Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Size: px
Start display at page:

Download "Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection"

Transcription

1 Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying a scheme that can seect a path with the argest epected duration. To this end we first study the distribution of path duration. We show that, under a set of mid conditions, when the hop count aong a path is arge, the distribution of path duration can be we approimated by an eponentia distribution even when the distributions of ink durations are dependent and heterogeneous. Secondy, we investigate the statistica reation between a path duration and the durations of the inks aong the path. We prove that the parameter of the eponentia distribution, which determines the epected duration of the path, is reated to the ink durations ony through their means and is given by the sum of the inverses of the epected ink durations. Based on our anaytica resuts we propose a scheme that can be impemented with eisting routing protocos and seect the paths with the argest epected durations. We evauate the performance of the proposed scheme using ns- simuation. I. INTRODUCTION Muti-hop wireess ad-hoc networks have been the focus of active research in recent years. Unike a wireine network with a fied infrastructure, a wireess ad-hoc network can be depoyed with no infrastructure and mobie nodes can estabish and maintain a network in an autonomous manner. Due to nodes mobiity, inks are epected to be set up and torn down much more frequenty than in a wireine network. As a resut, a network topoogy varies with time as the connectivity between nodes changes dynamicay. Frequent ink faiures and network topoogy changes in mobie ad-hoc networks (MANETs) render the routing protocos designed for wireine networks (e.g., the Internet) rather inefficient. A suite of new routing agorithms have been proposed for MANETs to dea with frequent network topoogy changes 8,, 4, 5. A detaied discussion of avaiabe routing protocos is provided in the monographs 3. Due to nodes mobiity, inks aong a provided path may become unavaiabe in an unpredictabe manner. When one or more inks aong a path in use become unavaiabe (which we ca a path faiure), the path is no onger vaid and a path recovery procedure is triggered to find an aternate path. Detecting and recovering from a path faiure can take a nonnegigibe amount of time (from appications viewpoint), during which service to on-going traffic wi be disrupted. Such a disruption in service can degrade the performance of time-critica appications. Furthermore, an initiation of path recovery incurs additiona overhead. Therefore, from the perspective of providing reiabe network service and Authors are with the Department of Eectrica & Computer Engineering, University of Maryand, Coege ark. E-mai: {hyonga,hyijie}@isr.umd.edu. minimizing contro overhead, a good routing agorithm shoud take into consideration the epected duration as we as other requirements when seecting a path. The duration of a path refers to the amount of time for which the path remains avaiabe after its set-up unti one of the inks aong the path fais for the first time. Intuitivey the duration of a path shoud depend on the durations of the inks aong the path and their dependence structure. Therefore, there is much interest in better understanding the statistica properties of ink and path durations and their reation. Better understanding of their statistica properties wi aow us to approimate the frequency of disruption in service and resuting overhead. Hence, it wi hep us evauate the performance of on-demand routing protocos and the adverse effects of potentiay frequent disruptions in service on the performance of upper ayers (e.g., Transmission Contro rotoco) without having to run time-consuming detaied simuations. A numerica eampe using the Random Waypoint (RW) mobiity mode is given in 5, Section 8. To the best of authors knowedge there is very itte known about the distribution of path durations and its reation with those of the inks that provide them. Consequenty, most of eisting routing protocos seect a path based on some heuristic argument; the Dynamic Source Routing (DSR) protoco seects the minimum hop path, whereas the Ad-hoc On-demand Distance Vector (AODV) routing protoco seects the first discovered path. Associativity Based Routing (ABR) protoco seects the path with maimum average age of the inks. However, it is not cear how the hop count or the average age of the inks aong a path is reated to its (epected) duration. Aong this ine Sadagopan et a. 7 presented a simuation study of the distribution of muti-hop path durations under various mobiity modes. Their study shows that the distribution of path duration can be accuratey approimated by an eponentia distribution when the number of hops is arger than 3 or 4 for a mobiity modes considered. However, no cear epanation was offered for the emergence of an eponentia distribution. In order to correct the current state of affairs Han et a. 5 deveoped an approimate framework for studying the distributions of path and ink durations. They showed that, under certain conditions, the distribution of path duration (under appropriate scaing) converges to an eponentia distribution when the number of hops becomes arge. This resut is in ine with the simuation resuts provided in 7, and is obtained as a simpe appication of am s Theorem 7, Thm. 5-4, p. 57. In addition, they epored the connection between the epected duration of a path and the epected durations of the

2 inks aong the path. To be more precise, they showed that when the number of hops is arge, the inverse of the epected duration of a path is approimatey given by the sum of the inverses of epected durations of the inks aong the path. The resuts reported in 5 provide the first evidence that when the hop count is arge, the distribution of path duration can indeed be approimated by an eponentia distribution. The appication of am s theorem in 5, however, requires that the ink ecess ives be mutuay independent, which is in genera not true. The ecess ife of a ink in a path refers to the amount of time the ink remains avaiabe unti it is torn down for the first time after the path set-up. Two neighboring inks aong a path, for eampe, share a common node. Ceary, the ecess ives of these two neighboring inks depend on the mobiity of the shared node, introducing some eve of dependence in them. Moreover, such oca dependence in ink ecess ives may be more evident under group mobiity modes where the mobiity of a set of nodes may be correated. Therefore, it is of much interest to see if the same distributiona convergence to an eponentia distribution hods without the independence assumption and how the parameter of the imit distribution (which decides the epected duration) is affected by the dependence. In this paper we etend the resuts in 5 by reaing the independence assumption on the ink ecess ives imposed in 5; we ony require that the dependence of ink ecess ives go away asymptoticay with increasing hop distance between the inks. This assumption can be stated using what is known as a miing condition (Section V-A). It aows the possibiity of reativey strong oca dependence in ink ecess ives which can be ehibited, for eampe, under group mobiity modes. We demonstrate that, under some mid conditions (to be stated precisey), the same distributiona convergence to an eponentia distribution reported in 5 hods under this much weaker condition (Section V-B). We point out that reaing the independence assumption demands a new technique for proving the distributiona convergence and compicates the proof consideraby; a suitabe etension of am s theorem that deas with dependent processes is not avaiabe. We aso show that the parameter of the emerging eponentia distribution is the same whether the ink ecess ives are mutuay independent or not. In other words, the parameter of the eponentia distribution is given by the sum of the inverses of the epected ink durations. This suggests that for a path with a sufficienty arge hop count the dependence of ink ecess ives does not significanty affect the path duration distribution. Based on this observation, we outine a scheme that can be impemented in eisting routing protocos to seect the path with the argest epected duration with minima communication overhead (Section VI). We impement this scheme in AODV and evauate the performance gain (Section VII). The paper is organized as foows. A basic framework for modeing path durations is given in Section II. Section III introduces the set-up under which the asymptotic distribution of a path duration with increasing hop count is studied. In Section IV we study a simper case in which ink durations have the same distribution and their dependence is imited to a finite neighborhood. This is foowed by a study of more genera cases in which the ink duration distributions may be heterogeneous and the dependence is not imited to a finite neighborhood in Section V. We outine how our resuts can be used to impement a scheme for seecting a path with the argest epected duration during a path discovery phase in Section VI. Simuation resuts are presented in Section VII to demonstrate the performance gain from our proposed scheme. A word on the notation and convention used throughout: We define a the random variabes (rvs) of interest on some common probabiity space (Ω, F, ). Two IR vaued rvs X and Y are said to be equa in aw if they have the same distribution, a fact we denote by X = st Y. The independence between two rvs X and Y is denoted by X Y. If G is a probabiity distribution on IR +, et m(g) denote its first moment which is aways assumed to be finite. Convergence in distribution (with n going to infinity) is denoted by = n. For any in IR, with components (, ), set = +. II. A BASIC FRAMEWORK This section describes the same basic framework that we borrow from 5 for our anaysis: Consider a MANET where a set of nodes creates and maintains network connectivity. We assume that an on-demand agorithm is used and a path between a source node and a destination node is set up ony when a request is made. Let V = {,..., N} denote the set of N mobie communicating nodes. Each node moves across a domain D of R or R 3 according to some mobiity mode. Due to nodes mobiity, inks between nodes are set up and torn down dynamicay. We assume that a ink between two nodes is either up or down. Two nodes without a ink between them estabish such a ink as soon as they become reachabe, e.g., when they come within a transmission range of each other or when the signa to interference and noise ratio (SINR) at the receiver eceeds certain threshod, and packets from each other can be successfuy decoded. The atter case captures the characteristics of the physica ayer (e.g., path oss and channe fading) more accuratey. Athough this is not needed for the anaysis, communication inks are assumed bidirectiona since such bidirectiona communication is typicay required between two nodes for reiabe forwarding of packets, for instance, by means of acknowedgments for each transmission. Estabishing a path from a source node to a destination node requires simutaneous avaiabiity of a number of communication inks that are up at the time of path request and coectivey provide the desired connectivity between the source and the destination. The duration of a path provided by the underying routing protoco is then defined as the amount of time that eapses unti one of the inks aong the path goes down for the first time after the path set-up. A ink may go down (which we ca a ink faiure) due to either mobiity or degradation in channe condition. For simpicity of anaysis, path set-up deays are assumed negigibe. A. Reachabiity processes We mode the situation outined above as foows: For a pair of distinct nodes i and j in V, we introduce a {0, }-vaued

