Feng, Bo Hu, Jianqiu Zhang,

More information

NOMA in Distributed Antenna System for Max-Min Fairness and Max-Sum-Rate

NOMA in Distributed Antenna System for Max-Min Fairness and Max-Sum-Rate NOMA in Distributed Antenna System for Max-Min Fairness and Max-Sum-Rate Dong-Jun Han, Student Member, IEEE, Minseok Choi, Student Member, IEEE, and Jaekyun Moon Fellow, IEEE School of Electrical Engineering

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 3, MARCH

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 3, MARCH IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 14, NO. 3, MARCH 2015 1183 Spectral Efficiency and Outage Performance for Hybrid D2D-Infrastructure Uplink Cooperation Ahmad Abu Al Haija, Student Member,

More information

Multicasting over Multiple-Access Networks

Multicasting over Multiple-Access Networks ing oding apacity onclusions ing Department of Electrical Engineering and omputer Sciences University of alifornia, Berkeley May 9, 2006 EE 228A Outline ing oding apacity onclusions 1 2 3 4 oding 5 apacity

More information

Frequency Synchronization in Global Satellite Communications Systems

Frequency Synchronization in Global Satellite Communications Systems IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 51, NO. 3, MARCH 2003 359 Frequency Synchronization in Global Satellite Communications Systems Qingchong Liu, Member, IEEE Abstract A frequency synchronization

More information

TWO-WAY communication between two nodes was first

TWO-WAY communication between two nodes was first 6060 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 61, NO. 11, NOVEMBER 2015 On the Capacity Regions of Two-Way Diamond Channels Mehdi Ashraphijuo, Vaneet Aggarwal, Member, IEEE, and Xiaodong Wang, Fellow,

More information

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control

Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Utilization-Aware Adaptive Back-Pressure Traffic Signal Control Wanli Chang, Samarjit Chakraborty and Anuradha Annaswamy Abstract Back-pressure control of traffic signal, which computes the control phase

More information

Throughput Optimization in Wireless Multihop Networks with Successive Interference Cancellation

Throughput Optimization in Wireless Multihop Networks with Successive Interference Cancellation Throughput Optimization in Wireless Multihop Networks with Successive Interference Cancellation Patrick Mitran, Catherine Rosenberg, Samat Shabdanov Electrical and Computer Engineering Department University

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

How Much Can Sub-band Virtual Concatenation (VCAT) Help Static Routing and Spectrum Assignment in Elastic Optical Networks?

How Much Can Sub-band Virtual Concatenation (VCAT) Help Static Routing and Spectrum Assignment in Elastic Optical Networks? How Much Can Sub-band Virtual Concatenation (VCAT) Help Static Routing and Spectrum Assignment in Elastic Optical Networks? (Invited) Xin Yuan, Gangxiang Shen School of Electronic and Information Engineering

More information

On the Value of Coherent and Coordinated Multi-point Transmission

On the Value of Coherent and Coordinated Multi-point Transmission On the Value of Coherent and Coordinated Multi-point Transmission Antti Tölli, Harri Pennanen and Petri Komulainen atolli@ee.oulu.fi Centre for Wireless Communications University of Oulu December 4, 2008

More information

Energy Efficiency Maximization for CoMP Joint Transmission with Non-ideal Power Amplifiers

Energy Efficiency Maximization for CoMP Joint Transmission with Non-ideal Power Amplifiers Energy Efficiency Maximization for CoMP Joint Transmission with Non-ideal Power Amplifiers Yuhao Zhang, Qimei Cui, and Ning Wang School of Information and Communication Engineering, Beijing University

More information

Optimum Detector for Spatial Modulation using Sparsity Recovery in Compressive Sensing

Optimum Detector for Spatial Modulation using Sparsity Recovery in Compressive Sensing ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(36), DOI: 10.17485/ijst/2016/v9i36/102114, September 2016 Optimum Detector for Spatial Modulation using

More information

Efficient Transmission Schemes for Low-Latency Networks: NOMA vs. Relaying

Efficient Transmission Schemes for Low-Latency Networks: NOMA vs. Relaying Efficient Transmission Schemes for Low-Latency Networks: NOMA vs. Relaying Yulin Hu, M. Cenk Gursoy and Anke Schmeink Information Theory and Systematic Design of Communication Systems, RWTH Aachen University,

More information

Sequencing and Scheduling for Multi-User Machine-Type Communication

Sequencing and Scheduling for Multi-User Machine-Type Communication 1 Sequencing and Scheduling for Multi-User Machine-Type Communication Sheeraz A. Alvi, Member, IEEE, Xiangyun Zhou, Senior Member, IEEE, Salman Durrani, Senior Member, IEEE, and Duy T. Ngo, Member, IEEE

More information

Joint Rate and Power Control Using Game Theory

Joint Rate and Power Control Using Game Theory This full text paper was peer reviewed at the direction of IEEE Communications Society subect matter experts for publication in the IEEE CCNC 2006 proceedings Joint Rate and Power Control Using Game Theory

More information

Channel Estimation and Multiple Access in Massive MIMO Systems. Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong

Channel Estimation and Multiple Access in Massive MIMO Systems. Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong Channel Estimation and Multiple Access in Massive MIMO Systems Junjie Ma, Chongbin Xu and Li Ping City University of Hong Kong, Hong Kong 1 Main references Li Ping, Lihai Liu, Keying Wu, and W. K. Leung,

More information

Secondary Transmission Profile for a Single-band Cognitive Interference Channel

Secondary Transmission Profile for a Single-band Cognitive Interference Channel Secondary Transmission rofile for a Single-band Cognitive Interference Channel Debashis Dash and Ashutosh Sabharwal Department of Electrical and Computer Engineering, Rice University Email:{ddash,ashu}@rice.edu

More information

Optimal Spectrum Management in Multiuser Interference Channels

Optimal Spectrum Management in Multiuser Interference Channels IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 8, AUGUST 2013 4961 Optimal Spectrum Management in Multiuser Interference Channels Yue Zhao,Member,IEEE, and Gregory J. Pottie, Fellow, IEEE Abstract

More information

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error

Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Energy Harvested and Achievable Rate of Massive MIMO under Channel Reciprocity Error Abhishek Thakur 1 1Student, Dept. of Electronics & Communication Engineering, IIIT Manipur ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

Near Optimal Joint Channel and Power Allocation Algorithms in Multicell Networks

Near Optimal Joint Channel and Power Allocation Algorithms in Multicell Networks Near Optimal Joint Channel and Power Allocation Algorithms in Multicell Networks Master Thesis within Optimization and s Theory HILDUR ÆSA ODDSDÓTTIR Supervisors: Co-Supervisor: Gabor Fodor, Ericsson Research,

More information