AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS

Size: px
Start display at page:

Download "AN Ω(D log(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS"

Transcription

1 SIAM J. COMPUT. c 1998 Society for Industria and Appied Mathematics Vo. 27, No. 3, pp , June AN Ω(D og(n/d)) LOWER BOUND FOR BROADCAST IN RADIO NETWORKS EYAL KUSHILEVITZ AND YISHAY MANSOUR Abstract. We show that for any randomized broadcast protoco for radio networks, there exists a network in which the expected time to broadcast a message is Ω(D og(n/d)), where D is the diameter of the network and N is the number of nodes. This impies a tight ower bound of Ω(D og N) for any D N 1 ε, where ε>0 is any constant. Key words. radio networks, broadcast, ower bounds AMS subject cassifications. 68Q22, 68M10 PII. S Introduction. Traditionay, radio networks have received considerabe attention due to their miitary significance. The growing interest in ceuar teephones and wireess communication networks has reinforced the interest in radio networks. The basic feature of radio networks, which distinguishes them from other networks, is that a processor can receive a message ony from a singe neighbor at a certain time. If two (or more) neighbors of a processor transmit concurrenty, then the processor woud not receive either messages. In many appications, the users of the radio network are mobie, and therefore the topoogy is unstabe. For this reason, it is desirabe for radio-networks agorithms to refrain from making assumptions about the network topoogy, or about the information that processors have concerning the topoogy. In this work we assume that none of the processors initiay have any topoogica information, except for the size of the network and its diameter. 1 See [Tan81, Ga85, BGI92, BGI91] for a discussion on this mode and reated modes. We study broadcast protocos; those protocos are initiated by a singe processor (the originator) that has a message M it wishes to propagate to a the other processors in the network. In many of the radio-networks appications (e.g., ceuar phones) broadcast is a centra primitive which is frequenty used, for exampe, to perform a network-wide search for a user. Bar-Yehuda, Godreich, and Itai [BGI92] present a randomized broadcast agorithm, that runs in expected O(D og N + og 2 N) time sots, where N is the number of processors in the network and D is its diameter. In contrast, they show that for any deterministic broadcast agorithm there are networks of constant diameter on which the agorithm needs Ω(N) time sots. Received by the editors September 8, 1994; accepted for pubication (in revised form) Apri 3, An eary version of this paper appeared in Proc. 12th ACM Symp. on Principes of Distributed Computing, ACM, New York, 1993, pp Aiken Computation Lab., Harvard University, Cambridge, MA Current address: Dept. of Computer Science, Technion, Haifa, 32000, Israe (eyak@cs.technion.ac.i). This research was supported by research contracts ONR-N J-1981 and NSF-CCR Computer Science Dept., Te-Aviv University, Ramat Aviv, Te Aviv 69978, Israe and IBM T. J. Watson Research Center (mansour@cs.tau.ac.i). 1 Usuay, when the topoogy is unstabe, the diameter is unknown to the processors and ony a bound on the size of the network is avaiabe. However, since we are proving a ower bound, this assumption ony makes the resut stronger. 702

2 LOWER BOUND FOR BROADCAST IN RADIO NETWORKS 703 Aon et a. [ABLP91] made the first step towards proving the optimaity of the upper bound of [BGI92]. Their resut can be viewed as a graph-theoretic resut; they show that there exist networks of diameter D = 3 on which any schedue needs at east Ω(og 2 N) time sots. This ower bound shows that there are networks on which broadcast requires this many time sots, and it matches the known upper bounds [BGI92, CW87], in the case of constant-diameter networks. In this work we compete the picture by proving an Ω(D og(n/d)) ower bound. Our resut is of a different nature; we show that for any randomized broadcast agorithm and parameters N and D, there is an ordering of the N processors in a network of diameter D such that the expected number of time sots, used by the agorithm, is Ω(D og(n/d)). For D N 1 ε this gives an Ω(D og N) ower bound. Hence, it proves the tightness of the upper bound of [BGI92] for a N and D N 1 ε. Moreover, the ower bound hods even if each of the N processors is aowed to use a different program (e.g., the processors can use their IDs). In a recent work, Gaber and Mansour [GM95] have shown that for every network, there exists a schedue whose time is O(D + og 5 N). The scheduer there needs to get the topoogy of the network in advance, in order to buid the schedue. The resut of [GM95] shows that the ower bound presented here must rey heaviy on the ack of topoogica knowedge at the processors. Broadcast in radio networks has received considerabe attention in previous works. [CW87] present a deterministic sequentia agorithm that, given the network, finds in poynomia time a ega schedue that requires at most O(D og 2 N) time sots. Broadcast that is based on using a spanning tree was suggested in [CK85a, CK87]. In [BII93] it is shown how to reduce the amortized cost per broadcast by using a breadthfirst-search (BFS) tree. Simuation of point to point networks on radio networks is found in [CK85b, ABLP92, BGI91]. An important issue in the study of radio networks is whether coisions can be detected; namey, whether a istener can distinguish between the case when none of its neighbors transmit and the case when two or more of them transmit. In our mode it is assumed that the istener cannot distinguish between the two cases (say, it hears noise in both cases). There is another common mode in which it is assumed that the two cases are distinguishabe (say, if no neighbor transmits, the istener hears sience, whie if two or more neighbors transmit, the istener hears noise). A discussion justifying both modes can be found in [Ga85, BGI92]. Wiard [Wi86] studies a broadcast probem in a singe mutiaccess channe under this second mode (i.e., when coision detection is avaiabe). He shows matching upper and ower bounds of Θ(og og n) expected time sots 2 in this mode. Our main emma impies an Ω(og n) ower bound for the same probem in our mode. Again, this ower bound hods even if the processors use different programs. Hence, we demonstrate a provabe exponentia gap between these two modes. The rest of this paper is organized as foows: section 2 contains some necessary definitions. Section 3 contains the proof of the main emma in the uniform case, where a the processors use the same program. Section 4 contains the proof of the main emma in the nonuniform case, where processors may use different programs. The 2 Wiard shows an Ω(og og n) ower bound in the singe mutiaccess channe mode. Athough this bound appies to a different mode, it shoud be noted that his bound is aso significanty restricted by the types of agorithms for which it appies. In particuar, he requires independence between the decision whether to transmit in a certain time sot and the decisions made in previous time sots. In our case such a restriction is unacceptabe, as the upper bound of [BGI92] has such dependencies. Aso, he does not hande the case where each processor uses a different program.