3 3 reachabiity process {ξ ij (t), t 0} with the interpretation that ξ ij (t) = (resp. ξ ij (t) = 0) if the unidirectiona ink from node i to node j, denoted by ink (i, j), is up (resp. down) at time t 0. Since the communication inks are assumed bidirectiona, we must have ξ ij (t) = ξ ji (t). The process {ξ ij (t), t 0} is simpy an aternating on-off process, with successive up and down time durations given by the rvs {U ij (k), k =,,...} and {D ij (k), k =,,...}, respectivey. The reachabiity processes can be defined in a number of ways. For eampe, for each i in V, et {X i (t), t 0} describe the trajectory of node i, i.e., X i (t) denotes the position of node i at time t 0. If we do not epicity mode channe fading between nodes, it is reasonabe to assume that two nodes can communicate with each other reiaby if the distance between them is smaer than some fied transmission range r min > 0. Hence, a ink between two distinct nodes i and j in V eists at time t 0 if and ony if their distance is smaer than r min, eading to the definition ξ ij (t) := X i (t) X j (t) r min, t 0. () Aternative modes can take into account the physica ayer characteristics of the channe. For instance, two nodes i and j in V can maintain a ink between them at time t 0 if and ony if ( j F ji (t) min, ) i F ij (t) > Γ () Ψ i (t) Ψ j (t) for some threshod Γ > 0, where i is the maimum transmission power of node i, and F (t) = (F ij (t)) denotes the channe gain matri (incuding fading) at time t with F ji (t) 0 and F ii (t) = 0, i, j =,... N. Different choices of Ψ i (t) in () ead to different physica ayer modes. In the simpest form, one can assume that a node i can decode the packets from node j if and ony if the received signa power eceeds some threshod Γ > 0, 6. In this case the reachabiity process between nodes i and j is given by () with Ψ i (t) = as the numerators give the argest achievabe received signa power at the nodes. Simiary, if one assumes that packets can be successfuy decoded if and ony if the achieved SINR eceeds the threshod Γ 3, 4, then the reachabiity process between nodes i and j is again given by () with Ψ i (t) = W i + k (t) F ki (t), (3) k T X(t)\{j} where W i is the noise variance at node i, T X(t) is the set of transmitters at time t and k (t) denotes the transmission power of node k. The right hand side of (3) represents the sum of noise power and interference at node i at time t. This impies that nodes i and j have connectivity if and ony if the achieved SINR vaue using the maimum transmission power eceeds Γ in both directions. B. ath duration Net we endow V with a time-varying graph structure by introducing a time-varying set E(t) of directed edges through the reation E(t) := {(i, j) V V : ξ ij (t) = }, t 0 (4) where by convention we set ξ ii (t) = 0 for each i in V and a t 0. Thus, a path can be estabished (in principe) between nodes s and d at time t 0, if node d is reachabe from node s by a path in the undirected graph derived from the directed graph (V, E(t)). Let sd (t) E(t) denote the set of paths from node s to node d providing this reachabiity. This set of paths is empty when the nodes s and d are not reachabe from each other at time t. When non-empty, this set sd (t) may contain more than one path since mutipe paths may eist between nodes s and d. In such a case, the routing protoco in use seects one of the paths in sd (t) and et L sd (t) denote the set of inks in the seected path. For each ink in L sd (t), et T (t) denote the time-to-ive or ecess ife after time t, i.e., T (t) is the amount of the time that eapses from time t onward unti ink is down. The time-to-ive or duration Z sd (t) of the estabished path from node s to node d using the inks in L sd (t) is defined as the amount of time that eapses from time t unti one of the inks in L sd (t) goes down, at which point a path recovery procedure is initiated. This quantity is simpy given by Z sd (t) := min (T (t) : L sd (t)), t 0. (5) III. THE SET-U AND MODELING ASSUMTIONS In this paper we are interested in studying the distribution of path duration as the number of hops becomes arge. In the foowing subsection we first describe the set-up used to mode this scenario. Then, we state the modeing assumptions under which the distributiona convergence of path duration is estabished with increasing hop count. A. The set-up In order to study the distribution of path duration with a arge hop count, we investigate the asymptotic distribution of path duration (under appropriate scaing of ink ecess ives) as the number of hop count increases. This is done by introducing a parametric scenario with a sequence of networks in which both the number of communicating nodes and the domain across which they trave increase: For each n =,,..., et V (n) = {,..., N (n) } and D (n) denote the set of mobie nodes and the domain across which the nodes move, respectivey. For each node i in V (n), the (t), t 0} denotes the trajectory of node i in D (n). The stochastic process that governs the arriva of path requests is assumed to be independent of these trajectory processes. D (n) -vaued process {X (n) i. Scaing We are interested in the situation where N (n) nn () and Area(D (n) ) n Area(D () ) (6) as n goes to infinity; it is customary to reparameterize so that N (n) = n. When in force, the scaing (6) guarantees N (n) Area(D (n) ) N () Area(D () ), From now on we omit this quaifier in a asymptotic equivaences.

