The User Capacity of Barrage Relay Networks

Size: px
Start display at page:

Download "The User Capacity of Barrage Relay Networks"

Transcription

1 The User Capacity of Barrage Relay Networks Thomas R. Halford TrellisWare Techologies, Ic Via Esprillo, Suite 300 Sa Diego, CA Thomas A. Courtade Ceter for Sciece of Iformatio Staford Uiversity Staford, CA Kurt A. Turck Networkig Techology Brach Air Force Research Laboratory Rome, NY Abstract Barrage relay etworks (BRNs) are a class of mobile ad hoc etworks based o a autoomous cooperative commuicatios scheme that affords a distributed, rapid, ad robust broadcast mechaism. BRN-based radios are curretly beig used operatioally; uderstadig scalig laws for BRNs ca thus shed light o how future systems ought be desiged to address a wider rage of military missios. It has previously bee show that BRNs scale optimally for broadcast traffic (i terms of sum throughput ad latecy). Furthermore, experimetal evidece supports the scalability of BRNs i practice: a 215-ode etwork of TrellisWare s BRN-based CheetahNet radios was demostrated i 2010 as part of the Rim of the Pacific (RIMPAC) exercise. I this work, we study scalig laws for uicast i BRNs. The spatial extet of uicast trasmissios i BRNs ca be cotaied via cotrolled barrage regios (CBRs), while barrage access cotrol protocols which are a type of path-orieted medium access cotrol (PO-MAC) protocol ca be used to schedule CBRs i space ad time. Traditioal techiques for scalig aalysis support either autoomous cooperatio or PO- MAC protocols; we therefore study the fudametal limits of CBR-based protocols through the les of user capacity, which we defie as the maximum umber of costat-rate, delay-optimal uicast flows that a -ode etwork ca simultaeously support. The user capacity of dese etworks operatig uder a CBR protocol is show to scale as Θ( ) whe source-destiatio pairs are chose radomly. BRNs are thus able to trasport Θ( / log ) bit-meters/sec, which is order optimal (i the Gupta-Kumar sese). If the source-destiatio pairs are istead chose so that their separatio (i hops) is a geometric radom variable, the the user capacity scales as Θ(/ log ). Thus, i a wireless etwork domiated by localized traffic, BRNs ca achieve throughput that is almost liear i the umber of users. Fially, it is show via software simulatio that distributed, greedy algorithms provide order optimal schedulig of CBRs for both the radom ad localized traffic models. This suggests that scalable protocols for uicast i BRNs ca be realized i practice. I. INTRODUCTION I respose to the limited success of traditioal, strictly layered approaches to mobile ad hoc etwork (MANET) architectures for military applicatios (cf., [1 3]), barrage relay etworks were desiged from the groud up to meet the demads of commuicatios at the tactical edge [4]. As Approved for Public Release; Distributio Ulimited: 88ABW dated 20 Jul ACKNOWLEDGMENT OF SUPPORT AND DIS- CLAIMER: (a) Cotractor ackowledges Govermet s support i the publicatio of this paper. This material is based upo work fuded by AFRL uder AFRL Cotract No. FA C (b) Ay opiios, fidigs ad coclusios or recommedatios expressed i this material are those of the author(s) ad do ot ecessarily reflect the views of AFRL. detailed i [5], BRNs utilize time divisio multiple access (TDMA) ad cooperative commuicatios as the basis of a efficiet broadcast protocol wherei packets ripple out from a source i pipelied spatial waves. This broadcast mechaism is the fudametal physical layer resource i a BRN; barrage access cotrol (BAC) protocols operatig at Layer 2 coordiate which ode is the broadcast source o ay give time slot, rather tha which poit-to-poit liks are active. It was show i [5] that BRNs provide optimal broadcast scalig: i a etwork where each ode ca trasmit W bits/sec, the sum throughput that ca be achieved by a arbitrary umber of broadcast sources scales as 1 Θ(W ). BRNs were proposed iitially for platoo-sized missios domiated by latecy-critical, broadcast ad multicast traffic (e.g., push-to-talk (PTT) voice ad real-time streamig video). Icreasigly, BRN-based radios are beig used to support larger missios ad richer classes of data services. For example, the Marie Corps Warfightig Laboratory deployed a 215- ode etwork of TrellisWare s CheetahNet radios as part of the Limited Objective Experimet 4 (LOE-4) exercise at RIMPAC Durig this exercise, applicatios that are iheretly uicast (e.g., IP chat) were supported i additio to broadcast services such as PTT voice ad positio locatio iformatio (PLI) moitorig. Such practical use cases motivate the study of efficiet protocols for uicast trasport i BRNs. The buildig blocks for uicast protocol desig i BRNs have bee described i [5 8]. Briefly, the spatial extet of trasmissios i BRNs ca be be cotaied via cotrolled barrage regios (CBRs). BAC protocols ca be used to schedule CBRs that are multiplexed i both space ad time (i.e., more tha oe uicast source is active o ay time slot). This work studies the fudametal limits that gover ay protocol employig CBRs for uicast trasmissio i BRNs. The assumptios made i traditioal scalig studies [9] fail to capture two saliet features of BRNs: cooperative commuicatios ad path-orieted medium access cotrol techiques that reserve etire multihop routes at Layer 2. We therefore study scalig laws for BRNs through the les of user capacity, which we defie as the maximum umber of costat-rate, delay-optimal uicast flows that a -ode 1 A fuctio f() =Ω(g()) if costats 0 ad c such that f() cg(), > 0. Similarly, f() =O (g()) if f() cg(), > 0.Iff() is Ω(g()) ad O (g()), the we say f() = Θ(g()). Throughout, o(1) deotes a quatity that vaishes as /12/$ IEEE

2 etwork ca simultaeously support. I the cotext of BAC protocols, user capacity ca be iterpreted as the maximum umber of CBRs that ca be accessed at ay give time. I a tactical sceario, user capacity measures, for example, how may streamig video feeds ca be simultaeously supported, a measure ot readily derived from the aalysis of [9]. Usig several ew results that are derived i a appedix, we demostrate i Sectio III that the user capacity of BRNs employig CBRs scales as Θ( ) whe the source ad destiatio odes are paired radomly. BRNs are thus capable of trasportig Θ( / log ) bit-meters/sec ad ca achieve the trasport capacity defied by Gupta ad Kumar [9]. Ituitively, this result idicates that although a give CBR cotais more odes tha is strictly required for uicast trasport the CBR cotais all possible shortest paths from the source to the destiatio, rather tha a sigle shortest path this does ot affect asymptotic scalability (all the while dramatically icreasig the reliability [10] ad stability [8] of multihop data trasport). It is further demostrated i Sectio III that the user capacity of BRNs employig CBRs scales as Θ(/ log ) whe the distaces betwee uicast source/destiatio pairs is geometrically distributed. Thus, i a wireless etwork domiated by localized traffic, BRNs ca achieve throughput that is almost liear i the umber of users. Fially, it is show via software simulatio i Sectio III that distributed, greedy algorithms provide order optimal schedulig of CBRs for both the radom ad localized traffic models. This suggests that scalable protocols for uicast trasport i BRNs ca be realized i practice. This paper cocludes i Sectio IV with a discussio of the desig challeges associated with such practical protocols. A. Network Model II. MODELS AND METRICS We adopt the stadard radom etwork model i this work wherei odes are distributed radomly o the uit square ad commuicatio at a rate of W bits/sec is possible betwee two odes if ad oly if they are separated by less tha the trasmissio rage r(). A key result i geometric radom graph theory asserts that the threshold o r() required for such a etwork to be coected scales as [11, 12]: ( ) log r() Θ. (1) This critical desity is assumed throughout. Whe simulatig radom etworks i Sectio III, a trasmissio rage of r () = 3 log (2) 2 π is assumed to assure coectivity with high probability 2. 2 A evet E occurs with high probability if α>1 there is a appropriate choice of costats for which E occurs with probability at least 1 O(1/ α ). B. Cotrolled Barrage Regios ad CBR Protocols Due to space limitatios, the reader is referred to [5] for a full descriptio of BRNs. It suffices presetly to describe CBRs. Briefly, cotrolled barrage regios ca be established by a reactive protocol as follows. Cotrol messages broadcast by the source (s) ad destiatio (d) of a uicast flow iform odes of their respective distace to s ad d i hops, as well as the distace of the shortest path from s to d. Nodes the use these three distaces to ascertai whether they are o ay of the shortest paths from s to d, i which case they are iterior to the CBR ad relay messages from s per the barrage cooperative decode-ad-forward protocol. Nodes that are ot iterior to the CBR, but which are eighbors of iterior odes, suppress their relay fuctio so that exteral packets do ot propagate ito the CBR, or do iteral packets propagate to the rest of the etwork. I this way, multiple uicast trasmissios may be established i the etwork. Defiitio 1 (CBR Protocol): A CBR protocol is a mechaism that establishes a cotrolled barrage regio such that a ode is iterior to the CBR if ad oly if it lies o ay shortest path coectig the source ad destiatio. C. Path-Orieted Medium Access Cotrol Although we focus primarily o BRNs, the results preseted herei ca be iterpreted i the cotext of ay PO-MAC protocol that reserves etire source-destiatio (s-d) paths at Layer 2 (e.g., [1]). Observe that a istataeous throughput of W/3 bits/sec ca be achieved alog what is effectively a multihop lie etwork uder such protocols. Furthermore, this trasmissio is delay-optimal: the ed-to-ed latecy depeds oly o the average s-d hop distace ad ot o, for example, the umber of two-hop eighbors of ay relay ode. Our goal i this paper is to compare the CBR protocol to the performace attaiable by ay etwork that employs a PO- MAC protocol. To this ed, we make the followig defiitio: Defiitio 2 (PO-MAC User Capacity): The PO-MAC user capacity is the maximum umber of mutually o-iterferig uicast flows that ca be simultaeously supported by a wireless etwork usig a PO-MAC protocol. Observe that these flows support Θ(W )-throughput, delay optimal data trasport provided the PO-MAC reserves etire routes. We show i the Sectio III that CBR protocols attai order optimal scalig with respect to the PO-MAC user capacity. D. Uicast Traffic Models Fially, we cosider two differet types of traffic model which represet the extremes of global ad local traffic i this paper. I a realistic sceario, the traffic geeratio process would likely be a mixture of these two extremes. Defiitio 3 (Uiform Traffic): Uicast traffic is said to be geerated accordig to the uiform traffic model if /2 distict source-destiatio pairs are chose radomly from the etwork odes. Note that the uiform traffic model is equivalet to radomly placig /2 source-destiatio pairs i the plae ad geeratig the iduced radom geometric graph.