3 704 EYAL KUSHILEVITZ AND YISHAY MANSOUR proof for this case is based on a probabiistic reduction to the uniform case. Finay, in section 5, we prove the main theorem. The proof invoves constructing a difficut network in a probabiistic way. 2. Preiminaries. A radio network is described by an undirected graph G(V,E), 3 where N = V and D is the diameter of the graph. The nodes of the graph represent processors of the network, and an edge between nodes v and u impies that v can send messages to u (and vice-versa). The neighborhood ofanodeu incudes a the nodes v such that there is an edge (u, v) ine. The time is viewed as divided into sots (or rounds). In any given sot, a node (processor) can either transmit some message (a string in {0, 1} ) or not (i.e., remain sient). A radio network has the property that if two or more nodes in the neighborhood of a node u transmit at the same time sot, then none of the messages is received at u. More formay, we can define the set of possibe transmissions as W = {0, 1} {sient}. If exacty one of the node s neighbors transmits at time t and the message that this neighbor transmits is some m {0, 1}, then m is received by the node. In any other case (i.e., if either none of the neighbors transmits or more than one neighbor transmits) this node hears sient. The history of ength ofanode is a vector in W which consists of its view of the first rounds. Each processor P i in the radio network uses a probabiistic program. This program defines whether the processor wi transmit at the next time sot j or not. As we are not concerned with the computationa power of the processors we can simpy view this program as a probabiity distribution, which may depend on the history. More formay, for each processor P i and step j there is a probabiistic function Γ j i : W j 1 W that, based on the history, determines the action of P i in step j (i.e., whether it remains sient, or ese the vaue of the message it sends). The program of P i is a coection Γ i =(Γ 1 i, Γ2 i,...) that defines the actions of P i in each step. A protoco P N,D is simpy a coection of N such programs, one per processor. A protoco is uniform if a processors use the same program. Otherwise, if each processor has a different program, the protoco is nonuniform. The above definition aows the protocos to use the vaues of N and D. On the other hand, the protoco does not know the topoogy of the graph, meaning that the same protoco must work for a graphs of N nodes and diameter D. A broadcast protoco is a protoco that is initiated by a singe processor, caed originator, that hods a message M. Any other processor is inactive (i.e., it remains sient) unti receiving a message for the first time. The aim of the protoco is that each processor in the network wi receive a copy of the message M. 3. Uniform processors. In this section we prove the main emma for the uniform case, where a processors use the same program. It shows that if there are n processors 4 arranged in a cique, then there exists a t (2 t n) such that if t processors wish to transmit (we ca these t processors the participants), then the expected number of rounds (time sots) unti a round in which exacty one of them transmits is Ω(og n). In fact, we show that this is the case for most of the t s of the form t =2 i. Note that the assumption that the topoogy is not known to the processors, in the context of this emma, means that t, the number of processors that 3 None of the resuts presented in this work wi be changed if the network is a directed one. However, it is common in this area to assume that the network is undirected. 4 Note that we use here n (and not N) as the number of processors. This wi be convenient whie using the emma in the proof of the theorem.

4 LOWER BOUND FOR BROADCAST IN RADIO NETWORKS 705 are trying to transmit, is not known to any processor. We can view the scenario as having a famiy of networks with n+1 nodes, composed from a cique of size n and an originator which is connected to t of the nodes in the cique. The (unknown) topoogy is chosen to be one of these networks. For a broadcast protoco Π, we ca a round successfu if exacty one processor transmits. Let E(T Π ) denote the expected number of rounds unti the first successfu round, given that the number of participants is 2 (the expectation is taken over the probabiistic choices of the processors). Lemma 1. Let Π be a broadcast protoco, et the network be as above, and et n be an upper bound on the number of participants. Then, E [E(T Π )] = Ω(og n), where E denotes the expectation when is chosen uniformy from the range 1 og n. Proof. The first observation that we make is that the emma deas ony with the first success. This, in a sense, aows us to get rid of the dependency in the history we can assume that the (probabiistic) decision as to which rounds a processor tries to transmit is made at the beginning of the protoco. This is done by etting each of the 2 processors choose whether to transmit in round s or not in the same way as it chooses in the origina protoco, when a previous rounds were unsuccessfu. Ceary, as far as the first success is concerned, this modification has no effect on the protoco. Aso, as ony the first success is considered, it does not matter what the vaues of the messages that the processors try to transmit are. Hence, the decision of a processor on whether to transmit in round s may depend on the round number, s, and the probabiistic choices of the processor in the first s 1 rounds, but it does not depend on choices made by other processors. 5 Therefore, we can think about the processors as if they choose in advance, for every round s =1, 2,..., whether they wi try to transmit. 6 For simpicity of notation, we assume that n is a power of 2. Define p s, = Pr(faiure in rounds 1,...,s 1 and success in round s 2 participants). As the events described in the definition are disjoint (for fixed and different s s), and assuming that the protoco succeeds with probabiity 1 (no matter what is), we have for a (1) p s, =1. s=1 At some point in the proof beow, it wi be inconvenient if p s, depends on events that happen in previous rounds. However, we can get rid of this dependency simpy by writing (2) p s, Pr( success in round s 2 participants). 5 The message M that the processors need to broadcast aso infuences their decisions. However, it can be thought of as part of the program used by the processors. 6 To avoid measurabiity concerns, it is convenient to assume that the protoco is such that s is in the range 1,...,F, for some finite F. If this is not the case, we can aways choose F such that the probabiity of choosing ony in the range 1,...,F is arbitrariy cose to 1. This wi cause minor changes in our proof.

5 706 EYAL KUSHILEVITZ AND YISHAY MANSOUR The next caim gives a bound on the sum of the success probabiities in a given round. Intuitivey it says that you cannot have high probabiity of success in (a fixed) round s for more than a few vaues of 2. This woud impy that since the number of participants is unknown, Ω(og n) rounds woud be required to reach a success for a numbers of participants. Formay, we make the foowing caim. Caim 2. For any s, og =1 Pr(success in round s 2 participants) < 2. Proof. Fix s. As aready discussed, we assume that the processors make a their choices in advance. The history of choices of a processor is a string in {0, 1} s 1, where the vaue of the ith bit means trying ( 1 ) or not trying ( 0 ). Define q(s) = Pr(trying in round s) = history h Pr(h) Pr(trying in round s h). Note that q(s) does not depend on. We assume, without oss of generaity, that q(s) > 0 (rounds with q(s) = 0 can be omitted from the protoco). Reca that a successfu round is one in which exacty one processor is trying to transmit. Therefore, We get og =1 Pr(success in round s 2 participants) = 2 q(s) (1 q(s)) 2 1. Pr(success in round s 2 participants) = og =1 2 q(s)(1 q(s)) 2 1 og = q(s) 2 (1 q(s)) 2 1 =1 n 1 2 q(s) (1 q(s)) j 1 (1 q(s))n =2 q(s) < 2 q(s) which competes the proof of the caim. Let k be a parameter (to be fixed ater). We are interested in k s=1 p s,, which is intuitivey the probabiity that, given that there are 2 participants, the agorithm succeeds in one of the first k rounds. Using equation (2) and Caim 2, we get (3) og =1 s=1 By definition, k p s, k og s=1 =1 E [E(T Π )] = og =1 j=1 Pr(success in round s 2 participants) < 2k. 1 og n p s, s s=1 k og og n =1 s=k p s,.

6 LOWER BOUND FOR BROADCAST IN RADIO NETWORKS 707 By equation (1), this equas k og n og =1 ( ) k 1 1 p s,, s=1 which, by equation (3), is greater than By choosing k = 1 4 og n, we have that k (og n 2(k 1)). og n E [E(T Π )] 1 8 og n + 1 2, which competes the proof of the emma Nonuniform processors. In this section we prove the main emma for the nonuniform case, where the n processors may use different programs. The main idea of the proof is to reduce the nonuniform case to the uniform one, and use the resut of the previous section (Lemma 1). Lemma 3. Let Π be a protoco for n distinct processors P 1,...,P n that run (possiby) different programs. Let E(T Π ) denote the expected number of rounds unti the first successfu round, given that a random set of 2 processors participates (the expectation is taken over the choice of the set and the probabiistic choices made by the processors). Then E [E(T Π )] = Ω(og n), where is chosen uniformy from the range 1 og n. Proof. As argued in the previous section, as ony the first successfu round is considered, each program can be thought of as a schedue a choice of a subset of rounds in which the processor wi transmit. Processor P i chooses its schedue from a distribution µ i. We now define, based on the (possiby different) programs used by P 1,...,P n,a new program that wi be used by each of L uniform processors Q 1,...,Q L : processor Q j chooses (uniformy) at random 1 i n and simuates the program of processor P i. Namey, it chooses a schedue s with probabiity n 1 n i=1 µ i(s), where µ i (s) is the probabiity that processor P i chooses the schedue s. We denote by c(q j ) the processor P i that Q j chose to simuate. We emphasize that a the Q j s run the same program (i.e., they are uniform), and that different Q j s may choose to simuate the same processor P i (we wi choose L sma enough so that this wi happen ony with a sma probabiity). The foowing caim says that, given that a the c(q j ) s are distinct for Q 1,...,Q 2, then the probabiity distribution of the schedues chosen by the Q j s is the same as that of a random set of 2 processors P i. Caim 4. Let Q = {Q 1,...,Q 2 }. For every Q j Q, et c(q j ) be a random processor P i. If j 1 j 2 : c(q j1 ) c(q j2 ), then P = {c(q j ) Q j Q} is a random 7 In the origina version of this paper [KM93], we proved a sighty better ower bound of 1 og n; 4 however, the proof here is simper.