4 4 so that the density of nodes, i.e., the number of nodes per unit area, is asymptoticay constant.. Stationarity As the system is epected to run for a ong time, we can assume that steady state has been reached. This possibiity is captured by taking the N (n) trajectory processes to be jointy stationary. Joint stationarity of the trajectory processes aso impies that the N (n) (N (n) ) reachabiity processes are jointy stationary. For distinct i < j in V (n), et the rvs {(U (n) ij (k), D (n) ij (k)), k =,,...} denote the sequence of up and down times for the reachabiity process {ξ (n) ij (t), t 0}. Writing ( (k) = (U (n) ij (k), D (n) ij (k)), i < j, i, j V (n)), k =,,..., we require that the sequence of rvs { (k), k =, 3,...} be stricty stationary. In particuar, for distinct i < j in V (n), the sequence {(U (n) ij (k), D (n) ij (k)), k =, 3,...} constitutes a stationary sequence with generic marginas (U (n) ij, D (n) ij ). We denote by G(n) ij the cumuative distribution function (CDF) of U (n) ij. This mode is genera enough that ink dynamics due to both mobiity and channe fading can be captured by a suitabe choice of the CDFs for U (n) ij. We-known resuts for renewa processes and independent on-off processes in equiibrium 7, Sections 5-6 can be generaized as foows: With = (i, j), in the notation introduced in Section II, we have T (n) (0) ξ (n) ij (0) = = F (n) (), R (7) where the conditiona probabiity F (n) () is given by { ( ) F (n) G (n) = m(g (n) ) 0 (y) dy if > 0 0 if 0 (8) for some ink duration CDF G (n) with support in IR +. In other words, F (n) is simpy the distribution of the forward recurrence time associated with U (n). From (8) it is easy to see that the duration of a one-hop path has a non-increasing probabiity density function (DF). If X (n) denotes any R + - vaued rv distributed according to F (n), then the reation (7) simpy states, with a itte abuse of notation, that T (n) (0) ξ (n) ij (0) = = st X (n). The rv (5) can now be viewed as the rv Z (n) defined by ( Z (n) := min X (n) : =,..., H (n)) (9) where H (n) = L (n) sd (0). Due to the underying stationarity assumptions, it ceary suffices to consider ony the case t = 0 as we do from now on. B. Modeing assumptions There are a few sources of difficuty in modeing and studying the distribution of path durations: First, the set L sd (0) of inks in the seected path is a random subset of E(0), which depends on the reachabiity processes at t = 0. Second, the reachabiity processes are usuay not mutuay independent. This is cear from either formuation () or (). In this subsection we epain how we hande these issues.. Asymptotics of the random set L (n) sd (0) With increasing network size under scaing (6) the average number of hops in a path between two randomy seected nodes is epected to increase with n. For eampe, consider the mode with a fied domain, in which the connectivity between two nodes is determined by (). We first seect the ocations of a source and a destination according to some stationary spatia distribution of the nodes. Then, for each n = 3, 4,..., pace the remaining n other nodes on the domain according to the same stationary distribution whie decreasing the transmission range of the nodes as / n. If minimum hop routing is empoyed, the number of hops aong the shortest path wi increase approimatey as n. Thus, we assume that a pair of nodes s and d in V (n) can be seected such that im L (n) sd (0) =, where for convenience the sequence { L (n) sd (0), n =,,...} is assumed to be deterministic.. Dependence of the reachabiity processes and ink ecess ives As mentioned earier, the ink ecess ives {X (n), =,..., H (n) } in (9) are not mutuay independent in genera. The authors of 5 skirted this difficuty by assuming that the reachabiity processes {ξ ij (t), t 0} are mutuay independent so that the rvs {X (n), =,..., H (n) } are mutuay independent. They provided a simuation study (Section 9 in 5) using the RW mobiity mode without pause to justify this assumption; it shows that the correation coefficient of ink ecess ives in (9) decays rapidy with increasing hop distance between the inks. More specificay, it indicates that the correation coefficient of ink ecess ives between two neighboring inks is sma and that of two inks separated by intermediate ink(s) is amost negigibe. This observation provides some evidence that the dependence of ink ecess ives may indeed decrease quicky with hop distance in some cases. However, the observed fast decrease of correation in hop distance may be a consequence of the fact that the mobiity of a node in the RW mode is independent of other nodes, and if the mobiity of a set of nodes is strongy correated (e.g., sodiers in a patoon partaking in a mission), this may no onger be true. In the foowing sections we rea the independence assumption of the reachabiity processes in 5 and repace it with what are commony known as miing conditions. These conditions impose a form of asymptotic independence as the hop distance between inks increases, whie aowing dependence in an (unbounded) neighborhood. IV. FINITE DEENDENCE WITH HOMOGENEOUS LINK DURATION DISTRIBUTION In this section we consider a simper case where ink durations have the same CDF G with support in IR + and the dependence in ink ecess ives is imited to a finite oca Decreasing the transmission range whie keeping the domain fied has the same effect as increasing the domain size whie keeping the transmission range fied.