3 Defiitio 4 (Localized Traffic): Uicast traffic is said to be geerated accordig to the localized traffic model with mea β if /2 distict sources are chose from the set of vertices, ad for each source s, a destiatio is chose uiformly from the set of vertices that are H(u) hops away from s. Here, H(u) is a geometric radom variable with mea β. I the localized traffic model, it is possible that a ode is a source for oe uicast flow ad a destiatio for aother distict albeit mutually iterferig flow. III. MAIN RESULTS AND DISCUSSION A. Results All of our results assume that the uderlyig etwork is modeled as a dese radom geometric graph with coectivity radius r() = Θ( log /) chose sufficietly large to esure coectivity with high probability (w.h.p.). All results hold with high probability i. With the exceptio of the first result, we delay proofs util the appedix. Mai Result 1: Uder ay traffic model, a etwork operatig uder a PO-MAC protocol supports at most O(/ log ) simultaeous uicast flows. Proof: A PO-MAC protocol reserves paths i a etwork, oe per uicast flow, ad the paths must be mutually oiterferig. Each path creates a iterferece regio of area greater tha πr() 2 sice it must cotai at least oe trasmittig ode. Dividig the area of the uit square by πr() 2 yields the desired upper boud. This first mai result places a upper limit o the user capacity of ay etwork employig a PO-MAC protocol, ad hece a upper limit o the umber of CBRs that ca be accessed simultaeously i a BRN. Ituitively, this upper boud results from the iterferece footprit of the source odes aloe. Our secod mai result idicates that this upper boud is i fact achievable i BRNs whe traffic is localized: Mai Result 2: A BRN etwork usig a CBR protocol supports Θ(/ log ) simultaeous flows uder the assumptios of the radom localized traffic model. Note that Result 1 does ot imply that ay Θ(/ log )- sized subset of the /2 flows i a realizatio of the localized traffic model ca be supported. Istead, it says that the size of the largest simultaeously supportable subset scales as Θ(/ log ). Result 1 ca be combied with the lower boud implicit i Result 2 i.e., if a CBR protocol achieves Ω(/ log ) user capacity the at least oe path-orieted MAC protocol has bee show to do so to yield a scalig law that characterizes the user capacity for etworks operatig with ay PO-MAC protocol uder the localized traffic model. Mai Result 3: Uder the localized traffic model, the PO- MAC user capacity scales as Θ(/ log ). Results 2 ad 3 together are iterestig as they demostrate that CBR protocols scale as well as ay path-orieted MAC protocol. That is to say, the additioal relay odes reserved i a CBR beyod the shortest path route odes do ot affect asymptotic scalability whe traffic is localized. It was show i [10] ad [8] that these additioal relay odes serve to ehace the reliability ad stability, respectively, of multihop data trasport, eve over 2- ad 3-hop CBRs. Our last two aalytical results cocer the trasport capacity of BRNs ad the umber of uicast flows that ca be supported by a BRN uder the assumptios of the uiform traffic model. Mai Result 4: Uder the uiform traffic model, a BRN employig a CBR protocol supports Θ( ) simultaeous uicast flows. Mai Result 5: Uder the uiform traffic model, a BRN employig a CBR protocol is capable of trasportig 3 Θ( / log ) bit-meters/sec ad therefore ca achieve the trasport capacity i the sese of [9]. Result 5 shows that, up to some costat factor that is idepedet of the etwork size, BRNs ca trasport as much data as arbitrary wireless etworks architectures. Sice shortest paths betwee vertices i a sufficietly dese radom geometric graph ca be approximated by straight-lie segmets, the results derived i the ext sectio suggest that uder the uiform traffic model, a etwork operatig uder a PO-MAC protocol ca support at most O( ) simultaeous traffic flows. This leads to the followig cojecture: Cojecture 1: A barrage relay etwork employig a CBR protocol achieves the PO-MAC user capacity (i the sese of order-optimal scalig) for the radom uiform traffic model. The proofs of these results hit that a greedy CBR formatio protocol ca be employed to achieve the user capacity. To this ed, we have simulated a greedy CBR formatio protocol uder each traffic model. The umerical results strogly idicate that the performace of a greedy CBR formatio protocol coicides with the optimal scalig results give i the above results. Simulatio results are give i Figure 1. B. Discussio By their very ature, BRNs embrace the fudametal broadcast characteristic of the the wireless medium rather tha try to cotrol it via a collisio avoidace mechaism. It was demostrated i [5] that a simple Layer 2 protocol achieves order optimal scalig for broadcast traffic. However, if the rapid broadcast mechaism is left uchecked, BRNs suffer from scalability issues for uicast ad multicast traffic sice a sigle multicast iteded for a small group of receivers ca moopolize the etire etwork for the duratio of the trasmissio. Employig a protocol that uses CBRs to cotai the spatial extet of BRN broadcasts is oe method of copig with this scalability issue. While the CBR protocol is a atural extesio of the traditioal barrage framework, it was ukow util ow whether it would scale i a optimal maer for uicast traffic. The results of the previous subsectio idicate that the aswer to this questio is affirmative for the localized traffic model, ad umerical ad aalytical evidece strogly idicate that this is the case for the uiform traffic 3 A bit-meter correspods to the trasport of 1 bit of iformatio 1 meter closer to its iteded destiatio.