7 708 EYAL KUSHILEVITZ AND YISHAY MANSOUR set of 2 processors (in P 1,...,P n ), and the foowing hods: for every choice of 2 schedues s 2 =(s 1,...,s 2 ), Pr[ s 2 processors Q run ]=Pr[ s 2 processors P run ]. The foowing caim is the main too in the reduction from the nonuniform case to the uniform case. Caim 5. Let Q be as above and et Q = {Q 1,...,Q 2 } be a set of 2 processors. Each processor Q j runs the program of Q j at the odd steps and the [BGI92] program at the even steps. (Note that the [BGI92] program is aso a uniform protoco, and therefore, so is the program run by the processors Q.) Let β be the probabiity that j 1 j 2, c(q j1 ) c(q j2 ). Let T Q be the random variabe indicating the time of first success when the 2 identica programs in Q run, and reca that T Π is the random variabe indicating the time of first success when a random subset of 2 distinct programs P i1,...,p i2 run. Then, E[T Q ] 2β E[T Π ] + 8(1 β ) og n. In the above caim we mixed the given (unknown) protoco with the [BGI92] protoco. This is because we have no guarantee about the running time of the simuation, in the case when some Q j s choose to simuate the same P i. For exampe, a protoco that ets processor P i transmit at time sot i woud not terminate if a the Q j simuate the same processor P i. Proof. Let unique be the event that Q j1,q j2 Q,c(Q j1 ) c(q j2 ). Then, E[T Q ]=E[T Q unique] Pr[unique]+ E[T Q not unique] Pr[not unique]. By definition, Pr[unique] =β. By Caim 4, E[T Q unique] 2E[T Π ], where the additiona factor of 2 is due to the intereaving of the two protocos. In the case when the choices of c(q j ) are not unique, we cannot use the properties of the origina protoco. However, we can use the fact that the [BGI92] protoco has the expected time unti the first success of at most 4 og n. Therefore, E[T Q not unique] 8 og n, which competes the proof of the caim. The next caim says that with high probabiity the choices c(q j ) are unique. Caim 6. Let β be the probabiity that j 1 j 2, c(q j1 ) c(q j2 ), and assume that 2 n 1/4. Then, β > 1 1. n Proof. Note that Pr[j 1 j 2 and c(q j1 )=c(q j2 )] = 1 n.

8 LOWER BOUND FOR BROADCAST IN RADIO NETWORKS 709 Therefore, β = Pr[ j 1 j 2 ( ) 2 1 : c(q j1 ) c(q j2 )] 1 2 n. Since 2 n 1/4 the emma foows. Let L = n 1/4. By Caims 5 and 6, E[T Q ] 2β E[T Π ]+(1 β )8 og n 2E[T Π ]+ 8 og n n or E[T Π ] 1 2 Q E[T ] 4 og n. n We now take the expectation over a vaues 1 og L and get By Lemma 1, which impies that E [E[T Π ]] 1 2 E [E[T Q ]] 4 og n. n E [E[T Q ]] = Ω(og L) = Ω(og n), E [E[T Π ]] = Ω(og n), as desired. 5. Main theorem. In this section we prove the main theorem. We show that for every broadcast agorithm that does not know the topoogy of the network, for every N and every D, there exist networks of N processors and diameter D such that the expected running time of the agorithm (unti a processors receive the message) is Ω(D og(n/d)). This impies a simiar ower bound for the worst case running time, when a sma probabiity of error is aowed (which is the scenario in which the upper bound of [BGI92] is described). Given an agorithm and the vaues N and D, we construct a network as foows. Let n = N/D, and assume for simpicity that n is a power of 2. We construct a compete ayered network of D + 2 ayers. The first ayer (ayer 0) contains one node, s, which wi be the originator of the broadcast. Each of the next D ayers (ayers 1, 2,...,D) consists of n i =2 i n nodes, where i is chosen uniformy (and independenty for each ayer i) in the range 1,...,og n. The ast ayer contains a the other nodes (so that the tota number of nodes wi be N). Eachnodeinayeri is connected to a nodes in ayers i 1 and i + 1. (See Figure 1.) Reca that the topoogy of the network is not known to the processors. (If the topoogy was known, then an efficient uniform protoco woud be to et a processor at ayer i broadcast with probabiity 1/n i, with expected time O(D). A nonuniform protoco that knows the topoogy simpy ets one node in each ayer transmit.) The agorithm can depend, however, on other information that the processors have, in particuar, the history, the number of steps, etc. (As mentioned, other information which is independent of the graph, such as the message M to be broadcast, the

9 710 EYAL KUSHILEVITZ AND YISHAY MANSOUR Fig. 1. Structure of the network. processors IDs, or the vaue of a cock, can be thought of as encoded into the programs of the processors.) We discuss the uniform case, in the sense that a the processors at ayer i have the same protoco. The extension to the nonuniform case empoys the techniques of the previous section, and the proof is the same but the notation becomes cumbersome. (In particuar, in the nonuniform case, at each ayer i we wi choose not ony n i but aso a random set of n i processors.) The main property of this construction is the foowing. For a i and a runs of the protoco, a the processors in ayer i have the same view; every message received at one of these processors is received by a other processors at the same time. Therefore, the broadcast progresses in a ayer-by-ayer fashion. Moreover, this impies that a the processors in ayer i choose schedues according to the same distribution µ (the choice of µ depends on the history, but a the processors of ayer i share the same history), which aows us to use Lemma 1. Finay, before going into the detais, we make one more assumption that makes our argument simper. We give the processors of ayer i, at the time they get the first message from a processor in ayer i 1, a the other messages they wi get from ayer i 1 in the future, as we as the actua vaues of 1,..., i 1. As this extra information can ony hep the processors to make the broadcast faster, we are aowed to make this assumption. Let t i be the random variabe indicating the number of rounds from the time the processors of ayer i get the message (and become active) unti their success (the first time that a singe processor in ayer i transmits). We need to show that for some choice of 1,..., D we get E Π ( D i=1 t i)=ω(d og(n/d)), where the expectation is taken over the random choices of the agorithm Π. Certainy, it is enough to show that E 1,..., D,Π( D i=1 t i)=ω(d og(n/d)). By inearity of expectation, we get E 1,..., D,Π ( D ) t i = i=1 D E 1,..., D,Π(t i ). So a we have to bound now is E 1,..., D,Π(t i ). Ceary, the choice of i+1,..., D has i=1