5 5 neighborhood. First, in order to mode the ink ecess ives, we introduce a stationary sequence of rvs {X i, i =,,...} whose CDF is given by F () = { m(g) 0 ( G(y)) dy, if > 0 0, if 0. (0) We et X (n) = X for a n + := {,,...} and a, i.e., rv X is used to mode the ecess ife of the - th ink in an -hop path. The path duration of an -hop path is modeed by rv Z (n) := min(x (n) : =,..., ). The rvs X i, i =,,..., are identicay distributed from the stationarity assumption, but may not be mutuay independent. The aforementioned assumption of finite dependence of ink ecess ives is given by the foowing: Assumption : (m-dependence 8) The rvs X i, i =,,..., satisfy X X if > m, where m is a finite positive integer. This assumption is consistent with the findings in 5, Fig. 9, where the dependence in ink ecess ives under the RW mobiity mode appears to be imited to a very sma neighborhood. Assumption : For every 0 and any given ɛ > 0, there eists an integer n = n (; ɛ) such that ( G ɛ, n = n n), n +,... Assumption is equivaent to saying that a ink duration is stricty positive with probabiity one, i.e., im G(/n) = G(0) = 0. It is obvious that this assumption hods triviay if the CDF G is continuous (i.e., ink durations can be modeed as continuous rvs). Therefore, it is a reasonabe assumption. Theorem : Suppose that Assumptions and hod for the stationary sequence {X i, i =,,...} and the CDF G. If the condition im ma c 0 X i < c X i < c, X j < c i j m = im ma X j < c X i < c () c 0 i j m = 0 hods, then im Z (n) = { e λ, if > 0 0, if 0 () where λ = (m(g)). roof: A proof is provided in Appendi III of the suppementa document due to a space constraint. Theorem tes us that as the number of hops aong a path increases the distribution of path duration can be we approimated by an eponentia distribution with parameter λ for a sufficienty arge. Note that rv Z (n) = min(x (n) : =,..., ) tends to decrease with increasing. This is aso obvious from the fact that λ as n. Thus, in order to keep Z (n) from converging to a constant rv with vaue zero as increases, rv Z (n) is scaed by the hop count in (). It is interesting to note that the parameter of the emerging eponentia distribution is given by the same λ = /m(g) whether the rvs {X i, i =,,...} are assumed to be ocay dependent as here or mutuay independent as assumed in 5. The condition in () impies that as c 0, the rare events {X j < c} do not occur in custers in a oca neighborhood of node i. One interpretation of this condition is as foows: Assume a very sma c. Rare events of ink ecess ives being smaer than c are primariy caused by nodes being cose to the edge of their transmission ranges and about to move out of the transmission ranges at the time of path set-up (rather than one or both of the nodes moving at an etremey high speed). Condition () impies that one pair of neighboring nodes being about to eave the transmission range of each other at the time of path set-up, does not mean the same is true for other pairs of neighboring nodes aong a path, which is reasonabe. This condition is vaidated in the case of the RW mobiity mode in Appendi V of the suppementa document. V. GENERAL DEENDENCE WITH HETEROGENEOUS LINK DURATION DISTRIBUTIONS In the previous section we considered the simper case where the dependence in ink ecess ives is imited to a finite neighborhood. As mentioned earier, this may be reasonabe in some cases. However, we show that it can be reaed consideraby. To be precise, the same distributiona convergence can be obtained even when the dependence of ink ecess ives is not bounded to any finite neighborhood and the ink duration distributions are heterogeneous. In this section we first define the miing conditions that describe the manner in which the dependence of ink ecess ives decays with the hop distance between the inks. Then, we estabish the distributiona convergence of path duration in more genera cases under the miing conditions. A. Miing conditions Suppose that W := { i, n =,,... ; i =,..., h(n)} is an array of IR-vaued rvs, where {h(n), n } is a sequence of positive integers with im h(n) =. Denote the joint CDF of rvs { i, i,..., i n } by J (n) i i n. For notationa simpicity we write J (n) i i n (u) for J (n) i i n (u,..., u). Let {u n, n } be a sequence of rea numbers (which typicay increases with n) and A := {α n,m, n =,,... ; m =,..., h(n)} be an array of non-negative rea numbers such that, for any integers < i < < i p < j < < j q h(n) where j i p > m, we have J (n) i...i pj...j q (u n ) J (n) i...i p (u n )J (n) j...j q (u n ) α n,m. (3) Definition : (D(u n ) condition 0, ) Suppose that we can find a sequence {m(n), n =,,...} of non-negative integers and an array A of rea numbers satisfying the condition in (3) such that (i) im m(n) =, (ii) m(n) = o(h(n)), m(n) i.e., im h(n) = 0, and (iii) im α n,m(n) = 0. Then, we say that the array W satisfies the condition D(u n ).

6 6 The condition D(u n ) imposes a form of dependence decay : As n increases, the dependence of two events { i u n,..., i p u n } and { j u n,..., j q u n } decreases as the distance j i p between the two sets of rvs increases. However, since m(n), it aows dependence in an unbounded neighborhood. One can easiy verify that a sequence that satisfies the m-dependence condition in Assumption satisfies the condition D(u n ) with any sequence {u n, n }. In order to state the definition of the second miing condition, we first need to introduce some notation. Let k be a fied positive integer. We divide the interva {,,..., h(n)} into k + disjoint subintervas 3 : The first k subintervas have a ength n := h(n)/k, where denotes the integer part of, and the ast interva has a ength smaer than k. For j =,,..., k, define and I (n) = {(j ) n +,..., j n }, I (n) k,k+ = {k n +,..., h(n)}. Note that I (n) = n for j =,..., k, and 0 I (n) k,k+ < k, where I denotes the cardinaity of I. Definition : The array W is said to satisfy the condition D (u n ) if, for a j =,,..., ( ) ( ) im, i > u n = o k i,i I (n) :i<i for a k > j. (4) A sufficient condition for the condition D (u n ) to hod is ( im h(n) k ( ) = o k ) sup, i > u n i,i I (n) :i<i for a k > j. (5) The interpretation of the condition D (u n ) in the contet of our probem wi be provided shorty. B. Distributiona convergence Define = (X (n) ), =,...,. Let W := {, n =,,... ; =,..., }. We denote the CDF of rv by J (n). We first make the foowing two assumptions. They are the same assumptions imposed in 5, Assumptions and for independent ink ecess ives cases. Assumption 3: For every 0, 4 ( ( )) im ma G (n) =,...,H (n) = 0. 3 We ca a finite set of consecutive integers {i,..., i } an interva with ength i i +. 4 In 5 the rvs X (n) are impicity scaed by, whie in this paper this scaing is carried out epicity. A more concrete way to epress Assumption 3 is as foows: For every 0 and any given ɛ > 0, there eists an integer n = n (; ɛ) such that ma G (n) =,...,H (n) ( ) ɛ, n = n, n +,... It is cear that the interpretation of this assumption is the same as that of Assumption and states that a ink duration is stricty positive with probabiity one. (. Assumption 4: (scaing) Let λ (n) = m(g (n) )) There eists some positive constant λ such that im = λ (n) = λ. (6) Assumption 4 simpy means that the ink ecess ives are scaed (by the average of the inverses of epected ink durations divided by λ) so that we can define the parameter of the imit distribution. Under Assumption 3, one can show that Assumption 4 is equivaent to the foowing assumption. Assumption 4A: There eists some positive constant λ such that, for any fied (0, ), we have = > λ as n. Lemma : Suppose that Assumption 3 hods. Let be some positive rea number and u n = /, n =,,.... Then, for any sequence {m(n), n =,,...} that satisfies conditions (i) - (ii) of Definition, we can find an array A of rea numbers which satisfies (3) and condition (iii) in Definition. roof: A proof is provided in Appendi IV of the suppementa document due to ack of space. Lemma impies that, under Assumption 3, the array W = {, n =,,... ; =,..., } aways satisfies the condition D(u n = /) for any in (0, ). In fact, in the proof we prove a sighty stronger resut: For any integers < i < < i p < j < < j q, the events { i,..., i p (n) } and {W j,..., j p } become asymptoticay independent as n increases. In other words, J (n) i...i pj...j q (u n ) J (n) i...i p (u n )J (n) j...j q (u n ) 0. For the cases with dependent ink ecess ives, we introduce two additiona assumptions. Assumption 5: For any sequence {Î(n), n =,,...} of sets of consecutive positive integers, where Î (n) {,..., }, λ (n) Î(n) = O ( Î(n) A sufficient condition for Assumption 5 to hod is that there eists some arbitrariy sma positive constant ε such that the epected ink durations satisfy m(g (n) ) ε for a n =,,... and =,...,. The interpretation of this assumption is that the epected ink durations do not ).