4 Number of Simultaeous CBRs / log 0.46 Localized Traffic Model Uiform Traffic Model Number of Nodes i Network () Fig. 1. Simulatio results for a distributed, greedy implemetatio of the CBR protocol. The solid blue lies represet the umber of simultaeous mutually o-iterferig CBRs supported by a greedy implemetatio of the CBR protocol. The results were averaged over 100 idepedet trials for each etwork size. The vertical blue lies idicate ±1 stadard deviatio. model as well. Thus, BRNs employig a CBR protocol ejoy the simplicity ad beefits of a traditioal BRN (cf., [5]), but they also support scalig to hudreds or thousads of odes. IV. CONCLUSION I this paper we proved that BRNs employig a CBR protocol ca support Θ(/ log ) ad Θ( ) simultaeous uicast sessios uder localized ad uiform traffic models, respectively. These results prove that order-optimal throughput scalig is achieved for the localized traffic model, ad the umerical ad aalytical results strogly suggest the same statemet is true for the uiform traffic model. We have also show that the CBR protocol ca achieve the trasport capacity for the uiform traffic model. These results resolve the scalig issue for dese BRNs; future work will cosider sparse etworks from a theoretical perspective. Fially, we also demostrate that a greedy, distributed implemetatio of the CBR protocol achieves the order-optimal scalig predicted by the theoretical results. This suggests that scalable barrage relay etwork architectures ca ideed be realized i practice. We have focused oly o data scalability i this paper i.e., how efficietly a etwork uses the RF spectrum whe trasmittig Layer 4 data. The Layer 2 ad 3 cotrol overhead that is eglected i such aalysis ca be a sigificat, eve limitig, factor i practical etworks. Ideed, the desig of practical BAC protocols for barrage relay etworks requires that the overhead used to multiplex CBRs i space ad time be cotaied. While the mathematical tools to address etworkig scalig i terms of both data ad cotrol are as yet ascset (cf., [3]), the developmet of a theoretical framework for uderstadig cotrol scalability i wireless etworks will provide valuable metrics agaist which practical protocol implemeters ca measure their desigs. V. ACKNOWLEDGEMENTS We wish to thak Mike Neely of the Uiversity of Souther Califoria for suggestig the proof techique for Theorem 3, as well as his cojecture that Claim 2 ought be provable. APPENDIX The mai results preseted i Sectio III ca be immediately deduced from Theorems 1-3, all of which assume the dese radom graph etwork model described i Sectio II. Theorem 1: Uder a localized traffic model, ay PO-MAC protocol that reserves all the shortest paths betwee sourcedestiatio (S-D) pairs (e.g., a CBR protocol) ca support Ω(/ log ) simultaeous traffic flows w.h.p. Proof: Let H(u) be the (radom) umber of hops separatig a source-destiatio pair. By Markov s iequality, Pr(H(u) 2β) 1/2, where β = E[H(u)], ad thus (w.h.p.) there exists /8 S-D pairs that are at most 2β hops apart. Each of these S-D pairs, ad all the shortest paths coectig the source ad destiatio, ca each be eclosed withi a ball of radius 2βr cetered at the respective source. Now, tessellate the uit square by boxes with side legth 2 8log/. By Lemma 5.7 i [13], each of these boxes cotais at least oe source vertex w.h.p. Now, partitio the boxes ito classes of equal size so that ay two boxes i the same class are at least distace 5βr apart. Sice each box has dimesio proportioal to r, a fiite umber of classes suffices (depedig o β, but ot ). The sources cotaied i a sigle class, the correspodig destiatios, ad the correspodig shortest paths are mutually o-iterferig by costructio. Thus, ay PO-MAC protocol that reserves shortest paths betwee source-destiatio pairs ca support Ω(/ log ) simultaeous traffic flows w.h.p i. By combiig Theorem 1 with Mai Result 1 of Sectio III, we obtai the followig result: Corollary 1: Uder the localized traffic model, the PO- MAC user capacity scales as Θ(/ log ). Moreover, ay PO- MAC protocol that reserves shortest paths betwee S-D pairs scales order-optimally with respect to PO-MAC user capacity. Now, we tur our attetio toward the task of showig that BRNs with a CBR protocol ca support Θ( ) simultaeous flows whe the source-destiatio pairs are chose radomly. Before we ca accomplish this, we eed two auxiliary lemmas. The first lemma is a combiatorial result that characterizes the umber of o-crossig lie segmets i the uit square. This result is proved via the probabilistic method (cf., [14]). The secod lemma relates lie segmets to paths i a radom geometric graph. We begi with some defiitios. Let Q =[0, 1) [0, 1) deote the uit square ad let L be a set of lie segmets i Q. Defie the distace betwee two lie segmets l 1,l 2 L as the miimum distace betwee ay poit i l 1 ad ay poit i l 2. Formally, d(l 1,l 2 ) := if x y, x l 1,y l 2

5 where x y is the Euclidea distace betwee poits x, y Q. A set U of lie segmets is said to be d-disjoit if all pairs of lie segmets i U are at least distace d apart. The N d (L ):= max U L { U : d(l 1,l 2 ) d for all l 1,l 2 U} is the size of the largest d-disjoit subset of L. I what follows, we will distiguish betwee left ad right edpoits of a lie segmet. This assigmet is a artificial oe, however, it simplifies the expositio cosiderably. Defiitio 5: A lie segmet is said to be draw accordig to a uiform process if the left ad right edpoits are chose idepedetly ad uiformly from the poits i Q. Lemma 1: If L is a set of lie segmets geerated accordig to a uiform process, the with probability approachig 1 as, N d() (L ) = Θ( ) for ay d() =O( 1/4 ). Proof: We prove Lemma 1 by showig that N d() (L )= Ω( ) ad N d() (L )=O( ). Claim 1: With probability tedig to 1 as, N d() (L )=Ω( ) for ay d() =O( 1/4 ). Proof of Claim 1: Partitio Q ito disjoit squares, each of size 1/4 1/4. Note that if a lie segmet l is cotaied i a sigle square, the it will ot itersect lie segmets cotaied i ay other square. Let Y be the umber of squares that cotai lie segmets. By assumptio, there exists a iteger m such that d() m 1/4 for all. Therefore, by the pigeo-hole priciple, we ca fid at least Y (1 o(1))/(m +1) 2 squares cotaiig lie segmets that are d()-disjoit. Thus, it remais to be show that Y c with high probability for some absolute costat c. Sice the area of each square is 1/, the probability that a edpoit falls ito a particular square j is 1/. Sice edpoits are chose idepedetly, the probability that a give lie l falls etirely iside that square l is 1/, ad the probability that square j does ot cotai ay lie segmets is (1 1/) 1/e. Further, ote that: Pr [{lie l ot i square i} {lie l ot i square j}] =1 Pr [{lie l i square i} {lie l i square j}] =1 (Pr [lie l i square i]+pr[lie l i square j]) =1 2/, where we used the fact that the evets {lie l i square i} ad {lie l i square j} are disjoit. The for ay pair of squares (i, j), the probability that either square i or square j cotais ay lie segmets is (1 2/) 1/e 2. Let X i be the idicator radom variable takig value 1 if square i cotais o lie segmets ad 0 otherwise. Note that EX i e 1,Var(X i ) e 1 (1 e 1 ), ad Cov(X i,x j )=E[X i X j ] E [X i ] E [X j ] =(1 2/) (1 1/) 2 e 2 e 2 + o(1) = o(1). The, lettig X = i=1 X i be the umber of squares that do t cotai ay lie segmets, ad otig that Var(X) = Var(X i )+ Cov(X i,x j ) i i j ( ( ) ) + o(1) + ( 1)o(1) e e + o(1), Chebyshev s iequality yields: [ Pr X EX 1 ] 100 Var(X) 10 + o(1) Therefore, with probability tedig to 1, ( X 1+ 1 ) 10 + o(1) e 2. Hece, Y = X /2 with probability tedig to 1. This proves the claim. Claim 2: With probability tedig to 1 as, N d() (L )=O( ) for ay d() =O( 1/4 ). Proof of Claim 2: First, observe that it suffices to prove that N 0 (L ) = O( ) sice N d (L ) is oicreasig i d. To this ed, from [15], there exists a absolute costat c such that for ay 2k poits i the plae, the umber of o-crossig left-right 4 perfect matchigs is upper-bouded by c 29 k. Cosider ay realizatio of lie segmets i the plae ad further cosider the 2k (k left ad k right) edpoits correspodig to ay subset S cosistig of k lie segmets. Every left-right perfect matchig of these 2k poits is equally likely, ad thus the probability that these k segmets are ocrossig is upper bouded by c 29 k /k! sice there are k! leftright perfect matchigs o the 2k edpoits. Upper boudig the right had side of this expressio usig Stirlig s formula ad recallig the crude upper boud ( ) ( k e ) k k yields the followig upper boud: ( ) c 29 k Pr[ k o-crossig segmets] k k! ( 29 e 2 o(1) Lettig k =15,wehave Pr[ 15 ( 29 e 2 o-crossig segmets] o(1) 15 2 k 2 ) k ) 15 o(1) (.96) 15 0, thus completig the proofs of the claim ad Lemma 1. 4 A matchig i a graph is a set of pairwise o-adjacet edges i.e., o two edges share a commo vertex while a perfect matchig is oe that matches every vertex i the graph. A left-right perfect matchig simply distiguishes betwee left edpoits ad right edpoits i edges. I other words, a edge is oly allowed to match a left edpoit to a right edpoit.