10 LOWER BOUND FOR BROADCAST IN RADIO NETWORKS 711 no infuence on the expectation of t i ; i.e., E 1,..., D,Π(t i )=E 1,..., i,π(t i ). Aso, by the discussion above, with every history (which depends on the random choices made in the first i 1 ayers, incuding the choice of 1,..., i 1 )wecan associate a probabiity distribution µ used by the processors in ayer i to choose their schedues. (Note that since we assume that the processors of ayer i get a the future information with the first message, they can make a their random choices at this time.) Therefore, we can write E 1,..., i,π(t i )= E i,π(t i 1 = b 1,..., i 1 = b i 1 ) Pr[ 1 = b 1,..., i 1 = b i 1 ]. b 1,...,b i 1 (4) It remains to bound the expression E i,π(t i 1 = b 1,..., i 1 = b i 1 ). As mentioned, we aow the processors at ayer i to have access to b 1,...,b i 1 (the actua vaues of 1,..., i 1 ). Therefore, we need to evauate E i,π i (t i ), where Π i is the protoco at ayer i, with the additiona information about the ower ayers. By Lemma 1, for each such Π i, E i,π i (t i ) c og n for some constant c. Therefore, for every b 1,...,b i 1,wehave which by (4), impies This impies E i,π(t i 1 = b 1,..., i 1 = b i 1 ) c og n, E 1,..., D,Π E 1,..., i,π(t i ) c og n. ( D ) t i =Ω(Dog n) =Ω(Dog(N/D)), i=1 which competes the proof of our main theorem. Theorem 7. For any nonuniform broadcast protoco, for every number of processors N and every diameter D, there exists a network in which the expected time to compete a broadcast is Ω(D og(n/d)). When D N 1 ε, the above proof shows a ower bound of Ω(D og N). Combining our resut with the resuts of Aon et a. [ABLP91] and Bar-Yehuda, Godreich, and Itai [BGI92], we have the foowing tight resut. Coroary 8. For any nonuniform broadcast protoco, for every number of processors N and every diameter D, there exists a network in which the time to compete a broadcast is Ω(og 2 N + D og(n/d)). Furthermore, there is a (uniform) protoco that requires ony O(og 2 N + D og N) expected time (which is tight for D N 1 ε ). Note that unike [ABLP91] we show that for any protoco there exists a network for which the ower bound hods, whie they prove that there exists a network on which any protoco requires the ower bound.

11 712 EYAL KUSHILEVITZ AND YISHAY MANSOUR Acknowedgments. We wish to thank Oded Godreich and the anonymous referees for their very usefu comments. REFERENCES [ABLP91] N. Aon, A. Bar-Noy, N. Linia, and D. Peeg, A ower bound for radio broadcast, J. Comput. System Sci., 43 (1991), pp [ABLP92] N. Aon, A. Bar-Noy, N. Linia, and D. Peeg, Singe round simuation on radio networks, J. Agorithms, 13 (1992), pp [BGI91] R. Bar-Yehuda, O. Godreich, and A. Itai, Efficient emuation of singe-hop radio network with coision detection on muti-hop radio network with no coision detection, Distrib. Comput., 5 (1991), pp [BGI92] R. Bar-Yehuda, O. Godreich, and A. Itai, On the time-compexity of broadcast in muti-hop radio networks: An exponentia gap between determinism and randomization, J. Comput. System Sci., 45 (1992), pp [BII93] R. Bar-Yehuda, A. Israei, and A. Itai, Mutipe communication in muti-hop radio networks, SIAM J. Comput., 22 (1993), pp [CK85a] I. Chamtac and S. Kutten, On broadcasting in radio networks probem anaysis and protoco design, IEEE Trans. Comm., COM-33 (1985), pp [CK85b] I. Chamtac and S. Kutten, A spatia reuse TDMA/FDMA for mobie muti-hop radio networks, in INFOCOM, 1985, pp [CK87] I. Chamtac and S. Kutten, Tree-based broadcasting in mutihop radio networks, IEEECOM, C-36 (1987), pp [CW87] I. Chamtac and O. Weinstein, The wave expansion approach to broadcasting in mutihop radio networks, in INFOCOM, pp , [Ga85] R. Gaager, A perspective on mutiaccess channes, IEEE Trans. Inform. Theory, 31 (1985), pp [GM95] I. Gaber and Y. Mansour, Broadcast in radio networks, in Proc. 6th ACM-SIAM Symposium on Discrete Agorithms, SIAM, 1995, pp [KM93] E. Kushievitz and Y. Mansour, An Ω(D og(n/d)) ower bound for broadcast in radio networks, in Proc. 12th ACM Symp. on Principes of Distributed Computing, 1993, pp [Tan81] A. S. Tanenbaum, Computer Networks, Prentice-Ha, Engewood Ciffs, NJ, [Wi86] D. E. Wiard, Log-ogarithmic seection resoution protocos in a mutipe access channe, SIAM J. Comput., 15 (1986), pp

Rateless Codes for the Gaussian Multiple Access Channel

Rateless Codes for the Gaussian Multiple Access Channel Rateess Codes for the Gaussian Mutipe Access Channe Urs Niesen Emai: uniesen@mitedu Uri Erez Dept EE, Te Aviv University Te Aviv, Israe Emai: uri@engtauaci Devavrat Shah Emai: devavrat@mitedu Gregory W

More information

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm

Announcements. Tuesday April 15 covers material from chapters: 1-3, 5-6 emphasis on material since last midterm Announcements Reading Today: 4.1 & 4.2 (skip 4.2.4 and 4.2.5) Second Midterm: Tuesday Apri 15 covers materia from chapters: 1-3, 5-6 emphasis on materia since ast midterm CMSC 417 - S97 (ect 18) copyright

More information

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks

Resource Allocation via Linear Programming for Multi-Source, Multi-Relay Wireless Networks Resource Aocation via Linear Programming for Muti-Source, Muti-Reay Wireess Networs Nariman Farsad and Andrew W Ecford Dept of Computer Science and Engineering, Yor University 4700 Keee Street, Toronto,

More information

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES

GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCLES VO. 10, NO. 18, OCTOBER 2015 ISSN 1819-6608 GRAY CODE FOR GENERATING TREE OF PERMUTATION WITH THREE CYCES Henny Widowati 1, Suistyo Puspitodjati 2 and Djati Kerami 1 Department of System Information, Facuty

More information

Capacity of Data Collection in Arbitrary Wireless Sensor Networks

Capacity of Data Collection in Arbitrary Wireless Sensor Networks This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. 1 Capacity of Data Coection in Arbitrary Wireess

More information

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution

Channel Division Multiple Access Based on High UWB Channel Temporal Resolution Channe Division Mutipe Access Based on High UWB Channe Tempora Resoution Rau L. de Lacerda Neto, Aawatif Menouni Hayar and Mérouane Debbah Institut Eurecom B.P. 93 694 Sophia-Antipois Cedex - France Emai:

More information

Network Control by Bayesian Broadcast

Network Control by Bayesian Broadcast IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. IT-33, NO. 3, MAY 1987 323 Network Contro by Bayesian Broadcast RONALD L. RIVEST Abstract-A transmission contro strategy is described for sotted- ALOHA-type

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks roceedings of the 46th IEEE Conference on Decision and Contro New Oreans, LA, USA, Dec. 12-14, 27 FrB2.5 ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao,

More information

SCHEDULING the wireless links and controlling their

SCHEDULING the wireless links and controlling their 3738 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 7, JULY 2014 Minimum Length Scheduing With Packet Traffic Demands in Wireess Ad Hoc Networks Yacin Sadi, Member, IEEE, and Sinem Coeri Ergen,

More information

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection?