7 7 decrease to zero with increasing network size. Since the ink durations are ikey to depend on the nodes mobiity and their transmission ranges but not directy on the network size, this is a reasonabe assumption. Assumption 6: The array W = {, n =,,... ; =,..., } satisfies the condition D (u n ) with u n = for any (0, ). ( ) The condition D u n = impies that the rare events { } X (n) j in a neighborhood are not strongy correated as n (hence 0). The roe and interpretation of this condition are simiar to those of condition () in the m- dependence case (stated at the end of Section IV). Theorem : Suppose that Assumptions 3-6 hod. Then, we have { im Z (n) e = λ, if > 0 0, if 0 (7) roof: The proof is given in Appendi I. Theorem states that the distribution of an h-hop path can be we approimated by an eponentia distribution for a sufficienty arge h. As a byproduct it aso tes us that if the ink duration distributions are given by G, =,..., h, the epected duration of the path can be approimated by /( =,...,h (m(g )) ). Somewhat surprisingy, the parameter of the emerging eponentia distribution in (7) is the same as that of the eponentia distribution with independent ink ecess ives 5, Theorem. This hods even with somewhat strong oca dependence that may eist, and is consistent with the simiar observation made in Section IV. This again suggests that the distribution of path duration is not significanty affected by the dependence of the reachabiity processes and ink ecess ives when the hop count is sufficienty arge. VI. AN OUTLINE OF A ROOSED SCHEME Detecting a ink faiure and finding an aternative path can take a non-negigibe amount of time in practice. This is because ink faiures are often detected through a faiure to receive/echange a contro message over a pre-determined period. When oca recovery is unsuccessfu after a ink faiure, packets queued at the originator of the faied ink and additiona packets on the way to the node which were to be routed using the ink, wi eventuay be dropped by the node and must be retransmitted by their senders. These dropped packets ead to a waste of wireess resources. Moreover, osses of consecutive packets cause the transport ayer protoco to back off, reducing its transmission rate. This may cause senders to rey on timeout to detect the packet osses, which can take more than a few seconds. Hence, frequent ink faiures aong the paths in use wi resut in disruptions in service and degrade the performance of appications, especiay that of time critica appications. For these reasons a routing agorithm shoud consider its epected duration in addition to other quaities (e.g., estimated avaiabe bandwidth or congestion eve) when choosing a path. In a arge scae MANET the hop distance between a source and a destination is ikey to be arge 4. Our resuts in the previous sections te us that when hop counts are arge, (i) the distribution of path duration can be we approimated by an eponentia distribution and (ii) the inverse of the epected duration of a path is approimatey given by the sum of the inverses of the epected durations of the inks aong the path. Thus, in order to approimate the epected duration of a path, a source needs to know ony the sum of the inverses of the epected ink durations. Unfortunatey, accurate estimation of the epected ink durations aong a path is difficut in practice. Instead, we approimate them using average ink durations eperienced by the nodes: Under our scheme each node maintains the average duration of the inks that it estabishes with other nodes. These average ink durations are used as estimates to the epected ink durations aong a path and are provided to the source during a path discovery phase. Suppose that a node has routing information for a requested destination. Then, it generates a repy message and specifies the inverse of its estimate of the epected duration of the path to the destination in a fied Inverse ath Duration (ID) in the repy. A node that receives a repy message, first adds to the ID vaue the inverse of its average of ink durations, and then forwards it to the net upstream node. Finay, when the source receives the repy message, it adds the inverse of its average ink duration to the ID vaue. Then, the source chooses a path with the smaest ID vaue, i.e., the argest estimated epected duration. Fig.. λ (n) + λ (n) + λ (S) ath Request S n n Repy Repy λ (n) + λ (n) ath Request λ (n) An eampe of an estimation of epected path duration. Let us epain this procedure using the eampe shown in Fig.. The source node S wants to find a path to destination node D and broadcasts a path request to its neighbors. Assume that node n does not have routing information for D and forwards the request to its neighbor, node n. Assume that node n has routing information for D. It generates a repy with the initia ID vaue of λ (n), which is the inverse of its average ink duration. Here node n s average ink duration is used as an estimate of the epected duration of its ink with D. Then, it forwards the repy to node n. Upon receiving the repy, node n adds the inverse λ (n) of its average ink duration to the ID vaue and forwards the repy to source node S. Again, node n s average ink duration is used in pace of the epected duration of its ink with n. When S receives the repy, it first adds λ (S) to the ID vaue of λ (n) + λ (n) in the repy. Then, it uses the inverse of the fina ID vaue as an estimate of the epected duration of the discovered path {(S, n), (n, n), (n, D)}. As ony the sum of the inverses of average ink durations is coected, this proposed modification can be easiy impemented in avaiabe on-demand routing agorithms with minima overhead. It is aso possibe with our scheme that a node cassifies its neighbors and maintains a separate average ink duration for D