6 Now, we state a result from [16] that relates lie-segmets to shortest paths i a radom geometric graph. Lemma 2 ([16] p. 426): For ay two vertices v 1,v 2 i a dese radom graph G, w.h.p., d G (v 1,v 2 ) K v 1 v 2 r() where d G (v 1,v 2 ) is the legth of the shortest path coectig vertices v 1 ad v 2 ad r() is the coectivity radius. Lemma 2 essetially states that the legth of a shortest path betwee two vertices is proportioal to the Euclidea distace betwee the two correspodig poits i the plae. Therefore, we ca use this lemma to coclude that the shortest paths coectig two vertices must be well-behaved. With the above lemmas i had, we ca ow prove Mai Result 4. Theorem 2: Cosider a set of /2 radomly chose distict source-destiatio pairs i a dese radom geometric graph G. With probability tedig to 1 as, there exist Ω( ) S-D pairs which geerate mutually o-iterferig CBRs. Proof: For a source-destiatio pair (s, d), deote the straight-lie segmet coectig s to d as l s,d. Sice the vertices of G are uiformly chose from Q ad the S-D pairs are chose radomly, the set of segmets coectig S-D pairs is geerated accordig to a uiform process. Defie { } T (s, d, α) = x Q : if x y α y l s,d to be the set of poits i Q that are withi distace α of l s,d. Lemma 1 states that, with high probability, there exist Θ( ) distict source-destiatio pairs such that T (s, d, 1/4 ) T (s,d, 1/4 )= for distict pairs (s, d), (s,d ). Deote this set of source-destiatio pairs as D. Lemma 2 implies (via a simple geometric exercise) that all shortest paths coectig (s, d) lie etirely i T (s, d, 0.5 1/4 ). Thus, o shortest paths coectig differet S-D pairs i D are adjacet. Sice a CBR cosists of a S-D pair ad all shortest paths coectig the source to the destiatio, the S-D pairs i D geerate mutually o-iterferig CBRs. Sice paths are closely approximated by lie segmets i a sufficietly dese radom geometric graph, Lemma 1 suggests that a etwork operatig uder ay PO-MAC ca support at most Θ( ) simultaeous flows. Thus, we cojecture that the user capacity of a etwork scales as Θ( ). To verify this cojecture, oe would eed to show that the maximum set of mutually o-iterferig routes selected usig ay metric i.e., o-shortest paths caot scale faster tha O( ). Theorem 3: Cosider a set of /2 radomly chose distict S-D pairs i dese radom geometric graph. With probability tedig to 1 as, there exist Ω( / log ) S-D pairs which geerate mutually o-iterferig CBRs. Moreover, these S-D pairs have average distace separatio Θ(1). Proof: Repeat the costructive part of the proof of Lemma 1, except divide Q ito horizotal strips of height 1/ ad width 1. With probability tedig to 1, we ca fid /2 distict strips that cotai lie segmets. By pruig the umber of strips ad keepig every ( r()) th strip, we are left with a set of Θ( / log ) lie segmets that are r()- disjoit. Call this set of lie segmets U. Cosider a sigle lie segmet l U, ad deote its edpoits i Cartesia form as: (x 1,y 1 ) ad (x 2,y 2 ). The l x 1 x 2 := L l, where the radom variable L l is idepedet from the evet {l U}which depeds oly o y 1,y 2. It is readily show that E[L l ]=Θ(1), which proves the theorem. If X i Q is the locatio of ode i i a etwork, the the trasport capacity T () is defied as the supremum of i j λ i,j X i X j, where {λ i,j : 1 i, j } is a achievable rate vector [9]. Although ot explicitly stated i the literature, T () =Θ( / log ) for the Gupta-Kumar protocol i which the trasmissio radius r() =Θ( log /) is idetical for all odes. To see that T () =O( / log ), oe ca repeat the argumet i Sectio 2.5 of [13], ad ote that the maximum umber of simultaeous trasmissios is Θ(1/r() 2 ) istead of /2. Theorem 3 gives the lower boud ad shows that the CBR protocol achieves the trasport capacity i the sese of Gupta ad Kumar. REFERENCES [1] R. Ramaatha, Challeges: A radically ew architecture for ext geeratio mobile ad hoc etworks, i Proc. ACM/IEEE It l Cof. Mobile Comp. ad Networkig, Cologe, Germay, August [2] J. K. Burbak, P. F. Chimeto, B. K. Haberma, ad W. T. Kasch, Key challeges of military tactical etworkig ad the elusive promise of MANET techology, IEEE Comms. Mag., pp , November [3] J. Adrews, N. Jidal, M. Haeggi, R. Berry, S. Jafar, D. Guo, S. Shakkottai, R. Heath, M. Neely, S. Weber, ad A. Yeer, Rethikig iformatio theory for mobile ad hoc etworks, IEEE Comms. Mag., vol. 46, o. 12, pp , December [4] A. Blair, T. Brow, K. M. Chugg, ad M. J. Johso, Tactical mobile mesh etwork system desig, i Proc. IEEE Military Comm. Cof., Orlado, FL, October [5] T. R. Halford ad K. M. Chugg, Barrage relay etworks, i Proc. Iform. Theory ad Apps. Workshop, La Jolla, CA, February [6] A. Blair, T. Brow, K. M. Chugg, T. R. Halford, ad M. Johso, Barrage relay etworks for cooperative routig i tactical MANETs, i Proc. IEEE Military Comm. Cof., Sa Diego, CA, November [7] T. R. Halford, K. M. Chugg, ad A. Polydoros, Barrage relay etworks: System ad protocol desig, i Proc. IEEE It l Symp. o Persoal, Idoor, ad Mobile Radio Comms., Istabul, Turkey, September [8] T. R. Halford ad K. M. Chugg, The stability of multihop trasport with autoomous cooperatio, i Proc. IEEE Military Comm. Cof., Baltimore, MD, November [9] P. Gupta ad P. R. Kumar, The capacity of wireless etworks, IEEE Tras. Iformatio Theory, vol. 46, o. 2, pp , March [10] T. R. Halford ad K. M. Chugg, The reliability of multihop reliability with autoomous cooperatio, i Proc. Iform. Theory ad Apps. Workshop, La Jolla, CA, February [11] M. D. Perose, The logest edge of the radom miimal spaig tree, Aals of Applied Probability, vol. 7, o. 2, pp , [12] P. Gupta ad P. R. Kumar, Stochastic Aalysis, Cotrol, Optimizatio ad Applicatios: A Volume i Hoor of W. H. Flemig. Bosto, MA: Birkhauser, 1998, ch. Critical power for asymptotic coectivity i wireless etworks, pp , eds. W. M. McEeaey, et al.. [13] F. Xue ad P. R. Kumar, Scalig laws for ad hoc wireless etworks: A iformatio theoretic approach, Foudatios ad Treds i Networkig, vol. 1, o. 2, pp , [14] N. Alo ad J. Specer, The Probabilistic Method. New York: Wiley- Itersciece, [15] M. Sharir ad E. Welzl, O the umber of crossig-free matchigs, cycles, ad partitios, SIAM J. Computig, vol. 36, o. 3, pp , [16] R. Ellis, J. Marti, ad C. Ya, Radom geometric graph diameter i the uit ball, Algorithmica, vol. 47, pp , 2007.

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS

ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Chapter ON THE FUNDAMENTAL RELATIONSHIP BETWEEN THE ACHIEVABLE CAPACITY AND DELAY IN MOBILE WIRELESS NETWORKS Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

x y z HD(x, y) + HD(y, z) HD(x, z)

x y z HD(x, y) + HD(y, z) HD(x, z) Massachusetts Istitute of Techology Departmet of Electrical Egieerig ad Computer Sciece 6.02 Solutios to Chapter 5 Updated: February 16, 2012 Please sed iformatio about errors or omissios to hari; questios

More information

Broadcast Capacity in Multihop Wireless Networks

Broadcast Capacity in Multihop Wireless Networks Broadcast Capacity i Multihop ireless Networks Alireza Keshavarz- Haddad alireza@rice.edu Viay Ribeiro viay@rice.edu Rudolf Riedi riedi@rice.edu Departmet of Electrical ad Computer Egieerig ad Departmet

More information

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks

The Throughput and Delay Trade-off of Wireless Ad-hoc Networks The Throughput ad Delay Trade-off of Wireless Ad-hoc Networks. Itroductio I this report, we summarize the papers by Gupta ad Kumar [GK2000], Grossglauser ad Tse [GT2002], Gamal, Mame, Prabhakar, ad hah

More information

Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception

Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Reception Broadcast Throughput Capacity of Wireless Ad Hoc Networks with Multipacket Receptio Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity

More information

Converge-Cast with MIMO

Converge-Cast with MIMO Coverge-Cast with MIMO Luoyi Fu, Yi Qi 2, Xibig Wag 3, Xue Liu 4,2,3 Depart. of Electroic Egieerig, Shaghai Jiaotog Uiversity, Chia 4 Depart. of Computer Sciece & Egieerig, Uiversity of Nebraska Licol,

More information

The Multicast Capacity of Large Multihop Wireless Networks

The Multicast Capacity of Large Multihop Wireless Networks The Multicast Capacity of Large Multihop Wireless Networks Sriivas Shakkottai Dept. of ECE, ad Coordiated Sciece Laboratory Uiversity of Illiois at Urbaa-Champaig sshakkot@uiuc.edu Xi Liu Dept. of Computer

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract The capacity of wireless ad hoc etwors is maily restricted by the umber

More information

Counting on r-fibonacci Numbers

Counting on r-fibonacci Numbers Claremot Colleges Scholarship @ Claremot All HMC Faculty Publicatios ad Research HMC Faculty Scholarship 5-1-2015 Coutig o r-fiboacci Numbers Arthur Bejami Harvey Mudd College Curtis Heberle Harvey Mudd

More information

The Multicast Capacity of Large Multihop Wireless Networks

The Multicast Capacity of Large Multihop Wireless Networks The Multicast Capacity of Large Multihop Wireless Networks Sriivas Shakkottai Dept. of ECE, ad Coordiated Sciece Laboratory Uiversity of Illiois at Urbaa-Champaig sshakkot@uiuc.edu Xi Liu Dept. of Computer

More information

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS

A SELECTIVE POINTER FORWARDING STRATEGY FOR LOCATION TRACKING IN PERSONAL COMMUNICATION SYSTEMS A SELETIVE POINTE FOWADING STATEGY FO LOATION TAKING IN PESONAL OUNIATION SYSTES Seo G. hag ad hae Y. Lee Departmet of Idustrial Egieerig, KAIST 373-, Kusug-Dog, Taejo, Korea, 305-70 cylee@heuristic.kaist.ac.kr

More information

Capacity of Interference-limited Three Dimensional CSMA Networks

Capacity of Interference-limited Three Dimensional CSMA Networks Capacity of Iterferece-limited Three Dimesioal CSMA Networks Tao Yag, Guoqiag Mao School of Electrical ad Iformatio Egieerig The Uiversity of Sydey Email: {tao.yag, guoqiag.mao}@sydey.edu.au Wei Zhag School

More information

7. Counting Measure. Definitions and Basic Properties

7. Counting Measure. Definitions and Basic Properties Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 7. Coutig Measure Defiitios ad Basic Properties Suppose that S is a fiite set. If A S the the cardiality of A is the umber of elemets i A, ad is

More information

8. Combinatorial Structures

8. Combinatorial Structures Virtual Laboratories > 0. Foudatios > 1 2 3 4 5 6 7 8 9 8. Combiatorial Structures The purpose of this sectio is to study several combiatorial structures that are of basic importace i probability. Permutatios

More information

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code

A New Space-Repetition Code Based on One Bit Feedback Compared to Alamouti Space-Time Code Proceedigs of the 4th WSEAS It. Coferece o Electromagetics, Wireless ad Optical Commuicatios, Veice, Italy, November 0-, 006 107 A New Space-Repetitio Code Based o Oe Bit Feedback Compared to Alamouti

More information

Hierarchical Beamforming for Large One-Dimensional Wireless Networks

Hierarchical Beamforming for Large One-Dimensional Wireless Networks Hierarchical Beamformig for Large Oe-Dimesioal Wireless Networks Alla Merzakreeva, Olivier Lévêque Swiss Federal Istitute of Techology - Lausae, Switzerlad {alla.merzakreeva, olivier.leveque}@epfl.ch Ayfer

More information

Logarithms APPENDIX IV. 265 Appendix

Logarithms APPENDIX IV. 265 Appendix APPENDIX IV Logarithms Sometimes, a umerical expressio may ivolve multiplicatio, divisio or ratioal powers of large umbers. For such calculatios, logarithms are very useful. They help us i makig difficult

More information

Network Coding Does Not Change The Multicast Throughput Order of Wireless Ad Hoc Networks

Network Coding Does Not Change The Multicast Throughput Order of Wireless Ad Hoc Networks Network Codig Does Not Chage The Multicast Throughput Order of Wireless Ad Hoc Networks Shirish Karade, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer

More information

Intermediate Information Structures

Intermediate Information Structures Modified from Maria s lectures CPSC 335 Itermediate Iformatio Structures LECTURE 11 Compressio ad Huffma Codig Jo Roke Computer Sciece Uiversity of Calgary Caada Lecture Overview Codes ad Optimal Codes

More information

Capacity of power constrained ad-hoc networks

Capacity of power constrained ad-hoc networks Capacity of power costraied ad-hoc etworks Rohit Negi, Arjua Rajeswara egi@ece.cmu.edu, arjua@cmu.edu Departmet of Electrical ad Computer Egieerig Caregie Mello Uiversity Abstract hroughput capacity is

More information

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im

sible number of wavelengths. The wave~~ngt~ ~ ~ ~ c ~ n b~dwidth is set low eno~gh to interfax One of the most im sible umber of wavelegths. The wave~~gt~ ~ ~ ~ c ~ b~dwidth is set low eo~gh to iterfax vices. Oe of the most im ed trasmitters ad ysis much more CO "The author is also f Cumputer sciece Departmet, Uiversity

More information

Lecture 4: Frequency Reuse Concepts

Lecture 4: Frequency Reuse Concepts EE 499: Wireless & Mobile Commuicatios (8) Lecture 4: Frequecy euse Cocepts Distace betwee Co-Chael Cell Ceters Kowig the relatio betwee,, ad, we ca easily fid distace betwee the ceter poits of two co

More information

On the Capacity of k-mpr Wireless Networks

On the Capacity of k-mpr Wireless Networks 3878 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 7, JULY 2009 O the Capacity of -MPR Wireless Networs Mig-Fei Guo, Member, IEEE, Xibig Wag, Member, IEEE, Mi-You Wu, Seior Member, IEEE Abstract

More information

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION

Sapana P. Dubey. (Department of applied mathematics,piet, Nagpur,India) I. INTRODUCTION IOSR Joural of Mathematics (IOSR-JM) www.iosrjourals.org COMPETITION IN COMMUNICATION NETWORK: A GAME WITH PENALTY Sapaa P. Dubey (Departmet of applied mathematics,piet, Nagpur,Idia) ABSTRACT : We are

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau Computer Laboratory, Uiversity of Cambridge; Dept. of E. & E. Egg., Uiversity College Lodo Chi-Ki.Chau@cl.cam.ac.uk Mighua Che Dept. of Iformatio

More information

PROJECT #2 GENERIC ROBOT SIMULATOR

PROJECT #2 GENERIC ROBOT SIMULATOR Uiversity of Missouri-Columbia Departmet of Electrical ad Computer Egieerig ECE 7330 Itroductio to Mechatroics ad Robotic Visio Fall, 2010 PROJECT #2 GENERIC ROBOT SIMULATOR Luis Alberto Rivera Estrada

More information

Capacity of Large-scale CSMA Wireless Networks

Capacity of Large-scale CSMA Wireless Networks Capacity of Large-scale CSMA Wireless Networks Chi-Ki Chau, Member, IEEE, Mighua Che, Member, IEEE, ad Soug Ch Liew, Seior Member, IEEE Abstract I the literature, asymptotic studies of multi-hop wireless

More information

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction

THE LUCAS TRIANGLE RECOUNTED. Arthur T. Benjamin Dept. of Mathematics, Harvey Mudd College, Claremont, CA Introduction THE LUCAS TRIANLE RECOUNTED Arthur T Bejami Dept of Mathematics, Harvey Mudd College, Claremot, CA 91711 bejami@hmcedu 1 Itroductio I 2], Neville Robbis explores may properties of the Lucas triagle, a

More information

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER

CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 95 CHAPTER 5 A NEAR-LOSSLESS RUN-LENGTH CODER 5.1 GENERAL Ru-legth codig is a lossless image compressio techique, which produces modest compressio ratios. Oe way of icreasig the compressio ratio of a ru-legth

More information

Permutation Enumeration

Permutation Enumeration RMT 2012 Power Roud Rubric February 18, 2012 Permutatio Eumeratio 1 (a List all permutatios of {1, 2, 3} (b Give a expressio for the umber of permutatios of {1, 2, 3,, } i terms of Compute the umber for