Dealing with Link Blockage in mmwave Networks: D2D Relaying or Multi-beam Reflection? Deaing with Lin Bocage in mmwave etwors: DD Reaying or Muti-beam Refection? Mingjie Feng, Shiwen Mao Dept. Eectrica & Computer Engineering Auburn University, Auburn, AL 36849-5, U.S.A. Tao Jiang Schoo

More information

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection

Distribution of Path Durations in Mobile Ad-Hoc Networks and Path Selection Distribution of ath Durations in Mobie Ad-Hoc Networks and ath Seection Richard J. La and Yijie Han Abstract We investigate the issue of path seection in mutihop wireess networks with the goa of identifying

More information

Cooperative Caching in Dynamic Shared Spectrum Networks

Cooperative Caching in Dynamic Shared Spectrum Networks Fina version appears in IEEE Trans. on Wireess Communications, 206. Cooperative Caching in Dynamic Shared Spectrum Networs Dibaar Das, Student Member, IEEE, and Ahussein A. Abouzeid, Senior Member, IEEE

More information

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM

Rate-Allocation Strategies for Closed-Loop MIMO-OFDM Rate-Aocation Strategies for Cosed-Loop MIMO-OFDM Joon Hyun Sung and John R. Barry Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, Atanta, Georgia 30332 0250, USA Emai: {jhsung,barry}@ece.gatech.edu

More information

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic

Satellite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Sateite Link Layer Performance Using Two Copy SR-ARQ and Its Impact on TCP Traffic Jing Zhu and Sumit Roy Department of Eectrica Engineering, University of Washington Box 352500, Seatte, WA 98195, USA

More information

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks

Joint Optimal Power Allocation and Relay Selection with Spatial Diversity in Wireless Relay Networks Proceedings of SDR'11-WInnComm-Europe, 22-24 Jun 2011 Joint Optima Power Aocation and Reay Seection with Spatia Diversity in Wireess Reay Networks Md Habibu Isam 1, Zbigniew Dziong 1, Kazem Sohraby 2,

More information

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks

An Evaluation of Connectivity in Mobile Wireless Ad Hoc Networks An Evauation of Connectivity in Mobie Wireess Ad Hoc Networks Paoo Santi Istituto di Informatica e Teematica Area dea Ricerca de CNR Via G.Moruzzi, 5624 Pisa Itay santi@iit.cnr.it Dougas M. Bough Schoo

More information

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel

On the Relationship Between Queuing Delay and Spatial Degrees of Freedom in a MIMO Multiple Access Channel On the Reationship Between Queuing Deay and Spatia Degrees of Freedom in a IO utipe Access Channe Sriram N. Kizhakkemadam, Dinesh Rajan, andyam Srinath Dept. of Eectrica Engineering Southern ethodist University

More information

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks

An Optimization Framework for XOR-Assisted Cooperative Relaying in Cellular Networks n Optimization Framework for XOR-ssisted Cooperative Reaying in Ceuar Networks Hong Xu, Student Member, IEEE, Baochun Li, Senior Member, IEEE bstract This work seeks to address two questions in cooperative

More information

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits

Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits Secure Physica Layer Key Generation Schemes: Performance and Information Theoretic Limits Jon Waace Schoo of Engineering and Science Jacobs University Bremen, Campus Ring, 879 Bremen, Germany Phone: +9

More information

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS

PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER FDMA SYSTEMS PROPORTIONAL FAIR SCHEDULING OF UPLINK SINGLE-CARRIER SYSTEMS Junsung Lim, Hyung G. Myung, Kyungjin Oh and David J. Goodman Dept. of Eectrica and Computer Engineering, Poytechnic University 5 Metrotech

More information

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique

Availability Analysis for Elastic Optical Networks with Multi-path Virtual Concatenation Technique Progress In Eectromagnetics Research Symposium Proceedings, Guangzhou, China, Aug. 25 28, 2014 849 Avaiabiity Anaysis for Eastic Optica Networks with Muti-path Virtua Concatenation Technique Xiaoing Wang

More information

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks

Joint Congestion Control, Routing and Media Access Control Optimization via Dual Decomposition for Ad Hoc Wireless Networks Joint Congestion Contro, Routing and Media Access Contro Optimization via Dua Decomposition for Ad Hoc Wireess Networks Francesco Lo Presti Dipartimento di Informatica Università de L Aquia opresti@di.univaq.it

More information

A Randomized Algorithm for Gossiping in Radio Networks

A Randomized Algorithm for Gossiping in Radio Networks A Randomized Algorithm for Gossiping in Radio Networks Marek Chrobak Department of Computer Science, University of California, Riverside, California 92521 Leszek Ga sieniec Department of Computer Science,

More information

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN

THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN THE TRADEOFF BETWEEN DIVERSITY GAIN AND INTERFERENCE SUPPRESSION VIA BEAMFORMING IN A CDMA SYSTEM Yan Zhang, Laurence B. Mistein, and Pau H. Siege Department of ECE, University of Caifornia, San Diego

More information

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM

Performance Measures of a UWB Multiple-Access System: DS/CDMA versus TH/PPM Performance Measures of a UWB Mutipe-Access System: DS/CDMA versus TH/PPM Aravind Kaias and John A. Gubner Dept. of Eectrica Engineering University of Wisconsin-Madison Madison, WI 53706 akaias@wisc.edu,

More information

Resource Allocation via Linear Programming for Fractional Cooperation

Resource Allocation via Linear Programming for Fractional Cooperation 1 Resource Aocation via Linear Programming for Fractiona Cooperation Nariman Farsad and Andrew W Ecford Abstract In this etter, resource aocation is considered for arge muti-source, muti-reay networs empoying

More information

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W.

Cross-layer queuing analysis on multihop relaying networks with adaptive modulation and coding K. Zheng 1 Y. Wang 1 L. Lei 2 W. www.ietd.org Pubished in IET Communications Received on 18th June 2009 Revised on 30th Juy 2009 ISSN 1751-8628 Cross-ayer queuing anaysis on mutihop reaying networks with adaptive moduation and coding

More information

Network-Wide Broadcast

Network-Wide Broadcast Massachusetts Institute of Technology Lecture 10 6.895: Advanced Distributed Algorithms March 15, 2006 Professor Nancy Lynch Network-Wide Broadcast These notes cover the first of two lectures given on

More information

Relays that Cooperate to Compute

Relays that Cooperate to Compute Reays that Cooperate to Compute Matthew Nokeby Rice University nokeby@rice.edu Bobak Nazer Boston University bobak@bu.edu Behnaam Aazhang Rice University aaz@rice.edu Natasha evroye University of Iinois

More information

Run to Potential: Sweep Coverage in Wireless Sensor Networks

Run to Potential: Sweep Coverage in Wireless Sensor Networks Run to Potentia: Sweep Coverage in Wireess Sensor Networks Min Xi,KuiWu,Yong Qi,Jizhong Zhao, Yunhao Liu,MoLi Department of Computer Science, Xi an Jiaotong University, China Department of Computer Science,

More information

A Distributed Utility Max-Min Flow Control Algorithm

A Distributed Utility Max-Min Flow Control Algorithm A Distributed tiity Max-Min Fow Contro Agorithm Hyang-Won Lee and Song Chong Department of Eectrica Engineering and Computer Science Korea Advanced Institute of Science and Technoogy (KAIST) mshw@netsys.kaist.ac.kr,

More information

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual

LBI Mobile Communications. EDACS TM Jessica. PBX Gateway. Operator s Manual Mobie Communications EDACS TM Jessica PBX Gateway Operator s Manua TABLE OF CONTENTS 1. SCOPE... 3 2. QUICK USAGE GUIDE... 4 2.1. Making Phone Cas From An EDACS Radio... 4 2.2. Caing EDACS Radios From