8 8 each type of neighbors. The reason for maintaining separate averages is as foows. A arge scae MANET is ikey to comprise many different types of nodes. For eampe, a Future Combat System (FCS) wi incude different types of vehices (e.g., jeeps, tanks, etc.), sodiers, and possiby aeria vehices. Ceary, the duration of a ink between two nodes wi depend on their mobiity and communication capabiities. Thus, the durations of inks a node estabishes with its neighbors over time wi be dependent on their mobiity and communication capabiities, as we as its own. By maintaining separate averages, we can improve the accuracy of the estimates of epected ink durations. This is demonstrated using ns- simuation resuts in Section VII. A. Impementation in AODV We impemented our proposed scheme in the AODV routing protoco to evauate the potentia gain in path durations. Most of our changes are imited to the path request and repy messages and their handing. The rest of the AODV scheme is eft intact. Since our primary interest is to study the potentia benefits of the path seection scheme (rather than proposing a compete routing protoco), we did not attempt to minimize the overhead it generates. Such overhead is ikey to depend on the routing protoco in which the proposed scheme is impemented, and the overa overhead of the integrated routing protoco shoud be minimized. Each node maintains two separate counters - a sequence number and a broadcast ID. The sequence number is incremented when (i) the node generates a new path request message or (ii) it is the requested destination in a path request message and generates a path repy message. This sequence number is used to indicate the freshness of the path request or repy message. Every node aso keeps an average of the ink durations it eperienced in the past. As mentioned earier, a node can maintain a separate average for each type of neighbors by cassifying them. Route entry A node creates and maintains a route entry for each known destination node. 5 However, unike in AODV, the node can keep up to k p paths (instead of a singe path), where k p is a design parameter. In our simuation the vaue of k p is set to three. The information of each path is recorded in a subentry with four fieds: (i) destination sequence number, (ii) net hop to the destination, (iii) hop count, and (iv) Inverse ath Duration (ID). The ID fied contains the the sum of the inverses of epected ink durations approimated using average ink durations and reported in a path repy message during path discovery. In order to avoid keeping redundant path information we require that the net hop to the destination of these paths be different. If there is more than one path avaiabe, one of them is seected as the primary path as foows. The others are used as backup paths in case the primary path fais. Ranking route subentries The paths in a route entry are ranked first based on the destination sequence numbers, and then based on the ID vaues. Ties are broken using the 5 The routing protoco running at a node may not be aware of node s neighbors at the beginning when the route entries are empty. hop counts. To be more precise, when more than one path to a destination are discovered, the paths are first ranked by decreasing destination sequence number. If two or more paths have the same sequence number, then the one with a smaer ID vaue takes a higher preference as it has a arger estimated epected duration than the others. Finay, if the first two are the same, the path with a smaer hop count is preferred. This is shown in Fig.. The path with the highest preference is used as the primary path for routing packets when needed. Fig.. Dest Seq. # ID vaue hop count Dest Seq. # ID vaue hop count Before ranking Ranking of discovered paths After ranking ath or route request When a source does not have routing information for a desired destination, it initiates a path discovery process; it first increments its sequence number and broadcasts a path request message to its neighbors. A path request message contains (i) source ID and its sequence number, (ii) source broadcast ID, (iii) destination ID and its sequence number, and (iv) hop count to the source. The hop count is initiay set to one. Each path request message is distinguished by its source ID and broadcast ID. When a node receives a path request message, it carries out the foowing: ) It checks if there is a subentry for the source in which the net hop is the neighbor that forwarded the request message. If there is no such subentry, it creates a subentry using the information contained in the request message. The ID vaue is set to infinity, indicating the information is not avaiabe, because the request message does not contain an ID vaue. If there is such a subentry and the sequence number in the request message is arger than the one in the subentry, it updates the source sequence number and the hop count. After the update, it re-ranks the paths to the source based on the new sequence number and the hop count. ) If the node had received another copy of the same request message, it terminates the message. Otherwise, if it is not the requested destination node in the message and has no routing information to the destination, it increases the hop count in the message and rebroadcasts the message to its neighbors. ath or route repy If an intermediate node has a route entry for the destination with the destination sequence number no smaer than the destination sequence number in the request message, it generates a path repy message. The repy message contains (i) destination ID and its sequence number, (ii) ID vaue, and (iii) hop count. For the destination sequence number, ID vaue, and hop count, the information in the subentry for the primary path to the destination node is used. The repy message is then sent to the neighbor node that forwarded the request message, and the request message is terminated. If a copy of the path request message reaches the destination node, the destination generates a repy message. It first increases its sequence number to the maimum of its current 3 4

9 9 sequence number and the destination sequence number in the request message. Then, it generates a repy message with the same three fieds in the repy message generated by an intermediate node. The initia vaue of the ID and the hop count are set to zero. If the destination node receives mutipe copies of the same path request message from different neighbor nodes, it can generate more than one repy message. When an intermediate node receives a repy message, it first adds the inverse of its average ink duration to the ID vaue in the repy message. Reca that the node may cassify the neighbor that forwarded the repy message and add the average ink duration corresponding to the neighbor s type when a separate average is kept for each type of neighbors. After incrementing the ID vaue, the intermediate node updates its routing information to the destination: It creates a temporary subentry for the newy discovered path to the destination with the information provided in the repy message. Then, it checks if the new path is better than the k p -th ranked path in the entry for the destination. If it is, then it re-ranks the paths, incuding the newy discovered path, and inserts the new subentry in the route entry for the destination. Otherwise, it discards the temporary subentry. If the repy message is the first repy the node receives for the corresponding request, then it forwards the repy to its upstream neighbor(s). Here we aow the node to forward the repy to up to k r ( k p ) neighbors that reayed a copy of the request message to the node. This is done to increase the number of discovered paths (than in AODV) so that the source can choose the best path among them. These k r upstream nodes are seected based on their ranking. The parameter k r may be adapted based on the average degree of the nodes. 6 In our simuation k r is set to three. If the repy message is not the first repy, but the new path has a smaer ID vaue than the previous primary path to the destination, then the node can sti forward the repy message. This is to advertise the discovery of a more reiabe path, i.e., a path with a arger epected duration. However, we did not use this feature in the simuation, and ony the first repy is forwarded. Finay, when the source receives a repy message, it first updates the hop count and the ID vaue using its average ink duration and then its route entry for the destination. Data transmission can begin after the first path to the destination is discovered. However, after processing a newy arrived repy message, the source may switch its primary path to the destination if the newy discovered path has a smaer ID vaue than the previous primary path. When a ink faiure occurs, the node that detects the faiure first attempts a oca recovery if there is a cached backup path in the route entry for the destination. The detais of our oca recovery scheme are described in 6 and are omitted in this paper. If the oca recovery fais, it broadcasts a route error message. The error message contains a ist of destination nodes affected by the ink faiure. Each node that receives an error message checks if any of the paths in its route entries traverses the faied ink. If there is any such path, the corresponding 6 When the average degree is arge, even a sma vaue of k r wi aow the source to discover mutipe avaiabe paths to choose from. If the network is sparsey connected, then a arger vaue of k r may be preferred. subentry is removed. If a primary path is affected, it initiates a path recovery procedure when necessary. VII. SIMULATION RESULTS In this section we evauate the performance gain (in path duration) from our scheme outined in the previous section. The simuation is run with 00 nodes moving in a km km rectanguar region. The RW mobiity mode is empoyed. The transmission range of the nodes is set to 50 m. There are two casses of nodes; the speed of a cass and cass node is uniformy distributed in, 5 m/s and 0, 30 m/s, respectivey. The reason for having two casses of nodes with different speed ranges is to create a scenario with heterogeneous nodes that eperience diverse ink durations in the fied (e.g., sodiers vs. tanks or jeeps). Sower moving cass nodes in genera eperience onger ink durations than faster moving cass nodes in our simuation due to the same fied transmission range. Speeds of the nodes are chosen independenty of the seected waypoints and previous speeds. Each run of simuation is for,00 seconds, and a tota of 6 runs are carried out with different random seeds. 7 However, in order to reduce the effects of transient period data are coected ony in the ast 800 seconds of each run. A tota of approimatey 5,000 connections are set up between randomy seected source and destination nodes. The interarriva times of connection requests are given by independent and identicay distributed rvs, each of which is a sum of 5 seconds and an eponentia rv with a mean 5 seconds. Each connection request generates a path request message, triggering a path discovery phase. Therefore, in the ast 800 seconds of each run we generate on the average 40 path request messages. We simuate three different scenarios by varying the number of cass nodes (hence cass nodes as we) to iustrate the benefits of our scheme and a trend that emerges. We first begin with 40 cass nodes and increase it to 60 and then to 80. Our scheme is run under two different modes: In the first mode, each node maintains a singe average ink duration for a neighbor nodes. In the second mode each node cassifies the neighbors and maintains two separate averages - one for cass neighbors and the other for cass neighbors. The CDFs of ink duration under our scheme for the 60 vs. 40 scenario are shown in Fig. 3. In the first mode, we pot the distributions seen by cass nodes and cass nodes. In the second mode, we pot the distributions of the inks between (i) two cass nodes, (ii) a cass node and a cass node, and (iii) two cass nodes. As epected, in the first mode ink durations seen by cass nodes are much arger than those seen by cass nodes in the usua stochastic order. However, note that the discrepancy in the ink duration distribution (a) between two cass nodes and (b) between a cass node and a cass node is not very arge. The CDFs of the path duration under AODV and our scheme (both with and without separate averages) are potted in Fig. 4. The median vaues of path durations are given in Tabe I. In the first two scenarios there is a 60 percent increase in the median vaues over AODV when nodes maintain separate 7 This is done to reduce the size of the mobiity fie needed in ns- simuation.