More information

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing

Application of Improved Genetic Algorithm to Two-side Assembly Line Balancing 206 3 rd Iteratioal Coferece o Mechaical, Idustrial, ad Maufacturig Egieerig (MIME 206) ISBN: 978--60595-33-7 Applicatio of Improved Geetic Algorithm to Two-side Assembly Lie Balacig Ximi Zhag, Qia Wag,

More information

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay

Efficient Feedback-Based Scheduling Policies for Chunked Network Codes over Networks with Loss and Delay Efficiet Feedback-Based Schedulig Policies for Chuked Network Codes over Networks with Loss ad Delay Aoosheh Heidarzadeh ad Amir H. Baihashemi Departmet of Systems ad Computer Egieerig, Carleto Uiversity,

More information

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks

On the Delay Performance of In-network Aggregation in Lossy Wireless Sensor Networks O the Delay Performace of I-etwork Aggregatio i Lossy Wireless Sesor Networks Chaghee Joo, Member, IEEE, ad Ness B. Shroff, Fellow, IEEE Abstract I this paper, we study the implicatio of wireless broadcast

More information

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule

Combinatorics. Chapter Permutations. Reading questions. Counting Problems. Counting Technique: The Product Rule Chapter 3 Combiatorics 3.1 Permutatios Readig questios 1. Defie what a permutatio is i your ow words. 2. What is a fixed poit i a permutatio? 3. What do we assume about mutual disjoitedess whe creatig

More information

Queuing network models for delay analysis of multihop wireless ad hoc networks q

Queuing network models for delay analysis of multihop wireless ad hoc networks q Available olie at www.sciecedirect.com Ad Hoc Networks 7 (2009) 79 97 www.elsevier.com/locate/adhoc Queuig etwork models for delay aalysis of multihop wireless ad hoc etworks q Nabhedra Bisik, Alhussei

More information

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter

Design of FPGA- Based SPWM Single Phase Full-Bridge Inverter Desig of FPGA- Based SPWM Sigle Phase Full-Bridge Iverter Afarulrazi Abu Bakar 1, *,Md Zarafi Ahmad 1 ad Farrah Salwai Abdullah 1 1 Faculty of Electrical ad Electroic Egieerig, UTHM *Email:afarul@uthm.edu.my

More information

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs

Cross-Layer Performance of a Distributed Real-Time MAC Protocol Supporting Variable Bit Rate Multiclass Services in WPANs Cross-Layer Performace of a Distributed Real-Time MAC Protocol Supportig Variable Bit Rate Multiclass Services i WPANs David Tug Chog Wog, Jo W. Ma, ad ee Chaig Chua 3 Istitute for Ifocomm Research, Heg

More information

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1

}, how many different strings of length n 1 exist? }, how many different strings of length n 2 exist that contain at least one a 1 1. [5] Give sets A ad B, each of cardiality 1, how may fuctios map A i a oe-tooe fashio oto B? 2. [5] a. Give the set of r symbols { a 1, a 2,..., a r }, how may differet strigs of legth 1 exist? [5]b.

More information

arxiv: v2 [math.co] 15 Oct 2018

arxiv: v2 [math.co] 15 Oct 2018 THE 21 CARD TRICK AND IT GENERALIZATION DIBYAJYOTI DEB arxiv:1809.04072v2 [math.co] 15 Oct 2018 Abstract. The 21 card trick is well kow. It was recetly show i a episode of the popular YouTube chael Numberphile.

More information

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress.

H2 Mathematics Pure Mathematics Section A Comprehensive Checklist of Concepts and Skills by Mr Wee Wen Shih. Visit: wenshih.wordpress. H2 Mathematics Pure Mathematics Sectio A Comprehesive Checklist of Cocepts ad Skills by Mr Wee We Shih Visit: weshih.wordpress.com Updated: Ja 2010 Syllabus topic 1: Fuctios ad graphs 1.1 Checklist o Fuctios

More information

Unit 5: Estimating with Confidence

Unit 5: Estimating with Confidence Uit 5: Estimatig with Cofidece Sectio 8.2 The Practice of Statistics, 4 th editio For AP* STARNES, YATES, MOORE Uit 5 Estimatig with Cofidece 8.1 8.2 8.3 Cofidece Itervals: The Basics Estimatig a Populatio

More information

Using Color Histograms to Recognize People in Real Time Visual Surveillance

Using Color Histograms to Recognize People in Real Time Visual Surveillance Usig Color Histograms to Recogize People i Real Time Visual Surveillace DANIEL WOJTASZEK, ROBERT LAGANIERE S.I.T.E. Uiversity of Ottawa, Ottawa, Otario CANADA daielw@site.uottawa.ca, lagaier@site.uottawa.ca

More information

On Parity based Divide and Conquer Recursive Functions

On Parity based Divide and Conquer Recursive Functions O Parity based Divide ad Coquer Recursive Fuctios Sug-Hyu Cha Abstract The parity based divide ad coquer recursio trees are itroduced where the sizes of the tree do ot grow mootoically as grows. These

More information

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters?

1. How many possible ways are there to form five-letter words using only the letters A H? How many such words consist of five distinct letters? COMBINATORICS EXERCISES Stepha Wager 1. How may possible ways are there to form five-letter words usig oly the letters A H? How may such words cosist of five distict letters? 2. How may differet umber

More information

A New Design of Log-Periodic Dipole Array (LPDA) Antenna

A New Design of Log-Periodic Dipole Array (LPDA) Antenna Joural of Commuicatio Egieerig, Vol., No., Ja.-Jue 0 67 A New Desig of Log-Periodic Dipole Array (LPDA) Atea Javad Ghalibafa, Seyed Mohammad Hashemi, ad Seyed Hassa Sedighy Departmet of Electrical Egieerig,

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Iformatio Trasmissio System Lab. Spread Spectrum Sigal for Digital Commuicatios Istitute of Commuicatios Egieerig Natioal Su Yat-se Uiversity Spread Spectrum Commuicatios Defiitio: The trasmitted

More information

X-Bar and S-Squared Charts

X-Bar and S-Squared Charts STATGRAPHICS Rev. 7/4/009 X-Bar ad S-Squared Charts Summary The X-Bar ad S-Squared Charts procedure creates cotrol charts for a sigle umeric variable where the data have bee collected i subgroups. It creates

More information

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance

Time-Space Opportunistic Routing in Wireless Ad Hoc Networks, Algorithms and Performance Time-Space Opportuistic Routig i Wireless Ad Hoc Networks, Algorithms ad Performace Fraçois Baccelli, Bartlomiej Blaszczyszy, Paul Muhlethaler To cite this versio: Fraçois Baccelli, Bartlomiej Blaszczyszy,

More information

PERMUTATION AND COMBINATION

PERMUTATION AND COMBINATION MPC 1 PERMUTATION AND COMBINATION Syllabus : Fudametal priciples of coutig; Permutatio as a arragemet ad combiatio as selectio, Meaig of P(, r) ad C(, r). Simple applicatios. Permutatios are arragemets

More information

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks Optimizig Route Legth i Reactive Protocols for Ad Hoc Networks Thomas Heide Clause *,PhilippeJacquetadLauretVieot INRIA Rocquecourt, Projet Hipercom, Domaie de Voluceau, B.P. 5, 7853 Le Chesay cedex, Frace

More information

13 Legislative Bargaining

13 Legislative Bargaining 1 Legislative Bargaiig Oe of the most popular legislative models is a model due to Baro & Ferejoh (1989). The model has bee used i applicatios where the role of committees have bee studies, how the legislative

More information

Zonerich AB-T88. MINI Thermal Printer COMMAND SPECIFICATION. Zonerich Computer Equipments Co.,Ltd MANUAL REVISION EN 1.