More information

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks

Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Energy-Aware Scheduing with Quaity of Surveiance Guarantee in Wireess Sensor Networks Jaehoon Jeong, Sarah Sharafkandi, and David H.C. Du Dept. of Computer Science and Engineering, University of Minnesota

More information

Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring

Distributed Learning for Multi-Channel Selection in Wireless Network Monitoring Distributed Learning for Muti-Channe Seection in Wireess Network Monitoring Yuan Xue, Pan Zhou, ao Jiang, Shiwen Mao and Xiaoei Huang Department of Computer Science and Engineering, Lehigh University,

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication Under Channel Uncertainties: A Stable Matching Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication Under Channe Uncertainties: A Stabe Matching Approach Monowar Hasan, Student Member, IEEE, and Ekram Hossain, Feow, IEEE Abstract

More information

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition

Joint Optimization of Scheduling and Power Control in Wireless Networks: Multi-Dimensional Modeling and Decomposition This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TMC.2018.2861859,

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

Information Theoretic Radar Waveform Design for Multiple Targets

Information Theoretic Radar Waveform Design for Multiple Targets 1 Information Theoretic Radar Waveform Design for Mutipe Targets Amir Leshem and Arye Nehorai Abstract In this paper we use information theoretic approach to design radar waveforms suitabe for simutaneousy

More information

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic

Joint Spectrum Access and Pricing in Cognitive Radio Networks with Elastic Traffic Joint Spectrum Access and Pricing in Cognitive Radio Networks with Eastic Traffic Joceyne Eias University of Bergamo E-mai: joceyne.eias@unibg.it Fabio Martignon University of Bergamo E-mai: fabio.martignon@unibg.it

More information

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies

Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Distributed Broadcast Scheduling in Mobile Ad Hoc Networks with Unknown Topologies Guang Tan, Stephen A. Jarvis, James W. J. Xue, and Simon D. Hammond Department of Computer Science, University of Warwick,

More information

Wireless Communications

Wireless Communications Wireess Communications Ceuar Concept Hamid Bahrami Reference: Rappaport Chap3 Eectrica & Computer Engineering Statements of Probems Soving the probem of Spectra congestion System Capacity A system-eve

More information

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM

FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM FAULT-TOLERANT AND REAL-TIME WIRELESS SENSOR NETWORK FOR CONTROL SYSTEM by Wenchen Wang Bacheor of Engineering, Northeastern University, China 2013 M.S. in Computer Science, University of Pittsburgh, 2017

More information

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access

A Low Complexity VCS Method for PAPR Reduction in Multicarrier Code Division Multiple Access 0 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY OF CHINA, VOL. 5, NO., JUNE 007 A Low Compexity VCS Method for PAPR Reduction in Muticarrier Code Division Mutipe Access Si-Si Liu, Yue iao, Qing-Song Wen,

More information

arxiv: v1 [cs.it] 22 Aug 2007

arxiv: v1 [cs.it] 22 Aug 2007 Voice Service Support in Mobie Ad Hoc Networks Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Dept. of Eec. & Comp. Eng., University of Aberta, Canada, hai.jiang@ece.uaberta.ca Dept. of Eec.

More information

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM

Fox-1E (RadFxSat-2) Telemetry and Whole Orbit Data Simulation. Burns Fisher, W2BFJ Carl Wick, N3MIM Fox-1E (RadFxSat-2) Teemetry and Whoe Orbit Data Simuation Burns Fisher, W2BFJ Car Wick, N3MIM 1 Review: Fox-1 DUV Teemetry Fox-1A through Fox-1D are FM Repeater Sateites» Ony a singe downink frequency»

More information

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems

Joint Beamforming and Power Optimization with Iterative User Clustering for MISO-NOMA Systems This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 0.09/ACCESS.07.70008,

More information

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations

On the Effectiveness of Sleep Modes in Backbone Networks with Limited Configurations On the Effectiveness of Seep Modes in Backbone Networks with Limited Configurations Luca Chiaravigio, Antonio Cianfrani 2,3 ) Eectronics and Teecommunications Department, Poitecnico di Torino, Torino,

More information

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL

ADAPTIVE ITERATION SCHEME OF TURBO CODE USING HYSTERESIS CONTROL ADATIV ITRATION SCHM OF TURBO COD USING HYSTRSIS CONTROL Chih-Hao WU, Kenichi ITO, Yung-Liang HUANG, Takuro SATO Received October 9, 4 Turbo code, because of its remarkabe coding performance, wi be popuar

More information

arxiv: v1 [cs.dc] 9 Oct 2017

arxiv: v1 [cs.dc] 9 Oct 2017 Constant-Length Labeling Schemes for Deterministic Radio Broadcast Faith Ellen Barun Gorain Avery Miller Andrzej Pelc July 11, 2017 arxiv:1710.03178v1 [cs.dc] 9 Oct 2017 Abstract Broadcast is one of the

More information

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS

COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS COMPARATIVE ANALYSIS OF ULTRA WIDEBAND (UWB) IEEE80.15.3A CHANNEL MODELS FOR nlos PROPAGATION ENVIRONMENTS Ms. Jina H. She PG Student C.C.E.T, Wadhwan, Gujarat, Jina_hshet@yahoo.com Dr. K. H. Wandra Director

More information

Utility-Proportional Fairness in Wireless Networks

Utility-Proportional Fairness in Wireless Networks IEEE rd Internationa Symposium on Persona, Indoor and Mobie Radio Communications - (PIMRC) Utiity-Proportiona Fairness in Wireess Networks G. Tychogiorgos, A. Gkeias and K. K. Leung Eectrica and Eectronic

More information

On optimizing low SNR wireless networks using network coding

On optimizing low SNR wireless networks using network coding On optimizing ow SNR wireess networks using network coding Mohit Thakur Institute for communications engineering, Technische Universität München, 80290, München, Germany. Emai: mohit.thakur@tum.de Murie

More information

Cross-Layer Design for Downlink Multi-Hop Cloud Radio Access Networks with Network Coding

Cross-Layer Design for Downlink Multi-Hop Cloud Radio Access Networks with Network Coding Cross-Layer Design for Downin Muti-Hop Coud Radio Access Networs with Networ Coding Liang Liu, Member, IEEE and Wei Yu, Feow, IEEE Abstract arxiv:1606.08950v1 [cs.it] 29 Jun 2016 There are two fundamentay

More information

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels

Iterative Transceiver Design for Opportunistic Interference Alignment in MIMO Interfering Multiple-Access Channels Journa of Communications Vo. 0 No. February 0 Iterative Transceiver Design for Opportunistic Interference Aignment in MIMO Interfering Mutipe-Access Channes Weipeng Jiang ai Niu and Zhiqiang e Schoo of

More information

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization

On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization On the Time-Complexity of Broadcast in Multi-Hop Radio Networks: An Exponential Gap Between Determinism and Randomization Reuven Bar-Yehuda Oded Goldreich Alon Itai Department of Computer Science Technion

More information

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks

Minimizing Distribution Cost of Distributed Neural Networks in Wireless Sensor Networks 1 Minimizing Distribution Cost of Distributed Neura Networks in Wireess Sensor Networks Peng Guan and Xiaoin Li Scaabe Software Systems Laboratory, Department of Computer Science Okahoma State University,