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo

More information

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp. 702 712, June 1998 008 AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

arxiv: v1 [cs.it] 22 Aug 2007

arxiv: v1 [cs.it] 22 Aug 2007 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.

More information

On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University.

On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University. On Avaiabe Bandwidth in FDDI-Based Recongurabe Networks Sanjay Kamat, Gopa Agrawa, and Wei Zhao Department of Computer Science Teas A&M University Coege Station, Teas 77843-3112 Abstract The increasing

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University

More information

Cooperative Caching in Dynamic Shared Spectrum Networks

Cooperative Caching in Dynamic Shared Spectrum Networks Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,

More information

Network Control by Bayesian Broadcast

Network Control by Bayesian Broadcast IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type

More information

Relays that Cooperate to Compute

Relays that Cooperate to Compute Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois

More information

Coverage and Rate Analysis for Millimeter Wave Cellular Networks

Coverage and Rate Analysis for Millimeter Wave Cellular Networks Coverage and Rate Anaysis for Miimeter Wave Ceuar Networks Tianyang Bai and Robert W. Heath, Jr. arxiv:42.643v3 cs.it 8 Oct 24 Abstract Miimeter wave mmwave) hods promise as a carrier frequency for fifth

More information

Analyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry

Analyzing Uplink SINR and Rate in Massive. MIMO Systems Using Stochastic Geometry Anayzing Upink SINR and Rate in Massive MIMO Systems Using Stochastic Geometry Tianyang Bai and Robert W. Heath, Jr. arxiv:5.2538v2 [cs.it] 2 Apr 26 Abstract This paper proposes a stochastic geometry framework

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

arxiv: v4 [physics.soc-ph] 31 Dec 2013

arxiv: v4 [physics.soc-ph] 31 Dec 2013 A Cascading Faiure Mode by Quantifying Interactions Junjian Qi and Shengwei Mei Department of Eectrica Engineering, Tsinghua University, Beijing, China 100084 arxiv:1301.2055v4 [physics.soc-ph] 31 Dec

More information

THE EMERGING IEEE ad wireless local area

THE EMERGING IEEE ad wireless local area 1 Suboptima Spatia Diversity Scheme for 60 Gz Miimeter-Wave WLAN Zhenyu Xiao, Member, IEEE arxiv:1511.02326v1 [cs.it] 7 Nov 2015 Abstract This etter revisits the equa-gain (EG) spatia diversity technique,

More information

Worst case delay analysis for a wireless point-to-point transmission

Worst case delay analysis for a wireless point-to-point transmission Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks n Optimization Framework for XOR-ssisted Cooperative Reaying in Ceuar Networks Hong Xu, Student Member, IEEE, Baochun Li, Senior Member, IEEE bstract This work seeks to address two questions in cooperative

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

Hybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications

Hybrid Digital-Analog Joint Source Channel Coding for Broadcast Multiresolution Communications 217 25th European Signa Processing Conference (EUSIPCO) Hybrid Digita-Anaog Joint Source Channe Coding for Broadcast Mutiresoution Communications O. Fresnedo, P. Suárez-Casa, L. Castedo Department of Eectronics

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks Joint Congestion Contro, Routing and Media Access Contro Optimization via Dua Decomposition for Ad Hoc Wireess Networks Francesco Lo Presti Dipartimento di Informatica Università de L Aquia opresti@di.univaq.it

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

CAN FD system design

CAN FD system design icc 215 CAN FD system design Dr. - Ing. M. Schreiner Daimer Research and Deveopment Abstract The objective of this paper is to give genera design rues for the physica ayer of CAN FD networks. As an introduction

More information

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic

More information

Provides exact fault location to one span

Provides exact fault location to one span TWS Mark VI Traveing wave faut ocator Provides exact faut ocation to one span Reduce down time by getting to the faut site faster Track intermittent sef cearing fauts and focus maintenance at the right

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

Estimation and Control of Lateral Displacement of Electric Vehicle Using WPT Information

Estimation and Control of Lateral Displacement of Electric Vehicle Using WPT Information Estimation and Contro of Latera Dispacement of Eectric Vehice Using WPT Information Pakorn Sukprasert Binh Minh Nguyen Hiroshi Fujimoto Department of Eectrica Engineering and Information Systems, The University

More information

Radial basis function networks for fast contingency ranking

Radial basis function networks for fast contingency ranking Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks

Distributed scheduling scheme for video streaming over multi-channel multi-radio multi-hop wireless networks Distributed scheduing scheme for video streaming over muti-channe muti-radio muti-hop wireess networks Liang Zhou, Xinbing Wang, Wei Tu, Gabrie-Miro Muntean, Benoit Geer To cite this version: Liang Zhou,

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication

More information

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S

More information

ARTI: An Adaptive Radio Tomographic Imaging System

ARTI: An Adaptive Radio Tomographic Imaging System 1 ARTI: An Adaptive Radio Tomographic Imaging System Ossi Katiokaio, Riku Jäntti Senior Member, IEEE and Nea Patwari Member, IEEE Abstract Radio tomographic imaging systems use received signa strength

More information

ENERGY MANAGEMENT OF WIRELESS SENSOR NETWORK WITH MIMO TECHNIQUES

ENERGY MANAGEMENT OF WIRELESS SENSOR NETWORK WITH MIMO TECHNIQUES EERGY MAAGEMET OF WIRELESS SESOR ETWORK WITH MIMO TECHIQUES TRUPTI MAYEE BEHERA Schoo of Eectronics, KIIT University Bhubaneswar, Odisha,India trupti_behera@rediffmai.com SUDHASU SEKHAR SIGH Schoo of Eectronics,

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations On the Effectiveness of Seep Modes in Backbone Networks with Limited Configurations Luca Chiaravigio, Antonio Cianfrani 2,3 ) Eectronics and Teecommunications Department, Poitecnico di Torino, Torino,

More information

Uplink Massive MIMO SIR Analysis: How do Antennas Scale with Users?