Zonerich AB-T88. MINI Thermal Printer COMMAND SPECIFICATION. Zonerich Computer Equipments Co.,Ltd  MANUAL REVISION EN 1. Zoerich AB-T88 MINI Thermal Priter COMMAND SPECIFICATION MANUAL REVISION EN. Zoerich Computer Equipmets Co.,Ltd http://www.zoerich.com Commad List Prit ad lie feed Prit ad carriage retur Trasmissio real-time

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 12 EECS 70 Discrete Mathematics ad Probability Theory Sprig 204 Aat Sahai Note 2 Probability Examples Based o Coutig We will ow look at examples of radom experimets ad their correspodig sample spaces, alog

More information

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION

BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION BOTTLENECK BRANCH MARKING FOR NOISE CONSOLIDATION IN MULTICAST NETWORKS Jordi Ros, Wei K. Tsai ad Mahadeve Iyer Departmet of Electrical ad Computer Egieerig Uiversity of Califoria, Irvie, CA 92697 {jros,

More information

Cooperative Spectrum Sensing in Cognitive Radio Networks

Cooperative Spectrum Sensing in Cognitive Radio Networks Cooperative Spectrum Sesig i Cogitive Radio Networks Ghurumuruha Gaesa ad Ye (Geoffrey) Li School of Electrical ad Computer Egieerig Georgia Istitute of Techology, Atlata, Georgia 30332 0250 Abstract I

More information

PHY-MAC dialogue with Multi-Packet Reception

PHY-MAC dialogue with Multi-Packet Reception PHY-AC dialogue with ulti-packet Receptio arc Realp 1 ad Aa I. Pérez-Neira 1 CTTC-Cetre Tecològic de Telecomuicacios de Cataluya Edifici Nexus C/Gra Capità, - 0803-Barceloa (Cataluya-Spai) marc.realp@cttc.es

More information

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1

SELEX Elsag. 5/18/2012 R. Pucci SDR 12 WinnComm 1 SELEX Elsag 5/18/01 R. Pucci SDR 1 WiComm 1 Military BU - SELEX Elsag Possible update of SDR Platforms to COGNITIVE architectures COGNITIVE MANAGER INTERFACE Geolocatio, Voice, Video, etc Applicatio Policy

More information

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks

Energy-Optimal Online Algorithms for Broadcasting in Wireless Networks Eergy-Optimal Olie Algorithms for Broadcastig i Wireless Networks Shay Kutte, Hirotaka Oo, David Peleg, Kuihiko Sadakae, ad Masafumi Yamashita Abstract The paper cosiders the desig of eergy-efficiet olie

More information

Ch 9 Sequences, Series, and Probability

Ch 9 Sequences, Series, and Probability Ch 9 Sequeces, Series, ad Probability Have you ever bee to a casio ad played blackjack? It is the oly game i the casio that you ca wi based o the Law of large umbers. I the early 1990s a group of math

More information

PERMUTATIONS AND COMBINATIONS

PERMUTATIONS AND COMBINATIONS www.sakshieducatio.com PERMUTATIONS AND COMBINATIONS OBJECTIVE PROBLEMS. There are parcels ad 5 post-offices. I how may differet ways the registratio of parcel ca be made 5 (a) 0 (b) 5 (c) 5 (d) 5. I how

More information

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks 2013 IEEE Wireless Commuicatios ad Networkig Coferece (WCNC): MAC Broadcastig i Multichael Cogitive Radio Ad Hoc Networks Zaw Htike Departmet of Computer Egieerig Kyug Hee Uiversity 1 Seocheo,Giheug, Yogi,

More information

E X P E R I M E N T 13

E X P E R I M E N T 13 E X P E R I M E N T 13 Stadig Waves o a Strig Produced by the Physics Staff at Colli College Copyright Colli College Physics Departmet. All Rights Reserved. Uiversity Physics, Exp 13: Stadig Waves o a

More information

General Model :Algorithms in the Real World. Applications. Block Codes

General Model :Algorithms in the Real World. Applications. Block Codes Geeral Model 5-853:Algorithms i the Real World Error Correctig Codes I Overview Hammig Codes Liear Codes 5-853 Page message (m) coder codeword (c) oisy chael decoder codeword (c ) message or error Errors

More information

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna

History and Advancement of the Family of Log Periodic Toothed Planer Microstrip Antenna Joural of Electromagetic Aalysis ad Applicatios, 2011, 3, 242-247 doi:10.4236/jemaa.2011.36039 Published Olie Jue 2011 (http://www.scirp.org/joural/jemaa) History ad Advacemet of the Family of Log Periodic

More information

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series

Roberto s Notes on Infinite Series Chapter 1: Series Section 2. Infinite series Roberto s Notes o Ifiite Series Chapter : Series Sectio Ifiite series What you eed to ow already: What sequeces are. Basic termiology ad otatio for sequeces. What you ca lear here: What a ifiite series

More information

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II

ECE 333: Introduction to Communication Networks Fall Lecture 4: Physical layer II ECE 333: Itroductio to Commuicatio Networks Fall 22 Lecture : Physical layer II Impairmets - distortio, oise Fudametal limits Examples Notes: his lecture cotiues the discussio of the physical layer. Recall,

More information

TO DETERMINE THE NUMERICAL APERTURE OF A GIVEN OPTICAL FIBER. 2. Sunil Kumar 3. Varun Sharma 4. Jaswinder Singh

TO DETERMINE THE NUMERICAL APERTURE OF A GIVEN OPTICAL FIBER. 2. Sunil Kumar 3. Varun Sharma 4. Jaswinder Singh TO DETERMINE THE NUMERICAL APERTURE OF A GIVEN OPTICAL FIBER Submitted to: Mr. Rohit Verma Submitted By:. Rajesh Kumar. Suil Kumar 3. Varu Sharma 4. Jaswider Sigh INDRODUCTION TO AN OPTICAL FIBER Optical

More information

ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT

ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT Joural of Egieerig Sciece ad Techology Vol. 12, No. 7 (2017) 1845-1854 School of Egieerig, Taylor s Uiversity ROBUST RADIO RESOURCE ALLOCATION IN LTE NETWORKS BY CHANNEL AND RELAY ASSIGNMENT R. SANTHAKUMAR*,

More information

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks

Enhancement of the IEEE MAC Protocol for Scalable Data Collection in Dense Sensor Networks Ehacemet of the IEEE 8.5. MAC Protocol for Scalable Data Collectio i Dese Sesor Networks Kira Yedavalli Departmet of Electrical Egieerig - Systems Uiversity of Souther Califoria Los Ageles, Califoria,

More information

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications

Measurements of the Communications Environment in Medium Voltage Power Distribution Lines for Wide-Band Power Line Communications Measuremets of the Commuicatios viromet i Medium Voltage Power Distributio Lies for Wide-Bad Power Lie Commuicatios Jae-Jo Lee *,Seug-Ji Choi *,Hui-Myoug Oh *, Wo-Tae Lee *, Kwa-Ho Kim * ad Dae-Youg Lee

More information

3. Error Correcting Codes

3. Error Correcting Codes 3. Error Correctig Codes Refereces V. Bhargava, Forward Error Correctio Schemes for Digital Commuicatios, IEEE Commuicatios Magazie, Vol 21 No1 11 19, Jauary 1983 Mischa Schwartz, Iformatio Trasmissio

More information

A Class of Interconnection Networks for Multicasting

A Class of Interconnection Networks for Multicasting A Class of Itercoectio Networks for Multicastig Yuayua Yag Departmet of Computer Sciece ad Electrical Egieerig Uiversity of Vermot, Burligto, VT 05405 yag@cs.uvm.edu Abstract Multicast or oe-to-may commuicatios

More information

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7

Tehrani N Journal of Scientific and Engineering Research, 2018, 5(7):1-7 Available olie www.jsaer.com, 2018, 5(7):1-7 Research Article ISSN: 2394-2630 CODEN(USA): JSERBR 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38

More information

Management of a Shared Spectrum Network in Wireless Communications

Management of a Shared Spectrum Network in Wireless Communications Maagemet of a Shared Spectrum Network i Wireless Commuicatios Shiig Wu, Jiheg Zhag, Rachel Q. Zhag Departmet of Logistics ad Maritime Studies The Hog Kog Polytechic Uiversity, Hog Kog Departmet of Idustrial

More information

Cooperative Diversity Based on Code Superposition

Cooperative Diversity Based on Code Superposition 1 Cooperative Diversity Based o Code Superpositio Lei Xiao, Thomas E. Fuja, Jörg Kliewer, Daiel J. Costello, Jr. Departmet of Electrical Egieerig, Uiversity of Notre Dame, Notre Dame, IN 46556, USA Email:

More information

A study on the efficient compression algorithm of the voice/data integrated multiplexer

A study on the efficient compression algorithm of the voice/data integrated multiplexer A study o the efficiet compressio algorithm of the voice/data itegrated multiplexer Gyou-Yo CHO' ad Dog-Ho CHO' * Dept. of Computer Egieerig. KyiigHee Uiv. Kiheugup Yogiku Kyuggido, KOREA 449-71 PHONE