More information

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE

NEW RISK ANALYSIS METHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE The 14 th Word Conference on Earthquake Engineering NEW RISK ANALYSIS ETHOD to EVALUATE BCP of SUPPLY CHAIN DEPENDENT ENTERPRISE Satoru Nishikawa 1, Sei ichiro Fukushima 2 and Harumi Yashiro 3 ABSTRACT

More information

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri

Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks. Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Selective Families, Superimposed Codes and Broadcasting on Unknown Radio Networks Andrea E.F. Clementi Angelo Monti Riccardo Silvestri Introduction A radio network is a set of radio stations that are able

More information

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS

Yongxiang Zhao Brookhaven National Laboratory Upton, NY, July 1998 CENTER FOR ACCELERATOR PHYSICS BNL CAP CCII, 65685 225-MUON-98C A NEW STRUCTURE OF LINEAR COLLIDER * Yongxiang Zhao Brookhaven Nationa Laboratory Upton, NY, 11973 RECEIVED AIK 1 7 1998 OSTI *This work was supported by the US Department

More information

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS

TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS TEMPORAL FAIRNESS ENHANCED SCHEDULING FOR COOPERATIVE RELAYING NETWORKS IN LOW MOBILITY FADING ENVIRONMENTS Ingmar Hammerström, Jian Zhao, and Armin Wittneben Swiss Federa Institute of Technoogy (ETH)

More information

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints

Sparse Beamforming Design for Network MIMO System with Per-Base-Station Backhaul Constraints Sparse Beamforming Design for Networ MIMO System with Per-Base-Station Bachau Constraints Binbin Dai and Wei Yu Department of Eectrica and Computer Engineering University of Toronto, Toronto, Ontario M5S

More information

Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1

Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio Ultra-Wideband Systems 1 Optima and Suboptima Finger Seection Agorithms for MMSE Rake Receivers in Impuse Radio Utra-Wideband Systems Sinan Gezici, Mung Chiang, H. Vincent Poor and Hisashi Kobayashi Department of Eectrica Engineering

More information

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels

Effect of Estimation Error on Adaptive L-MRC Receiver over Nakagami-m Fading Channels Internationa Journa of Appied Engineering Research ISSN 973-456 Voume 3, Number 5 (8) pp. 77-83 Research India Pubications. http://www.ripubication.com Effect of Estimation Error on Adaptive -MRC Receiver

More information

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM

Spatial Reuse in Dense Wireless Areas: A Cross-layer Optimization Approach via ADMM IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Spatia Reuse in Dense Wireess Areas: A Cross-ayer Optimization Approach via ADMM Haeh Tabrizi, Member, IEEE, Borja Peeato, Member, IEEE, Gonaz Farhadi, Member,

More information

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network

Model of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobile Ad Hoc Network Mode of Neuro-Fuzzy Prediction of Confirmation Timeout in a Mobie Ad Hoc Network Igor Konstantinov, Kostiantyn Poshchykov, Sergej Lazarev, and Oha Poshchykova Begorod State University, Pobeda Street 85,

More information

Worst case delay analysis for a wireless point-to-point transmission

Worst case delay analysis for a wireless point-to-point transmission Worst case deay anaysis for a wireess point-to-point transmission Katia Jaffrès-Runser University of Tououse IRIT - INPT ENSEEIHT Tououse, France Emai: katia.jaffres-runser@irit.fr Abstract Wireess technoogies

More information

Wireless Communications

Wireless Communications Wireess Communications Mutipe Access Hamid Bahrami Eectrica & Computer Engineering Communication System Bock Diagram Dupexing Dupexing: transmit and receive at the same time Exampe: teephone, how about

More information

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach

Distributed Resource Allocation for Relay-Aided Device-to-Device Communication: A Message Passing Approach Distributed Resource Aocation for Reay-Aided Device-to-Device Communication: A Message Passing Approach Monowar Hasan and Ekram Hossain arxiv:406.323v [cs.ni] 2 Jun 204 Abstract Device-to-device D2D communication

More information

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays

Resource Allocation for Network-Integrated Device-to-Device Communications Using Smart Relays Resource Aocation for Network-Integrated Device-to-Device Communications Using Smart Reays Monowar Hasan and Ekram Hossain Department of Eectrica and Computer Engineering, University of Manitoba, Winnipeg,

More information

Improving the Active Power Filter Performance with a Prediction Based Reference Generation

Improving the Active Power Filter Performance with a Prediction Based Reference Generation Improving the Active Power Fiter Performance with a Prediction Based Reference Generation M. Routimo, M. Sao and H. Tuusa Abstract In this paper a current reference generation method for a votage source

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): /GLOCOM.2003. Coon, J., Siew, J., Beach, MA., Nix, AR., Armour, SMD., & McGeehan, JP. (3). A comparison of MIMO-OFDM and MIMO-SCFDE in WLAN environments. In Goba Teecommunications Conference, 3 (Gobecom 3) (Vo. 6, pp.

More information

An Approach to use Cooperative Car Data in Dynamic OD Matrix

An Approach to use Cooperative Car Data in Dynamic OD Matrix An Approach to use Cooperative Car Data in Dynamic OD Matrix Estimation L. Montero and J. Barceó Department of Statistics and Operations Research Universitat Poitècnica de Cataunya UPC-Barceona Tech Abstract.

More information

Radial basis function networks for fast contingency ranking

Radial basis function networks for fast contingency ranking Eectrica Power and Energy Systems 24 2002) 387±395 www.esevier.com/ocate/ijepes Radia basis function networks for fast contingency ranking D. Devaraj a, *, B. Yegnanarayana b, K. Ramar a a Department of

More information

OpenStax-CNX module: m Inductance. OpenStax College. Abstract

OpenStax-CNX module: m Inductance. OpenStax College. Abstract OpenStax-CNX modue: m42420 1 Inductance OpenStax Coege This work is produced by OpenStax-CNX and icensed under the Creative Commons Attribution License 3.0 Cacuate the inductance of an inductor. Cacuate

More information

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System

Fast Hybrid DFT/DCT Architecture for OFDM in Cognitive Radio System Fast Hybrid DF/D Architecture for OFDM in ognitive Radio System Zhu hen, Moon Ho Lee, Senior Member, EEE, hang Joo Kim 3 nstitute of nformation&ommunication, honbuk ationa University, Jeonju, 56-756,Korea

More information

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks

Best Relay Selection Using SNR and Interference Quotient for Underlay Cognitive Networks IEEE ICC 1 - Wireess Communications Symposium Best Reay Seection Using SNR and Interference Quotient for Underay Cognitive Networks Syed Imtiaz Hussain 1, Mohamed M. Abdaah 1, Mohamed-Sim Aouini 1,, Mazen

More information

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards

Comparison of One- and Two-Way Slab Minimum Thickness Provisions in Building Codes and Standards ACI STRUCTURAL JOURNAL Tite no. 107-S15 TECHNICAL PAPER Comparison of One- and Two-Way Sab Minimum Thickness Provisions in Buiding Codes and Standards by Young Hak Lee and Andrew Scanon Minimum thickness

More information

Coverage and Rate Analysis for Millimeter Wave Cellular Networks

Coverage and Rate Analysis for Millimeter Wave Cellular Networks Coverage and Rate Anaysis for Miimeter Wave Ceuar Networks Tianyang Bai and Robert W. Heath, Jr. arxiv:42.643v3 cs.it 8 Oct 24 Abstract Miimeter wave mmwave) hods promise as a carrier frequency for fifth

More information

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel

On the Relationship Between Capacity and Distance in an Underwater Acoustic Communication Channel On the Reationship Between Capacity and Distance in an Underwater Acoustic Communication Channe Miica Stojanovic Massachusetts Institute of Technoogy miitsa@mit.edu ABSTRACT Path oss of an underwater acoustic

More information

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL

CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL XIV Internationa PhD Worshop OWD 00 3 October 0 CO-ORDINATE POSITION OF SENSOR IN MASS OF CUTTING TOOL G. Tymchi I. Diorditsa S. Murahovsyy R. Tymchi Nationa Technica University of Uraine "Kiev Poytechnic

More information

On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University.