Uplink Massive MIMO SIR Analysis: How do Antennas Scale with Users? Upink Massive MIMO SIR Anaysis: How do Antennas Scae with Users? Tianyang Bai and Robert W. Heath, Jr. Wireess Networking and Communication Group The University of Texas at Austin 66 Guadaupe Street, C83,

More information

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI

CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI CHANNEL MODELLING & PERFORMANCE ANALYSIS OF WIFI Jivisha, Gaurav Mohta, Saumya Das Siim Manipa Institute of Technoogy Emai Id- gauravmohta.officia@gmai.com; Ph No. +9 9609850304 Abstract Wi-Fi or wireess

More information

Knowledge Representation and Reasoning in the Design of Composite Systems

Knowledge Representation and Reasoning in the Design of Composite Systems 470 IEEE TRANSACTIONS ON, SOFTWARE ENGINEERING, VOL. 18, NO. h, JUNE 1992 Knowedge Representation and Reasoning in the Design of Composite Systems Stephen Fickas and B. Robert Hem Abstract- Our interest

More information

Wireless Communications

Wireless Communications Wireess Communications Mutipe Access Hamid Bahrami Eectrica & Computer Engineering Communication System Bock Diagram Dupexing Dupexing: transmit and receive at the same time Exampe: teephone, how about

More information

Secrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels

Secrecy Outage Analysis over Correlated Composite Nakagami-m/Gamma Fading Channels Secrecy Outage Anaysis over Correated Composite Nakagami-m/Gamma Fading Channes George C. Aexandropouos, Senior Member, IEEE and Kostas P. Peppas, Senior Member, IEEE arxiv:7.9v [cs.it] 3 Oct 7 Abstract

More information

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing

Energy Efficient Sensor, Relay and Base Station Placements for Coverage, Connectivity and Routing Energy Efficient Sensor, Reay and Base Station Pacements for Coverage, Connectivity and Routing Mauin Pate*, R. Chandrasekaran and S.Venkatesan Teecommunication Engineering Program Erik Jonsson Schoo of

More information

An Efficient Adaptive Filtering for CFA Demosaicking

An Efficient Adaptive Filtering for CFA Demosaicking Dev.. Newin et. a. / (IJCSE) Internationa Journa on Computer Science and Engineering An Efficient Adaptive Fitering for CFA Demosaicking Dev.. Newin*, Ewin Chandra Monie** * Vice Principa & Head Dept.

More information

QoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation

QoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 2, DECEMBER 2009 QoS-Driven MAC-Layer Resource Aocation for Wireess Mesh Networks with n-atruistic de Cooperation and Service Differentiation Ho

More information

Multi-user video streaming using unequal error protection network coding in wireless networks

Multi-user video streaming using unequal error protection network coding in wireless networks Vukobratović and Stanković EURASIP Journa on Wireess Communications and Networking 202, 202:28 RESEARCH Open Access Muti-user video streaming using unequa error protection network coding in wireess networks

More information

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS Ingmar Hammerström, Jian Zhao, and Armin Wittneben Swiss Federa Institute of Technoogy (ETH)

More information

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,

More information

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems

Non-Preemptive Interrupt Scheduling for Safe Reuse of Legacy Drivers in Real-Time Systems Non-Preemptive Interrupt Scheduing for Safe Reuse of Legacy Drivers in Rea-Time Systems Tuio Facchinetti, Giorgio Buttazzo, Mauro Marinoni, and Giacomo Guidi University of Pavia, Itay {tuio.facchinetti,giorgio.buttazzo,

More information

Configuring Onyx to print on your HEXIS media

Configuring Onyx to print on your HEXIS media Configuring Onyx to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing the media profie into Onyx 3 2. Defaut setting

More information

Configuring RolandVersaWorks to print on your HEXIS media

Configuring RolandVersaWorks to print on your HEXIS media PRINTING DIVISION Product Buetin N 4 Configuring RoandVersaWorks to print on your HEXIS media 1. Instaing a media profie suitabe for your HEXIS printing media 1.1. Downoading the media profie 2 1.2. Importing

More information

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES

DESIGN OF SHIP CONTROLLER AND SHIP MODEL BASED ON NEURAL NETWORK IDENTIFICATION STRUCTURES DESIGN OF SHIP CONROLLER AND SHIP MODEL BASED ON NEURAL NEWORK IDENIFICAION SRUCURES JASMIN VELAGIC, FACULY OF ELECRICAL ENGINEERING SARAJEVO, BOSNIA AND HERZEGOVINA, asmin.veagic@etf.unsa.ba ABSRAC his

More information

Space-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks

Space-Time Focusing Transmission in Ultra-wideband Cooperative Relay Networks ICUWB 2009 (September 9-11, 2009) 1 Space-Time Focusing Transmission in Utra-wideband Cooperative Reay Networks Yafei Tian and Chenyang Yang Schoo of Eectronics and Information Engineering, Beihang University

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

Cross-Layer Design for Downlink Multi-Hop Cloud Radio Access Networks with Network Coding

Cross-Layer Design for Downlink Multi-Hop Cloud Radio Access Networks with Network Coding Cross-Layer Design for Downin Muti-Hop Coud Radio Access Networs with Networ Coding Liang Liu, Member, IEEE and Wei Yu, Feow, IEEE Abstract arxiv:1606.08950v1 [cs.it] 29 Jun 2016 There are two fundamentay

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation

Power Spectrum Optimization for Interference Mitigation via Iterative Function Evaluation Power Spectrum Optimization for Interference Mitigation via Iterative Function Evauation Hayssam Dahrouj, Wei Yu, Taiwen Tang, and Steve Beaudin Eectrica and Computer Engineering Dept., University of Toronto,

More information

Resource management for network-assisted D2D communication DEMIA DELLA PENDA

Resource management for network-assisted D2D communication DEMIA DELLA PENDA Resource management for network-assisted D2D communication DEMIA DELLA PENDA Licentiate Thesis Stockhom, Sweden 2016 TRITA-EE 2016:035 ISSN 1653-5146 ISBN 978-91-7595-885-9 KTH Roya Institute of Technoogy

More information

RESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC

RESEARCH OF UHV CIRCUIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC .P.B. Sci. Bu., Series C, Vo. 79, Iss. 3, 217 ISSN 2286-354 RESEARCH OF HV CIRCIT BREAKER TRANSIENT RECOVERY VOLTAGE CHARACTERISTIC Baina HE 1, Yunwei HAO 2 The most critica transient a circuit breaker

More information

P H O T O CD I N F O R M A T I O N B U L L E T I N

P H O T O CD I N F O R M A T I O N B U L L E T I N PCD 077 Juy, 1994 Copyright, Eastman Kodak Company, 1994 P H O T O CD I N F O R M A T I O N B U L L E T I N Fuy Utiizing Photo CD Images Maintaining Coor Consistency When Creating KODAK Photo CD Portfoio

More information

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department

More information

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor Networks

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor Networks A Process Agebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireess Sensor Networks L. Gaina, A. Marin, S. Rossi Università Ca Foscari Venezia, Itay {gaina,marin,srossi}@dais.unive.it

More information

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

Dual Relay Selection for Cooperative NOMA with Distributed Space Time Coding

Dual Relay Selection for Cooperative NOMA with Distributed Space Time Coding This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI.9/ACCESS.8.846, IEEE Access

More information