More information

CS3203 #5. 6/9/04 Janak J Parekh

CS3203 #5. 6/9/04 Janak J Parekh CS3203 #5 6/9/04 Jaak J Parekh Admiistrivia Exam o Moday All slides should be up We ll try ad have solutios for HWs #1 ad #2 out by Friday I kow the HW is due o the same day; ot much I ca do, uless you

More information

ELEC 350 Electronics I Fall 2014

ELEC 350 Electronics I Fall 2014 ELEC 350 Electroics I Fall 04 Fial Exam Geeral Iformatio Rough breakdow of topic coverage: 0-5% JT fudametals ad regios of operatio 0-40% MOSFET fudametals biasig ad small-sigal modelig 0-5% iodes (p-juctio

More information

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains

Fingerprint Classification Based on Directional Image Constructed Using Wavelet Transform Domains 7 Figerprit Classificatio Based o Directioal Image Costructed Usig Wavelet Trasform Domais Musa Mohd Mokji, Syed Abd. Rahma Syed Abu Bakar, Zuwairie Ibrahim 3 Departmet of Microelectroic ad Computer Egieerig

More information

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer

Compound Controller for DC Motor Servo System Based on Inner-Loop Extended State Observer BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 6, No 5 Special Issue o Applicatio of Advaced Computig ad Simulatio i Iformatio Systems Sofia 06 Prit ISSN: 3-970; Olie ISSN:

More information

4. INTERSYMBOL INTERFERENCE

4. INTERSYMBOL INTERFERENCE DATA COMMUNICATIONS 59 4. INTERSYMBOL INTERFERENCE 4.1 OBJECT The effects of restricted badwidth i basebad data trasmissio will be studied. Measuremets relative to itersymbol iterferece, usig the eye patter

More information

Node Deployment Coverage in Large Wireless Sensor Networks

Node Deployment Coverage in Large Wireless Sensor Networks Node Deploymet Coverage i Large Wireless Sesor Networks Gayarti Devi Professor, Dept. of CSE, ABIT, Cuttack-753014, Odisha, Idia. Rajeeb Sakar Bal Seior Lecturer, Dept. of CSE, ABIT, Cuttack-753014, Odisha,

More information

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003

Introduction to Wireless Communication Systems ECE 476/ECE 501C/CS 513 Winter 2003 troductio to Wireless Commuicatio ystems ECE 476/ECE 501C/C 513 Witer 2003 eview for Exam #1 March 4, 2003 Exam Details Must follow seatig chart - Posted 30 miutes before exam. Cheatig will be treated

More information

Measurement-Based Opportunistic Feedback and Scheduling for Wireless Systems

Measurement-Based Opportunistic Feedback and Scheduling for Wireless Systems Measuremet-Based Opportuistic Feedbac ad Schedulig for Wireless Systems Gustavo de Veciaa ad Shailesh Patil Wireless Networig ad Commuicatios Group Dept. of Electrical ad Computer Egieerig The Uiversity

More information

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS

COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS COMPRESSION OF TRANSMULTIPLEXED ACOUSTIC SIGNALS Mariusz Ziółko, Przemysław Sypka ad Bartosz Ziółko Departmet of Electroics, AGH Uiversity of Sciece ad Techology, al. Mickiewicza 3, 3-59 Kraków, Polad,

More information

SIDELOBE SUPPRESSION IN OFDM SYSTEMS

SIDELOBE SUPPRESSION IN OFDM SYSTEMS SIDELOBE SUPPRESSION IN OFDM SYSTEMS Iva Cosovic Germa Aerospace Ceter (DLR), Ist. of Commuicatios ad Navigatio Oberpfaffehofe, 82234 Wesslig, Germay iva.cosovic@dlr.de Vijayasarathi Jaardhaam Muich Uiversity

More information

Combined Scheme for Fast PN Code Acquisition

Combined Scheme for Fast PN Code Acquisition 13 th Iteratioal Coferece o AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT- 13, May 6 8, 009, E-Mail: asat@mtc.edu.eg Military Techical College, Kobry Elkobbah, Cairo, Egypt Tel : +(0) 4059 4036138, Fax:

More information

Summary of Random Variable Concepts April 19, 2000

Summary of Random Variable Concepts April 19, 2000 Summary of Radom Variable Cocepts April 9, 2000 his is a list of importat cocepts we have covered, rather tha a review that derives or explais them. he first ad primary viewpoit: A radom process is a idexed

More information

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio

Performance Analysis of Channel Switching with Various Bandwidths in Cognitive Radio Performace Aalysis of Chael Switchig with Various Badwidths i Cogitive Radio Po-Hao Chag, Keg-Fu Chag, Yu-Che Che, ad Li-Kai Ye Departmet of Electrical Egieerig, Natioal Dog Hwa Uiversity, 1,Sec.2, Da-Hsueh

More information

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks

Optimal Geolocation Updating for Location Aware Service Provisioning in Wireless Networks Optimal Geolocatio Updatig for Locatio Aware Service Provisioig i Wireless Networks Siri Tekiay Amer Catovic tekiay@adm.jit.edu axc4466@jit.edu New Jersey Istitute of Techology Uiversity Heights, Newark,

More information

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel

Decode-forward and Compute-forward Coding Schemes for the Two-Way Relay Channel Decode-forward ad Compute-forward Codig Schemes for the Two-Way Relay Chael Peg Zhog ad Mai Vu Departmet of Electrical ad Computer Egieerig McGill Uiversity Motreal, QC, Caada H3A A7 Emails: peg.zhog@mail.mcgill.ca,

More information

Joint Rate Control and Scheduling for Real-Time Wireless Networks

Joint Rate Control and Scheduling for Real-Time Wireless Networks Joit Rate Cotrol ad Schedulig for Real-Time Wireless Networks Shuai Zuo, I-Hog Hou, Tie Liu, Aathram Swami, ad Prithwish Basu Abstract This paper studies wireless etworks with multiple real-time flows

More information

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario

A Framework for Analysis of Connectivity and Performance Bounds in Ad Hoc Networks and Its Application to a Slotted-ALOHA Scenario JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, VOL., NO., SEPTEMBER 005 35 A Framework for Aalysis of Coectivity ad Performace Bouds i Ad Hoc Networks ad Its Applicatio to a Slotted-ALOHA Sceario Fabrizio

More information

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73,

CS 201: Adversary arguments. This handout presents two lower bounds for selection problems using adversary arguments ëknu73, CS 01 Schlag Jauary 6, 1999 Witer `99 CS 01: Adversary argumets This hadout presets two lower bouds for selectio problems usig adversary argumets ëku73, HS78, FG76ë. I these proofs a imagiary adversary

More information

Joint Power Allocation and Beamforming for Cooperative Networks

Joint Power Allocation and Beamforming for Cooperative Networks It. J. Commuicatios, etwork ad System Scieces,, 4, 447-45 doi:.436/ijcs..4753 Published Olie July (http://www.scirp.org/joural/ijcs) Joit Power Allocatio ad Beamformig for Cooperative etworks Sodes Maadi,,

More information

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks

Optimization of Fractional Frequency Reuse in Long Term Evolution Networks 2012 IEEE Wireless Commuicatios ad Networkig Coferece: Mobile ad Wireless Networks Optimizatio of Fractioal Frequecy Reuse i Log Term Evolutio Networks Dimitrios Bilios 1,2, Christos Bouras 1,2, Vasileios

More information

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks

Optimizing Route Length in Reactive Protocols for Ad Hoc Networks Optimizig Route Legth i Reactive Protocols for Ad Hoc Networks Thomas Clause, Philippe Jacquet, Lauret Vieot To cite this versio: Thomas Clause, Philippe Jacquet, Lauret Vieot. Optimizig Route Legth i

More information

Interference-aware Multipath Video Streaming for Quality Delivery in Vehicular Environments

Interference-aware Multipath Video Streaming for Quality Delivery in Vehicular Environments Page of 0 0 0 0 0 0 Iterferece-aware Multipath Video Streamig for Quality Delivery i Vehicular Eviromets Ahmed Aliyu, Abdul Haa Abdullah, Member IEEE, Nauma Aslam, Member IEEE, Raja Zahilah Raja Mohd Radzi,

More information

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network

Optimization of Base Station and Maximizing the Lifetime of Wireless Sensor Network Optimizatio of Base Statio ad Maximizig the Lifetime of Wireless Sesor Network P.Parthiba 1, G.Sudararaj 2, K.A.Jagadheesh 3, P.Maiiarasa 4 SS1 Research Scholar, P.S.G College of Techology, Coimbatore,

More information