On Available Bandwidth in FDDI-Based Recongurable Networks. Sanjay Kamat, Gopal Agrawal, and Wei Zhao. Texas A&M University. On Avaiabe Bandwidth in FDDI-Based Recongurabe Networks Sanjay Kamat, Gopa Agrawa, and Wei Zhao Department of Computer Science Teas A&M University Coege Station, Teas 77843-3112 Abstract The increasing

More information

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor Networks

A Process Algebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireless Sensor Networks A Process Agebraic Framework for Estimating the Energy Consumption in Ad-hoc Wireess Sensor Networks L. Gaina, A. Marin, S. Rossi Università Ca Foscari Venezia, Itay {gaina,marin,srossi}@dais.unive.it

More information

Acknowledged Broadcasting and Gossiping in ad hoc radio networks

Acknowledged Broadcasting and Gossiping in ad hoc radio networks Acknowledged Broadcasting and Gossiping in ad hoc radio networks Jiro Uchida 1, Wei Chen 2, and Koichi Wada 3 1,3 Nagoya Institute of Technology Gokiso-cho, Syowa-ku, Nagoya, 466-8555, Japan, 1 jiro@phaser.elcom.nitech.ac.jp,

More information

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel

Co-channel Interference Suppression Techniques for STBC OFDM System over Doubly Selective Channel Co-channe Interference Suppression Techniques for STBC OFDM System over Douby Seective Channe Jyoti P. Patra Dept. of Eectronics and Communication Nationa Institute Of Technoogy Rourkea-769008, India E

More information

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION

LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION LSTM TIME AND FREQUENCY RECURRENCE FOR AUTOMATIC SPEECH RECOGNITION Jinyu Li, Abderahman Mohamed, Geoffrey Zweig, and Yifan Gong Microsoft Corporation, One Microsoft Way, Redmond, WA 98052 { jinyi, asamir,

More information

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2

Performance Comparison of Cyclo-stationary Detectors with Matched Filter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 2 ISSN 319-8885 Vo.3,Issue.39 November-14, Pages:7859-7863 www.ijsetr.com Performance Comparison of Cyco-stationary Detectors with Matched Fiter and Energy Detector M. SAI SINDHURI 1, S. SRI GOWRI 1 PG Schoar,

More information

Low Delay Wind Noise Cancellation for Binaural Hearing Aids

Low Delay Wind Noise Cancellation for Binaural Hearing Aids INTER-NOISE 6 Low Deay Wind Noise Canceation for Binaura Hearing Aids Nobuhio HIRUMA ; Ryousue KOUYAMA ; Hidetoshi NAKASHIMA 3 ; Yoh-ichi FUJISAKA 4, 4 Rion Co., Ltd, Japan, 3 Nationa Institute of Technoogy,

More information

Multi-user video streaming using unequal error protection network coding in wireless networks

Multi-user video streaming using unequal error protection network coding in wireless networks Vukobratović and Stanković EURASIP Journa on Wireess Communications and Networking 202, 202:28 RESEARCH Open Access Muti-user video streaming using unequa error protection network coding in wireess networks

More information

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM

Effect of Interfering Users on the Modulation Order and Code Rate for UWB Impulse-Radio Bit-Interleaved Coded M-ary PPM Effect of Interfering Users on the Moduation Order and Code Rate for UWB Impuse-Radio Bit-Intereaved Coded M-ary PPM Ruben Merz and Jean-Yves Le Boudec EPFL, Schoo of Computer and Communication Sciences

More information

QoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation

QoS-Driven MAC-Layer Resource Allocation for Wireless Mesh Networks with Non-Altruistic Node Cooperation and Service Differentiation IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 2, DECEMBER 2009 QoS-Driven MAC-Layer Resource Aocation for Wireess Mesh Networks with n-atruistic de Cooperation and Service Differentiation Ho

More information

U. of Toronto Dept. of Comp. Science Dept. of Comp. Science

U. of Toronto Dept. of Comp. Science Dept. of Comp. Science On Power-Law Reationships of the Internet Topoogy Michais Faoutsos Petros Faoutsos U.C. Riverside U. of Toronto Dept. of Comp. Science Dept. of Comp. Science michais@cs.ucr.edu pfa@cs.toronto.edu Christos

More information

Suppression of ISI Caused by Sampling Time Offset in IFDMA Systems

Suppression of ISI Caused by Sampling Time Offset in IFDMA Systems Suppression of ISI Caused by Samping Time Offset in IFDA Systems Aexander Arkhipov, ichae Schne German Aerospace Center (DLR), Inst. of Communications and Navigation, D-82234, Wessing, Germany. Phone/e-mai:

More information

FOR energy limited data networks, e.g., sensor networks,

FOR energy limited data networks, e.g., sensor networks, 578 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., DECEMBER 009 An Optima Power Aocation Scheme for the STC Hybrid ARQ over Energy Limited Networks Hongbo Liu, Member, IEEE, Leonid Razoumov,

More information

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS

CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS CAPACITY OF UNDERWATER WIRELESS COMMUNICATION CHANNEL WITH DIFFERENT ACOUSTIC PROPAGATION LOSS MODELS Susan Joshy and A.V. Babu, Department of Eectronics & Communication Engineering, Nationa Institute

More information

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS

SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS SURGE ARRESTERS FOR CABLE SHEATH PREVENTING POWER LOSSES IN M.V. NETWORKS A. Heiß Energie-AG (EAM), Kasse G. Bazer Darmstadt University of Technoogy O. Schmitt ABB Caor Emag Schatanagen, Mannheim B. Richter

More information

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University.

A Game-theoretic Approach to Power Management in MIMO-OFDM. Ad Hoc Networks. A Dissertation. Submitted to the Faculty. Drexel University. A Game-theoretic Approach to Power Management in MIMO-OFDM Ad Hoc Networks A Dissertation Submitted to the Facuty of Drexe University by Chao Liang in partia fufiment of the requirements for the degree

More information

Sensor Network Gossiping or How to Break the Broadcast Lower Bound

Sensor Network Gossiping or How to Break the Broadcast Lower Bound Sensor Network Gossiping or How to Break the Broadcast Lower Bound Martín Farach-Colton 1 Miguel A. Mosteiro 1,2 1 Department of Computer Science Rutgers University 2 LADyR (Distributed Algorithms and

More information

Marketing tips and templates

Marketing tips and templates For financia adviser use ony. Not approved for use with customers. Marketing tips and tempates Heping you to grow your equity reease business The growing equity reease market can offer many opportunities

More information

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA

Copyright 2000 IEEE. IEEE Global Communications Conference (Globecom 2000), November 27 - December 1, 2000, San Francisco, California, USA Copyright 2000 EEE. EEE Goba Communications Conference (Gobecom 2000), November 27 - December 1, 2000, San Francisco, Caifornia, USA Persona use of this materia is permitted. owever, permission to reprint/repubish

More information

Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold

Analytical Modeling of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshold Anaytica Modeing of Wi-Fi and LTE-LAA Coexistence: Throughput and Impact of Energy Detection Threshod Morteza Mehrnoush, Vanin Sathya, Sumit Roy, and Monisha Ghosh University of Washington, Seatte, WA-99

More information